MIMIX Availability. Version 7.1 MIMIX Operations 5250

Size: px
Start display at page:

Download "MIMIX Availability. Version 7.1 MIMIX Operations 5250"

Transcription

1 MIMIX Availability Version 7.1 MIMIX Operations 5250

2 Notices MIMIX Operations User Guide January 2014 Version: Copyright 1999, 2014 Vision Solutions, Inc. All rights reserved. The information in this document is subject to change without notice and is furnished under a license agreement. This document is proprietary to Vision Solutions, Inc., and may be used only as authorized in our license agreement. No portion of this manual may be copied or otherwise reproduced without the express written consent of Vision Solutions, Inc. Vision Solutions provides no expressed or implied warranty with this manual. The following are trademarks or registered trademarks of their respective organizations or companies: MIMIX and Vision Solutions are registered trademarks and AutoGuard, Data Manager, Director, Dynamic Apply, ECS/400, GeoCluster, IntelliStart, Integrator, ioptimize, itera, itera Availability, MIMIX AutoNotify, MIMIX Availability, MIMIX Availability Manager, MIMIX DB2 Replicator, MIMIX Director, MIMIX dr1, MIMIX Enterprise, MIMIX Global, MIMIX Monitor, MIMIX Object Replicator, MIMIX Professional, MIMIX Promoter, OMS/ODS, RecoverNow, Replicate1, RJ Link, SAM/400, Switch Assistant, Vision AutoValidate, and Vision Suite are trademarks of Vision Solutions, Inc. Double-Take Share, Double-Take Availability, and Double-Take RecoverNow DoubleTake Inc. AIX, AIX 5L, AS/400, DB2, eserver, IBM, Informix, i5/os, iseries, OS/400, Power, System i, System i5, System p, System x, System z, and WebSphere International Business Machines Corporation. Adobe and Acrobat Reader Adobe Systems, Inc. HP-UX Hewlett-Packard Company. Teradata Teradata Corporation. Intel Intel Corporation. Java, all Java-based trademarks, and Solaris Sun Microsystems, Inc. Linux Linus Torvalds. Internet Explorer, Microsoft, Windows, and Windows Server Microsoft Corporation. Mozilla and Firefox Mozilla Foundation. Netscape Netscape Communications Corporation. Oracle Oracle Corporation. Red Hat Red Hat, Inc. Sybase Sybase, Inc. Symantec and NetBackup Symantec Corporation. UNIX and UNIXWare the Open Group. All other brands and product names are trademarks or registered trademarks of their respective owners. If you need assistance, contact Vision Solutions CustomerCare team at: CustomerCare Vision Solutions, Inc. Telephone: or support@visionsolutions.com Web Site:

3 Contents Who this book is for What is in this book The MIMIX documentation set Sources for additional information How to contact us Chapter 1 MIMIX overview 15 MIMIX concepts Product concepts System role concepts Journaling concepts Configuration concepts Process concepts Additional switching concepts Best practices for maintaining your MIMIX environment Authority to products and commands Accessing the MIMIX Main Menu Chapter 2 MIMIX policies 26 Environment considerations for policies Policies in environments with more than two nodes or bi-directional replication. 27 When to disable automatic recovery for replication and auditing Disabling audits and recovery when using the MIMIX CDP feature Setting policies - general Changing policies for an installation Changing policies for a data group Resetting a data group-level policy to use the installation level value Policies which affect an installation Changing retention criteria for procedure history Policies which affect replication Errors handled by automatic database recovery Errors handled by automatic object recovery Policies which affect auditing Policies for auditing runtime behavior Policies for submitting audits automatically When automatically submitted audits run Changing auditing policies Changing when automatic audits are allowed to run Changing scheduling criteria for automatic audits Changing the selection frequency of priority auditing categories Changing the audit level policy when switching Changing the system where audits are performed Changing retention criteria for audit history Restricting auditing based on the state of the data group Preventing audits from running Disabling all auditing for an installation Disabling all auditing for a data group Disabling automatically submitted audits Policies for switching with model switch framework Specifying a default switch framework in policies

4 Setting polices for MIMIX Switch Assistant Setting policies when MIMIX Model Switch Framework is not used Policy descriptions Chapter 3 Checking status in environments with application groups 60 Checking application group status Resolving problems reported in the Monitors field Resolving problems reported in the Notifications field Resolving problems reported in Status columns Resolving a procedure status problem Resolving an *ATTN status for an application group Resolving other common status values for an application group Status for Work with Node Entries Status for Work with Data Resource Group Entries Verifying the sequence of the recovery domain Changing the sequence of backup nodes Examples of changing the backup sequence Chapter 4 Working with status of procedures and steps 77 Displaying status of procedures Displaying status of the last run of all procedures Displaying available status history of procedure runs Resolving problems with procedure status Responding to a procedure in *MSGW status Resolving a *FAILED or *CANCELED procedure status Displaying status of steps within a procedure run Resolving problems with step status Responding to a step with a *MSGW status Resolving *CANCEL or *FAILED step statuses Acknowledging a procedure Running a procedure Resuming a procedure Overriding the attributes of a step Canceling a procedure Chapter 5 Monitoring status with MIMIX Availability Status 93 Checking replication status from the MIMIX Availability Status display Checking audit and notification status from the MIMIX Availability Status display Checking status of supporting services from the MIMIX Availability Status display.. 96 Chapter 6 Working with data group status 98 The Work with Data Groups display Problems reflected in the Audits/Recov./Notif. field Problems reflected in the Data Group column Resolving problems highlighted in the Data Group column Manager problems reflected in the Source and Target columns Replication problems reflected in the Source and Target columns Setting the automatic refresh interval Working with the detailed status of data groups Displaying data group detailed status Merged view

5 Object detailed status views Database detailed status views Identifying replication processes with backlogs Data group status in environments with journal cache or journal state Resolving a problem with journal cache or journal state Chapter 7 Working with audits 121 Auditing overview Components of an audit Phases of audit processing Object selection methods for automatic audits How priority auditing determines what objects to select How audits are submitted automatically Audit status and results Audit compliance Guidelines and considerations for auditing Auditing best practices Considerations for specific audits Recommendations when checking audit results Displaying audit runtime status Running an audit immediately Resolving audit problems Checking the job log of an audit Ending audits Displaying audit history Audits with no selected objects Working with audited objects Displaying audited objects from a specific audit run Displaying a customized list of audited objects Working with audited object history Displaying the audit history for a specific object Displaying audit compliance Determining whether auditing is within compliance Displaying scheduling information for automatic audits Chapter 8 Working with system-level processes 149 Displaying status of system-level processes Resolving *ACTREQ status for a system manager Checking for a system manager backlog Starting a system manager or a journal manager Ending a system manager or a journal manager Starting collector services Ending collector services Starting target journal inspection processes Ending target journal inspection processes Displaying status of target journal inspection Displaying results of target journal inspection Displaying details associated with target journal inspection notifications Displaying messages for TGTJRNINSP notifications Identifying the last entry inspected on the target system

