HBCM-UserGuide-RD24716

Embed Size (px)

Citation preview

Hitachi Business Continuity ManagerUser Guide

Document Organization Product Version Getting Help Contents

MK-94RD247-16

2011 Hitachi, Ltd., Hitachi Data Systems Corporation. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or stored in a database or retrieval system for any purpose without the express written permission of Hitachi, Ltd. (hereinafter referred to as "Hitachi") and Hitachi Data Systems Corporation (hereinafter referred to as "Hitachi Data Systems"). Hitachi and Hitachi Data Systems reserve the right to make changes to this document at any time without notice and assume no responsibility for its use. This document contains the most current information available at the time of publication. When new or revised information becomes available, this entire document will be updated and distributed to all registered users. All of the features described in this document may not be currently available. Refer to the most recent product announcement or contact your local Hitachi Data Systems sales office for information on feature and product availability. Notice: Hitachi Data Systems products and services can be ordered only under the terms and conditions of Hitachi Data Systems' applicable agreements. The use of Hitachi Data Systems products is governed by the terms of your agreements with Hitachi Data Systems. By using this software, you agree that you are responsible for: a) Acquiring the relevant consents as may be required under local privacy laws or otherwise from employees and other individuals to access relevant data; and b) Ensuring that data continues to be held, retrieved, deleted or otherwise processed in accordance with relevant laws. Hitachi is a registered trademark of Hitachi, Ltd. in the United States and other countries. Hitachi Data Systems is a registered trademark and service mark of Hitachi in the United States and other countries. Hitachi Tiered Storage Manager includes RSA BSAFE security software from RSA Security Inc. Microsoft product screen shots reprinted with permission from Microsoft Corporation. All other trademarks, service marks, and company names are properties of their respective owners.

iiHitachi Business Continuity Manager User Guide

ContentsPreface................................................................................................xixIntended audience.............................................................................................xx Product version..................................................................................................xx Release notes....................................................................................................xx Document revision level......................................................................................xx Document organization......................................................................................xxi Referenced documents......................................................................................xxii Document conventions.....................................................................................xxiv Convention for storage capacity values..............................................................xxv Getting help.....................................................................................................xxv xxvi Comments.......................................................................................................

1. Overview of Business Continuity Manager..............................................1-1

Why use Business Continuity Manager?....................................................................1-2 Communication with Hitachi Command Suite products...............................................1-2 Products that can be controlled by Business Continuity Manager................................1-4 Hitachi ShadowImage in-system replication (SI).................................................1-5 Hitachi TrueCopy (TC).......................................................................................1-5 Hitachi TrueCopy Asynchronous (TCA)...............................................................1-6 Universal Replicator (UR)..................................................................................1-6 Remote volume operations......................................................................................1-7 Grouping to simplify volume operations....................................................................1-7 Copy groups.....................................................................................................1-8 Consistency groups...........................................................................................1-8 Journal groups......................................................................................1-11 Open/MF consistency groups..................................................................1-11 Copy group containers....................................................................................1-12 Extended consistency groups.................................................................1-13 Terminology by copy type...............................................................................1-14 Data center configurations.....................................................................................1-14 A 2DC configuration........................................................................................1-14 A 3DC Cascade configuration...........................................................................1-15 A 3DC Multi-target configuration......................................................................1-15 A 3DC Multi-target configuration with the Delta Resync function........................1-16 A 2DC configuration with HyperSwap and Universal Replicator...........................1-17 A 4x4 configuration.........................................................................................1-17

iiiHitachi Business Continuity Manager User Guide

A 4x4x4 Cascade configuration........................................................................1-18 4x4x4 Multi-Target configuration......................................................................1-19 FlashCopy linkage configuration ......................................................................1-20 Functions supporting the automatic operation (BCM Monitor)...................................1-21 Business Continuity Manager functions...................................................................1-22 Functionalities dependent on the storage system.....................................................1-24 Storage system identification.................................................................................1-26 Setting up Business Continuity Manager..................................................................1-29

2. Business Continuity Manager with replication products........................... 2-1

Storage system settings and copy group definitions...................................................2-2 Replication products and data center configurations.................................................. 2-3 The 2DC configuration...................................................................................... 2-4 The 3DC configuration...................................................................................... 2-4 The 3DC Cascade configuration................................................................2-5 The 3DC Multi-Target configuration.......................................................... 2-5 The Delta Resync configuration................................................................ 2-8 The 2DC configuration with HyperSwap and Universal Replicator......................... 2-9 The 4x4 configuration.....................................................................................2-11 The 4x4x4 Cascade configuration.....................................................................2-12 The FlashCopy linkage configuration................................................................2-15 Overview of functions............................................................................2-15 Prerequisites for the FlashCopy linkage configuration...............................2-16 Sample Replication product combinations...............................................................2-19 Understanding copy group operations.....................................................................2-21 Configuration for copy groups used by Business Continuity Manager..................2-21 Configuration patterns that allow pair creation.........................................2-21 Configuration patterns that prohibit pair creation.....................................2-23 Copy group operation commands.....................................................................2-26 Using CLI commands to obtain status...............................................................2-27 Meaning of copy pair statuses................................................................2-27 Using the YKQRYDEV command to obtain the copy pair status of specified volumes................................................................................................2-30 Using the YKQUERY command to obtain the copy pair status for each copy pair......................................................................................................2-33 Acquiring copy pair information from one site of a copy pair.....................2-36 Copy pair status transitions.............................................................................2-36 Status monitoring for copy groups...................................................................2-39 Status monitoring by copy pair...............................................................2-39 Status monitoring by volume..................................................................2-39

