Hitachi Command Control Interface (CCI) User and Reference Guide ix
Contents
Chapter 1 Overview of CCI Functionality...............................................................................................1
1.1 Overview of Command Control Interface.....................................................1
1.2 Overview of Hitachi Data Replication Functions ............................................2
1.2.1 Hitachi TrueCopy........................................................................ 2
1.2.2 Hitachi ShadowImage................................................................... 3
1.2.3 Hitachi Universal Replicator...........................................................3
1.2.4 Hitachi Copy-on-Write Snapshot ......................................................4
1.3 Overview of Hitachi Data Protection Functions .............................................5
1.3.1 Hitachi Database Validator ............................................................5
1.3.2 Hitachi Data Retention Utility (Open LDEV Guard) ................................6
Chapter 2 Overview of CCI Operations..................................................................................................7
2.1 Overview...........................................................................................8
2.2 Features of Paired Volumes.....................................................................9
2.2.1 ShadowImage Duplicated Mirroring................................................. 10
2.2.2 ShadowImage Cascading Pairs....................................................... 11
2.2.3 Hitachi TrueCopy Takeover Commands............................................ 14
2.2.4 Hitachi TrueCopy Remote Commands.............................................. 15
2.2.5 Hitachi TrueCopy Local Commands................................................. 16
2.3 Overview of CCI ShadowImage Operations ................................................. 17
2.4 Hitachi TrueCopy/ShadowImage Volumes .................................................. 18
2.4.1 TrueCopy/ShadowImage/Universal Replicator Volume Status ................. 19
2.4.2 TrueCopy Async, TrueCopy Sync CTG, and Universal Replicator Volumes ... 23
2.4.3 TrueCopy Sync/Async and Universal Replicator Fence-Level Settings........ 28
2.5 Applications of Hitachi TrueCopy/ShadowImage Commands ............................ 31
2.6 Overview of Copy-on-Write Snapshot Operations ......................................... 37
2.6.1 Creating SnapShot..................................................................... 38
2.6.2 SnapShot Volume Specifications .................................................... 38
2.6.3 SnapShot Volume Characteristics................................................... 38
2.7 Overview of CCI Data Protection Operations............................................... 40
2.7.1 Database Validator.................................................................... 40
2.7.2 Restrictions on Database Validator................................................. 41
2.7.3 Data Retention Utility/Open LDEV Guard ......................................... 42
2.7.4 Restrictions on Data Retention Utility Volumes .................................. 43
2.7.5 Operations.............................................................................. 44
2.8 CCI Software Structure ........................................................................ 45
2.8.1 HORCM Operational Environment................................................... 45
2.8.2 CCI Instance Configurations.......................................................... 46
2.8.3 Host Machines that Can be Paired.................................................. 48
2.8.4 Configuration Definition File ........................................................ 50
2.8.5 Command Device ...................................................................... 63
2.8.6 Alternate Command Device Function .............................................. 64
2.8.7 Command Interface with Hitachi TrueCopy/ShadowImage..................... 65
2.8.8 Logical DKC per 64K LDEVs........................................................... 68
2.8.9 Command Device Guarding .......................................................... 69
2.8.10 CCI Software Files..................................................................... 71