OS/400 Backup and Recovery V5R3public.dhe.ibm.com/systems/power/docs/systemi/v5r3/en_US/... ·...

572
iSeries Backup and Recovery Version 5 SC41-5304-07 E Rserver

Transcript of OS/400 Backup and Recovery V5R3public.dhe.ibm.com/systems/power/docs/systemi/v5r3/en_US/... ·...

  • iSeries

    Backup

    and

    Recovery

    Version

    5

    SC41-5304-07

    ERserver

    ���

  • iSeries

    Backup

    and

    Recovery

    Version

    5

    SC41-5304-07

    ERserver

    ���

  • Note

    Before

    using

    this

    information

    and

    the

    product

    it

    supports,

    be

    sure

    to

    read

    the

    information

    in

    Appendix

    E,

    “Notices,”

    on

    page

    531.

    Eighth

    Edition

    (May

    2004)

    This

    edition

    applies

    to

    version

    5,

    release

    3,

    modification

    0

    of

    IBM

    Operating

    System/400

    (product

    number

    5722-SS1)

    and

    to

    all

    subsequent

    releases

    and

    modifications

    until

    otherwise

    indicated

    in

    new

    editions.

    This

    version

    does

    not

    run

    on

    all

    reduced

    instruction

    set

    computer

    (RISC)

    models

    nor

    does

    it

    run

    on

    CISC

    models.

    This

    edition

    replaces

    SC41-5304-06.

    ©

    Copyright

    International

    Business

    Machines

    Corporation

    1997,

    2004.

    All

    rights

    reserved.

    US

    Government

    Users

    Restricted

    Rights

    Use,

    duplication

    or

    disclosure

    restricted

    by

    GSA

    ADP

    Schedule

    Contract

    with

    IBM

    Corp.

    |||

    |

  • Contents

    Figures

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . ix

    Tables

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xi

    About

    Backup

    and

    Recovery,

    SC41-5304-07

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xiii

    Who

    should

    read

    this

    book

    .

    .

    .

    .

    .

    .

    .

    .

    . xiii

    Prerequisite

    and

    related

    information

    .

    .

    .

    .

    .

    . xiii

    How

    to

    send

    your

    comments

    .

    .

    .

    .

    .

    .

    .

    . xiv

    Summary

    of

    Changes

    to

    Backup

    and

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . xv

    Part

    1.

    Saving

    Information

    on

    Your

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 1

    Chapter

    1.

    Saving

    your

    Server

    .

    .

    .

    .

    . 3

    Save

    your

    server

    with

    the

    GO

    SAVE

    command

    .

    .

    . 3

    Overview

    of

    the

    GO

    SAVE

    command

    menu

    options

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 5

    Change

    Save

    menu

    defaults

    with

    GO

    SAVE:

    Option

    20

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 6

    Save

    your

    whole

    server

    with

    GO

    SAVE:

    Option

    21

    6

    Save

    system

    data

    with

    GO

    SAVE:

    Option

    22

    .

    .

    . 7

    Save

    user

    data

    with

    GO

    SAVE:

    Option

    23

    .

    .

    .

    . 8

    Save

    parts

    of

    your

    server

    with

    other

    GO

    SAVE

    command

    menu

    options

    .

    .

    .

    .

    .

    .

    .

    .

    . 8

    View

    entire

    GO

    SAVE

    checklist

    .

    .

    .

    .

    .

    .

    . 9

    Save

    Considerations

    When

    Checking

    Out

    Objects

    .

    . 20

    Tape

    Write

    Error

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    . 21

    Using

    the

    ObjectConnect/400

    Function

    .

    .

    .

    .

    . 21

    Components

    of

    ObjectConnect/400

    .

    .

    .

    .

    . 22

    Setting

    Up

    Your

    System

    to

    Use

    ObjectConnect/400

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 22

    How

    the

    System

    Runs

    an

    ObjectConnect

    Command

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 23

    Using

    the

    ObjectConnect

    Commands

    .

    .

    .

    .

    . 24

    Investigating

    ObjectConnect

    Problems

    .

    .

    .

    . 25

    CPFAD84

    Error

    Codes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 26

    Part

    2.

    Recovering

    Information

    on

    Your

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 29

    Chapter

    2.

    Restore

    Procedures–General

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 33

    The

    Relationship

    Between

    Save

    and

    Restore

    Commands

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 35

    What

    Happens

    When

    You

    Restore

    Objects

    .

    .

    .

    . 36

    Sequence

    for

    Restoring

    Related

    Objects

    .

    .

    .

    .

    . 39

    Putting

    Your

    System

    in

    a

    Restricted

    State

    .

    .

    .

    . 39

    Reclaiming

    Storage

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    How

    to

    Reclaim

    Storage

    .

    .

    .

    .

    .

    .

    .

    .

    . 40

    Controlling

    Restoration

    of

    Security-Sensitive

    Objects

    44

    Minimizing

    Object

    Scans

    After

    Restores

    .

    .

    .

    .

    . 48

    How

    to

    Set

    the

    QPFRADJ

    System

    Value

    for

    a

    Different

    Processor

    or

    Memory

    .

    .

    .

    .

    .

    .

    .

    . 48

    Locked

    Objects

    While

    Restoring

    .

    .

    .

    .

    .

    .

    . 49

    How

    to

    Verify

    That

    Objects

    Are

    Restored

    Successfully

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 49

    Recovery

    from

    an

    Unsuccessful

    Restore

    Operation

    51

    Recovering

    from

    an

    Error

    While

    Restoring

    Libraries

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 51

    Recovering

    from

    an

    Error

    While

    Restoring

    DLOs

    52

    How

    to

    Perform

    a

    Normal

    IPL

    .

    .

    .

    .

    .

    .

    .

    . 54

    Parallel

    Restore

    Operations

    .

    .

    .

    .

    .

    .

    .

    .

    . 54

    Recovery

    Considerations

    for

    Cryptographic

    Access

    Provider

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 55

    Chapter

    3.

    Selecting

    the

    Right

    Recovery

    Strategy

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 57

    Some

    Common

    Recovery

    Terminology

    .

    .

    .

    .

    . 57

    Recovery

    Procedure

    for

    a

    Power

    Failure

    .

    .

    .

    .

    . 59

    Recovery

    Procedure

    for

    a

    System

    Failure

    .

    .

    .

    . 59

    Recovery

    Procedure

    for

    a

    Program

    Failure

    or

    Human

    Error

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 59

    Choosing

    the

    Recovery

    Procedure

    for

    a

    Disk

    Failure

    or

    Disk

    Errors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 60

    Actions

    for

    load

    source

    disk

    unit

    failure–Checklist

    1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 62

    Actions

    for

    load

    source

    disk

    unit

    failure–Checklist

    2

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 63

    Actions

    for

    load

    source

    disk

    unit

    failure–Checklist

    3

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 64

    Actions

    for

    load

    source

    disk

    unit

    failure–Checklist

    4

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 65

    Actions

    for

    load

    source

    disk

    unit

    failure–Checklist

    5

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 69

    Actions

    for

    non-load

    source

    disk

    unit

    failure

    or

    disk

    units

    in

    basic

    user

    ASP

    disk

    failure–Checklist

    6

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 72

    Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    7

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 73

    Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    8

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 74

    Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    9

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 75

    Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    10

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 78

    Actions

    for

    a

    failure

    in

    a

    basic

    ASP

    disk

    unit–Checklist

    11

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 82

    Actions

    for

    a

    failure

    in

    a

    basic

    ASP

    disk

    unit–Checklist

    12

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 83

    Actions

    for

    a

    failure

    in

    a

    basic

    ASP

    disk

    unit–Checklist

    13

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 85

    Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    14

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 87

    ©

    Copyright

    IBM

    Corp.

