Document revision date: 30 March 2001 | |
Previous | Contents | Index |
Testing alone cannot guarantee the correctness of a backup procedure.
However, testing is a critical component of designing any backup and
recovery process.
7.12.13 Restoring Data
Too often, organizations concentrate on the backup process with little
thought to how their data will be restored. Remember that the ultimate
goal of any backup strategy is to recover data in the event of a
disaster. Restore and recovery procedures must be designed and tested
as carefully as the backup procedures.
7.12.14 Revalidation of Data Consistency Methods
The discussion in this section is based on features and behavior of OpenVMS Version 7.3 and applies to prior versions as well. Future versions of OpenVMS may have additional features or different behavior that affect the procedures necessary for data consistency. Sites that upgrade to future versions of OpenVMS must reevaluate their procedures and be prepared to make changes or to employ nonstandard settings in OpenVMS to ensure that their backups remain consistent.
This chapter explains how to accomplish system maintenance tasks on a
standalone system or an OpenVMS Cluster system that uses volume
shadowing. Refer to Chapter 3 for information about setting up and
booting a system to use volume shadowing.
8.1 Upgrading the Operating System on a System Disk Shadow Set
It is important to upgrade the operating system at a time when your system can afford to have its shadowing support disabled. This is because you cannot upgrade to new versions of the OpenVMS operating system on a shadowed system disk. If you attempt to upgrade a system disk while it is an active member of a shadow set, the upgrade procedure will fail.
Procedure for Upgrading Your Operating System
This procedure is divided into four parts. Part 1 describes how to prepare a shadowed system disk for the upgrade. Part 2 describes how to perform the upgrade. Part 3 describes how to enable volume shadowing on the upgraded system. Part 4 shows how to boot other nodes in an OpenVMS Cluster system with and without volume shadowing.
Part 1: Preparing a Shadowed System Disk
If you need to change the volume label of a disk that is mounted across the cluster, be sure you change the label on all nodes in the OpenVMS Cluster system. For example, you could propagate the volume label change to all nodes in the cluster with one SYSMAN utility command, after you define the environment as the cluster:
|
You cannot perform an upgrade on a shadowed system disk. If your system is set up to boot from a shadow set, you must disable shadowing the system disk before performing the upgrade. This requires changing SYSGEN parameter values interactively using the SYSGEN utility. |
$ RUN SYS$SYSTEM:SYSGEN |
SYSGEN> USE upgrade-disk:[SYSn.SYSEXE]ALPHAVMSSYS.PAR SYSGEN> |
SYSGEN> USE upgrade-disk:[SYSn.SYSEXE]VAXVMSSYS.PAR SYSGEN> |
SYSGEN> SET SHADOW_SYS_DISK 0 |
SYSGEN> WRITE upgrade-disk:[SYSn.SYSEXE]ALPHAVMSSYS.PAR |
SYSGEN> WRITE upgrade-disk:[SYSn.SYSEXE]VAXVMSSYS.PAR |
Even if you plan to use the upgraded system disk to upgrade the operating system on other OpenVMS Cluster nodes, you should complete the upgrade on one node before altering parameters for other nodes. Proceed to Part 2.
Part 2: Performing the Upgrade
Part 3: Enabling Volume Shadowing on the Upgraded System
Once the upgrade is complete and the upgraded node has finished running AUTOGEN, you can enable shadowing for the upgraded node using the following steps.
$ RUN SYS$SYSTEM:SYSGEN SYSGEN> USE CURRENT SYSGEN> |
SYSGEN> SET SHADOWING 2 SYSGEN> SET SHADOW_SYS_DISK 1 SYSGEN> SET SHADOW_SYS_UNIT 54 SYSGEN> WRITE CURRENT |
Part 4: Booting Other Nodes in the OpenVMS Cluster from the Upgraded Disk
If other nodes boot from the upgraded disk, the OpenVMS upgrade procedure automatically upgrades and runs AUTOGEN on each node when it is booted. The procedure for booting other nodes from the upgraded disk differs based on whether the upgraded disk has been made a shadow set.
Once you have successfully upgraded the system or systems and you have completed other postupgrade work (such as layered product installations), perform the following steps:
Generally, users and applications access a shadow set through the virtual unit. Occasionally, you may want to change the data on an individual shadow set member and then pass the changed data to other shadow set members.
The following series of commands demonstrates how you can dissolve and recreate the shadow set to perform specialized processes on one shadow set member and transfer the change to the other shadow set members.
The following command mounts a shadow set with three shadow set members:
$ MOUNT DSA9:/SHADOW=($45$DUA2:,$45$DUA4:,$45$DUA8:) LURK1 |
The following command dissolves the shadow set mounted in the previous command and makes the individual shadow set members available:
$ DISMOUNT DSA9: |
The following command mounts one former shadow set member as a disk volume outside of the shadow set:
$ MOUNT/OVERRIDE=SHADOW_MEMBERSHIP $45$DUA2: LURK1 |
In this command, in order to have write access, you must use the /OVERRIDE=SHADOW_MEMBERSHIP qualifier to zero the shadow set generation number. At this point, the disk is mounted as a nonshadowed volume and can be modified as required.