6 Chapter 9 Working with notifications and recoveries 159 What are notifications and recoveries Displaying notifications What information is available for notifications Detailed information Options for working with notifications Notifications for newly created objects Displaying recoveries What information is available for recoveries Detailed information Options for working with recoveries Orphaned recoveries Determining whether a recovery is orphaned Removing an orphaned recovery Chapter 10 Starting and ending replication 169 Before starting replication Commands for starting replication What is started with the STRMMX command STRMMX and ENDMMX messages What is started by the default START procedure for an application group Choices when starting or ending an application group What occurs when a data group is started Journal starting point identified on the STRDG request Journal starting point when the object send process is shared Clear pending and clear error processing Starting MIMIX Starting an application group Starting selected data group processes Starting replication when open commit cycles exist Checking for open commit cycles Resolving open commit cycles Before ending replication Commands for ending replication Command choice by reason for ending replication Additional considerations when ending replication Ending immediately or controlled Controlling how long to wait for a controlled end to complete Ending all or selected processes When to end the RJ link What is ended by the ENDMMX command What is ended by the default END procedure for an application group What occurs when a data group is ended Ending MIMIX Ending with default values Ending by prompting the ENDMMX command After you end MIMIX products Ending an application group Ending a data group in a controlled manner Preparing for a controlled end of a data group

7 Performing the controlled end Confirming the end request completed without problems Ending selected data group processes What replication processes are started by the STRDG command What replication processes are ended by the ENDDG command Chapter 11 Resolving common replication problems 207 Working with message queues Working with the message log Working with user journal replication errors Working with files needing attention (replication and access path errors) Working with journal transactions for files in error Placing a file on hold Ignoring a held file Releasing a held file at a synchronization point Releasing a held file Releasing a held file and clearing entries Correcting file-level errors Correcting record-level errors Record written in error Working with tracking entries Accessing the appropriate tracking entry display Holding journal entries associated with a tracking entry Ignoring journal entries associated with a tracking entry Waiting to synchronize and release held journal entries for a tracking entry Releasing held journal entries for a tracking entry Releasing and clearing held journal entries for a tracking entry Removing a tracking entry Working with objects in error Using the Work with DG Activity Entries display Retrying data group activity entries Retrying a failed data group activity entry Determining whether an activity entry is in a delay/retry cycle Removing data group activity history entries Chapter 12 Starting, ending, and verifying journaling 230 What objects need to be journaled Authority requirements for starting journaling MIMIX commands for starting journaling Journaling for physical files Displaying journaling status for physical files Starting journaling for physical files Ending journaling for physical files Verifying journaling for physical files Journaling for IFS objects Displaying journaling status for IFS objects Starting journaling for IFS objects Ending journaling for IFS objects Verifying journaling for IFS objects Journaling for data areas and data queues

8 Displaying journaling status for data areas and data queues Starting journaling for data areas and data queues Ending journaling for data areas and data queues Verifying journaling for data areas and data queues Chapter 13 Switching 244 About switching Planned switch Unplanned switch Switching application group environments with procedures Switching data group environments with MIMIX Model Switch Framework Switching an application group Switching a data group-only environment Switching to the backup system Synchronizing data and starting MIMIX on the original production system Switching to the production system Determining when the last switch was performed Checking the last switch date Problems checking switch compliance Performing a data group switch Switch Data Group (SWTDG) command Chapter 14 Less common operations 259 Starting the TCP/IP server Ending the TCP/IP server Working with objects Displaying long object names Considerations for working with long IFS path names Displaying data group spooled file information Viewing status for active file operations Displaying a remote journal link Displaying status of a remote journal link Identifying data groups that use an RJ link Identifying journal definitions used with RJ Disabling and enabling data groups Procedures for disabling and enabling data groups Determining if non-file objects are configured for user journal replication Determining how IFS objects are configured Determining how data areas or data queues are configured Using file identifiers (FIDs) for IFS objects Operating a remote journal link independently Starting a remote journal link independently Ending a remote journal link independently Chapter 15 Troubleshooting - where to start 276 Gathering information before reporting a problem Obtaining MIMIX and IBM i information from your system Reducing contention between MIMIX and user applications Data groups cannot be ended Verifying a communications link for system definitions Verifying the communications link for a data group

9 Verifying all communications links Checking file entry configuration manually Data groups cannot be started Cannot start or end an RJ link Removing unconfirmed entries to free an RJ link RJ link active but data not transferring Errors using target journal defined by RJ link Verifying data group file entries Verifying data group data area entries Verifying key attributes Working with data group timestamps Automatically creating timestamps Creating additional timestamps Creating timestamps for remote journaling processing Deleting timestamps Displaying or printing timestamps Removing journaled changes Performing journal analysis Removing journal analysis entries for a selected file Appendix A Interpreting audit results - supporting information 299 Interpreting results for configuration data - #DGFE audit When the difference is not found Interpreting results of audits for record counts and file data What differences were detected by #FILDTA What differences were detected by #MBRRCDCNT Interpreting results of audits that compare attributes What attribute differences were detected Where was the difference detected What attributes were compared Appendix B IBM Power Systems operations that affect MIMIX 310 MIMIX procedures when performing an initial program load (IPL) MIMIX procedures when performing an operating system upgrade Prerequisites for performing an OS upgrade on either system MIMIX-specific steps for an OS upgrade on the backup system MIMIX-specific steps for an OS upgrade on the production system with switching 315 MIMIX-specific steps for an OS upgrade on the production system without switching MIMIX procedures when upgrading hardware without a disk image change Considerations for performing a hardware system upgrade without a disk image change MIMIX-specific steps for a hardware upgrade without a disk image change Hardware upgrade without a disk image change - preliminary steps Hardware upgrade without a disk image change - subsequent steps MIMIX procedures when performing a hardware upgrade with a disk image change Considerations for performing a hardware system upgrade with a disk image change

10 MIMIX-specific steps for a hardware upgrade with a disk image change Hardware upgrade with a disk image change - preliminary steps Hardware upgrade with a disk image change - subsequent steps Handling MIMIX during a system restore Prerequisites for performing a restore of MIMIX Index