    1997,

    2004

    iii

    ||||

    |

    |

  • Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    15

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 88

    Actions

    for

    non-load

    source

    disk

    unit

    failure–Checklist

    16

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 88

    Actions

    for

    independent

    ASP

    disk

    failure–Checklist

    17

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 89

    Actions

    for

    a

    failure

    in

    an

    independent

    ASP

    disk

    unit–Checklist

    18

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 90

    Actions

    for

    a

    failure

    in

    an

    independent

    ASP

    disk

    unit–Checklist

    19

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 91

    Recovering

    your

    entire

    system

    after

    a

    complete

    system

    loss–Checklist

    20

    .

    .

    .

    .

    .

    .

    .

    .

    . 93

    Recovering

    your

    entire

    system

    after

    a

    complete

    system

    loss

    including

    independent

    ASPs–Checklist

    21

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 96

    Restoring

    a

    Logical

    Partition

    to

    Another

    Logical

    Partition—Checklist

    22

    .

    .

    .

    .

    .

    .

    .

    .

    . 100

    Actions

    for

    a

    failed

    cache

    card

    Checklist

    23

    102

    Choosing

    the

    Procedure

    to

    Recover

    User

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 103

    Recovering

    User

    Information

    Using

    Commands–Checklist

    24

    .

    .

    .

    .

    .

    .

    .

    .

    . 105

    Using

    Option

    21

    from

    the

    Restore

    Menu–Checklist

    25

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 108

    Using

    Options

    22

    and

    23

    from

    the

    Restore

    Menu–Checklist

    26

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 111

    Recovering

    User

    Information

    Using

    Tapes

    from

    Operational

    Assistant

    Backup–Checklist

    27

    .

    . 114

    Chapter

    4.

    Recovering

    the

    Licensed

    Internal

    Code

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 119

    How

    to

    Prepare

    for

    Loading

    the

    Licensed

    Internal

    Code

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 120

    Task

    1–Getting

    Ready

    to

    Load

    the

    Licensed

    Internal

    Code

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 120

    Task

    2–Powering

    Down

    the

    System

    .

    .

    .

    .

    . 122

    Task

    3a–Preparing

    the

    System

    to

    Perform

    an

    IPL

    from

    an

    Alternate

    Device

    .

    .

    .

    .

    .

    .

    .

    . 122

    Task

    3b-Preparing

    a

    Logical

    Partition

    to

    Perform

    an

    IPL

    from

    an

    Alternate

    Device

    .

    .

    .

    .

    .

    . 123

    Task

    4–Loading

    the

    Licensed

    Internal

    Code

    from

    Media

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 123

    How

    to

    Load

    the

    Licensed

    Internal

    Code

    .

    .

    .

    . 128

    How

    to

    Recover

    Your

    Logical

    Partition

    Configuration

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 132

    How

    to

    Set

    Up

    Your

    Disk

    Configuration

    After

    Installing

    the

    Licensed

    Internal

    Code

    and

    Initializing

    the

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 133

    How

    to

    Recover

    Your

    Disk

    Configuration

    Using

    iSeries

    Navigator

    at

    DST

    .

    .

    .

    .

    .

    .

    .

    .

    . 135

    How

    to

    Recover

    Your

    Disk

    Configuration

    .

    .

    .

    . 139

    How

    to

    Start

    Your

    System

    After

    Restoring

    Licensed

    Internal

    Code

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 142

    Chapter

    5.

    Restoring

    the

    Operating

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 143

    Choosing

    the

    Right

    Procedure

    for

    Restoring

    the

    Operating

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 144

    How

    to

    Load

    the

    Operating

    System

    Using

    a

    Manual

    IPL

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 145

    How

    to

    Restore

    the

    OS/400

    Licensed

    Program

    .

    . 145

    Task

    1–Starting

    to

    Restore

    the

    Operating

    System

    146

    Task

    2–Selecting

    the

    Installation

    Options

    .

    .

    . 150

    Task

    3–Selecting

    IPL

    Options

    .

    .

    .

    .

    .

    .

    . 155

    Task

    4–Setting

    Major

    System

    Options

    .

    .

    .

    . 157

    Task

    5–Defining

    or

    Changing

    the

    System

    at

    IPL

    158

    Task

    6–Completing

    the

    IPL

    .

    .

    .

    .

    .

    .

    .

    . 160

    Recovering

    from

    SRC

    A900

    2000

    .

    .

    .

    .

    .

    .

    . 162

    Creating

    a

    Configuration

    for

    34xx

    Tape

    Units

    162

    Creating

    a

    Configuration

    for

    Other

    Tape

    Units

    163

    Chapter

    6.

    Starting

    the

    System

    After

    It

    Ends

    Abnormally

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 165

    What

    Happens

    When

    Your

    System

    Stops

    .

    .

    .

    . 165

    Using

    the

    Disk

    Configuration

    Error

    Report

    Display

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 166

    Using

    the

    Main

    Storage

    Dump

    Occurred

    Display

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 166

    How

    to

    Restart

    Your

    System

    .

    .

    .

    .

    .

    .

    .

    . 167

    Task

    1–Performing

    an

    Attended

    IPL

    .

    .

    .

    .

    . 167

    Task

    2–Using

    the

    Edit

    Rebuild

    of

    Access

    Paths

    Display

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 170

    Task

    3–Using

    the

    Edit

    Check

    Pending

    Constraints

    Display

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 171

    Task

    4–Recovering

    from

    Damaged

    Objects

    and

    Unreadable

    Sectors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 173

    Chapter

    7.

    Recovering

    Information

    in

    a

    User

    Auxiliary

    Storage

    Pool

    .

    .

    .

    . 181

    Describing

    the

    Contents

    of

    Your

    User

    Auxiliary

    Storage

    Pools

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 181

    Choosing

    the

    Procedure

    to

    Recover

    User

    ASPs

    .

    . 182

    How

    to

    Recover

    a

    Basic

    User

    ASP

    After

    Recovering

    the

    System

    ASP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 182

    Task

    1–Reclaiming

    Storage

    .

    .

    .

    .

    .

    .

    .

    . 183

    Task

    2–Restoring

    User

    Profiles

    .

    .

    .

    .

    .

    .

    . 184

    Task

    3–Restoring

    the

    Configuration

    .

    .

    .

    .

    . 185

    Task

    4–Recovering

    Journals

    and

    Journal

    Receivers

    in

    the

    QRCL

    Library

    .

    .

    .

    .

    .

    . 185

    Task

    5–Restoring

    Libraries

    to

    the

    System

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    . 186

    Task

    6–Restoring

    Document

    Library

    Objects

    to

    the

    System

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    . 187

    Task

    7–Restoring

    User-Defined

    File

    Systems

    to

    the

    User

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    . 187

    Task

    8–Reclaiming

    Document

    Library

    Objects

    188

    Task

    9–Recovering

    Save

    Files

    from

    the

    QRCL

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 188

    Task

    10–Associating

    Journal

    Receivers

    with

    Journals

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 189

    Task

    11–Restoring

    Object

    Ownership

    .