3. Understanding Business Continuity Manager functions............................3-1

The Remote DKC Control Function........................................................................... 3-2 Functions that support disaster recovery...................................................................3-4 The Reverse Resync Function............................................................................ 3-4 The TrueCopy Consistency Preservation Function................................................3-6 The operational testing function...............................................................................3-7 Functions that support copy group definitions and operations.................................... 3-9 The Copy Group Configuration Check Function................................................... 3-9 Copy Group Definition File Generation Function using CSV files..........................3-10 SMS Storage Group Import Function................................................................3-11

ivHitachi Business Continuity Manager User Guide

The specified time suspend function.......................................................................3-12 NORMAL ATTIME Suspend Function.................................................................3-12 Performing a backup using the NORMAL ATTIME Suspend Function (for TrueCopy Asynchronous).......................................................................3-13 Performing a backup using the NORMAL ATTIME Suspend Function (for ShadowImage)......................................................................................3-14 When suspensions are executed (NORMAL ATTIME Suspend Function).....3-14 NORMAL ATTIME Suspend Function: recommendations for backing up multiple generations...........................................................................................3-15 UR ATTIME Suspend Function..........................................................................3-15 Performing a backup using the UR ATTIME suspend (for Universal Replicator) ............................................................................................................3-15 Relationship between the ATTIME suspend time and timeout times..........3-16 When suspensions are executed (UR ATTIME Suspend Function)..............3-17 UR ATTIME Suspend Function: recommendations for backing up multiple generations...........................................................................................3-19 Differences in functionality between the NORMAL ATTIME Suspend Function and the UR ATTIME Suspend Function..........................................................................3-20 Functions that acquire volume information..............................................................3-20 The Local Scan...............................................................................................3-21 The Remote Scan...........................................................................................3-21 The NG Scan..................................................................................................3-22 Volumes used for NG Scans....................................................................3-23 Copy types for which a copy group including Non Gen'ed volumes can be defined.................................................................................................3-24 Operating a copy group including Non Gen'ed volumes............................3-26 Notes on executing an NG Scan..............................................................3-27 The Logical Path Control Function..........................................................................3-28 Inter-control unit logical paths.........................................................................3-28 Inter-disk controller logical paths.....................................................................3-29 Function that monitors event and errors.................................................................3-30

4. Preparing for operation........................................................................4-1

Preparation overview..............................................................................................4-2 Specifying the BCM log output destination................................................................4-2 Setting up storage systems......................................................................................4-3 Settings in the Set Defaults panel............................................................................4-4 Specifying the Device Address Domain ID..........................................................4-4 Setting a prefix for configuration files.................................................................4-6 Creating configuration files......................................................................................4-7 Overview of configuration files...........................................................................4-7 Required settings for configuration files............................................................4-10 Preparing the configuration files on each site....................................................4-10 Acquiring volume information (preparations)...........................................................4-10 Performing a Local Scan to acquire volume information.....................................4-11 Performing an NG Scan (on a Non Gen'ed volume) to acquire device configuration information....................................................................................................4-11 Preparing the hardware (NG Scan).........................................................4-11 Preparing the configuration files.............................................................4-12 Performing a Remote Scan to acquire remote storage system information..........4-13 Specifying a route list ID........................................................................4-14 Performing a Remote Scan.....................................................................4-15 vHitachi Business Continuity Manager User Guide

Assigning a dummy device number.........................................................4-15 Creating a logical path...........................................................................................4-17 Establishing a logical path...............................................................................4-17 Establishing an inter-control unit logical path....................................................4-18 Acquiring path information from a storage system.............................................4-19 Checking the prerequisite conditions for acquiring a port number..............4-20 Establishing a logical path in the reverse direction.............................................4-20 Deleting a logical path.....................................................................................4-20 Setting up the Remote DKC Control Function environment.......................................4-21 Configuring routes..........................................................................................4-22 Procedures for configuring routes...........................................................4-22 Example of configuring routes................................................................4-23 Defining the route list......................................................................................4-25 Route list settings..................................................................................4-26 Registering a command device........................................................................4-26 Registering a command device in the forward direction............................4-26 Command device setup procedure..........................................................4-26 Registering a command device in the reverse direction............................4-27 Command device definition rules............................................................4-27 Deleting command devices..............................................................................4-28 Deleting command devices registered in a route list.................................4-29 Deleting command devices not registered in a route list...........................4-29 Creating an inter-control unit logical path dedicated to the command device.......4-29 Supporting a TrueCopy or TrueCopy Asynchronous copy group configuration ............................................................................................................4-30 Supporting a Universal Replicator copy group configuration......................4-30 Preparing to use the Remote DKC Control Function...........................................4-31 Configuration definition for using the TrueCopy Consistency Preservation Function....4-32 Environment definition for using the Reverse Resync Function..................................4-33 When the Reverse Resync Function is used from the primary site and one or more other sites......................................................................................................4-33 When the Reverse Resync Function is used only from the primary site................4-33

5. Configuration definitions.......................................................................5-1

Defining a 2DC configuration................................................................................... 5-2 A 2DC configuration example.............................................................................5-2 Preparing the hardware (2DC configuration).......................................................5-3 Preparing the configuration files (2DC configuration)...........................................5-4 Flow of configuration definitions (2DC configuration)...........................................5-6 Secondary site with a host....................................................................... 5-6 Secondary site without a host.................................................................. 5-8 Definition procedure (2DC configuration)............................................................5-9 Defining a 3DC Cascade configuration....................................................................5-14 A 3DC Cascade configuration example..............................................................5-14 Preparing the hardware (3DC Cascade configuration)........................................5-15 Preparing the configuration files (3DC Cascade configuration)............................5-16 Definition procedure (3DC Cascade configuration).............................................5-17 Steps on the primary host (3DC Cascade configuration)...........................5-18 Steps on the secondary host (3DC Cascade configuration)........................5-22 Defining a 3DC Multi-Target configuration...............................................................5-27 A 3DC Multi-Target configuration example........................................................5-27 Preparing the hardware (3DC Multi-Target configuration)..................................5-28