11 Who this book is for Who this book is for What is in this book The MIMIX Operations book describes how to perform routine operational tasks and basic troubleshooting for MIMIX Enterprise and MIMIX Professional from a 5250 emulator. The MIMIX Operations book provides these distinct types of information: A summary of concepts within MIMIX Application group and data group status and troubleshooting Audit status, troubleshooting, scheduling, and history Procedures for starting, ending, and switching replication Procedures for starting, ending, and verifying journaling Procedures for handling MIMIX when performing operations such as IPLs or hardware and operating system upgrades. The MIMIX documentation set The following documents about MIMIX Availability products are available: Using License Manager License Manager currently supports MIMIX Availability, itera Availability, and ioptimize. This book describes software requirements, system security, and other planning considerations for installing software and software fixes for Vision Solutions products that are supported through License Manager. The preferred way to obtain license keys and install software is by using Vision AutoValidate and the product s Installation Wizard. However, if you cannot use the wizard or AutoValidate, this book provides instructions for obtaining licenses and installing software from a 5250 emulator. This book also describes how to use the additional security functions from Vision Solutions which are available for License Manager and MIMIX and implemented through License Manager. MIMIX Administrator Reference This book provides detailed conceptual, configuration, and programming information for MIMIX Enterprise and MIMIX Professional. It includes checklists for setting up several common configurations, information for planning what to replicate, and detailed advanced configuration topics for custom needs. It also identifies what information can be returned in outfiles if used in automation. MIMIX Operations with IBM i Clustering This book is for administrators and operators in an IBM i clustering environment who either use the basic support for IBM i clustering provided within MIMIX or who use MIMIX Global to integrate cluster management with MIMIX logical replication or supported hardware-based replication techniques. This book 11

12 The MIMIX documentation set focuses on addressing problems reported in MIMIX status and basic operational procedures such as starting, ending, and switching. MIMIX Operations This book provides high level concepts and operational procedures for managing your high availability environment using MIMIX Enterprise or MIMIX Professional from a 5250 emulator. This book focuses on tasks typically performed by an operator, such as checking status, starting or stopping replication, performing audits, and basic problem resolution. Using MIMIX Monitor This book describes how to use the MIMIX Monitor user and programming interfaces available with MIMIX Enterprise or MIMIX Professional. This book also includes programming information about MIMIX Model Switch Framework and support for hardware switching. Using MIMIX Promoter This book describes how to use MIMIX commands for copying and reorganizing active files. MIMIX Promoter is available with MIMIX Enterprise and as nocharge feature for MIMIX Professional. MIMIX for IBM WebSphere MQ This book identifies requirements for the MIMIX for MQ feature which supports replication in IBM WebSphere MQ environments. This book describes how to configure MIMIX for this environment and how to perform the initial synchronization and initial startup. Once configured and started, all other operations are performed as described in the MIMIX Operations book. 12

13 Sources for additional information Sources for additional information This book refers to other published information. The following information, plus additional technical information, can be located in the IBM System i and i5/os Information Center. From the Information center you can access these IBM Power Systems topics, books, and redbooks: Backup and Recovery Journal management DB2 Universal Database for IBM Power Systems Database Programming Integrated File System Introduction Independent disk pools OptiConnect for OS/400 TCP/IP Setup IBM redbook Striving for Optimal Journal Performance on DB2 Universal Database for iseries, SG IBM redbook AS/400 Remote Journal Function for High Availability and Data Replication, SG IBM redbook Power Systems iasps: A Guide to Moving Applications to Independent ASPs, SG The following information may also be helpful if you replicate journaled data areas, data queues, or IFS objects: DB2 UDB for iseries SQL Programming Concepts DB2 Universal Database for iseries SQL Reference IBM redbook AS/400 Remote Journal Function for High Availability and Data Replication, SG

14 How to contact us How to contact us For contact information, visit our Contact CustomerCare web page. If you are current on maintenance, support for MIMIX products is also available when you log in to Support Central. It is important to include product and version information whenever you report problems. 14

15 CHAPTER 1 MIMIX overview This book provides operational information and procedures for using MIMIX Enterprise and MIMIX Professional through its 5250 emulator user interface. For simplicity, this book uses the term MIMIX to refer to the functionality provided by either product unless a more specific name is necessary. MIMIX Availability version 7.1 provides high availability for your critical data in a production environment on IBM Power Systems through real-time replication of changes and the ability to quickly switch your production environment to a ready backup system. These capabilities allow your business operations to continue when you have planned or unplanned outages in your System i environment. MIMIX also provides advanced capabilities that can help ensure the integrity of your MIMIX environment. Replication: MIMIX continuously captures changes to critical database files and objects on a production system, sends the changes to a backup system, and applies the changes to the appropriate database file or object on the backup system. The backup system stores exact duplicates of the critical database files and objects from the production system. MIMIX uses two replication paths to address different pieces of your replication needs. These paths operate with configurable levels of cooperation or can operate independently. The user journal replication path captures changes to critical files and objects configured for replication through a user journal. When configuring this path, shipped defaults use the remote journaling function of the operating system to simplify sending data to the remote system. In previous versions, MIMIX DB2 Replicator provided this function. The system journal replication path handles replication of critical system objects (such as user profiles, program objects, or spooled files), integrated file system (IFS) objects, and document library object (DLOs) using the system journal. In previous versions MIMIX Object Replicator provided this function. Configuration choices determine the degree of cooperative processing used between the system journal and user journal replication paths when replicating database files, IFS objects, data areas, and data queues. Switching: One common use of MIMIX is to support a hot backup system to which operations can be switched in the event of a planned or unplanned outage. If a production system becomes unavailable, its backup is already prepared for users. In the event of an outage, you can quickly switch users to the backup system where they can continue using their applications. MIMIX captures changes on the backup system for later synchronization with the original production system. When the original production system is brought back online, MIMIX assists you with analysis and synchronization of the database files and other objects. 15

16 Automatic verification and correction: MIMIX enables earlier and easier detection of problems known to adversely affect maintaining availability and switch-readiness of your replication environment. MIMIX automatically detects and corrects potential problems during replication and auditing. MIMIX also helps to ensure the integrity of your MIMIX configuration by automatically verifying that the files and objects being replicated are what is defined to your configuration. MIMIX is shipped with these capabilities enabled. Incorporated best practices for maintaining availability and switch-readiness are key to ensuring that your MIMIX environment is in tip-top shape for protecting your data. User interfaces allow you to fine-tune to the needs of your environment. Analysis: MIMIX also provides advanced analysis capabilities through the MIMIX portal application for Vision Solutions Portal (VSP). When using the VSP user interface, you can see what objects are configured for replication as well as what replicated objects on the target system have been changed by people or programs other than MIMIX. (Objects changed on the target system affect your data integrity.) You can also check historical arrival and backlog rates for replication to help you identify trends in your operations that may affect MIMIX performance. Uses: MIMIX is typically used among systems in a network to support a hot backup system. Simple environments have one production system and one backup system. More complex environments have multiple production systems or backup systems. MIMIX can also be used on a single system. You can view the replicated data on the backup system at any time without affecting productivity. This allows you to generate reports, submit (read-only) batch jobs, or perform backups to tape from the backup system. In addition to real-time backup capability, replicated databases and objects can be used for distributed processing, allowing you to off-load applications to a backup system. The topics in this chapter include: MIMIX concepts on page 17 summarizes key concepts that you need to know about MIMIX. Best practices for maintaining your MIMIX environment on page 23 summarizes recommendations from Vision Solutions. Authority to products and commands on page 23 identifies authority levels to MIMIX functions when additional security features provided by Vision Solutions are used. Accessing the MIMIX Main Menu on page 24 describes the MIMIX Basic Main menu and the MIMIX Intermediate Main Menu. The MIMIX Basic Main menu is used to access the MIMIX Availability Status (WRKMMXSTS) display. 16

