Data Protection Facility Specifications - Hitachi VSP F1500 User And Reference Manual

Command control interface guide
Hide thumbs Also See for VSP F1500:
Table of Contents

Advertisement

Data Protection Facility specifications

Only the permitted volumes can be registered in horcm.conf. When creating
the horcm.conf file, describe volumes only from the view that the host
shows. CCI manages mirror descriptors (TrueCopy, ShadowImage/
MU#0/1/2) as a unit. The Data Protection Facility has two specifications: one
must be a volume that you can see from the host such as the Inquiry tool,
and the other must be a mirror descriptor volume that was registered in
horcm.conf. The following table shows the registration for the mirror
descriptor.
Volumes
in
TrueCopy
horcm.co
nf
E
Unknown
-
/dev/
permitted
rdsk/
volumes
c0t0d0
Unknown
-
Legend:
E: Mirror descriptor volume to be registered in horcm.conf.
Unknown: Volumes that own host cannot recognize, even though volumes were registered in
horcm.conf.
CCI permits operation after the permission command at startup of
HORCM. The target is volume that was registered in the horcm.conf file.
The permission command is necessary to permit the protected volume at
first. The permission command compares an identification for volumes of
horcm.conf to all of own host volumes, and the result is registered within
HORCM. And HORCM makes tables for protected volume and permitted
Figure 7-1 Definition of the protection volumes
Table 7-2 Registration for the mirror descriptor
Mirror Descriptor in horcm.conf
MU#0
none
E
-
-
-
permitted
volumes
-
-
Data protection operations with CCI
Command Control Interface User and Reference Guide
ShadowImage
MU#1
none
E
-
-
-
permitted
volumes
-
-
MU#2
none
E
-
-
-
permitted
volumes
-
-
none
-
-
-
7-7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents