Hitachi MK-90RD011-25 Computer Drive User Manual


 
Hitachi Command Control Interface (CCI) User and Reference Guide xi
4.7
Checking Attribute and Status (Pairvolchk) ............................................... 194
4.7.1 Recovery in Case of SVOL-Takeover............................................... 202
4.7.2 PVOL-PSUE-Takeover ................................................................ 205
4.7.3 Recovery in Case of PVOL-PSUE-Takeover........................................ 206
4.7.4 SVOL-SSUS Takeover in Case of ESCON/Fibre/Host Failure.................... 207
4.7.5 Recovery from SVOL-SSUS-Takeover .............................................. 208
4.7.6 SVOL-Takeover in Case of Host Failure ........................................... 210
4.8 Displaying Pair Status (Pairdisplay)......................................................... 211
4.9 Checking Hitachi TrueCopy Pair Currency (Paircurchk) ................................. 216
4.10 Performing Hitachi TrueCopy Takeover Operations...................................... 219
4.10.1 Horctakeover Command Functions ................................................ 223
4.10.2 Applications of the Horctakeover Command..................................... 227
4.11 Displaying Configuration Information ...................................................... 229
4.11.1 Raidscan Command .................................................................. 229
4.11.2 Raidar Command ..................................................................... 234
4.11.3 Raidqry Command .................................................................... 236
4.12 Performing Data Protection Operations.................................................... 238
4.12.1 Raidvchkset Command............................................................... 238
4.12.2 Raidvchkdsp Command .............................................................. 242
4.12.3 Raidvchkscan Command............................................................. 249
4.12.4 Raidvchkscan Command for Journal (UR) ........................................ 255
4.12.5 Raidvchkscan Command for Snapshot Pool and Dynamic Provisioning.......259
4.13 Controlling CCI Activity....................................................................... 261
4.13.1 Horcmstart Command ............................................................... 261
4.13.2 Horcmshutdown Command.......................................................... 262
4.13.3 Horcctl Command .................................................................... 263
4.13.4 3DC Control Command using HORC/UR NEW..................................... 265
4.13.5 Windows Subcommands ............................................................. 270
4.13.6 Findcmddev Subcommand .......................................................... 270
4.13.7 Drivescan Subcommand ............................................................. 271
4.13.8 Portscan Subcommand............................................................... 272
4.13.9 Sync and Syncd Subcommands ..................................................... 273
4.13.10 Mount Subcommand.................................................................. 275
4.13.11 Umount and Umountd Subcommands ............................................. 277
4.13.12 Environment Variable Subcommands.............................................. 279
4.14 CCI Command Tools ........................................................................... 280
4.14.1 Inqraid Command Tool .............................................................. 280
4.14.2 Mkconf Command Tool .............................................................. 288
4.15 Synchronous Waiting Command (Pairsyncwait) for Hitachi TrueCopy Async/UR .... 291
4.16 Protection Facility............................................................................. 296
4.16.1 Protection Facility Specification...................................................296
4.16.2 Examples for Configuration and Protected Volumes............................ 298
4.16.3 Target Commands for Protection .................................................. 300
4.16.4 Permission Command ................................................................ 300
4.16.5 New Options for Security............................................................ 301
4.16.6 Permitting the Protected Volumes ................................................ 302
4.16.7 Environmental Variables ............................................................ 304
4.16.8 Determining the Protection Mode Command Device............................ 305
4.17 Group Version Control for Mixed Storage System Configurations...................... 306