Before creating a new shadow set, dismount the $45$DUA2 physical disk, as follows:
$ DISMOUNT/NOUNLOAD $45$DUA2 $ MOUNT DSA9:/SHADOW=$45$DUA2: LURK1 |
The second command recreates the shadow set with $45$DUA2 as the only member.
Note that mounting $45$DUA2 with the /OVERRIDE=SHADOW_MEMBERSHIP qualifier automatically zeroed the volume shadowing generation number. If you were to specify all the former members of the shadow set in the same command line, the MOUNT command would consider $45$DUA2 an unrelated volume and would determine that it requires a copy operation. This would overwrite the earlier modifications.
To save the current contents of $45$DUA2, add the other two former shadow set members to the new shadow set with a subsequent MOUNT command:
$ MOUNT DSA9:/SHADOW=($45$DUA4:,$45$DUA8:) LURK1 |
In this command, $45$DUA4 and $45$DUA8 are added to the shadow set
DSA9. This recreates the original shadow set, except that each shadow
set member now has the benefit of the changed data that was done to the
single shadow set member.
8.3 Performing Backup Operations on a Shadow Set
You should think of a shadow set as a single, highly available disk. As such, backup techniques for nonshadowed disks apply to shadow set virtual units. However, to preserve the consistency and integrity of the shadow set, avoid removing a physical member of the shadow set without dismounting the virtual unit unless you have scrupulously followed the guidelines in Section 7.12. If you leave some disk members of a shadow set active during the backup operation, data integrity is compromised because some disks in the shadow set may have files open. Refer to Section 4.8.3 for information about obtaining a member of a shadow set for the source of a backup operation.
The following list describes options that are available when backing up shadow sets that are not available with nonshadowed disks.
HSC BACKUP and RESTORE techniques are not recommended for saving and restoring the contents of a shadow set member. These HSC utilities are applicable to the disk geometry only, not to the OpenVMS file system. Although HSC BACKUP and RESTORE techniques save and restore the contents of an entire disk volume (including blocks that may not be in use by the file system on that volume), they do not save and restore specific files, groups of files, directories, or subdirectories. In addition, these utilities do not defragment a disk. Moreover, the utilities cannot restore the context of a shadow set virtual unit.
The following sections describe several approaches to shadow set backup
operations.
8.3.1 Restrictions on BACKUP Procedures
On VAX systems, accessing shadow sets from standalone BACKUP is not supported. The command procedures supplied with OpenVMS for building standalone BACKUP kits are designed to prevent standalone BACKUP from using volume shadowing improperly. However, these checks can easily be overridden by a well-informed and sufficiently privileged user.
Note the following restrictions for standalone BACKUP on VAX systems that use volume shadowing:
On Alpha computers, the same restrictions apply. You cannot use the
standalone, menu-driven procedure included on the OpenVMS Alpha
operating system distribution compact disc to perform BACKUP operations
on shadow sets.
8.3.2 Using Copy Operations to Create a Backup
This example shows how to use volume shadowing copy operations to create an offline identical disk volume that you can then use as a backup of your shadow set. The following command creates a shadow set with one shadow set member:
$ MOUNT DSA0:/SHADOW=$1$DUA10: SHADOWFACTS %MOUNT-I-MOUNTED, SHADOWFACTS mounted on _DSA0: %MOUNT-I-SHDWMEMSUCC, _$1$DUA10: (DISK01) is now a valid member of the shadow set |
The following command adds a second member, $1$DUA11, to the shadow set:
$ MOUNT DSA0:/SHADOW=$1$DUA11: SHADOWFACTS %MOUNT-I-SHDWMEMCOPY, _$1$DUA11: (DISK02) added to the shadow set with a copy operation |
At this point you must wait for the copy operation to complete before dismounting the shadow set. When the copy operation is complete, messages are sent to the system console and to any operators enabled to receive them.
The following command dismounts the shadow set, leaving $1$DUA10 and $1$DUA11 with logically identical volumes:
$ DISMOUNT DSA0: |
At this point you can re-create the shadow set with one of the volumes
and keep the other as a backup, or use it as a source for the backup
operation.
8.3.3 Using the OpenVMS Backup Utility
Generally you can use the OpenVMS Backup utility (BACKUP) with shadow sets as you do with regular volumes. (See the OpenVMS System Manager's Manual, Volume 1: Essentials for a description of how to back up volumes.) You can create BACKUP save sets or copies from shadow sets by using the shadow set virtual unit name instead of a physical device name as the input specifier. However, you cannot always restore to a shadow set by listing the virtual unit name as an output specifier. The main restriction to any backup restoration is that you cannot mount the target volume with the /FOREIGN qualifier. The proper procedure for a BACKUP/IMAGE restoration is described in Section 8.3.4.
The format for a BACKUP command is as follows:
BACKUP input-specifier output-specifier |
The format is the same as for any BACKUP operation. The following command, for example, designates a virtual unit for the input specifier:
$ BACKUP/RECORD DSA2:[*...]/SINCE=BACKUP MTA0:23DEC.BCK |
$ BACKUP/RECORD DSA2:[*...]/SINCE=BACKUP MTA0:23DEC.BCK |
This command saves all files on the shadow set DSA2 that have been created or modified since the last backup and records the current time as their new backup date.
Previous | Next | Contents | Index |
privacy and legal statement | ||
5423PRO_011.HTML |