17 MIMIX concepts MIMIX concepts Product concepts The following subtopics organize the basic concepts associated with MIMIX into related groups. More detailed information is available in the MIMIX Administrator Reference book. MIMIX installation - The network of IBM Power Systems systems that transfer data and objects among each other using functions of a common MIMIX product. A MIMIX installation is defined by the way in which you configure the MIMIX product for each of the participating systems. A system can participate in multiple independent MIMIX installations. Replication - The activity that MIMIX performs to continuously capture changes to critical database files and objects on a production system as they occur, send the changes to a backup system, and apply the changes to the appropriate database file or object on the backup system. Switch - The process by which a production environment is moved from one system to another system and the production environment is made available there. A switch may be performed as part of a planned event such as for system maintenance, or an unplanned event such as a power or equipment failure. MIMIX provides customizable functions for switching. Audits - Audits are predetermined programs that are used to check for differences in replicated objects and other conditions between systems. Audits run and can correct detected problems automatically. Policies control when audits run and many other aspects of how audits are performed. Additional auditing concepts and recommendations are described in the auditing chapter of this book. Automatic recovery - MIMIX provides a set of functions that provide the ability to automatically correct problems detected in a MIMIX installation during database replication, object replication, and auditing. During these activities, when MIMIX detects any of a set of scenarios known to interfere with maintaining your MIMIX environment, it will automatically start recovery actions to correct them. Through policies, you have the ability to disable automatic recovery in any of these areas at the installation or data group level. Application group - A MIMIX construct used to group and control resources from a single point in a way that maintains relationships between them. The use of application groups is best practice for MIMIX Professional and MIMIX Enterprise and required for MIMIX Global. Data group - A MIMIX construct that is used to control replication activities. A data group is a logical grouping of database files, data areas, objects, IFS objects, DLOs, or a combination thereof that defines a unit of work by which MIMIX replication activity is controlled. A data group may represent an application, a set of one or more libraries, or all of the critical data on a given system. Application environments may define a data group as a specific set of files and objects. 17

18 MIMIX concepts Prioritized status - MIMIX assigns a priority to status values to ensure that problems with the highest priorities, those for detected problems or situations that require immediate attention or intervention, are reflected on the highest level of the user interface. Additional detail and lower priority items can be viewed by drilling down to the next level within the interfaces. Those interfaces are the Work with Systems display and depending on your configuration, either the Work with Application Groups display or the Work with Data Groups display. Policies - A policy is a mechanism used to enable, disable, or provide input to a function such as replication, auditing, or MIMIX Model Switch Framework. For most policies, the initially shipped values apply to an installation. However, policies can be changed and most can also be overridden for individual data groups. Policies that control when audits are automatically performed can be set only for each specific combination of audit rule and data group. Notifications - A notification is the resulting automatic report associated with an event that has already occurred. The severity of a notification is reflected in the overall status of the installation. Notifications can be generated by a process, program, command, or monitor. Because the originator of notifications varies, it is important to note that notifications can represent both real-time events as well as events that occurred in the past but, due to scheduling, are being reported in the present. Recoveries - This term recovery is used in two ways. The most common use refers to the recovery action taken by a replication process or an audit to correct a detected difference when automatic recovery polices are enabled. The second use refers to a temporary report that provides details about a recovery action in progress that is created when the recovery action starts and is removed when it completes. System role concepts MIMIX uses several pairs of terms to refer to the role of a system within a particular context. These terms are not interchangeable. Production system and backup system - These terms describe the role of a system relative to the way applications are used on that system. A production system is the system currently running the production workload for the applications. In normal operations, the production system is the system on which the principal copy of the data and objects associated with the application exist. A backup system is the system that is not currently running the production workload for the applications. In normal operations, the backup system is the system on which you maintain a copy of the data and objects associated with the application. These roles are not always associated with a specific system. For example, if you switch application processing to the backup system, the backup system temporarily becomes the production system. Typically, for normal operations in basic two-system environment, replicated data flows from the system running the production workload to the backup system. Source system and target system - These terms identify the direction in which an activity occurs between two participating systems. 18

19 MIMIX concepts A source system is the system from which MIMIX replication activity between two systems originates. In replication, the source system contains the journal entries. Information from the journal entries is either replicated to the target system or used to identify objects to be replicated to the target system. A target system is the system on which MIMIX replication activity between two systems completes. Management system and network system - These terms define the role of a system relative to how the products interact within a MIMIX installation. These roles remain associated with the system within the MIMIX installation to which they are defined. One system in the MIMIX installation is designated as the management system and the remaining one or more systems are designated as network systems. A management system is the system in a MIMIX installation that is designated as the control point for all installations of the product within the MIMIX installation. The management system is the location from which work to be performed by the product is defined and maintained. Often the system defined as the management system also serves as the backup system during normal operations. A network system is any system in a MIMIX installation that is not designated as the management system (control point) of that MIMIX installation. Work definitions are automatically distributed from the management system to a network system. Often a system defined as a network system also serves as the production system during normal operations. Journaling concepts MIMIX uses journaling to perform replication and to support newer analysis functionality. Journaling and object auditing - Journaling and object auditing are techniques that allow object activity to be logged to a journal. Journaling logs activity for selected objects of specific object types to a user journal. Object auditing logs activity for all objects to the security audit journal (QAUDJRN, the system journal), including those defined to a user journal. MIMIX relies on these techniques and the entries placed in the journal receivers for replicating logged activity. Journal - An IBM i system object that identifies the objects being journaled and the journal receivers associated with the journal. The system journal is a specialized journal on the system which MIMIX uses. Journal receiver - An IBM i system object that is associated with a journal and contains the log of all activity for objects defined to the journal. Journal entry - A record added to a journal receiver that identifies an event that occurred on a journaled object. MIMIX uses file and record level journal entries to recreate the object on a designated system. Remote journaling - A function of IBM i that allows you to establish journals and journal receivers on one system and associate them with specific journals and journal receivers on another system. Once the association is established, the operating system can use the pair of journals to replicate journal entries in one direction, from the local journal to the remote journal on the other system. In some configurations, 19

