HP XP P9000 RAID Manager User Guide (T1610-96059, January 2014)

Business Copy operations......................................................................................................135
Business Copy duplicated mirroring....................................................................................135
Business Copy cascading pairs..........................................................................................136
Restrictions for Business Copy cascading volumes............................................................137
Restriction for Continuous Access Synchronous/Business Copy cascading volumes...............138
Continuous Access Synchronous operations..............................................................................138
Continuous Access Synchronous takeover commands............................................................138
Continuous Access Synchronous remote commands..............................................................139
Continuous Access Synchronous local commands.................................................................140
Continuous Access Synchronous, Business Copy, and Continuous Access Journal operations...........141
Continuous Access Synchronous/Business Copy volumes.......................................................141
Continuous Access Synchronous/Business Copy/Continuous Access Journal pair status.............142
Continuous Access Asynchronous, Continuous Access Synchronous, and Continuous Access Journal
volumes..........................................................................................................................146
Sidefile cache for Continuous Access Asynchronous.........................................................148
Continuous Access Asynchronous transition states and sidefile control................................149
Continuous Access Asynchronous/Continuous Access Journal error state.............................150
Continuous Access Synchronous/Continuous Access Asynchronous and Continuous Access Journal
fence level settings...........................................................................................................151
Setting the fence level..................................................................................................152
Snapshot operations.............................................................................................................153
Snapshot volumes............................................................................................................153
Creating a Snapshot pair..................................................................................................153
Snapshot pair status.........................................................................................................154
Pair status relationship to Snapshot commands.....................................................................155
Controlling Auto LUN............................................................................................................155
Specifications for Auto LUN...............................................................................................155
Commands to control Auto LUN.........................................................................................157
Relations between "cc" command issues and status..............................................................159
Restrictions for Auto LUN...................................................................................................161
Continuous Access Journal MxN configuration and control.........................................................161
Overview........................................................................................................................161
Policy ............................................................................................................................162
horcm.conf......................................................................................................................162
Command specifications...................................................................................................163
pairdisplay command..................................................................................................163
pairsplit command......................................................................................................164
Notice on system operation...............................................................................................166
Configuration examples....................................................................................................167
Remote volume discovery.......................................................................................................169
Discovering a remote volume.............................................................................................170
7 Data protection operations with RAID Manager..........................................172
Data protection operations.....................................................................................................172
Data Retention ................................................................................................................172
Restrictions on Data Retention volume.............................................................................173
Database Validator..........................................................................................................173
Restrictions on Database Validator.................................................................................174
Protection parameters and operations......................................................................................174
Data Protection facility...........................................................................................................175
Data Protection Facility specifications..................................................................................176
Examples for configuration and protected volumes...............................................................177
The operation authority with CMD security enabled..............................................................178
Target commands for protection.........................................................................................178
permission command.......................................................................................................178
6 Contents