viHitachi Business Continuity Manager User Guide

Preparing the configuration files (3DC Multi-Target configuration)......................5-29 Definition procedure (3DC Multi-Target configuration).......................................5-31 Performing a scan (3DC Multi-Target configuration).................................5-32 Settings for operations on the primary site (3DC Multi-Target configuration) ............................................................................................................ -32 5 Settings for operations on the local site (3DC Multi-Target configuration). .5-34 Settings for operations on the remote site (3DC Multi-Target configuration) ............................................................................................................ -36 5 Creating a copy group (3DC Multi-Target configuration)...........................5-38 Defining a Delta Resync configuration..................................................................... -39 5 Configuration example (Delta Resync configuration).......................................... 5-40 Preparing the hardware (Delta Resync configuration)........................................5-40 Preparing the configuration files (Delta Resync configuration)............................5-41 Definition procedure (Delta Resync configuration).............................................5-45 Creating a disk configuration definition file..............................................5-46 Settings on the primary site...................................................................5-46 Settings on the local site (Delta Resync configuration).............................5-48 Settings on the remote site (Delta Resync configuration)..........................5-50 Creating a copy group (Delta Resync configuration).................................5-52 Copy pair status transitions for Delta Resync pairs............................................5-53 Defining a 2DC configuration with HyperSwap and Universal Replicator....................5-55 Configuration example (HyperSwap)................................................................5-55 Preparing the hardware (HyperSwap)............................................................... -56 5 Preparing the configuration files (HyperSwap)................................................... -58 5 Definition procedure (HyperSwap)...................................................................5-60 Performing a scan.................................................................................5-61 Setting up for performing operations at the primary site...........................5-61 Setting up for performing operations at the secondary site.......................5-63 Making a copy group.............................................................................5-65 Defining a 4x4 configuration..................................................................................5-66 A 4x4 configuration example............................................................................ -66 5 Preparing the hardware (4x4 configuration)...................................................... -70 5 Preparing the configuration files (4x4 configuration).......................................... 5-72 Definition procedure (4x4 configuration)........................................................... -73 5 Defining a new 4x4 configuration...........................................................5-74 Expanding to a 4x4 configuration by adding storage systems to a 2DC configuration......................................................................................... -75 5 Changing to a 4x4 configuration without changing the existing storage system configuration......................................................................................... -76 5 Adding a new journal group to a 4x4 configuration..................................5-78 Adding an existing journal group to a 4x4 configuration...........................5-79 Checking the registration status of EXCTG (4x4 configuration)...........................5-80 EXCTG registration when the copy operation is performed in the forward direction...............................................................................................5-81 EXCTG registration when the copy operation is performed in the reverse direction...............................................................................................5-82 Deleting a journal group from a copy group container with EXCTG ID specified (4x4 configuration)................................................................................................. -83 5 Defining a 4x4x4 Cascade configuration.................................................................. -83 5 Configuration example (4x4x4 Cascade)...........................................................5-84 Preparing hardware (4x4x4 Cascade)...............................................................5-85 Preparing the configuration files (4x4x4 Cascade).............................................5-87

viiHitachi Business Continuity Manager User Guide

Definition procedure (4x4x4 Cascade)..............................................................5-89 Defining a new 4x4x4 Cascade configuration...........................................5-90 Expanding to a 4x4x4 Cascade configuration by adding a Universal Replicator copy group to a TrueCopy copy group...................................................5-100 Expanding to a 4x4x4 Cascade configuration by adding a series of storage systems to a 3DC Cascade configuration...............................................5-110 Checking the registration status of the EXCTG.................................................5-116 Defining a configuration so that the UR ATTIME Suspend Function can be used.......5-117 Configuration example (UR ATTIME suspend).................................................5-117 Preparing the hardware (UR ATTIME suspend)................................................5-118 Preparing the configuration files (UR ATTIME)................................................5-118 Defining a configuration so that the Open/MF Consistency Preservation Function can be used...................................................................................................................5-120 Configuration example (Open/MF Consistency)................................................5-120 Preparing the hardware(Open/MF Consistency)...............................................5-121 Preparing the configuration files (Open/MF Consistency)..................................5-122 Definition procedure (Open/MF Consistency)...................................................5-123 Preparing at the open system side........................................................5-123 Definition procedure for Business Continuity Manager............................5-123

6. Importing copy groups.........................................................................6-1

Generating a copy group definition file by using CSV files..........................................6-2 Generating a copy group definition file (CSV file for copy group definition)...........6-2 Required files (CSV file for copy group definition)......................................6-2 Attributes to be defined in a base copy group definition file........................6-2 Rules on which a copy group is defined (CSV file for copy group definition) ..............................................................................................................6-3 Generation example (CSV file for copy group definition).............................6-6 Example of JCL (for CSV file for copy group definition)...............................6-8 Generating CSV files for copy group definition....................................................6-8 Required files (CSV file for copy group definition)......................................6-8 Generation example (CSV file for copy group definition).............................6-9 Example of JCL for CSV file for copy group definition.................................6-9 Updating an existing copy group definition file..................................................6-10 Importing definitions for monitoring PPRC copy pairs...............................................6-11 Example of a PPRC copy pair configuration.......................................................6-11 Preparing the hardware...................................................................................6-12 Preparing the software....................................................................................6-13 Copy types and generation units for which definitions can be generated.............6-13 Supported PPRC commands.............................................................................6-13 Generating copy group definition files from the ISPF panel................................6-15 Example of importing PPRC copy pairs.............................................................6-16 When monitoring PPRC TrueCopy/TrueCopy Asynchronous copy pairs.......6-16 When monitoring only PPRC ShadowImage copy pairs.............................6-17 When monitoring only PPRC TrueCopy/ShadowImage copy pairs..............6-18 Importing SMS storage group definitions................................................................6-19 Preparing to use SMS storage group definitions.................................................6-19 Importing storage group information......................................................6-19 Before importing new SMS storage groups..............................................6-20 Importing new storage group information...............................................6-21 Importing changed storage volume information.......................................6-22 About the SMS List Output Function.................................................................6-22

viiiHitachi Business Continuity Manager User Guide

JCL example (SMS storage group definition)............................................6-23

7. Using Business Continuity Manager....................................................... 7-1

Before using copy pairs...........................................................................................7-2 Preparing to use the Remote DKC Control Function.............................................7-2 When executing copy group operation commands...............................................7-2 Batch processing for multiple copy pairs.............................................................7-4 Copy pair operations common to all copy types.................................................. 7-5 Copy pair operations for ShadowImage and TrueCopy Asynchronous................... 7-5 Copy pair operations for ShadowImage.............................................................. 7-5 Copy pair operations for TrueCopy.....................................................................7-6 Copy pair operations for Universal Replicator...................................................... 7-6 Messages output from Business Continuity Manager............................................7-6 Using configuration files.......................................................................................... 7-7 Working with scripts................................................................................................7-7 Expanding to REXX variables............................................................................. 7-8 Acquiring copy pair status................................................................................. 7-8 Creating and dissolving copy pairs..................................................................... 7-8 Changing the copy pair status........................................................................... 7-8 Monitoring the copy pair status..........................................................................7-9 Checking the copy group configuration...............................................................7-9 Sample script...................................................................................................7-9 About scripts and YKLOAD................................................................................ 7-9 Operating a copy group...........................................................................................7-9 Preparing to use a copy group...........................................................................7-9 Starting backup operations..............................................................................7-10 Suspending a copy group................................................................................7-10 Resynchronizing a copy group.........................................................................7-10 Displaying the status of a copy group...............................................................7-10 Operating a copy group...................................................................................7-10 Creating a copy group.....................................................................................7-11 Backing up a copy group.................................................................................7-14 Operational testing.........................................................................................7-14 Backup operations using the UR ATTIME Suspend Function.....................................7-15 Status during normal operations......................................................................7-16 Obtaining UR ATTIME backups........................................................................7-16 If an error occurs while copy pairs are suspended.............................................7-18 Determining the volume to be used for restoration............................................7-18 Check whether the Universal Replicator S-VOL is usable...........................7-19 Check which ShadowImage S-VOL generation is usable...........................7-19 Setting and canceling ATTIME Suspension information......................................7-20 Monitoring status and changing configurations in a 3DC Cascade configuration.........7-20 Monitoring the copy status..............................................................................7-21 When the TrueCopy Consistency Preservation Function is not used...........7-22 When the TrueCopy Consistency Preservation Function is used.................7-22 Changing configurations of TrueCopy and Universal Replicator copy groups........7-23 To add a volume:..................................................................................7-23 To delete a volume:...............................................................................7-25 Using FlashCopy linkage configurations...................................................................7-27 Using the FlashCopy Linkage Function in a 2DC configuration............................7-27 FlashCopy linkage when the copy pair is in the DUPLEX status (TrueCopy or Universal Replicator)..............................................................................7-28 ixHitachi Business Continuity Manager User Guide