20 MIMIX concepts MIMIX uses remote journaling for transferring data to be replicated from the source system to the target system. Configuration concepts MIMIX configuration provides considerable flexibility to enable supporting a wide variety of customer environments. Configuration is implemented through sets of related commands. The following terms describe configuration concepts. Definitions - MIMIX uses several types of named definitions to identify related configuration choices. System definitions identify systems that participate in a MIMIX installation. Each system definition identifies one system. Transfer definitions identify the communications path and protocol to be used between systems. Journal definitions identify journaling environments that MIMIX uses for replication Each journal definition identifies a system and characteristics of the journaling environment on that system. Data group definitions identify the characteristics of how replication occurs between two systems. Each data group definition determines the direction in which replication occurs between the systems, whether that direction can be switched, and the default processing characteristics for replication processes. Application group definitions identify whether the replication environment does or does not use IBM i clustering. When clustering is used, the application group also defines information about an application or proprietary programs necessary for controlling operations in the clustering environment. Data group entries - A data group entry is a configuration construct that identifies a source of information to be replicated by or excluded from replication by a data group. Each entry identifies at least one object and its location on the source system. Classes of data group entries are based on object type. MIMIX uses data group entries to determine whether a journal entry should be replicated. Data groups that replicate from both the system journal and a user journal can have any combination of data group entries. Remote journal link (RJ link) - An RJ link is a MIMIX configuration element that identifies an IBM i remote journaling environment used by user journal replication processes. An RJ link identifies the journal definitions that define the source and target journals, primary and secondary transfer definitions for the communications path used by MIMIX, and whether the IBM i remote journal function sends journal entries asynchronously or synchronously. Cooperative processing - Cooperative processing refers to MIMIX techniques that efficiently replicate certain object types by using a coordinated effort between the system journal and user journal replication paths. Configuration choices in data group definitions and data group entries determine the degree of cooperative processing used between the system journal and user journal replication paths when replicating database files, IFS objects, data areas, and data queues. 20

21 MIMIX concepts Process concepts Tracking entries - Tracking entries identify objects that can be replicated using advanced journaling techniques and assist with tracking the status of their replication. A unique tracking entry is associated with each IFS object, data area, and data queue that is eligible for replication using advanced journaling. IFS tracking entries identify eligible, existing IFS objects while object tracking entries identify eligible, existing data areas and data queues. The following terms identify MIMIX processes. Some, like the system manager, are required to allow MIMIX to function. Others, like procedures, are used only when invoked by users. Replication path - A replication path is a series of processes used for replication that represent the critical path on which data to be replicated moves from its origin to its destination. MIMIX uses two replication paths to accommodate differences in how replication occurs for user journal and system journal entries. These paths operate with configurable levels of cooperation or can operate independently. The user journal replication path captures changes to critical files and objects configured for replication through a user journal. When configuring this path, shipped defaults use the remote journaling function of the operating system to simplify sending data to the remote system. The changes are applied to the target system. The system journal replication path handles replication of critical system objects (such as user profiles, program objects, or spooled files), integrated file system (IFS) objects, and document library object (DLOs) using the system journal. Information about the changes are sent to the target system where it is applied. System manager - The system manager is a pair of communications jobs between the management system and a network system which must be active to enable replication. The system manager monitors for configuration changes and automatically moves any configuration changes to the network system. Dynamic status changes are also collected and returned to the management system. The system manager also gathers messages and timestamp information from the network system and places them in a message log and timestamp file on the management system. In addition, the system manager performs periodic maintenance tasks, including cleanup of the system and data group history files. Journal manager - The journal manager is a job on each system that MIMIX uses to maintain the journaling environment on that system. By default, MIMIX performs both change management and delete management for journal receivers used by the replication process. Collector services - A group of jobs that are necessary for MIMIX to track historical data and to support using the MIMIX portal application within the Vision Solutions Portal. One or more collector service jobs collect and combine MIMIX status from all systems. Cluster services - When MIMIX Global is configured for IBM i clustering, MIMIX uses the cluster services function provided by IBM i to integrate the system management functions needed for clustering. Cluster services must be active in order for a cluster 21

22 MIMIX concepts node to be recognized by the other nodes in the cluster. MIMIX integrates starting and stopping cluster services into status and commands for controlling processes that run at the system level. Target journal inspection - A MIMIX process that reads a journal on a system being used as the target system for replication. The process identifies people or processes other than MIMIX that accessed replicated objects on the target system. Users can access the resulting information from the Replicated Objects portlet within the MIMIX portal application in Vision Solutions Portal. Procedures and steps - Procedures and steps are a highly customizable means of performing operations for application groups. A set of default procedures for each application group provide the ability to start, end, perform pre-check activity for switching, and switch the application group. Each operation is performed by a procedure that consists of a sequence of steps and multiple jobs. Each step calls a predetermined step program to perform a specific sub-task of the larger operation. Steps also identify runtime attributes for handling before and after the program call within the context of the procedure. Log space - A MIMIX object that provides an efficient storage and manipulation mechanism for replicated data that is temporarily stored on the target system during the receive and apply processes. Additional switching concepts The following concepts are specific to switching. Environments configured with application groups perform switching through procedures. Planned switch - An intentional change to the direction of replication for any of a variety of reasons. You may need to take the system offline to perform maintenance on its hardware or software, or you may be testing your disaster recovery plan. In a planned switch, the production system (the source of replication) is available. When you perform a planned switch, replication is ended on both the source and target systems. The next time you start replication, it will be set to replicate in the opposite direction. Unplanned switch - A change the direction of replication as a response to a problem. Most likely the production system is no longer available. When you perform an unplanned switch, you must initiate the switch from the target system. Replication is ended on the target system. The next time you start replication, it will be set to replicate in the opposite direction. MIMIX Model Switch Framework - A set of programs and commands that provide a consistent framework to be used when performing planned or unplanned switches in environments that do not use application groups. Typically, a model switch framework is customized to your environment through its exit programs. MIMIX Switch Assistant - A guided user interface that guides you through switching using your default MIMIX Model Switch Framework. MIMIX Switch Assistant is accessed from the MIMIX Basic Main Menu and does not support application groups. 22