    .

    .

    . 190

    How

    to

    Recover

    An

    Overflowed

    User

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 191

    Resetting

    An

    Overflowed

    User

    Auxiliary

    Storage

    Pool

    without

    an

    IPL

    .

    .

    .

    .

    .

    .

    . 192

    Resetting

    An

    Overflowed

    User

    Auxiliary

    Storage

    Pool

    during

    an

    IPL

    .

    .

    .

    .

    .

    .

    .

    . 193

    How

    to

    Delete

    Overflowed

    Objects

    during

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 196

    iv

    OS/400

    Backup

    and

    Recovery

    V5R3

    ||

  • How

    to

    Recover

    a

    Damaged

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 196

    Task

    1–Restoring

    User

    Profiles

    .

    .

    .

    .

    .

    .

    . 196

    Task

    2–Determining

    the

    Contents

    of

    the

    Lost

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    . 197

    Task

    3–Determining

    Tasks

    to

    Restore

    Objects

    197

    Task

    4–Restoring

    Libraries

    to

    a

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 198

    Task

    5–Restoring

    Journals

    to

    a

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 198

    Task

    6–Restoring

    Documents

    to

    a

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    . 199

    Task

    7–Restoring

    User-Defined

    File

    Systems

    to

    a

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    . 200

    Task

    8–Restoring

    Journal

    Receivers

    to

    a

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    . 201

    Task

    9–Restore

    Save

    Files

    to

    a

    Basic

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 201

    How

    to

    Recover

    an

    Independent

    ASP

    .

    .

    .

    .

    . 201

    Task

    1–Restoring

    User

    Profiles

    .

    .

    .

    .

    .

    .

    . 201

    Task

    2–Determining

    Tasks

    to

    Restore

    Objects

    to

    an

    Independent

    ASP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 202

    Task

    3–Restoring

    Libraries

    to

    the

    Independent

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    . 202

    Task

    4–Restoring

    User-Defined

    File

    Systems

    to

    the

    Independent

    Auxiliary

    Storage

    Pool

    .

    .

    . 203

    How

    to

    Remove

    a

    Failed

    Disk

    Unit

    from

    the

    System

    ASP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 205

    Task

    1–Access

    Dedicated

    Service

    Tools

    .

    .

    .

    . 205

    Task

    2–Delete

    the

    Auxiliary

    Storage

    Pool

    Data

    206

    Task

    3–Remove

    the

    Disk

    Unit

    from

    the

    Auxiliary

    Storage

    Pool

    Configuration

    .

    .

    .

    . 207

    Chapter

    8.

    The

    Restore

    Menu

    .

    .

    .

    . 209

    What

    the

    Restore

    Menu

    Options

    Do

    .

    .

    .

    .

    .

    . 209

    How

    to

    Use

    Restore

    Menu

    Options

    21,

    22,

    and

    23

    210

    Chapter

    9.

    How

    to

    Restore

    Specific

    Types

    of

    Information

    .

    .

    .

    .

    .

    .

    .

    . 215

    Recovering

    System

    Information

    .

    .

    .

    .

    .

    .

    . 215

    Sequence

    for

    Restoring

    Security

    Information

    .

    .

    . 215

    Restoring

    User

    Profiles

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 216

    What

    Happens

    When

    You

    Restore

    User

    Profiles

    217

    What

    You

    Should

    Know

    About

    Restoring

    User

    Profiles

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 218

    How

    the

    System

    Establishes

    Ownership

    for

    Restored

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 220

    How

    the

    System

    Establishes

    the

    Authorization

    List

    for

    a

    Restored

    Object

    .

    .

    .

    .

    .

    .

    .

    . 220

    How

    the

    System

    Establishes

    the

    Primary

    Group

    for

    Restored

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 220

    Restoring

    Object

    Authorities

    .

    .

    .

    .

    .

    .

    .

    . 221

    Overview

    of

    Restoring

    Authorities

    .

    .

    .

    .

    . 221

    Restoring

    Authority

    On

    a

    System

    in

    a

    Non-Restricted

    State

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 222

    Restoring

    Authority

    On

    a

    System

    in

    a

    Restricted

    State

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 226

    What

    the

    System

    Does

    When

    You

    Restore

    Authority

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 226

    How

    to

    Restore

    Configuration

    Objects

    .

    .

    .

    .

    . 229

    Correcting

    Problems

    with

    the

    System

    Resource

    Management

    Information

    .

    .

    .

    .

    .

    .

    .

    . 230

    Recovering

    When

    You

    Change

    the

    Console

    Type

    232

    Recovering

    the

    System/36

    Environment

    Configuration

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 233

    Restoring

    Logical

    Partitions

    .

    .

    .

    .

    .

    .

    .

    . 234

    Restoring

    Libraries

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 234

    Restoring

    a

    Library

    From

    a

    Previous

    Release

    234

    Restoring

    Multiple

    Libraries

    .

    .

    .

    .

    .

    .

    . 234

    Considerations

    and

    Restrictions

    .

    .

    .

    .

    .

    . 235

    How

    to

    Restore

    All

    Libraries

    from

    a

    Single

    Save

    Operation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 236

    How

    to

    Restore

    All

    Libraries

    from

    Multiple

    Save

    Operations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 236

    How

    to

    Restore

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 237

    Restoring

    User-Defined

    File

    Systems

    .

    .

    .

    .

    . 237

    Restore

    an

    unmounted

    UDFS

    .

    .

    .

    .

    .

    .

    . 237

    Restore

    an

    individual

    object

    from

    an

    unmounted

    UDFS

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 238

    Restore

    a

    mounted

    UDFS

    .

    .

    .

    .

    .

    .

    .

    . 238

    Restoring

    Objects

    That

    Are

    Journaled

    .

    .

    .

    .

    . 238

    What

    Happens

    When

    You

    Restore

    Journaled

    Objects

    to

    a

    Different

    Library

    or

    Directory

    .

    .

    . 239

    Restoring

    Database

    Files

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 240

    Comparing

    File

    Attributes

    during

    a

    Restore

    Operation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 241

    How

    the

    System

    Matches

    File

    Members

    during

    a

    Restore

    Operation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 243

    Restoring

    Members

    to

    a

    File

    .

    .

    .

    .

    .

    .

    . 243

    Restoring

    Logical

    Files

    .

    .

    .

    .

    .

    .

    .

    .

    . 244

    How

    the

    System

    Restores

    Access

    Paths

    .

    .

    .

    . 245

    How

    the

    System

    Restores

    Files

    with

    Shared

    Formats

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 247

    How

    the

    System

    Restores

    Files

    with

    Referential

    Constraints

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 248

    How

    the

    System

    Restores

    Files

    with

    Triggers

    249

    Steps

    Before

    Deleting

    a

    Physical

    File

    .

    .

    .

    . 250

    Restoring

    Journals

    and

    Journal

    Receivers

    .

    .

    .

    . 251

    Restoring

    Journals

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 251

    Steps

    before

    Deleting

    a

    Journal

    .

    .

    .

    .

    .

    . 252

    Restoring

    Journal

    Receivers

    .

    .

    .

    .

    .

    .

    .