FlashCopy linkage using the Preserve Mirror function when the copy pair is in the DUPLEX status (TrueCopy)...............................................................7-29 FlashCopy linkage after placing the copy pair in the suspend status (TrueCopy, TrueCopy Asynchronous, or Universal Replicator)....................................7-32 Using the FlashCopy Linkage Function in a 3DC Multi-Target configuration..........7-34 Determining the FlashCopy copy status............................................................7-35 How to determine the FlashCopy copy status..........................................7-36 Example of a script that determines the FlashCopy copy status.................7-36 Monitoring PPRC copy pairs...................................................................................7-37 Using an Open/MF consistency group.....................................................................7-37 Operating an Open/MF consistency group.........................................................7-37 Resynchronizing an Open/MF consistency group...............................................7-39

8. Maintenance and troubleshooting operations.........................................8-1

Using a 2DC configuration.......................................................................................8-2 Failover procedure............................................................................................8-2 Failback procedure............................................................................................8-4 Notes on failovers and failbacks in a 2DC configuration.......................................8-6 Notes on operating copy pairs..................................................................8-6 Notes on dissolving copy pairs..................................................................8-6 Using a 3DC Cascade configuration..........................................................................8-7 Failover procedure............................................................................................8-7 Failback procedure............................................................................................8-9 Using a Delta Resync configuration.........................................................................8-12 Performing primary site storage system maintenance........................................8-14 Failover................................................................................................8-14 Failback................................................................................................8-17 Performing local site storage system maintenance.............................................8-20 Preparing..............................................................................................8-20 Recovering............................................................................................8-21 Performing remote site storage system maintenance.........................................8-22 Preparing..............................................................................................8-22 Recovering............................................................................................8-23 Performing primary site host maintenance........................................................8-24 Failover................................................................................................8-24 Failback................................................................................................8-27 Operating procedure during a primary site storage system failure (volatile).........8-29 Failover................................................................................................8-29 Failback................................................................................................8-31 Operating procedure during a primary site storage system failure (nonvolatile)...8-35 Failover................................................................................................8-35 Failback................................................................................................8-36 Operating procedure during a local site storage system failure (volatile).............8-39 Preparing..............................................................................................8-39 Recovering............................................................................................8-40 Operating procedure during a local site storage system failure (nonvolatile)........8-43 Operating procedure during a remote site storage system failure (volatile).........8-43 Preparing..............................................................................................8-43 Recovering............................................................................................8-43 Operating procedure during a remote site storage system failure (nonvolatile)....8-46 Preparing..............................................................................................8-46 Recovering............................................................................................8-46

xHitachi Business Continuity Manager User Guide

Primary Site Host failure..................................................................................8-46 Failover................................................................................................8-46 Failback................................................................................................8-49 Operating procedure during a path failure between the primary site storage system and the local site storage system.....................................................................8-51 Preparing..............................................................................................8-51 Recovering............................................................................................8-52 Actions to be taken when the Delta Resync function cannot be set up or operated successfully....................................................................................................8-53 Managing the HOLDTRNS status.............................................................8-54 When copy pairs do not change to HOLD status......................................8-56 Managing the HOLDER status.................................................................8-56 If pair status changes to NODELTA.........................................................8-58 About containers with pairs of mixed pair statuses...................................8-59 Ensuring successful completion of Delta Resync in advance......................8-60 Using a 2DC configuration with HyperSwap and Universal Replicator........................8-62 Operation startup procedure............................................................................8-64 Performing primary storage system maintenance..............................................8-65 Failover................................................................................................8-65 Failback................................................................................................8-67 Performing primary host maintenance..............................................................8-70 Failover................................................................................................8-70 Failback................................................................................................8-71 Performing local storage system maintenance...................................................8-73 Preparing..............................................................................................8-73 Recovering............................................................................................8-74 Performing remote storage system maintenance...............................................8-74 Preparing..............................................................................................8-74 Recovering............................................................................................8-75 Operating procedure during a primary storage system failure (volatile)...............8-76 Failover................................................................................................8-76 Failback................................................................................................8-78 Operating procedure during a primary storage system failure (nonvolatile).........8-82 Failover................................................................................................8-82 Failback................................................................................................8-82 Operating procedure during a primary host failure............................................8-86 Failover................................................................................................8-86 Failback................................................................................................8-88 Operating procedure during a path failure between the primary storage system and the local storage system..................................................................................8-91 Preparing..............................................................................................8-91 Recovering............................................................................................8-91 Operating procedure during a local storage system failure (volatile)...................8-91 Preparing..............................................................................................8-91 Recovering............................................................................................8-91 Operating procedure during a local storage system failure (nonvolatile)..............8-93 Operating procedure during remote storage system failure (volatile)..................8-93 Preparing..............................................................................................8-93 Recovering............................................................................................8-93 Operating procedure during a remote storage system failure (nonvolatile)..........8-96 Preparing..............................................................................................8-96 Recovering............................................................................................8-96

