Checklist 5: Actions for load-source disk unit failure
This checklist shows the sequence of steps you should use to recover after a load-source disk unit failure after a complete data loss. A user auxiliary storage pool has been configured, and the basic user ASP has overflowed.
This checklist should be used for the following problem situation:
- Failed unit:
- Load source unit
- Data loss:
- All
- User ASP configured:
- Yes
- Basic user ASP overflowed:
- Yes
- You have a large number of objects in your user ASPs
- You have thoroughly backed up your system
If you choose to do this, perform the steps that are described in Checklist 20: Recovering your entire system after a complete system loss to recover your system.
| Task | What to do | Where to read more about it |
|---|---|---|
| Actions to be performed by the service representative | ||
| ___ Task 1 | Attach the new disk unit. | |
| ___ Task 2 | Prepare to load the Licensed Internal Code using the most recent Save System (SAVSYS) media. |
Preparing for loading the Licensed Internal Code. |
| ___ Task 3 | Install the Licensed Internal Code using option 3 (Install Licensed Internal Code and Recover Configuration). | Loading the Licensed Internal Code. |
| ___ Task 4 | Recover the disk configuration (assignment of disk to ASPs and protection). | Recovering your disk configuration. |
| Actions to be performed by the user | ||
| ___ Task 5 | If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive. |
Recovering from an encrypted backup using an encrypted tape |
| ___ Task 6 | Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. | Restoring the operating system, task 1 through task 6. |
| ___ Task 7 | If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys. |
Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic. |
| ___ Task 8 | If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list, might have been reset to default values. Verify these values and correct them if necessary. | Recovering system information. |
| ___ Task 8 | If necessary, change the QALWOBJRST system value. Write the old value here: ___________ | Controlling restoration of security-sensitive objects. |
| ___ Task 10 | If necessary, change the QVFYOBJRST system value. Write the old value here: ___________ | Controlling restoration of security-sensitive objects. |
| ___ Task 11 | If necessary, change the system value that controls whether the job log wraps when it is full. Use the Work with System Values command: WRKSYSVAL QJOBMSGQFL. Write down the current value here: ___________. Then change the value to *PRTWRAP. | The System values topic in the IBM i Information Center. |
| ___ Task 12 | After changing the system values, sign off by using the command SIGNOFF *LIST. Then, using a newly created password, sign back on as QSECOFR for the new values to take effect. | Describing the contents of your user auxiliary storage pools. |
| ___ Task 13 | Describe or diagram, as much as possible, the contents of your user ASPs before the failure. | Describing the contents of your user auxiliary storage pools. |
| ___ Task 14 | Recover user profiles, configuration, libraries in the system ASP, and the contents of the user ASPs that were not in overflowed status. If you choose not to restore all of your libraries at this time, ensure that you restore the QGPL and QUSRSYS libraries along with the libraries that you are restoring. | Recovering a basic user auxiliary storage pool (ASP) after recovering the system ASP, task 1 through task 11. |
| ___ Task 15 | Recover the objects in the user ASPs that were overflowed. | Recovering a damaged basic auxiliary storage pool, task 1 through task 9. |
| ___ Task 16 | Restore document library objects to the system ASP and to any overflowed user ASPs that had DLOs. | Restoring documents and folders. |
| ___ Task 17 | Restore your last complete save of directories.1 | Restoring objects in directories. |
| ___ Task 18 | If you have user-defined file systems (UDFSs) in user ASPs that do not restore correctly, you might need to perform additional recovery steps. | Task 7: Restoring user-defined file systems to the user auxiliary storage pool. |
| ___ Task 19 | Restore changed objects and apply journaled changes. | Restoring changed objects and apply journaled changes. |
| ___ Task 20 | Update program temporary fix (PTF) information for all PTF save files in library QGPL by typing: UPDPTFINF. | Restoring changed objects and apply journaled changes. |
| ___ Task 21 | If the Save System Information (SAVSYSINF) has been used, then run the Restore System Information (RSTSYSINF) command. The Restore System Information (RSTSYSINF) command restores a subset of the system data and objects saved by the Save System Information (SAVSYSINF) command. | Restoring system information. |
| ___ Task 22 | Restore authority. Type: RSTAUT | Restoring object authorities. |
| ___ Task 23 | Reapply any PTFs that were applied since your last SAVSYS operation. | Restoring program temporary fixes (PTFs). |
| ___ Task 24 | If you use an integrated server and saved the network server description (NWSD) and related server objects, complete the recovery for the integrated server. |
Recovery for save operation of network server storage spaces. |
| ___ Task 25 | If you run Linux® or AIX® and saved by varying off the network server descriptions, complete the recovery for Linux or AIX. |
Recovering AIX, IBM i, or Linux in a logical partition. |
| ___ Task 26 | If necessary, use the WRKSYSVAL command to change the QALWOBJRST system value back to its original value. | Controlling restoration of security-sensitive objects. |
| ___ Task 27 | If necessary, use the WRKSYSVAL command to change the QVFYOBJRST system value back to its original value. | Controlling restoration of security-sensitive objects. |
| ___ Task 28 | If necessary, change the QJOBMSGQFL system value back to its original value by using the WRKSYSVAL command. | System values. |
| ___ Task 29 | Perform either a: or a Check the job log to ensure all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any. Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the errors, and then restore those objects from the media. |
|
| ___ Task 30 | You must perform a normal initial program load (IPL) at this time. | Performing a normal initial program load. |
| ___ Task 31 | If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server. |
Recovery for save operation of data in QNTC file system. |
| ___ Task 32 | If IBM
Content Manager OnDemand for i is
installed, complete journaling for Content Manager OnDemand by typing
the following commands: |
|
| ___ Task 33 | If you have the Cryptographic
Device Manager licensed program, 5733-CY2 or 5733-CY3, installed,
run this command: |
|
| ___ Task 34 | Review job logs or output from your restore operations to ensure that all objects were restored successfully. | Verifying whether objects are restored successfully. |
|
||