A SERVICE OF

logo

Hitachi Command Control Interface (CCI) User and Reference Guide xv
Figure 4.32
Raidvchkset Command Examples ..................................................... 238
Figure 4.33 Raidvchkdsp Command Examples with -fd and -fe Options....................... 244
Figure 4.34 Raidvchkdsp Command Example with -v cflag Option............................. 245
Figure 4.35 Raidvchkdsp Command Example with -v offset Option............................ 246
Figure 4.36 Raidvchkdsp Command Example with -v errcnt Option ........................... 246
Figure 4.37 Raidvchkdsp Command Example with -v gflag Option............................. 246
Figure 4.38 Raidvchkdsp Command Example with -v pool Option ............................. 247
Figure 4.39 Raidvchkdsp Command Example with -v aou Option .............................. 248
Figure 4.40 Raidvchkscan Command Example with -v cflag Option............................ 251
Figure 4.41 Raidvchkscan Command Example with -v offset Option .......................... 252
Figure 4.42 Raidvchkscan Command Example with -v errcnt Option.......................... 252
Figure 4.43 Raidvchkscan Command Example with -v gflag Option ........................... 253
Figure 4.44 Raidvchkscan Command Example with -v pool Option ............................ 254
Figure 4.45 Raidvchkscan Command Example with -v aou Option ............................. 254
Figure 4.46 Raidvchkscan Command Example with -v jnl 0 Option............................ 255
Figure 4.47 Example of Q-Marker and Q-CNT ..................................................... 257
Figure 4.48 Raidvchkscan Command Example with -v jnlt Option ............................. 258
Figure 4.49 Raidvchkscan Command Example with -v pid Option.............................. 259
Figure 4.50 Raidvchkscan Command Example with -v pida Option ............................ 260
Figure 4.51 Findcmddev Subcommand Example .................................................. 270
Figure 4.52 Drivescan Subcommand Example ..................................................... 271
Figure 4.53 Portscan Subcommand Example ...................................................... 272
Figure 4.54 Sync Subcommand Example – Pairsplit............................................... 274
Figure 4.55 Sync Subcommand Example – Pairsplit -S............................................ 274
Figure 4.56 Mount Subcommand Example for Windows NT ..................................... 275
Figure 4.57 Mount Subcommand Example for Windows 2003/2000............................ 276
Figure 4.58 Umount Subcommand Example ....................................................... 277
Figure 4.59 Environment Variable Subcommand Examples ..................................... 279
Figure 4.60 Inqraid Command Tool Examples ................................................283-281
Figure 4.61 Inqraid: Example of -find Option (Linux example shown) ........................ 285
Figure 4.62 Inqraid: Example of -find Option (HP-UX example shown) ....................... 285
Figure 4.63 Inqraid: Example of -findc Option (HP-UX example shown)...................... 285
Figure 4.64 Inqraid: Example of -CLI Option (Linux example shown) ......................... 286
Figure 4.65 Inqraid: Example of -CLIWP and -CLIWN Options (HP-UX example shown) .... 286
Figure 4.66 Inqraid: Example of -sort[CM] Option (HP-UX example shown)..................287
Figure 4.67 Inqraid: Example of -gvinf Option .................................................... 287
Figure 4.68 Inqraid: Example of -svinf[=PTN] Option ............................................ 287
Figure 4.69 Mkconf Command Tool Example (HP-UX example shown) ........................ 289
Figure 4.70 Synchronization for Hitachi TrueCopy Async/UR................................... 291
Figure 4.71 Pairsyncwait Command Examples .................................................... 295
Figure 4.72 Definition of the Protection Volume ................................................. 296
Figure 4.73 Example for the Two Host Configuration............................................ 298
Figure 4.74 Example for the One Host Configuration ............................................ 299
Figure 4.75 Definition of the Group Version....................................................... 306
Figure 4.76 LDM Volume Configuration............................................................. 307
Figure 4.77 LDM Volume Flushing ................................................................... 311
Figure 4.78 Configurations with MSCS and ShadowImage (HOMRCF) .......................... 314
Figure 4.79 Directory Mount Structure ............................................................. 318
Figure 4.80 Protection of the command device that has the SLPR attribute ................ 322
Figure 4.81 SLPR Configuration on a Single Host ................................................. 324