xiHitachi Business Continuity Manager User Guide

Using a 4x4x4 Cascade configuration......................................................................8-97 Performing primary site storage system maintenance........................................8-99 Failover................................................................................................8-99 Failback..............................................................................................8-100 Performing intermediate site storage maintenance..........................................8-103 Preparing............................................................................................8-103 Recovering..........................................................................................8-105 Performing remote site storage maintenance..................................................8-106 Preparing............................................................................................8-106 Recovering..........................................................................................8-107 Performing primary site host maintenance......................................................8-108 Failover...............................................................................................8-108 Failback..............................................................................................8-110 Operating procedure during a primary site storage system failure (volatile).......8-112 Failover...............................................................................................8-112 Failback..............................................................................................8-113 Operating procedure during a primary site storage system failure (nonvolatile). 8-116 Failover...............................................................................................8-117 Failback..............................................................................................8-117 Operating procedure during an intermediate site storage system failure (volatile)8-119 Preparing............................................................................................8-120 Recovering..........................................................................................8-121 Operating procedure during an intermediate site storage system failure (nonvolatile) ...................................................................................................................8-124 Operating procedure during a remote site storage system failure (volatile)........8-125 Preparing............................................................................................8-125 Recovering..........................................................................................8-125 Operating procedure during a remote site storage system failure (nonvolatile). .8-128 Preparing............................................................................................8-128 Recovering..........................................................................................8-128 Operating procedure during a primary site host failure.....................................8-129 Failover...............................................................................................8-129 Failback..............................................................................................8-130 Operating procedure during a path failure between the primary site storage system and the intermediate site storage system........................................................8-132 Preparing............................................................................................8-133 Recovering..........................................................................................8-134

9. Using the ISPF panels..........................................................................9-1

Acquiring volume information..................................................................................9-2 Local Scan procedure........................................................................................9-2 Scanning a device locally on the primary site (Local Scan)...................................9-2 Scanning a device locally on the secondary site (Local Scan)...............................9-5 Transferring a disk configuration definition file from the secondary site to the primary site......................................................................................................9-6 NG Scan procedure...........................................................................................9-7 Creating a path set................................................................................................ -10 9 Defining the inter-disk controller logical path set...............................................9-10 Adding a logical path to a path set...................................................................9-12 Allocating physical paths to logical paths..........................................................9-15 Defining the inter-control unit logical path set................................................... -18 9 Adding a logical path to the path set....................................................... -19 9

xiiHitachi Business Continuity Manager User Guide

Allocating physical paths to logical paths.................................................9-23 Establishing a logical path......................................................................................9-25 Defining a route list...............................................................................................9-27 Defining a route list ID....................................................................................9-28 Defining the first entry of a route.....................................................................9-29 Adding an entry (extended route definition)......................................................9-33 If the storage system on the secondary site has been scanned.................9-33 Remote-scanning the storage system on the secondary site from the primary site.......................................................................................................9-36 Defining the second route...............................................................................9-37 Images for route list definitions.......................................................................9-37 Registering a command device in a storage system.................................................9-39 Remote Scan procedure........................................................................................9-41 Specifying a route list ID.................................................................................9-41 Performing a Remote Scan..............................................................................9-42 Assigning a dummy device number..................................................................9-44 Changing dummy device numbers....................................................................9-47 Defining a copy group...........................................................................................9-47 Defining the copy group ID and copy group attributes (Universal Replicator)......9-48 Adding the copy pair to the copy group (Universal Replicator)..................9-49 Defining the copy group ID and copy group attributes (ShadowImage)..............9-51 Adding the copy pair to the copy group (ShadowImage)..........................9-52 Defining the copy group ID and copy group attributes (TrueCopy).....................9-52 Adding the copy pair to the copy group (TrueCopy).................................9-54 Defining the copy group ID and copy group attributes (TrueCopy Asynchronous) 9-54 Adding the copy pair to the copy group (TrueCopy Asynchronous)............9-55 Defining a copy group container.............................................................................9-55 Defining the copy group ID and copy group attributes.......................................9-56 Adding a consistency group.............................................................................9-57 Changing a copy group that is not a copy group container to one that is (adding a consistency group)..........................................................................................9-58 Changing a copy group that is a container to one that is not (deleting a consistency group)...........................................................................................................9-59 Defining an EXCTG..........................................................................................9-60 Saving settings...............................................................................................9-61 Defining an Open/MF consistency group.................................................................9-62 Loading a copy group......................................................................................9-62 Suspending a copy group................................................................................9-64 Changing a copy group definition (setting the Open/MF Consistency attribute)....9-65 Loading a copy group after changing its definition.............................................9-65 Resynchronizing a copy group.........................................................................9-67 Operating copy groups..........................................................................................9-69 Loading a copy group......................................................................................9-71 Making a Universal Replicator copy pair (SIMPLEX to DUPLEX)...........................9-72 Suspending a Universal Replicator copy pair.....................................................9-76 Making a ShadowImage copy pair (SIMPLEX to DUPLEX)...................................9-77 Suspending a ShadowImage copy pair.............................................................9-79 Resynchronizing a Universal Replicator copy pair...............................................9-80

10. Automatic operation using BCM Monitor.............................................10-1Overview of the BCM Monitor functions..................................................................10-2 Starting and stopping BCM Monitor........................................................................10-7

xiiiHitachi Business Continuity Manager User Guide

Starting BCM Monitor......................................................................................10-7 Format.................................................................................................10-7 Operands..............................................................................................10-7 Example...............................................................................................10-7 Stopping BCM Monitor.....................................................................................10-7 Format.................................................................................................10-8 Operands..............................................................................................10-8 Example...............................................................................................10-9 Remarks...............................................................................................10-9 Forcibly stopping BCM Monitor.........................................................................10-9 Format.................................................................................................10-9 Operands............................................................................................10-10 Example..............................................................................................10-10 Return codes for BCM Monitor........................................................................10-10 Operator commands available in BCM Monitor.......................................................10-11 DISPLAY command.......................................................................................10-11 Format................................................................................................10-11 Operands............................................................................................10-12 Example..............................................................................................10-12 REPORT command........................................................................................10-13 Format................................................................................................10-13 Operands............................................................................................10-13 Example..............................................................................................10-14 SET command..............................................................................................10-14 Format................................................................................................10-15 Operands............................................................................................10-15 Example..............................................................................................10-16 SLEEP command...........................................................................................10-17 Format................................................................................................10-17 Operands............................................................................................10-17 Example..............................................................................................10-18 WAKEUP command.......................................................................................10-18 Format................................................................................................10-18 Operands............................................................................................10-18 Example..............................................................................................10-18 Troubleshooting procedures provided by BCM Monitor...........................................10-19 Logs collected by BCM Monitor.......................................................................10-19 When a BCM Monitor instance cannot be started.............................................10-19 When a BCM Monitor instance has started......................................................10-20 BCM Monitor operation examples.........................................................................10-21 Backup operation example.............................................................................10-21 Example configuration for backup operation..........................................10-21 Backup operation flow..........................................................................10-22 Example of creating the YKMONOPT file used for a backup operation......10-23 Example of creating the YKMONCG file used for a backup operation........10-24 Example of failure monitoring........................................................................10-24 Example configuration of failure monitoring...........................................10-24 Failure monitoring flow........................................................................10-25 Example of creating a YKMONOPT file used for failure monitoring...........10-26 Example of creating the YKMONCG file used for failure monitoring..........10-27

