HP Volume Shadowing for OpenVMS: OpenVMS Version 8.4 > Chapter 4 Creating and Managing Shadow Sets Using DCL Commands Managing Shadow Sets With SET SHADOW (Integrity servers and Alpha)OpenVMS Alpha Version 7.3 introduced qualifiers to the DCL command SET SHADOW for specifying management attributes for shadow set members located at different sites. These qualifiers are also supported on OpenVMS Integrity servers. OpenVMS Version 8.2 introduced qualifiers to SET SHADOW that can be used to manage copy and merge operations at a single location or at multiple sites. OpenVMS Version 8.3 introduced the /RESET qualifier to reset the shadowing-specific counters that are maintained for each shadow set. OpenVMS Version 8.4 added additional keywords and parameters for multiuse bitmaps. Many of the SET SHADOW qualifiers, described in Table 4-3, can be applied to individual shadow set members or to the entire shadow set. By using these qualifiers, system managers can override the default volume shadowing actions that can occur when the systems at one site of a multiple-site OpenVMS Cluster configuration fail or when a merge operation is required. Designed primarily for use in a configuration that uses Fibre Channel for a storage interconnect, either locally or site-to-site, these command qualifiers can be used in other configurations as well. Similarly, the DCL command DISMOUNT was enhanced in OpenVMS Alpha Version 7.3 by the addition of the qualifier /FORCE_REMOVAL ddcu:. This qualifier, also supported on OpenVMS Integrity servers, was added to give system managers greater control of shadow set members located at different sites. For more information about this qualifier, see “Removing Members from Shadow Sets ”. Figure 4-1 depicts a typical multiple-site cluster using Fibre Channel. The figure illustrates the steps required to recover one site manually when the site-to-site storage interconnect fails. These steps must be taken for multiple-site OpenVMS Cluster systems that are running:
To prevent the shadowing driver from automatically recovering shadow sets from connection-related failures, you must perform the following three configuration tasks prior to any failure:
Figure 4-1 shows a shadow set DSA42, whose members are devices $1$DGA1000 and $1$DGA2000. Systems at Site A or Site B have direct access to all devices at both sites via Fibre Channel connections. XYZZY is a theoretical point between the two sites. If the Fibre Channel connection were to break at this point, each site could access different “local” members of DSA42 without error. For the purpose of this example, Site A is the sole site chosen to retain access to the shadow set. The following steps must be taken to recover the shadow set at Site A.
|