Checklist 5: Actions for load-source disk unit failure

This checklist shows the sequence of steps you should use to recover after a load-source disk unit failure after a complete data loss. A user auxiliary storage pool has been configured, and the basic user ASP has overflowed.

This checklist should be used for the following problem situation:

Failed unit:
Load source unit
Data loss:
All
User ASP configured:
Yes
Basic user ASP overflowed:
Yes
Attention: When you replace a disk unit in your system auxiliary storage pool (ASP), the system loses addressability to the objects in your basic user ASPs. Recovering object ownership for objects other than document library objects (DLOs) will require manually assigning ownership for every object in every basic user ASP. You might want to treat this situation as a total recovery and restore all your information from your save media if the following conditions are true:
  • You have a large number of objects in your user ASPs
  • You have thoroughly backed up your system

If you choose to do this, perform the steps that are described in Checklist 20: Recovering your entire system after a complete system loss to recover your system.

Table 1. Recovery checklist for disk failureChecklist 5
Task What to do Where to read more about it
Actions to be performed by the service representative
___ Task 1 Attach the new disk unit.  
___ Task 2

Prepare to load the Licensed Internal Code using the most recent Save System (SAVSYS) media.

Preparing for loading the Licensed Internal Code.
___ Task 3 Install the Licensed Internal Code using option 3 (Install Licensed Internal Code and Recover Configuration). Loading the Licensed Internal Code.
___ Task 4 Recover the disk configuration (assignment of disk to ASPs and protection). Recovering your disk configuration.
Actions to be performed by the user
___ Task 5

If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive.

Recovering from an encrypted backup using an encrypted tape
___ Task 6 Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. Restoring the operating system, task 1 through task 6.
___ Task 7

If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys.

Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic.
___ Task 8 If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list, might have been reset to default values. Verify these values and correct them if necessary. Recovering system information.
___ Task 8 If necessary, change the QALWOBJRST system value. Write the old value here: ___________ Controlling restoration of security-sensitive objects.
___ Task 10 If necessary, change the QVFYOBJRST system value. Write the old value here: ___________ Controlling restoration of security-sensitive objects.
___ Task 11 If necessary, change the system value that controls whether the job log wraps when it is full. Use the Work with System Values command: WRKSYSVAL QJOBMSGQFL. Write down the current value here: ___________. Then change the value to *PRTWRAP. The System values topic in the IBM i Information Center.
___ Task 12 After changing the system values, sign off by using the command SIGNOFF *LIST. Then, using a newly created password, sign back on as QSECOFR for the new values to take effect. Describing the contents of your user auxiliary storage pools.
___ Task 13 Describe or diagram, as much as possible, the contents of your user ASPs before the failure. Describing the contents of your user auxiliary storage pools.
___ Task 14 Recover user profiles, configuration, libraries in the system ASP, and the contents of the user ASPs that were not in overflowed status. If you choose not to restore all of your libraries at this time, ensure that you restore the QGPL and QUSRSYS libraries along with the libraries that you are restoring. Recovering a basic user auxiliary storage pool (ASP) after recovering the system ASP, task 1 through task 11.
___ Task 15 Recover the objects in the user ASPs that were overflowed. Recovering a damaged basic auxiliary storage pool, task 1 through task 9.
___ Task 16 Restore document library objects to the system ASP and to any overflowed user ASPs that had DLOs. Restoring documents and folders.
___ Task 17 Restore your last complete save of directories.1 Restoring objects in directories.
___ Task 18 If you have user-defined file systems (UDFSs) in user ASPs that do not restore correctly, you might need to perform additional recovery steps. Task 7: Restoring user-defined file systems to the user auxiliary storage pool.
___ Task 19 Restore changed objects and apply journaled changes. Restoring changed objects and apply journaled changes.
___ Task 20 Update program temporary fix (PTF) information for all PTF save files in library QGPL by typing: UPDPTFINF. Restoring changed objects and apply journaled changes.
___ Task 21 If the Save System Information (SAVSYSINF) has been used, then run the Restore System Information (RSTSYSINF) command. The Restore System Information (RSTSYSINF) command restores a subset of the system data and objects saved by the Save System Information (SAVSYSINF) command. Restoring system information.
___ Task 22 Restore authority. Type: RSTAUT Restoring object authorities.
___ Task 23 Reapply any PTFs that were applied since your last SAVSYS operation. Restoring program temporary fixes (PTFs).
___ Task 24

If you use an integrated server and saved the network server description (NWSD) and related server objects, complete the recovery for the integrated server.

Recovery for save operation of network server storage spaces.
___ Task 25

If you run Linux® or AIX® and saved by varying off the network server descriptions, complete the recovery for Linux or AIX.

Recovering AIX, IBM i, or Linux in a logical partition.
___ Task 26 If necessary, use the WRKSYSVAL command to change the QALWOBJRST system value back to its original value. Controlling restoration of security-sensitive objects.
___ Task 27 If necessary, use the WRKSYSVAL command to change the QVFYOBJRST system value back to its original value. Controlling restoration of security-sensitive objects.
___ Task 28 If necessary, change the QJOBMSGQFL system value back to its original value by using the WRKSYSVAL command. System values.
___ Task 29 Perform either a:
SIGNOFF *LIST

or a

DSPJOBLOG * *PRINT

Check the job log to ensure all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any.

Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the errors, and then restore those objects from the media.

 
___ Task 30 You must perform a normal initial program load (IPL) at this time. Performing a normal initial program load.
___ Task 31

If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server.

Recovery for save operation of data in QNTC file system.
___ Task 32 If IBM Content Manager OnDemand for i is installed, complete journaling for Content Manager OnDemand by typing the following commands:
CALL QRDARS/QRLCSTRJ PARM('RLC')
CALL QRDARS/QRLCSTRJ PARM('RLR')
 
___ Task 33

If you have the Cryptographic Device Manager licensed program, 5733-CY2 or 5733-CY3, installed, run this command: CALL QCCADEV/QCCAELOAD

 
___ Task 34 Review job logs or output from your restore operations to ensure that all objects were restored successfully. Verifying whether objects are restored successfully.
1
You might receive the following message:
CPD377A: Object not restored, /QNTC.
These objects cannot be restored until their file system has been mounted during the IPL. The additional recovery tasks will guide you through the steps to restore these objects.