xivHitachi Business Continuity Manager User Guide

11. Linkage with Replication Manager.....................................................11-1

What can be achieved when Business Continuity Manager is linked to Replication Manager?.............................................................................................................11-2 Device scan from Replication Manager.............................................................11-3 Defining a copy group from Replication Manager...............................................11-4 Manipulating a copy group from Replication Manager........................................11-4 Monitoring a copy group from Replication Manager...........................................11-4 Possible configurations....................................................................................11-4 Configuring a Business Continuity Manager agent....................................................11-5 Selecting a startup mode.................................................................................11-6 Selecting lock mode...............................................................................11-6 Operations after the configuration file is locked.......................................11-7 Collecting audit logs......................................................................................11-11 Starting and stopping Business Continuity Manager agents.....................................11-12 Starting a Business Continuity Manager agent.................................................11-12 Format................................................................................................11-12 Operands............................................................................................11-12 Example..............................................................................................11-13 Stopping a Business Continuity Manager agent................................................11-13 Format................................................................................................11-13 Operands............................................................................................11-13 Example..............................................................................................11-14 Return codes.......................................................................................11-14 Forcibly stopping a Business Continuity Manager agent....................................11-14 Format................................................................................................11-14 Operands............................................................................................11-15 Example..............................................................................................11-15 Displaying or changing the log output level...........................................................11-15 Displaying the log output level.......................................................................11-15 Format................................................................................................11-15 Operands............................................................................................11-16 Example..............................................................................................11-16 Changing the log output level........................................................................11-16 Format................................................................................................11-16 Operands............................................................................................11-17 Example..............................................................................................11-17 Notes on updating configuration files....................................................................11-17 Working around site errors and host failures.........................................................11-18 Error types and error information handling............................................................11-18 When Business Continuity Manager agent cannot be started............................11-20 When information obtained from Business Continuity Manager agent is not updated ...................................................................................................................11-21

12. Troubleshooting...............................................................................12-1

Types of failure and their countermeasures.............................................................12-2 Error notification...................................................................................................12-2 Performance monitor.............................................................................................12-3 Trace output method.............................................................................................12-4 Collecting logs......................................................................................................12-4 Log types.......................................................................................................12-5 Setting the BCM log output destination.............................................................12-5 System logger service setup............................................................................12-6 xvHitachi Business Continuity Manager User Guide

Defining a log stream............................................................................12-7 Which parameters to specify for a log stream definition...........................12-8 Planning a DASD log dataset................................................................12-10 Deleting a log stream...........................................................................12-10 Confirming a log stream.......................................................................12-10 BCM log output method.................................................................................12-10 Using system logger service.................................................................12-10 Not using system logger service............................................................12-11 BCM log data formats..........................................................................12-14 BCM log data output tool...............................................................................12-14 Specifying log data conditions...............................................................12-14 Example JCL........................................................................................12-16 Error processing..................................................................................12-16 Data format........................................................................................12-16 ISPF log data................................................................................................12-17 CLI command-execution logs.........................................................................12-17 Using the ISPF editor...........................................................................12-18 Using a script for retrieval....................................................................12-19 HyperSwap completion detection..........................................................................12-20 Recovering from a failure.....................................................................................12-20 Recovering a command device after an LDEV blockage....................................12-20 Recovering a command device after a power outage.......................................12-21 Recovering a log dataset after logs are full.....................................................12-21 Performing operations when a failure occurs for a volume in a copy group........12-22 Recovering from a Universal Replicator failure.................................................12-22 Types of failures..................................................................................12-22 Recovering from failures during failovers and PSOFF/Cut power..............12-23 Recovering from other types of failures.................................................12-25 What to do when an error occurs while creating a configuration file..................12-27 How to correct an error that occurs while creating or updating a configuration file......................................................................................................12-27 Causes of errors that might occur while creating or updating a configuration file and the recommended actions........................................................12-28 What to do when an error occurs in the Copy Group Definition File Generation Function using CSV files................................................................................12-29

A Defining command devices in non-basic configurations...........................A-1

Configurations for which the same command device is shared from multiple hosts......A-2 Configurations for which command devices can and cannot be defined.......................A-2 Configurations for which command devices can be defined..................................A-2 Configurations for which command devices cannot be defined.............................A-3 When multiple command devices are defined for a single storage system on the same device address domain............................................................................................A-4

B Initializing volumes for command devices (for the Lightning 9900V series) ..........................................................................................................B-1

Command device settings........................................................................................B-2 Example of a JCL for volume initialization of command devices..................................B-3

xviHitachi Business Continuity Manager User Guide

C Conventions in syntax explanations.......................................................C-1Conventions in syntax explanations..........................................................................C-2

Acronyms and Abbreviations Glossary Index

xviiHitachi Business Continuity Manager User Guide

xviiiHitachi Business Continuity Manager User Guide

PrefaceThis document describes how to use the following program products. In this manual, these products are collectively referred to as Business Continuity Manager: - Hitachi Business Continuity Manager Basic - Hitachi Business Continuity Manager UR 4x4 Extended CTG Notice: The use of Hitachi Business Continuity Manager and all other Hitachi Data Systems products is governed by the terms of your agreement(s) with Hitachi Data Systems. This preface includes the following information: Intended audience Product version Release notes Document revision level Document organization Referenced documents Document conventions Convention for storage capacity values Getting help Comments

Preface Hitachi Business Continuity Manager User Guide

xix

Intended audienceThis manual is intended for people who: Want to know how to use Business Continuity Manager and the functions that it offers. Want to use Business Continuity Manager to improve the performance of their storage system.

The readers of this manual should have a basic knowledge of: The functions of the Lightning 9900V series, USP, USP V or VSP System configuration using Hitachi Replication Manager when it is linked to Replication Manager.

Product versionThis document revision applies to Hitachi Business Continuity Manager version 6.6.1 or later.

Release notesRelease notes contain requirements and more recent product information that may not be fully described in this manual. Be sure to review the release notes before installation.