    . 253

    Steps

    before

    Deleting

    a

    Journal

    Receiver

    .

    .

    . 254

    How

    the

    System

    Restores

    Programs

    .

    .

    .

    .

    .

    . 254

    Restoring

    Programs

    to

    a

    Different

    Release

    .

    .

    . 255

    Restoring

    Save

    File

    Data

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 256

    Restoring

    Spooled

    Output

    Files

    .

    .

    .

    .

    .

    .

    . 256

    Restoring

    Licensed

    Programs

    .

    .

    .

    .

    .

    .

    .

    . 256

    Restoring

    Documents

    and

    Folders

    .

    .

    .

    .

    .

    . 256

    RSTDLO

    Command

    Options

    .

    .

    .

    .

    .

    .

    . 256

    Using

    Multiple

    Concurrent

    DLO

    commands

    .

    . 257

    Output

    from

    the

    RSTDLO

    Command

    .

    .

    .

    . 257

    Considerations

    and

    Restrictions

    .

    .

    .

    .

    .

    . 257

    Restoring

    Folders

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 259

    Renaming

    Documents

    When

    Restoring

    .

    .

    .

    . 259

    Restoring

    OfficeVision/400

    Mail

    and

    Distribution

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 259

    How

    the

    System

    Restores

    Descriptive

    Information

    for

    DLOs

    .

    .

    .

    .

    .

    .

    .

    .

    . 260

    How

    the

    System

    Restores

    Authority

    and

    Ownership

    for

    DLOs

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 260

    Contents

    v

    |

    |

    |

    |

    |

    |

    |

    |

    |

  • When

    to

    Run

    the

    Rename

    Directory

    (RNMDIRE)

    Command

    .

    .

    .

    .

    .

    .

    .

    .

    . 261

    When

    to

    Run

    the

    Rename

    Document

    Library

    Object

    (RNMDLO)

    Command

    .

    .

    .

    .

    .

    .

    . 261

    Restoring

    Objects

    in

    Directories

    .

    .

    .

    .

    .

    .

    . 261

    Completing

    Recovery

    for

    the

    IBM

    iSeries

    Integration

    for

    Windows

    Server

    Product

    .

    .

    .

    . 263

    Recovery

    for

    save

    performed

    with

    Integrated

    xSeries

    Server

    varied

    off

    .

    .

    .

    .

    .

    .

    .

    .

    . 263

    Recovery

    for

    save

    performed

    with

    Integrated

    xSeries

    Server

    varied

    on

    .

    .

    .

    .

    .

    .

    .

    .

    . 264

    Recovering

    Linux

    in

    a

    Partition

    .

    .

    .

    .

    .

    . 264

    Recovery

    Steps

    for

    OS/400

    Enhanced

    Integration

    for

    Novell

    NetWare

    .

    .

    .

    .

    .

    . 265

    Recovering

    a

    Domino

    Server

    .

    .

    .

    .

    .

    .

    .

    . 265

    Recovering

    an

    entire

    Domino

    server

    .

    .

    .

    .

    . 266

    Recovering

    Domino

    mail

    .

    .

    .

    .

    .

    .

    .

    . 266

    Recovering

    specific

    Domino

    databases

    .

    .

    .

    . 267

    Restoring

    changed

    objects

    to

    a

    Domino

    server

    268

    Restoring

    a

    Windows

    server

    .

    .

    .

    .

    .

    .

    .

    . 270

    Restrictions

    When

    Using

    the

    Restore

    Command

    270

    How

    to

    Restore

    Program

    Temporary

    Fixes

    .

    .

    .

    . 273

    Chapter

    10.

    How

    to

    Restore

    Changed

    Objects

    and

    Apply

    Journaled

    Changes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 275

    Task

    1–Restoring

    Changed

    Objects

    .

    .

    .

    .

    .

    . 276

    Restoring

    Changed

    Objects

    by

    Library

    .

    .

    .

    . 276

    Restoring

    Changed

    Objects

    Individually

    .

    .

    . 276

    Task

    2–Restoring

    Changed

    Objects

    in

    Directories

    277

    Task

    3–Determining

    Whether

    You

    Need

    to

    Apply

    Journaled

    Changes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 278

    Task

    4–Determining

    What

    Journal

    Receivers

    to

    Use

    278

    Task

    5–Applying

    Journaled

    Changes

    for

    User

    Journals

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 280

    Task

    6–Applying

    Journaled

    Changes

    for

    the

    QAOSDIAJRN

    Journal

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 282

    Task

    7–Restoring

    Changed

    Documents

    and

    Folders

    283

    Chapter

    11.

    Mirrored

    Protection

    Recovery

    Actions

    .

    .

    .

    .

    .

    .

    .

    .

    . 285

    System

    Actions

    for

    Permanent

    Errors

    .

    .

    .

    .

    . 285

    Suspending

    Mirrored

    Units

    .

    .

    .

    .

    .

    .

    .

    .

    . 286

    Resuming

    Mirrored

    Units

    .

    .

    .

    .

    .

    .

    .

    .

    . 287

    Replacing

    a

    Mirrored

    Unit

    .

    .

    .

    .

    .

    .

    .

    .

    . 287

    Using

    Spare

    Nonconfigured

    Units

    for

    Replacement

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 289

    Mirrored

    Protection

    Recovery

    Actions

    Performed

    by

    the

    Service

    Representative

    .

    .

    . 291

    Other

    Recovery

    Considerations

    for

    Mirrored

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 292

    Mirrored

    Protection

    Disk-Error

    Handling

    .

    .

    . 292

    Missing

    Disk

    Units

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 293

    Saving

    a

    Unit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 294

    Restoring

    a

    Unit

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 294

    Active

    Mirrored

    Load

    Source

    Failure

    .

    .

    .

    . 295

    Unknown

    Unit

    1

    Status

    .

    .

    .

    .

    .

    .

    .

    .

    . 297

    Display

    Incorrect

    Licensed

    Internal

    Code

    Install

    298

    Recovering

    remote

    load

    source

    mirroring

    .

    .

    .

    . 299

    Recovering

    After

    the

    Remote

    Load

    Source

    Has

    Failed

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 299

    Recovering

    After

    the

    Local

    Load

    Source

    Has

    Failed

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 299

    Dedicated

    recovery

    of

    local

    load

    source

    --

    local

    system

    is

    still

    functional

    .

    .

    .

    .

    .

    .

    .

    .

    . 299

    Dedicated

    recovery

    from

    remote

    disk

    units

    --

    after

    a

    local

    site

    disaster

    .

    .

    .

    .

    .

    .

    .

    .

    . 300

    Using

    the

    Recover

    Mirrored

    Load

    Source

    function

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 300

    Chapter

    12.

    How

    to

    Restore

    Your

    System

    Using

    Operational

    Assistant

    Tapes

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 303

    How

    to

    Restore

    Your

    Libraries

    .

    .

    .

    .

    .

    .

    .

    . 304

    How

    to

    Restore

    Libraries

    That

    You

    Saved

    by

    Using

    a

    Backup

    List

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 305

    How

    to

    Restore

    Changed

    Objects

    That

    You

    Saved

    by

    Using

    Operational

    Assistant

    .

    .

    .

    .

    .

    .

    . 306

    Chapter

    13.

