Hitachi Command Control Interface (CCI) User and Reference Guide
xv
Figure 4.32
Raidvchkset Command Examples ..................................................... 238
Figure 4.33
Raidvchkdsp Command Examples with -fd and -fe Options....................... 244
Figure 4.34
Raidvchkdsp Command Example with -v cflag Option............................. 245
Figure 4.35
Raidvchkdsp Command Example with -v offset Option............................ 246
Figure 4.36
Raidvchkdsp Command Example with -v errcnt Option ........................... 246
Figure 4.37
Raidvchkdsp Command Example with -v gflag Option............................. 246
Figure 4.38
Raidvchkdsp Command Example with -v pool Option ............................. 247
Figure 4.39
Raidvchkdsp Command Example with -v aou Option .............................. 248
Figure 4.40
Raidvchkscan Command Example with -v cflag Option............................ 251
Figure 4.41
Raidvchkscan Command Example with -v offset Option .......................... 252
Figure 4.42
Raidvchkscan Command Example with -v errcnt Option .......................... 252
Figure 4.43
Raidvchkscan Command Example with -v gflag Option ........................... 253
Figure 4.44
Raidvchkscan Command Example with -v pool Option ............................ 254
Figure 4.45
Raidvchkscan Command Example with -v aou Option ............................. 254
Figure 4.46
Raidvchkscan Command Example with -v jnl 0 Option ............................ 255
Figure 4.47
Example of Q-Marker and Q-CNT ..................................................... 257
Figure 4.48
Raidvchkscan Command Example with -v jnlt Option ............................. 258
Figure 4.49
Raidvchkscan Command Example with -v pid Option.............................. 259
Figure 4.50
Raidvchkscan Command Example with -v pida Option ............................ 260
Figure 4.51
Findcmddev Subcommand Example .................................................. 270
Figure 4.52
Drivescan Subcommand Example ..................................................... 271
Figure 4.53
Portscan Subcommand Example ...................................................... 272
Figure 4.54
Sync Subcommand Example – Pairsplit............................................... 274
Figure 4.55
Sync Subcommand Example – Pairsplit -S............................................ 274
Figure 4.56
Mount Subcommand Example for Windows NT ..................................... 275
Figure 4.57
Mount Subcommand Example for Windows 2003/2000............................ 276
Figure 4.58
Umount Subcommand Example ....................................................... 277
Figure 4.59
Environment Variable Subcommand Examples ..................................... 279
Figure 4.60
Inqraid Command Tool Examples ................................................283-281
Figure 4.61
Inqraid: Example of -find Option (Linux example shown) ........................ 285
Figure 4.62
Inqraid: Example of -find Option (HP-UX example shown) ....................... 285
Figure 4.63
Inqraid: Example of -findc Option (HP-UX example shown) ...................... 285
Figure 4.64
Inqraid: Example of -CLI Option (Linux example shown) ......................... 286
Figure 4.65
Inqraid: Example of -CLIWP and -CLIWN Options (HP-UX example shown) .... 286
Figure 4.66
Inqraid: Example of -sort[CM] Option (HP-UX example shown).................. 287
Figure 4.67
Inqraid: Example of -gvinf Option .................................................... 287
Figure 4.68
Inqraid: Example of -svinf[=PTN] Option ............................................ 287
Figure 4.69
Mkconf Command Tool Example (HP-UX example shown) ........................ 289
Figure 4.70
Synchronization for Hitachi TrueCopy Async/UR ................................... 291
Figure 4.71
Pairsyncwait Command Examples .................................................... 295
Figure 4.72
Definition of the Protection Volume ................................................. 296
Figure 4.73
Example for the Two Host Configuration ............................................ 298
Figure 4.74
Example for the One Host Configuration ............................................ 299
Figure 4.75
Definition of the Group Version....................................................... 306
Figure 4.76
LDM Volume Configuration............................................................. 307
Figure 4.77
LDM Volume Flushing ................................................................... 311
Figure 4.78
Configurations with MSCS and ShadowImage (HOMRCF) .......................... 314
Figure 4.79
Directory Mount Structure ............................................................. 318
Figure 4.80
Protection of the command device that has the SLPR attribute ................ 322
Figure 4.81
SLPR Configuration on a Single Host ................................................. 324
Содержание TAGMASTORE MK-90RD011-25
Страница 2: ......
Страница 8: ...viii Preface ...
Страница 18: ...xviii Contents ...
Страница 180: ...162 Chapter 3 Preparing for CCI Operations ...
Страница 250: ...232 Chapter 4 Performing CCI Operations Vol Type logical unit LU type e g OPEN V OPEN 9 ...
Страница 370: ...352 Chapter 5 Troubleshooting ...
Страница 388: ...370 Acronyms and Abbreviations ...