Document revision levelRevisionMK-94RD247-00 MK-94RD247-01 MK-94RD247-02 MK-94RD247-03 MK-94RD247-04 MK-94RD247-05 MK-94RD247-06 MK-94RD247-07 MK-94RD247-08 MK-94RD247-09

DateAugust 2004 May 2005 June 2005 October 2005 June 2006 October 2006 January 2007 June 2007 Initial Release

DescriptionRevision 1, supersedes and replaces MK-94RD247-00 Revision 2, supersedes and replaces MK-94RD247-01 Revision 3, supersedes and replaces MK-94RD247-02 Revision 4, supersedes and replaces MK-94RD247-03 Revision 5, supersedes and replaces MK-94RD247-04 Revision 6, supersedes and replaces MK-94RD247-05 Revision 7, supersedes and replaces MK-94RD247-06

December 2007 Revision 8, supersedes and replaces MK-94RD247-07 May 2008 Revision 9, supersedes and replaces MK-94RD247-08

xx

Preface Hitachi Business Continuity Manager User Guide

RevisionMK-94RD247-10 MK-94RD247-11 MK-94RD247-12 MK-94RD247-13 MK-94RD247-14 MK-94RD247-15 MK-94RD247-16

Date

Description

December 2008 Revision 10, supersedes and replaces MK-94RD247-09 July 2009 Revision 11, supersedes and replaces MK-94RD247-10

December 2009 Revision 12, supersedes and replaces MK-94RD247-11 June 2010 October 2010 April 2011 August 2011 Revision 13, supersedes and replaces MK-94RD247-12 Revision 14, supersedes and replaces MK-94RD247-13 Revision 15, supersedes and replaces MK-94RD247-14 Revision 16, supersedes and replaces MK-94RD247-15

Document organizationThe following table provides an overview of the contents and organization of this document. Click the chapter title in the left column to go to that chapter. The first page of each chapter provides links to the sections in that chapter.ChapterOverview of Business Continuity Manager on page 1-1 Business Continuity Manager with replication products on page 2-1 Understanding Business Continuity Manager functions on page 3-1 Preparing for operation on page 4-1 Configuration definitions on page 5-1 Importing copy groups on page 6-1

DescriptionDescribes the reasons for using Business Continuity (BC) Manager and introduces features and concepts. Describes the relationships among supported replication products and Business Continuity Manager. Describes Business Continuity Manager functions. Explains the preparation procedures needed to run Business Continuity Manager. Explains the definition procedures for when managing replication in configurations with multiple data centers. Explains how to generate copy group definitions files by using CSV files, import definitions to monitor PPRC copy pairs, and import SMS storage group definitions. Explains how to use Business Continuity Manager functionality. Explains how to perform maintenance on hosts and storage systems and how to take action if a failure occurs. Explains how to use the ISPF panel. Provides an overview of the functions for BCM Monitor, available operator commands, how to

Using Business Continuity Manager on page 7-1 Maintenance and troubleshooting operations on page 8-1 Using the ISPF panels on page 9-1 Automatic operation using BCM Monitor on page 10-1

Preface Hitachi Business Continuity Manager User Guide

xxi

Chapter

Descriptiontroubleshoot issues, and operation examples. It also describes how to start and exit BCM Monitor.

Linkage with Replication Manager on page 11-1

Explains what can be done when Business Continuity Manager agent is linked with Replication Manager. This chapter also provides notes on running the system, and explains how to operate Business Continuity Manager agents and how to work around failures. Describes the countermeasures to be taken and the information to be collected during a failure. Explains how to define command devices for nonbasic configurations.

Troubleshooting on page 12-1 A Defining command devices in non-basic configurations on page A-1

B Initializing volumes for command Explains how to perform the required initialization devices (for the Lightning 9900V of volumes for command devices on the Lightning 9900V series. series) on page B-1 C Conventions in syntax explanations on page C-1 Acronyms and Abbreviations on page Acronyms-1 Glossary on page Glossary-1 Index Explains the conventions in syntax explanations. Defines the acronyms and abbreviations used in this document. Defines the special terms used in this document. Lists the topics in this document in alphabetical order.

Referenced documentsThe following Hitachi referenced documents can be found on the applicable Hitachi documentation CD: Hitachi Business Continuity Manager Documents:

Hitachi Business Continuity Manager Messages, MK-94RD262 Hitachi Business Continuity Manager Installation Guide, MK-95HC104 Hitachi Business Continuity Manager Reference Guide, MK-96HC135 Hitachi Command Suite Replication Manager User Guide, MK-99HC166 Hitachi Virtual Storage Platform Hitachi TrueCopy for IBM(R) z/OS(R) User Guide, MK-94RD214 Hitachi Virtual Storage Platform Hitachi Universal Replicator for IBM(R) z/OS(R) User Guide, MK-94RD224 Hitachi Command Control Interface User and Reference Guide , MK-90RD011 Hitachi Virtual Storage Platform Hitachi Storage Navigator User Guide, MK-94RD206

Hitachi Command Suite Document:

Hitachi Products for IBM OS/390 and z/OS Documents:

xxii

Preface Hitachi Business Continuity Manager User Guide

Hitachi Virtual Storage Platform Hitachi ShadowImage for IBM(R) z/ OS(R) User Guide, MK-94RD212 Hitachi Virtual Storage Platform Hitachi Universal Volume Manager User Guide, MK-94RD220 MVS Programming: Assembler Services Guide, GC28-1762 MVS Setting Up a Sysplex, GC28-1779 MVS System Codes, GC28-1780 MVS System Commands, GC28-1781 MVS Programming: Assembler Services Reference, GC28-1910 Communications Server: IP User's Guide and Commands, GC31-8514 Program Directory for IBM Library for REXX on zSeries Alternate Library, GI10-3243 DFSMSdfp Utilities, SC26-7343 MVS Initialization and Tuning Reference, SC28-1752 SecureWay Security Server RACF Security Administrator's Guide, SC28-1915 TSO/E Customization, SC28-1965 TSO/E Programming Services, SC28-1971 TSO/E System Programming Command Reference, SC28-1972 TSO/E REXX Reference, SC28-1975 eNetwork Communications Server: IP API Guide, SC31-8516 Communications Server IP Configuration Guide, SC31-8725 Communications Server IP Configuration Reference, SC31-8726 ISPF User's Guide Volume I, SC34-4791 Program Directory for IBM Library for REXX on zSeries Alternate Library, GI10-3243 MVS Initialization and Tuning Reference, SA22-7592 MVS Programming: Assembler Services Reference, SA22-7606, SA22-7607 MVS Setting Up a Sysplex, SA22-7625 MVS System Codes, SA22-7626 MVS System Commands, SA22-7627 Security Server RACF Security Administrator's Guide, SA22-7683 Security Server RACROUTE Macro Reference, SA88-8621 TSO/E Customization, SA22-7783 TSO/E Programming Services, SA22-7789 TSO/E REXX Reference, SA22-7790 TSO/E System Programming Command Reference, SA22-7793