    How

    to

    Restore

    the

    System

    from

    the

    Save

    Storage

    Media

    . 309

    Task

    1–Powering

    Down

    the

    System

    and

    Loading

    the

    Licensed

    Internal

    Code

    .

    .

    .

    .

    .

    .

    .

    .

    . 310

    Task

    2–Restoring

    the

    Save

    Storage

    Tapes

    .

    .

    .

    . 310

    Task

    3–Responding

    to

    Messages

    .

    .

    .

    .

    .

    .

    . 313

    Task

    4–Completing

    the

    Restore

    Storage

    Operation

    314

    Task

    5–Restoring

    Additional

    Information

    .

    .

    .

    . 316

    Task

    6–Restoring

    Program

    Temporary

    Fixes

    (PTFs)

    316

    How

    to

    Resume

    the

    Restore

    Storage

    Operation

    .

    . 317

    Part

    3.

    Release-to-Release

    Support

    319

    Chapter

    14.

    Release-to-Release

    Support

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 321

    Current

    Release-to-Previous

    Release

    Support

    .

    .

    . 321

    Creating

    the

    Object

    for

    the

    Previous

    Release

    .

    . 322

    Saving

    the

    Object

    for

    the

    Previous

    Release

    .

    . 323

    Testing

    the

    Object

    on

    the

    Current

    Release

    .

    .

    . 328

    Restoring

    and

    Using

    the

    Object

    on

    the

    Previous

    Release

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 328

    Restrictions

    for

    Current

    Release-to-Previous

    Release

    Support

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 329

    Previous

    Release-to-Current

    Release

    Support

    .

    .

    . 329

    Considerations

    when

    Moving

    System

    Customization

    Information

    .

    .

    .

    .

    .

    .

    .

    . 330

    Restoring

    Previous

    Release

    User

    Data

    to

    a

    New

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 330

    Restrictions

    when

    going

    from

    previous

    release

    to

    current

    release

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 348

    Chapter

    15.

    System

    Synchronization-Planning

    and

    Procedures

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 349

    Synchronization

    Methods:

    Overview

    .

    .

    .

    .

    . 350

    Moving

    Changed

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    . 351

    Steps

    for

    Saving

    Changed

    Objects

    .

    .

    .

    .

    . 352

    Steps

    for

    Restoring

    Changed

    Objects

    .

    .

    .

    . 353

    vi

    OS/400

    Backup

    and

    Recovery

    V5R3

    ||

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

    |

  • Problems

    When

    Restoring

    Changed

    Objects

    .

    . 355

    Moving

    Entire

    Libraries

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 357

    Considerations

    for

    Moving

    Entire

    Libraries

    .

    . 358

    Moving

    Individual

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    . 358

    Applying

    Journaled

    Changes

    .

    .

    .

    .

    .

    .

    .

    . 359

    Refreshing

    Your

    new

    system

    .

    .

    .

    .

    .

    .

    .

    . 361

    Additional

    Synchronization

    Tips

    .

    .

    .

    .

    .

    .

    . 362

    Part

    4.

    Considerations

    for

    Merging

    Two

    or

    More

    Systems

    .

    .

    .

    .

    .

    .

    . 365

    Chapter

    16.

    Tips

    for

    Merging

    Two

    Systems

    Into

    a

    Single

    System

    .

    .

    .

    . 367

    Guidelines

    for

    Restoring

    Information

    from

    the

    Development

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 367

    Part

    5.

    Alternate

    Installation

    Device

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 369

    Chapter

    17.

    Using

    an

    Alternate

    Installation

    Device

    .

    .

    .

    .

    .

    .

    .

    .

    . 371

    Alternate

    Installation

    Device—Overview

    .

    .

    .

    . 371

    Setting

    up

    an

    Alternate

    Installation

    Device

    .

    .

    . 371

    Disabling

    an

    Alternate

    Installation

    Device

    .

    .

    .

    . 374

    Verifying

    and

    Selecting

    an

    Alternate

    Installation

    Device

    during

    a

    Manual

    Installation

    .

    .

    .

    .

    .

    . 375

    Part

    6.

    Disk

    Configuration

    and

    Protection

    Procedures

    .

    .

    .

    .

    . 377

    Chapter

    18.

    Procedures

    for

    Configuring

    Disks

    and

    Disk

    Protection

    379

    Choosing

    the

    Right

    Procedure

    for

    Configuring

    Disks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 379

    Configuring

    Disks

    on

    a

    New

    System–Checklist

    1

    380

    Adding

    Disk

    Units

    without

    Device

    Parity

    Protection–Checklist

    2

    .

    .

    .

    .

    .

    .

    .

    .

    . 381

    Adding

    Disk

    Units

    to

    an

    Existing

    Input/Output

    Adapter–Checklist

    3

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 382

    Adding

    a

    New

    Input/Output

    Adapter–Checklist

    4

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 383

    Moving

    Disk

    Units

    Between

    Non-Mirrored

    Auxiliary

    Storage

    Pools–Checklist

    5

    .

    .

    .

    .

    . 384

    Moving

    Disk

    Units

    Between

    Mirrored

    Auxiliary

    Storage

    Pools–Checklist

    6

    .

    .

    .

    .

    .

    .

    .

    . 385

    Deleting

    an

    Auxiliary

    Storage

    Pool–Checklist

    7

    386

    Removing

    Disk

    Units

    Without

    Device

    Parity

    Protection–Checklist

    8

    .

    .

    .

    .

    .

    .

    .

    .

    . 387

    Removing

    Disk

    Units

    That

    Have

    Device

    Parity

    Protection

    from

    an

    ASP

    Without

    Mirrored

    Protection–Checklist

    9

    .

    .

    .

    .

    .

    .

    .

    .

    . 388

    Removing

    Disk

    Units

    That

    Have

    Device

    Parity

    Protection

    from

    an

    ASP

    With

    Mirrored

    Protection–Checklist

    10

    .

    .

    .

    .

    .

    .

    .

    .

    . 389

    Using

    System

    Service

    Tools

    and

    Dedicated

    Service

    Tools

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 391

    How

    to

    Display

    Your

    Disk

    Configuration

    .

    .

    . 393

    Chapter

    19.

    Working

    with

    Auxiliary

    Storage

    Pools

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 399

    How

    to

    Add

    Disk

    Units

    to

    an

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 399

    How

    to

    Change

    the

    Storage

    Threshold

    for

    an

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 402

    How

    to

    Change

    the

    Storage

    Threshold

    for

    the

    System

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    . 403

    How

    to

    Move

    a

    Disk

    Unit

    to

    a

    Different

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 405

    How

    to

    Remove

    a

    Disk

    Unit

    from

    an

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 407

    How

    to

    Delete

    an

    Auxiliary

    Storage

    Pool

    .

    .

    .

    . 409

    Calculating

    Space

    Requirements

    for

    an

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 410

    How

    to

    Display

    the

    Objects

    in

    a

    User

    ASP

    .

    .

    . 410

    Balancing

    an

    Auxiliary

    Storage

    Pool

    .

    .

    .

    .

    .

    . 411

    Capacity

    Balancing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 411

    Usage

    Balancing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 411

    Hierarchical

    Storage

    Management

    (HSM)

    Balancing

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 412

    Transferring

    Objects

    between

    Auxiliary

    Storage

    Pools

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 412

    How

    to

    Move

    Authorities

    to

    a

    Different

    ASP

    413

    How

    to

    Transfer

    a

    Library

    to

    a

    Different

    ASP

    413

    How

    to

    Transfer

    a

    Folder

    to

    a

    Different

    ASP

    .