23 Best practices for maintaining your MIMIX environment Best practices for maintaining your MIMIX environment MIMIX is shipped with default settings that incorporate many best practices for maintaining your environment. Others may require changing policies and adopting best practices within your organization. Best practices include: Allow MIMIX to automatically correct differences detected during database and object replication processes that would otherwise result in errors. If MIMIX is unable to perform the recovery, the problem is reported as a replication error (a file is placed in held error or an object is in error). Allow MIMIX to automatically perform audits and to automatically recover any differences detected by audits. Best practice is to allow regularly scheduled audits of all objects configured for replication and daily audits of prioritized categories of replicated objects. User interfaces summarize audit results and indicate whether MIMIX is unable to recover an object. Perform all audits with the audit level set at level 30 immediately prior to a planned switch to the backup system and before switching back to the production system. Perform switches on a regular basis. Best practice is to switch every three to six months. You need to set aside time for performing planned switches. Environments that continue to use MIMIX Switch Assistant can use policies so that compliance with regular switching is automatically reported in the user interface. Authority to products and commands If your MIMIX environment takes advantage of the additional security available in the product and command authority functions which Vision Solutions provides through License Manager, you may need a higher authority level in order to perform MIMIX daily operations. A MIMIX administrator can change your authorization level to commands and displays. Authorization levels typically fall into these categories: Viewing information requires display (*DSP) authority. Controlling operations requires operator (*OPR) authority. Creating or changing configuration requires management (*MGT) authority. For example, consider audits. You can view an audit if you have display authority, perform audits if you have operator authority, and change policies that affect how auditing is performed if you have management authority. For more information about these provided security functions, see the Using License Manager book. 23

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices

Version 5.0. MIMIX ha1 and MIMIX ha Lite for IBM i5/os. Using MIMIX. Published: May 2008 level 5.0.13.00. Copyrights, Trademarks, and Notices Version 5.0 MIMIX ha1 and MIMIX ha Lite for IBM i5/os Using MIMIX Published: May 2008 level 5.0.13.00 Copyrights, Trademarks, and Notices Product conventions... 10 Menus and commands... 10 Accessing online

More information

Veritas NetBackup 6.0 Database and Application Protection

Veritas NetBackup 6.0 Database and Application Protection Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database

More information

IBM Lotus Enterprise Integrator (LEI) for Domino. Version 8.5.2. August 17, 2010

IBM Lotus Enterprise Integrator (LEI) for Domino. Version 8.5.2. August 17, 2010 IBM Lotus Enterprise Integrator (LEI) for Domino Version 8.5.2 August 17, 2010 A) What's new in LEI V8.5.2 B) System requirements C) Installation considerations D) Operational considerations E) What's

More information

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One September 2013 Customer External Become a Best-Run Business with Remote Support Platform for SAP Business One Run

More information

IBM WebSphere MQ File Transfer Edition, Version 7.0

IBM WebSphere MQ File Transfer Edition, Version 7.0 Managed file transfer for SOA IBM Edition, Version 7.0 Multipurpose transport for both messages and files Audi logging of transfers at source and destination for audit purposes Visibility of transfer status

More information

Veritas Cluster Server by Symantec

Veritas Cluster Server by Symantec Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status

More information

Symantec NetBackup for Lotus Notes Administrator's Guide

Symantec NetBackup for Lotus Notes Administrator's Guide Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

More information

Symantec NetBackup Getting Started Guide. Release 7.1

Symantec NetBackup Getting Started Guide. Release 7.1 Symantec NetBackup Getting Started Guide Release 7.1 21159722 Contents NetBackup Getting Started Guide... 5 About NetBackup... 5 How a NetBackup system works... 6 How to make a NetBackup system work for

More information

IBM Maximo Asset Management Essentials

IBM Maximo Asset Management Essentials Enterprise asset capabilities for small and midsized organizations IBM Maximo Asset Essentials Highlights Leverage enterprise asset capabilities in a package specifically designed for small and midsized

More information

IBM Tivoli Web Response Monitor

IBM Tivoli Web Response Monitor IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready

IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready Agenda Key: Session Number: 35CA 540195 IBM Systems Director Navigator for i5/os New Web console for i5, Fast, Easy, Ready 8 Copyright IBM Corporation, 2008. All Rights Reserved. This publication may refer

More information

System i and System p. Customer service, support, and troubleshooting

System i and System p. Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting System i and System p Customer service, support, and troubleshooting Note Before using this information and the product it supports,

More information

CA Workload Automation Agent for Databases

CA Workload Automation Agent for Databases CA Workload Automation Agent for Databases Implementation Guide r11.3.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems

More information

IBM Systems and Technology Group Technical Conference

IBM Systems and Technology Group Technical Conference IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster

More information

VERITAS NetBackup 6.0 Database and Application Protection

VERITAS NetBackup 6.0 Database and Application Protection VERITAS NetBackup 6.0 Database and Application Protection INNOVATIVE DATA PROTECTION When it comes to database and application recovery, VERITAS Software has a clear goal in mind simplify the complexity

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer

HP Insight Diagnostics Online Edition. Featuring Survey Utility and IML Viewer Survey Utility HP Industry Standard Servers June 2004 HP Insight Diagnostics Online Edition Technical White Paper Featuring Survey Utility and IML Viewer Table of Contents Abstract Executive Summary 3

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

IBM and Vision Solutions application availability and data protection for IBM PureFlex System

IBM and Vision Solutions application availability and data protection for IBM PureFlex System IBM and Vision Solutions application availability and data protection for IBM PureFlex System The integration of Vision Solutions MIMIX Availability with the IBM PureSystems platform ensures application

More information

IBM Remote Lab Platform Citrix Setup Guide

IBM Remote Lab Platform Citrix Setup Guide Citrix Setup Guide Version 1.8.2 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation in

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department

Ahsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:

More information

Veritas Cluster Server from Symantec

Veritas Cluster Server from Symantec Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster

More information

DocAve 4.1 SharePoint Disaster Recovery High Availability (SPDR HA) User Guide

DocAve 4.1 SharePoint Disaster Recovery High Availability (SPDR HA) User Guide August 2007 DocAve 4.1 SharePoint Disaster Recovery High Availability (SPDR HA) User Guide Additional user guides available at http://www.avepoint.com/support Copyright 2001-2007 AvePoint, Inc. All rights

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

IBM Tivoli Storage FlashCopy Manager

IBM Tivoli Storage FlashCopy Manager IBM Storage FlashCopy Manager Online, near-instant snapshot backup and restore of critical business applications Highlights Perform near-instant application-aware snapshot backup and restore, with minimal

More information

An Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations.

An Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations. An Introduction to System i High Availability Get to know the core components of HA solutions and important installation considerations. Introduction Every company faces critical hours when system downtime

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

Release Notes. LiveVault. Contents. Version 7.65. Revision 0

Release Notes. LiveVault. Contents. Version 7.65. Revision 0 R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation

More information

Disaster Recovery for Oracle Database

Disaster Recovery for Oracle Database Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Job Management Partner 1/Performance Management - Remote Monitor for Virtual Machine Description, User's Guide and Reference

Job Management Partner 1/Performance Management - Remote Monitor for Virtual Machine Description, User's Guide and Reference Job Management Partner 1 Version 10 Job Management Partner 1/Performance Management - Remote Monitor for Virtual Machine Description, User's Guide and Reference 3021-3-353(E) Relevant program products

More information

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes

Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes Altiris Patch Management Solution for Windows 7.1 from Symantec Release Notes The software described in this book is furnished

More information

NEC Storage Manager Data Replication User's Manual (Function Guide)

NEC Storage Manager Data Replication User's Manual (Function Guide) NEC Storage Manager Data Replication User's Manual (Function Guide) NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC

More information

Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide.