Hitachi Products for IBM OS/390 Documents:

Hitachi Products for IBM z/OS Documents:

Preface Hitachi Business Continuity Manager User Guide

xxiii

MVS Programming: Assembler Services Guide, SA88-8577 DFSMS: Using Data Sets, SC26-7410 DFSMSdfp Utilities, SC26-7414 IBM Tivoli Storage Productivity Center for Replication User's Guide, SC27-2322 Communications Server IP Configuration Guide, SC31-8775 Communications Server IP Configuration Reference, SC31-8776 Communications Server IP User's Guide & Commands, SC31-8780 Communications Server IP API Guide, SC31-8788 ISPF User's Guide Volume I, SC34-4822 DFSMS Advanced Copy Services, SC35-0428

Document conventionsThis document uses the following typographic conventions:ConventionBold

DescriptionIndicates text on a window, other than the window title, including menus, menu options, buttons, fields, and labels. Example: Click OK. Indicates a variable, which is a placeholder for actual text provided by the user or system. Example: copy source-file target-file Note: Angled brackets (< >) are also used to indicate variables. Indicates text that is displayed on screen or entered by the user. Example: # pairdisplay -g oradb Indicates a variable, which is a placeholder for actual text provided by the user or system. Example: # pairdisplay -g Note:Italic font is also used to indicate variables. Indicates optional values. Example: [ a | b ] indicates that you can choose a, b, or nothing. Indicates required or expected values. Example: { a | b } indicates that you must choose either a or b. Indicates that you have a choice between two or more options or arguments. Examples: [ a | b ] indicates that you can choose a, b, or nothing. { a | b } indicates that you must choose either a or b.

Italic

screen/code < > angled brackets [ ] square brackets { } braces | vertical bar

This document uses the following icons to draw attention to information:IconNote

Label

DescriptionCalls attention to important and/or additional information.

Tip

Provides helpful information, guidelines, or suggestions for performing tasks more effectively.

xxiv

Preface Hitachi Business Continuity Manager User Guide

Icon

LabelCaution

DescriptionWarns the user of adverse conditions and/or consequences (e.g., disruptive operations). Warns the user of severe conditions and/or consequences (e.g., destructive operations).

WARNING

Convention for storage capacity valuesPhysical storage capacity values (e.g., drive capacity) are calculated based on the following values:Physical capacity unit1 KB 1 MB 1 GB 1 TB 1 PB 1 EB 1,000 bytes 1,0002 bytes 1,0003 bytes 1,0004 bytes 1,0005 bytes 1,0006 bytes

Value

Logical storage capacity values (e.g., logical device capacity) are calculated based on the following values:Logical capacity unit1 KB 1 MB 1 GB 1 TB 1 PB 1 EB 1 BLOCK 1,024 (210) bytes 1,024 KB or 1,0242 bytes 1,024 MB or 1,0243 bytes 1,024 GB or 1,0244 bytes 1,024 TB or 1,0245 bytes 1,024 PB or 1,0246 bytes 512 BYTES

Value

Getting helpThe Hitachi Data Systems Support Center staff is available 24 hours a day, seven days a week. If you need technical support, log on to the Hitachi Data Systems Portal for contact information: https://hdssupport.hds.com.

Preface Hitachi Business Continuity Manager User Guide

xxv

CommentsPlease send us your comments on this document: [email protected]. Include the document title, number, and revision, and refer to specific sections and paragraphs whenever possible. All comments become the property of Hitachi Data Systems Corporation. Thank you!

xxvi

Preface Hitachi Business Continuity Manager User Guide

1Overview of Business Continuity ManagerThis chapter provides an overview of Business Continuity Manager and its features. This chapter also provides system configurations, and provides an overview of BCM Monitor and the differences between the storage system models. This chapter also outlines how to set up Business Continuity Manager. Why use Business Continuity Manager? Communication with Hitachi Command Suite products Products that can be controlled by Business Continuity Manager Remote volume operations Grouping to simplify volume operations Data center configurations Functions supporting the automatic operation (BCM Monitor) Business Continuity Manager functions Functionalities dependent on the storage system Storage system identification Setting up Business Continuity Manager

Overview of Business Continuity Manager Hitachi Business Continuity Manager User Guide

1-1

Why use Business Continuity Manager?The amount of data stored on corporate information systems has increased in tandem with the importance of keeping that data safe. Due to the rising management costs associated with this continually increasing size of storage systems, the ability to manage mainframe system storage available with Business Continuity Manager is in strong demand. Hitachi Business Continuity Manager offers centralized, enterprise-wide replication and duplication management for IBM z/OS mainframe environments, without the help of host processing. By taking advantage of storage system copy functions, Business Continuity Manager makes it possible to reliably perform backup operations in large-scale configurations. This minimizes disaster recovery time and data loss, and reduces the workload on the storage administrator. Business Continuity Manager software provides access to critical system performance metrics and thresholds that enable proactive problem avoidance. With this information, you can achieve optimum system performance and meet or exceed service-level objectives. The Business Continuity Manager autodiscovery capability eliminates hours of tedious input and costly human errors resulting from configuring and protecting complex, mission critical applications. Business Continuity Manager provides centralized management of Hitachi mainframe replication products, regardless of where they reside on storage systems. This provides many business benefits: Improved business resilience and confidence through frequent, nondisruptive disaster recovery. Robust disaster recovery and planned outage functions that make for smooth operations and dramatically reducing recovery times. Easy to acquire storage system information, making it possible to avoid disaster recovery failures caused by specifying the wrong duplication target. Easy development of additional automation with built-in automation and extensibility features, using the familiar REXX language, to protect more data with less effort. Accelerated deployment of Universal Replicator, TrueCopy, TrueCopy Asynchronous and ShadowImage software solutions through a single, consistent user interface based on the familiar TSO/ISPF full-screen panels.

Communication with Hitachi Command Suite productsHitachi Command Suite is a series of storage management solutions that can centrally manage ever-increasing storage systems to help reduce storage system management workloads, and streamline storage system operations.

1-2

Overview of Business Continuity Manager Hitachi Business Continuity Manager User Guide

However, since the Hitachi Command Suite products were originally designed to manage open-system storage, initially their full power could not be unleashed in the field of mainframe-system storage management. For this reason, users who owned both storage system for open system and mainframe system had to manage them separately. In recent years, customers have been demanding programs that can manage both storage system for open system and mainframe system to address the problem that increasing storage sizes tends to increase storage management cost. Business Continuity Manager can link wit