    . 413

    How

    to

    Transfer

    Journals

    and

    Objects

    to

    a

    Different

    ASP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 414

    How

    to

    Create

    Objects

    in

    a

    Library

    User

    ASP

    415

    How

    to

    Place

    Journal

    Receivers

    in

    a

    User

    ASP

    416

    How

    to

    Move

    Journal

    Receivers

    From

    an

    Overflowed

    Basic

    User

    ASP

    .

    .

    .

    .

    .

    .

    . 417

    How

    to

    Reset

    a

    Journal

    with

    a

    Status

    of

    Overflowed

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 418

    How

    to

    Work

    with

    Nonlibrary

    User

    ASPs

    .

    .

    .

    . 419

    Creating

    Objects

    in

    a

    Nonlibrary

    User

    ASP

    .

    . 419

    Transferring

    an

    Object

    to

    a

    Nonlibrary

    User

    ASP

    420

    Transferring

    a

    Journal

    to

    a

    Nonlibrary

    User

    ASP

    420

    Chapter

    20.

    Working

    with

    Device

    Parity

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 423

    Starting

    Device

    Parity

    Protection

    .

    .

    .

    .

    .

    .

    . 423

    How

    to

    Start

    Device

    Parity

    Protection

    for

    an

    Input/Output

    Adapter

    .

    .

    .

    .

    .

    .

    .

    .

    . 423

    Stopping

    Device

    Parity

    Protection

    .

    .

    .

    .

    .

    . 425

    How

    to

    Stop

    Device

    Parity

    Protection

    on

    an

    Input/Output

    Adapter

    .

    .

    .

    .

    .

    .

    .

    .

    . 425

    How

    to

    Include

    a

    Disk

    Unit

    in

    Device

    Parity

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 427

    How

    to

    Exclude

    a

    Disk

    Unit

    from

    Device

    Parity

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 428

    How

    to

    Display

    Device

    Parity

    Status

    .

    .

    .

    .

    . 429

    How

    to

    Enable

    Disk

    Units

    Attached

    to

    the

    MFIOP

    to

    Use

    Device

    Parity

    Protection

    .

    .

    .

    .

    .

    .

    . 431

    Chapter

    21.

    Working

    with

    Mirrored

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 439

    Mirrored

    Protection–Configuration

    Rules

    .

    .

    .

    . 439

    How

    to

    Start

    Mirrored

    Protection

    .

    .

    .

    .

    .

    .

    . 439

    Contents

    vii

  • What

    the

    System

    Does

    When

    You

    Start

    Mirrored

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 441

    Mirrored

    Protection

    Configuration

    Errors

    .

    .

    .

    . 442

    How

    to

    Stop

    Mirrored

    Protection

    .

    .

    .

    .

    .

    .

    . 442

    Chapter

    22.

    Working

    with

    Disk

    Compression

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 445

    Introduction

    to

    Disk

    Compression

    .

    .

    .

    .

    .

    . 445

    Restrictions

    and

    Considerations

    .

    .

    .

    .

    .

    . 445

    Disk

    Compression

    and

    Capacity

    .

    .

    .

    .

    .

    . 446

    Disk

    Unit

    Full

    Considerations

    .

    .

    .

    .

    .

    .

    . 448

    How

    The

    System

    Responds

    to

    Disk

    Unit

    Full

    448

    SRC

    Code

    A6xx

    0277

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 449

    User

    Action

    1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 450

    User

    Action

    2

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 451

    User

    Action

    3

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 451

    User

    Action

    4

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 451

    Examples

    of

    A6xx

    0277

    .

    .

    .

    .

    .

    .

    .

    .

    . 452

    How

    to

    Start

    Disk

    Compression

    .

    .

    .

    .

    .

    .

    . 452

    How

    to

    Stop

    Disk

    Compression

    .

    .

    .

    .

    .

    .

    . 455

    Procedural

    Sequences

    for

    Configuring

    Disks

    and

    Protection

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 457

    Adding

    a

    New

    I/O

    Compression-Capable

    Storage

    Controller

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 457

    Adding

    Disk

    Units

    to

    an

    Existing

    Compression-Capable

    Storage

    Controller

    .

    .

    . 458

    Moving

    Disk

    Units

    from

    the

    System

    ASP

    to

    a

    User

    ASP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 459

    Recovering

    from

    Error

    Codes

    .

    .

    .

    .

    .

    .

    .

    . 460

    Recovering

    from

    SRC

    6xxx

    7051

    .

    .

    .

    .

    .

    . 460

    Recovering

    from

    SRC

    6xxx

    7052

    .

    .

    .

    .

    .

    . 461

    Chapter

    23.

    Managing

    Auxiliary

    Storage

    Pools

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 463

    Working

    with

    ASP

    Trace

    and

    ASP

    Balance

    .

    .

    .

    . 463

    Capacity

    Balance

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 464

    Hierarchical

    Storage

    Management

    (HSM)

    Balance

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 465

    Usage

    Balance

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 465

    ASP

    Trace

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 466

    Determining

    adequate

    disk

    storage

    .

    .

    .

    .

    .

    . 466

    Part

    7.

    Backup

    and

    Recovery

    Tools

    and

    Techniques

    .

    .

    .

    .

    .

    . 469

    Chapter

    24.

    Techniques

    and

    Programming

    Examples

    for

    Backup

    and

    Recovery

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 471

    Programming

    Examples

    for

    Backup

    and

    Recovery

    471

    Using

    the

    Retrieve

    Journal

    Entry

    (RTVJRNE)

    Command

    in

    a

    Program

    .

    .

    .

    .

    .

    .

    .

    .

    . 471

    CL

    Program

    to

    Handle

    Escape

    Conditions

    .

    .

    . 471

    Writing

    output

    to

    save

    media

    using

    the

    receive

    journal

    entry

    command

    .

    .

    .

    .

    .

    .

    .

    .

    . 473

    Appendix

    A.

    Licensed

    Internal

    Code

    Installation

    Error

    Screens

    .

    .

    .

    .

    .

    . 477

    Appendix

    B.

    Example

    Disaster

    Recovery

    Plan

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 485

    Section

    1.

    Major

    Goals

    of

    a

    Disaster

    Recovery

    Plan–Example

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 485

    Section

    2.

    Personnel–Example

    .

    .

    .

    .

    .

    .

    .

    . 485

    Organization

    Chart

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 486

    Section

    3.

    Application

    Profile–Example

    .

    .

    .

    .

    . 486

    Section

    4.

    Inventory

    Profile–Example

    .

    .

    .

    .

    . 486

    Section

    5.

    Information

    Services

    Backup

    Procedures

    487

    Section

    6.

    Disaster

    Recovery

    Procedures

    .

    .

    .

    . 488

    Disaster

    Action

    Checklist

    .

    .

    .

    .

    .

    .

    .

    . 488

    Recovery

    Start-Up

    Procedures

    for

    Use

    after

    Actual

    Disaster

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 489

    Section

    7.

    Recovery

    Plan–Mobile

    Site

    .

    .

    .

    .

    . 489

    Mobile

    Site

    Setup

    Plan

    .

    .

    .

    .

