10 Triple Contingency
...................................................................................................
271
Overview.............................................................................................................................................271
Requirements......................................................................................................................................271
How Triple Contingency Works.........................................................................................................271
Hardware Requirements.....................................................................................................................272
Software Requirements.......................................................................................................................272
The RETAINCOUNT Configuration Parameter.................................................................................273
The COPYAUDIT Command..............................................................................................................274
COPYAUDIT Restartability................................................................................................................275
Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails.............................275
Triple Contingency Without ZLT..................................................................................................275
Using ZLT to Achieve the same Protection...................................................................................276
Summary.............................................................................................................................................277
11 Subvolume-Level and File-Level Replication
...........................................................
279
INCLUDE Clauses..............................................................................................................................279
EXCLUDE Clauses..............................................................................................................................279
Wildcard Character (*)........................................................................................................................280
Within Subvolume Names.............................................................................................................280
Within Filenames...........................................................................................................................280
INCLUDE/EXCLUDE and RDFCOM In-Memory Table....................................................................280
INCLUDE and EXCLUDE Processing................................................................................................281
INCLUDEPURGE and EXCLUDEPURGE.........................................................................................281
Error Checking....................................................................................................................................282
Performance Ramifications.................................................................................................................282
Summary Examples............................................................................................................................282
12 Subvolume Name Mapping
...................................................................................
285
Creating a Mapfile to Define the Rules for Subvolume Name Mapping...........................................285
Rules for Creating Mapfile Mapping Strings......................................................................................285
How an Updater Manages Filename Collisions.................................................................................286
Creating a Maplog to Log Subvolume Name Mapping.....................................................................287
Adding a Mapfile and Maplog to an Updater's Configuration Record.............................................288
Managing Subvolume Name Mapping for Partitioned Files.............................................................288
13 Auxiliary Audit Trails
...............................................................................................
291
Auxiliary Extractor..............................................................................................................................291
Auxiliary Receiver...............................................................................................................................291
Configuring Extractors and Receivers................................................................................................291
Error conditions.............................................................................................................................291
Configuring Image Trails....................................................................................................................292
Configuring Updaters.........................................................................................................................292
Error Conditions............................................................................................................................292
Ramifications for STOP TMF, Stop-Update-to-Time, and SQL Shared Access DDL Ops..................292
Takeover Ramifications.......................................................................................................................293
Usage of Master and Auxiliary Audit Trails.......................................................................................293
Using Expand Multi-CPU Paths.........................................................................................................293
14 Network Transactions
..............................................................................................
295
Configuration Changes.......................................................................................................................295
NETWORK Attribute.....................................................................................................................295
Table of Contents
15
Содержание NonStop RDF
Страница 68: ...68 ...
Страница 186: ...186 ...
Страница 260: ...260 ...
Страница 278: ...278 ...
Страница 284: ...284 ...
Страница 290: ...290 ...
Страница 308: ...308 ...
Страница 322: ...322 ...
Страница 336: ...336 ...
Страница 348: ...348 ...
Страница 464: ...464 ...
Страница 478: ......