Version 4.61 or Later. Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. Version 4.61 or Later Copyright 2013 Interactive Financial Solutions, Inc. All Rights Reserved. ProviderPro Network Administration Guide. This manual, as well as the software described in it, is furnished

More information

Installation & Configuration Guide

Installation & Configuration Guide EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20

More information

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS

DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS DOCUMENTATION MICROSOFT SQL BACKUP & RESTORE OPERATIONS Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication

More information

Tivoli Access Manager Agent for Windows Installation Guide

Tivoli Access Manager Agent for Windows Installation Guide IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

Exam : IBM 000-851. : Iseries Linux Soluton Sales v5r3

Exam : IBM 000-851. : Iseries Linux Soluton Sales v5r3 Exam : IBM 000-851 Title : Iseries Linux Soluton Sales v5r3 Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key

More information

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE

WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's

More information

Framework 8.1. External Authentication. Reference Manual

Framework 8.1. External Authentication. Reference Manual Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

High Availability Guide for Distributed Systems

High Availability Guide for Distributed Systems Tivoli IBM Tivoli Monitoring Version 6.2.2 Fix Pack 2 (Revised May 2010) High Availability Guide for Distributed Systems SC23-9768-01 Tivoli IBM Tivoli Monitoring Version 6.2.2 Fix Pack 2 (Revised May

More information

IBM Sterling Control Center

IBM Sterling Control Center IBM Sterling Control Center System Administration Guide Version 5.3 This edition applies to the 5.3 Version of IBM Sterling Control Center and to all subsequent releases and modifications until otherwise

More information

HP Matrix Operating Environment 7.2 Recovery Management User Guide

HP Matrix Operating Environment 7.2 Recovery Management User Guide HP Matrix Operating Environment 7.2 Recovery Management User Guide Abstract The HP Matrix Operating Environment 7.2 Recovery Management User Guide contains information on installation, configuration, testing,

More information

SAP Sybase SQL Anywhere New Features Improve Performance, Increase Security, and Ensure 24/7 Availability

SAP Sybase SQL Anywhere New Features Improve Performance, Increase Security, and Ensure 24/7 Availability SAP Sybase SQL Anywhere New Features Improve Performance, Increase, and Ensure 24/7 Availability This SAP paper summarizes the key business benefits and new functionality of release 16.0 of SAP Sybase

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this

More information

Disaster Recovery. Websense Web Security Web Security Gateway. v7.6

Disaster Recovery. Websense Web Security Web Security Gateway. v7.6 Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

IBM Tivoli Monitoring for Databases

IBM Tivoli Monitoring for Databases Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric

More information

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.

More information

Robot SCHEDULE 12 User Guide

Robot SCHEDULE 12 User Guide Robot SCHEDULE 12 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. Robot is a division of HelpSystems. www.helpsystems.com U.S.: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148

More information

AC 10.0 Centralized Emergency Access

AC 10.0 Centralized Emergency Access AC 10.0 Centralized Emergency Access Customer Solution Adoption June 2011 Version 2.0 Purpose of this document This document is a detailed guide on the emergency access capability of Access Control 10.0.

More information

LifeKeeper for Linux. Network Attached Storage Recovery Kit v5.0 Administration Guide

LifeKeeper for Linux. Network Attached Storage Recovery Kit v5.0 Administration Guide LifeKeeper for Linux Network Attached Storage Recovery Kit v5.0 Administration Guide February 2011 SteelEye and LifeKeeper are registered trademarks. Adobe Acrobat is a registered trademark of Adobe Systems

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

ERserver. iseries. Work management

ERserver. iseries. Work management ERserver iseries Work management ERserver iseries Work management Copyright International Business Machines Corporation 1998, 2002. All rights reserved. US Government Users Restricted Rights Use, duplication

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Microsoft SQL Server Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation")

More information

RLP Citrix Setup Guide

RLP Citrix Setup Guide RLP Citrix Setup Guide M Version 2.1 Trademarks IBM is a registered trademark of International Business Machines Corporation. The following are trademarks of International Business Machines Corporation

More information

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview

WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER Table of Contents Introduction...1 Today s IT Landscape...2 What Replication

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

System Migrations Without Business Downtime. An Executive Overview

System Migrations Without Business Downtime. An Executive Overview System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.

More information

Double-Take Cloud Migration Center (CMC) Tech Brief

Double-Take Cloud Migration Center (CMC) Tech Brief Double-Take Cloud Migration Center (CMC) Tech Brief Overview Double-Take Cloud Migration Center is an online service that enables migrations from VMware vsphere and Amazon Web Services EC2 to Microsoft

More information

Data Replication User s Manual (Installation and Operation Guide for Windows)

Data Replication User s Manual (Installation and Operation Guide for Windows) NEC Storage Manager Data Replication User s Manual (Installation and Operation Guide for Windows) IS016-5E NEC Corporation 2001-2004 No part of the contents of this book may be reproduced or transmitted

More information

Actualtests.C2010-508.40 questions

Actualtests.C2010-508.40 questions Actualtests.C2010-508.40 questions Number: C2010-508 Passing Score: 800 Time Limit: 120 min File Version: 5.6 http://www.gratisexam.com/ C2010-508 IBM Endpoint Manager V9.0 Fundamentals Finally, I got

More information

SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit. Administration Guide

SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit. Administration Guide SteelEye Protection Suite for Windows Microsoft SQL Server Recovery Kit Administration Guide June 2013 This document and the information herein is the property of SIOS Technology Corp. (previously known

More information

Cluster to Cluster Failover Using Double-Take

Cluster to Cluster Failover Using Double-Take Cluster to Cluster Failover Using Double-Take Cluster to Cluster Failover Using Double-Take published August 2001 NSI and Double-Take are registered trademarks of Network Specialists, Inc. GeoCluster is

More information

HelpSystems Web Server User Guide

HelpSystems Web Server User Guide HelpSystems Web Server User Guide Copyright Copyright HelpSystems, LLC. Robot is a division of HelpSystems. HelpSystems Web Server, OPAL, OPerator Assistance Language, Robot ALERT, Robot AUTOTUNE, Robot

More information

Snapshot Agents USER GUIDE

Snapshot Agents USER GUIDE Snapshot Agents USER GUIDE FalconStor Snapshot Agents User Guide User Guide content for individual agents may change between major product versions of FalconStor CDP/NSS in order to reflect agent updates

More information

Process Archiving using NetWeaver Business Process Management

Process Archiving using NetWeaver Business Process Management Process Archiving using NetWeaver Business Process Management Applies to: NetWeaver Composition Environment 7.2, 7.3. For more information, visit the Business Process Modeling homepage. Summary This document