    .

    .

    .

    .

    . 490

    Communication

    Disaster

    Plan

    .

    .

    .

    .

    .

    .

    . 490

    Electrical

    Service

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 490

    Section

    8.

    Recovery

    Plan–Hot

    Site

    .

    .

    .

    .

    .

    . 491

    Hot-Site

    System

    Configuration

    .

    .

    .

    .

    .

    . 491

    Section

    9.

    Restoring

    the

    Entire

    System

    .

    .

    .

    .

    . 491

    Section

    10.

    Rebuilding

    Process

    .

    .

    .

    .

    .

    .

    .

    . 492

    Section

    11.

    Testing

    the

    Disaster

    Recovery

    Plan

    .

    . 492

    Section

    12.

    Disaster

    Site

    Rebuilding

    .

    .

    .

    .

    .

    . 494

    Vendors

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 495

    Floor

    Plan

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 495

    Section

    13.

    Record

    of

    Plan

    Changes

    .

    .

    .

    .

    .

    . 495

    Appendix

    C.

    Recovering

    your

    server

    497

    Appendix

    D.

    Recovering

    your

    server

    to

    a

    different

    server

    .

    .

    .

    .

    .

    .

    .

    .

    . 513

    Appendix

    E.

    Notices

    .

    .

    .

    .

    .

    .

    .

    . 531

    Trademarks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 533

    Bibliography

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 535

    Index

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 537

    viii

    OS/400

    Backup

    and

    Recovery

    V5R3

  • Figures

    1.

    Save

    commands

    and

    menu

    options

    .

    .

    .

    .

    . 4

    2.

    Save

    Menu–First

    Display

    .

    .

    .

    .

    .

    .

    .

    . 5

    3.

    ObjectConnect

    Job

    Flow

    .

    .

    .

    .

    .

    .

    .

    . 23

    4.

    Restore

    Procedures

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 34

    5.

    Save

    procedures

    and

    restore

    procedures

    for

    file

    systems

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 35

    6.

    User

    ASP

    Configuration

    Before

    Failure

    181

    7.

    Basic

    User

    ASP

    Configuration

    After

    Restoring

    Operating

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 183

    8.

    User

    ASP

    Configuration

    After

    Reclaiming

    Storage

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 184

    9.

    User

    ASP

    Configuration

    After

    Recovering

    Isolated

    Journal

    Receiver

    .

    .

    .

    .

    .

    .

    .

    . 186

    10.

    Restore

    Menu–First

    Display

    .

    .

    .

    .

    .

    .

    . 209

    11.

    Sample

    Job

    Log

    for

    RSTAUT

    on

    a

    System

    in

    a

    Restricted

    State

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 224

    12.

    Expanded

    Text

    for

    Message

    CPF3736

    224

    13.

    Expanded

    Text

    for

    Message

    CPF3845

    225

    14.

    Sample

    Job

    Log

    for

    RSTAUT

    on

    a

    System

    in

    a

    Non-restricted

    State

    .

    .

    .

    .

    .

    .

    .

    .

    . 225

    15.

    Expanded

    Text

    for

    Message

    CPF3845

    225

    16.

    Example:

    Restoring

    a

    Journaled

    Object

    to

    a

    Different

    Library

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 239

    17.

    Example

    of

    a

    Database

    File

    with

    Two

    Members

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 240

    18.

    Restoring

    a

    Copy

    of

    a

    File

    .

    .

    .

    .

    .

    .

    . 241

    19.

    Restoring

    Database

    Files

    with

    Different

    Creation

    Dates

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 242

    20.

    Restoring

    Database

    Files

    with

    Different

    Creation

    Dates

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 242

    21.

    Restoring

    Access

    Paths

    .

    .

    .

    .

    .

    .

    .

    . 246

    22.

    Restoring

    a

    Referential

    Constraint

    Network

    249

    23.

    An

    Object

    with

    Hard

    Links–Example

    262

    24.

    An

    Object

    with

    a

    Symbolic

    Link–Example

    263

    25.

    Sample

    Recovery

    Time

    Line

    .

    .

    .

    .

    .

    .

    . 275

    26.

    Receiver

    Directory–Saving

    Attached

    Receivers

    279

    27.

    Receiver

    Directory–Saving

    Detached

    Receivers

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 279

    28.

    How

    the

    System

    Is

    Saved

    with

    Operational

    Assistant

    Backup

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 304

    29.

    Recovery

    steps

    for

    restoring

    previous

    release

    user

    data

    to

    a

    new

    system

    .

    .

    .

    .

    .

    .

    . 331

    30.

    Overview

    of

    Synchronization

    Process

    350

    31.

    Display

    Hardware

    Resource

    Listing

    .

    .

    .

    . 394

    32.

    Program

    for

    Retrieving

    Journal

    Entries

    471

    33.

    Example

    Program

    Prompts

    for

    Restoring

    the

    Required

    Receiver

    For

    an

    APYJRNCHG

    .

    .

    . 472

    34.

    Program

    for

    writing

    RCVJRNE

    output

    to

    save

    media

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 474

    ©

    Copyright

    IBM

    Corp.

    1997,

    2004

    ix

  • x

    OS/400

    Backup

    and

    Recovery

    V5R3

  • Tables

    1.

    Spooled

    Files

    Created

    by

    the

    server

    .

    .

    .

    . 17

    2.

    ObjectConnect/400

    and

    Associated

    iSeries

    Save

    and

    Restore

    Commands

    .

    .

    .

    .

    .

    .

    .

    . 22

    3.

    Relationship

    Between

    Save

    and

    Restore

    Commands

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 36

    4.

    Restoring

    Objects

    with

    ALWOBJDIF

    .

    .

    .

    . 37

    5.

    Resolving

    Problems

    Detected

    by

    the

    RCLSTG

    Procedure

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 43

    6.

    Lock

    Type

    Needed

    for

    Restore

    Operation

    49

    7.

    Choosing

    the

    Correct

    Recovery

    Procedure

    for

    Disk

    Media

    Failure

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 60

    8.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    1

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 62

    9.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    2

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 63

    10.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    4

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 66

    11.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    5

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 70

    12.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    6

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 73

    13.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    7

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 73

    14.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    8

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 74

    15.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    9

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 76

    16.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    10

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 79

    17.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    11

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 82

    18.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    12

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 83

    19.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    13

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 85

    20.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    14

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 88

    21.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    15

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 88

    22.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    16

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 89

    23.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    17

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 90

    24.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    18

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 90

    25.

    Recovery

    Checklist

    for

    Disk

    Failure–Checklist

    19

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 91

    26.

    Recovery

    Checklist

    for

    Complete

    System

    Loss–Checklist

    20

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 93

    27.

    Recovery

    Checklist

    for

    Complete

    System

    Loss–Checklist

    21

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 96

    28.

    Recovery

    Checklist

    for

    Complete

    System

    Loss–Checklist

    22

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 101

    29.

    Recovery

    Checklist

    for

    Failed

    Cache

    Card–Checklist

    23

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 103

    30.

    Choosing

    the

    Correct

    Recovery

    Procedure

    for

    User

    Information

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 104

    31.

    Checklist

    for

    Recovering

    User

    Information

    Using

    Commands

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 105

    32.

    Checklist

    for

    Recovering

    User

    Information

    Using

    Option

    21

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 109

    33.

    Checklist

    for

    Recovering

    User

    Information

    Using

    Options

    22

    and

    23

    .

    .

    .

    .

    .

    .

    .

    . 111

    34.

    Checklist

    for

    Recovering

    User

    Information

    Using

    Operational

    Assistant

    Backup

    Tapes

    .

    . 114

    35.

    Options

    from

    the

    Install

    the

    Licensed

    Internal

    Code

    (LIC)

    Menu

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 119

    36.

    SRC

    Codes

    When

    Loading

    the

    Licensed

    Internal

    Code

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 125

    37.

    Configuring

    Disk

    While

    Installing

    the

    Operating

    System

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 148

    38.

    Recovery

    for

    Damaged

    Objects

    by

    Object

    Type

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 174

    39.

    Object

    Types

    That

    Require

    Special

    Procedures

    for

    Deleting

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 192

    40.

    Tasks

    for

    Restoring

    basic

    ASP

    Objects

    198

    41.

    Example

    of

    restore

    order

    for

    independent

    ASPs

    saved

    with

    GO

    SAVE:

    Option

    21

    or

    23

    . 202

    42.

    Tasks

    for

    Restoring

    independent

    ASP

    Objects

    202

    43.

    Commands

    for

    Changing

    System

    Information

    215

    44.

    How

    User

    Profiles

    Are

    Restored

    .

    .

    .

    .

    . 216

    45.

    Results

    of

    Restoring

    User

    Profiles

    .

    .

    .

    .

    . 218

    46.

    Restoring

    an

    Object

    Linked

    to

    an

    Authorization

    List

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 220

    47.

    How

    Configuration

    Objects

    Are

    Restored

    230

    48.

    Methods

    for

    Restoring

    All

    Libraries–Single

    Save

    Operation

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 236

    49.

    Methods

    for

    Restoring

    All

    Libraries–Multiple

    Save

    Operations

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 236

    50.

    Restoring

    a

    File

    Network

    .

    .

    .

    .

    .

    .

    . 247

    51.

    Restoring

    Files

    That

    Have

    Trigger

    Programs

    250

    52.

    Restoring

    Objects

    That

    Have

    Hard

    Links

    263

    53.

    Using

    the

    RST

    Command

    for

    QSYS.LIB

    Objects

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 271

    54.

    New

    Name

    Options

    on

    the

    RST

    Command–Examples

    .

    .

    .

    .

    .

    .

    .

    .

    . 272

    55.

    Restore

    Procedures

    for

    Changed

    Objects

    276

    56.

    Handling

    Messages

    When

    Restoring

    Storage

    313

    57.

    Values

    for

    TGTRLS

    Parameter

    .

    .

    .

    .

    .

    . 321

    58.

    Language

    Support

    for

    the

    Target

    Release

    Parameter

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 322

    59.

    Previous-Release

    Support

    by

    Object

    Type

    324

    60.

    Comparison

    of

    Synchronization

    Methods

    351

    61.

    Choosing

    the

    Right

    Disk

    Procedure

    .

    .

    .

    . 379

    62.

    Configuring

    Disks

    on

    a

    New

    System–Tasks

    380

    63.

    Adding

    Disk

    Units

    without

    Device

    Parity

    Protection–Tasks

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 381

    64.

    Adding

    Disk

    Units

    to

    an

    Existing

    Input/Output

    Adapter–Tasks

    .

    .

    .

    .

    .

    . 382

    65.

    Adding

    a

    New

    input/output

    adapter–Tasks

    383

    66.

    Moving

    Disk

    Units

    Between

    ASPs–Tasks

    385

    ©

    Copyright

    IBM

    Corp.

    1997,

    2004

    xi

    |||

    |

    |

  • 67.

    Moving

    Disk

    Units

    Between

    ASPs

    with

    mirrored

    protection–Tasks

    .

    .

    .

    .

    .

    .

    . 386

    68.

    Deleting

    an

    Auxiliary

    Storage

    Pool–Tasks

    387

    69.

    Removing

    Disk

    Units

    That

    Do

    Not

    Have

    Device

    Parity

    Protection–Tasks

    .

    .

    .

    .

    .

    . 388

    70.

    Removing

    Disk

    Units

    from

    an

    IOA

    and

    a

    Non-Mirrored

    ASP–Tasks

    .

    .

    .

    .

    .

    .

    . 389

    71.

    Removing

    Disk

    Units

    from

    an

    IOA

    and

    a

    Mirrored

    ASP–Tasks

    .

    .

    .

    .

    .

    .

    .

    .

    . 390

    72.

    Word

    formats

    for

    SRC

    codes

    in

    V4R5.

    449

    73.

    SRC

    code

    word

    formats

    in

    V4R4

    and

    previous

    releases.

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 450

    74.

    Adding

    a

    New

    I/O

    Storage

    Controller

    and

    Disk

    Units

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 457

    75.

    Adding

    Compressed

    Disk

    Units

    to

    an

    Existing

    Storage

    Controller

    .

    .

    .

    .

    .

    .

    . 458

    76.

    Moving

    Disk

    Units

    from

    the

    System

    ASP

    to

    a

    User

    ASP

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 459

    77.

    Checklist

    for

    Testing

    the

    Disaster

    Recovery

    Plan

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    .

    . 492

    xii

    OS/400

    Backup

    and

    Recovery

    V5R3

  • About

    Backup

    and

    Recovery,

    SC41-5304-07

    This

    book

    provides

    general

    information

    about

    backup

    and

    recovery

    options

    for

    the

    IBM®

    iSeries

    server.

    It

    describes

    the

    options

    available

    on

    the

    system,

    compares

    and

    contrasts

    them,

    and

    tells

    where

    to

    find

    more

    information

    about

    them.

    This

    book

    release

    contains

    minimal

    information

    about

    how

    to

    back

    up

    your

    server.

    Look

    for

    comprehensive

    information

    about

    backing

    up

    your

    server

    in

    the

    iSeries

    Information

    Center

    at

    the

    following

    Web

    site:

    http://www.ibm.com/eserver/iseries/infocenter.

    This

    book

    provides

    information

    on

    the

    following

    topics:

    v

    Procedures

    on

    how

    to

    save

    your

    system

    with

    the

    Save

    menu

    options

    of

    the

    GO

    SAVE

    command.

    v

    Restoring

    to

    a

    different

    releases

    of

    OS/400

    v

    Selecting

    the

    right

    recovery

    strategy

    v

    Procedures

    for

    restoring

    information

    to

    your

    system

    v

    Device

    Parity

    Protection

    procedures

    v

    Mirrored

    protection

    procedures

    Who

    should

    read

    this

    book

    This

    book

    is

    intended

    for

    someone

    who

    is

    assigned

    the

    responsibilities

    of

    backup

    and

    recovery

    planning

    and

    recovering

    the

    system

    after

    a

    failure.

    You

    should

    be

    familiar

    with

    the

    information

    contained

    in

    the

    Systems

    Management

    —>

    Backup

    and

    Recovery

    topic

    of

    the

    Information

    Center

    Website

    before

    using

    this

    book.

    If

    you

    know

    how

    to

    operate

    the

    system,

    you

    should

    be

    ready

    to

    use

    this

    book.

    Prerequisite

    and

    related

    information

    Use

    the

    iSeries

    Information

    Center

    as

    your

    starting