More information

Symantec NetBackup Vault Operator's Guide

Symantec NetBackup Vault Operator's Guide Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

More information

Contents. SnapComms Data Protection Recommendations

Contents. SnapComms Data Protection Recommendations Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery

More information

User's Guide - Beta 1 Draft

User's Guide - Beta 1 Draft IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Cluster Server Agent vnext User's Guide - Beta 1 Draft SC27-2316-05 IBM Tivoli Composite Application Manager for Microsoft

More information

Microsoft File and Print Service Failover Using Microsoft Cluster Server

Microsoft File and Print Service Failover Using Microsoft Cluster Server Microsoft File and Print Service Failover Using Microsoft Cluster Server TechNote First Edition (March 1998) Part Number 309826-001 Compaq Computer Corporation Notice The information in this publication

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

TSM Backup Service. Standard Service Level Agreement

TSM Backup Service. Standard Service Level Agreement TSM Backup Service Standard Service Level Agreement University Of Michigan Information Technology and Services 7/1/2008 1.0 Overview Service Level Agreements (SLAs) are between Information Technology and

More information

VERITAS NetBackup TM 6.0

VERITAS NetBackup TM 6.0 VERITAS NetBackup TM 6.0 System Administrator s Guide, Volume II for UNIX and Linux N15258B September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

iseries Recovery Options Pro s & Cons

iseries Recovery Options Pro s & Cons iseries Recovery Options Pro s & Cons Presented by: David Tedford Lakeview Technology, Inc. tedfordd@lakeviewtech.com 978-671-9211 office 617-901-7909 - cell Presenter background 1987, BS in CIS, Quinnipiac

More information

Database Backup and Recovery Guide

Database Backup and Recovery Guide Scout Diagnostics Database Backup and Recovery Guide P H 803. 358. 3600 F A X 803. 358. 3636 WWW.AVTECINC.COM 100 I N N O VAT I O N P L ACE, L E X I N G T O N SC 29072 Copyright 2013 by Avtec, Inc. All

More information

HP Data Protector Express Single Server Edition technical white paper

HP Data Protector Express Single Server Edition technical white paper HP Data Protector Express Single Server Edition technical white paper Backup and recovery software exclusively for StorageWorks tape drives and tape autoloaders Table of contents Introduction... 2 Why

More information

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server

Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Veritas Cluster Server Application Note: Disaster Recovery for Microsoft SharePoint Server Windows Server 2003, Windows Server 2008 5.1 Veritas Cluster Server Application Note: Disaster Recovery for Microsoft

More information

Symantec NetBackup PureDisk Deduplication Option Guide

Symantec NetBackup PureDisk Deduplication Option Guide Symantec NetBackup PureDisk Deduplication Option Guide Windows, Linux, and UNIX Release 6.6.5 Revision 1 The software described in this book is furnished under a license agreement and may be used only

More information

Veritas NetBackup 6.0 Server Now from Symantec

Veritas NetBackup 6.0 Server Now from Symantec Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide

More information

Budget Control by Cost Center

Budget Control by Cost Center SAP Business One Budget Control by Cost Center Ecosystem & Channels Readiness July 2011 Allows a precise follow up of costs booked using the cost accounting dimensions functionality as introduced in SAP

More information

Course Syllabus. At Course Completion

Course Syllabus. At Course Completion Key Data Product #: Course #: 6231A Number of Days: 5 Format: Certification Exams: 70-432, 70-433 Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the

More information

Systems Management Advanced job scheduler

Systems Management Advanced job scheduler System i Systems Management Advanced job scheduler Version 5 Release 4 System i Systems Management Advanced job scheduler Version 5 Release 4 Note Before using this information and the product it supports,

More information

How To Use Ibm Tivoli Monitoring Software

How To Use Ibm Tivoli Monitoring Software Monitor and manage critical resources and metrics across disparate platforms from a single console IBM Tivoli Monitoring Highlights Help improve uptime and shorten Help optimize IT service delivery by

More information

Application Servers - BEA WebLogic. Installing the Application Server

Application Servers - BEA WebLogic. Installing the Application Server Proven Practice Application Servers - BEA WebLogic. Installing the Application Server Product(s): IBM Cognos 8.4, BEA WebLogic Server Area of Interest: Infrastructure DOC ID: AS01 Version 8.4.0.0 Application

More information

MCAPS 3000 DISASTER RECOVERY GUIDE

MCAPS 3000 DISASTER RECOVERY GUIDE MCAPS 3000 DISASTER RECOVERY GUIDE Manual Part Number 99875294-1 FEBRUARY 2004 REGISTERED TO ISO 9001:2000 1710 Apollo Court Seal Beach, CA 90740 Phone: (562) 546-6400 FAX: (562) 546-6301 Technical Support:

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Sybase Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Symantec NetBackup Clustered Master Server Administrator's Guide

Symantec NetBackup Clustered Master Server Administrator's Guide Symantec NetBackup Clustered Master Server Administrator's Guide for Windows, UNIX, and Linux Release 7.5 Symantec NetBackup Clustered Master Server Administrator's Guide The software described in this

More information

Quick Beginnings for DB2 Servers

Quick Beginnings for DB2 Servers IBM DB2 Universal Database Quick Beginnings for DB2 Servers Version 8 GC09-4836-00 IBM DB2 Universal Database Quick Beginnings for DB2 Servers Version 8 GC09-4836-00 Before using this information and

More information

WANSync SQL Server. Operations Guide

WANSync SQL Server. Operations Guide WANSync SQL Server Operations Guide This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes only

More information

Course Syllabus. Microsoft Dynamics GP Installation & Configuration. Key Data. Introduction. Audience. At Course Completion

Course Syllabus. Microsoft Dynamics GP Installation & Configuration. Key Data. Introduction. Audience. At Course Completion Course Syllabus Microsoft Dynamics GP Installation & Configuration Key Data Course Number: 8814B Number of Days: 3 Available: August, 2007 Languages: U.S. English Format: Instructor-Led Training (lecture

More information

DOCUMENTATION MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS

DOCUMENTATION MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE OPERATIONS DOCUMENTATION MICROSOFT WINDOWS SYSTEM BACKUP AND RESTORE Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited. No part of this publication

More information

SAP Central Process Scheduling (CPS) 8.0 by Redwood

SAP Central Process Scheduling (CPS) 8.0 by Redwood SAP Central Process Scheduling (CPS) 8.0 by Redwood What s new in SAP CPS 8.0? November 2010 Agenda 1. SAP Central Process Scheduling by Redwood Architecture Overview 2. Enhanced User Interface 3. New

More information

Nimsoft Monitor Compatibility Matrix October 17, 2013

Nimsoft Monitor Compatibility Matrix October 17, 2013 Nimsoft Monitor Compatibility Matrix October 17, 2013 1 Nimsoft Monitor Compatibility Matrix Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided

More information