Sun Microsystems 3.2 manual Safeguarding the Vtoc Information

Page 13

Safeguarding the VTOC Information

Caution – When creating shadow volume sets, do not create shadow or bitmap volumes using partitions that include cylinder 0. Data loss might occur.

The Solaris system administrator must be knowledgable about the virtual table of contents (VTOC) that is created on raw devices by the Solaris operating system. The creation and updating of a physical disk’s VTOC is a standard function of the Solaris operating system. Software applications like the Sun StorEdge Availability Suite, the growth of storage virtualization, and the appearance of SAN-based controllers have made it easy for an uninformed Solaris system administrator to allow a VTOC to be altered inadvertently. Altering the VTOC increases the possibility of data loss.

Remember these points about the VTOC:

A VTOC is a software-generated virtual table of contents based on the geometry of a device and written to the first cylinder of that device by the Solaris format(1M) utility.

Various software components such as dd(1M), backup utilities, point-in-time copy software, and remote mirror software can copy the VTOC of one volume to another volume if that volume includes cylinder 0 in its mapping.

If the VTOC of the source and destination volumes are not identical, some type of data loss might occur. This data loss might not be detected initially, but can be detected later when other utilities are used, like fsck(1M), or when the system is rebooted.

When first configuring and validating volume replication, save copies of all affected devices’ VTOCs using the prtvtoc(1M) utility. The fmthard(1M) utility can be used to restore them later, if necessary.

When using volume managers like SVM and VxVM, copying between individual volumes created under these volume managers is safe. VTOC issues are avoided because the VTOC is excluded from volumes created by these volume managers.

When formatting individual partitions on a raw device, for all partitions except the backup partition, make sure the partitions do not map cylinder 0, which contains the VTOC. When using raw partitions as volumes, you are the volume manager and you need to exclude the VTOC from partitions that you configure.

When formatting the backup partition of a raw device, make sure that the physical geometries of the source and destination devices are identical. (Partition 2, by default, maps all cylinders under the backup partition.) If identical device sizing is not possible, make sure that the source backup partition is smaller than the destination partition and that the destination partition does not map cylinder 0.

Chapter 1 Point-in-Time Copy Software Troubleshooting Tips 3

Image 13
Contents Sun Microsystems, Inc Please Recycle Contents Error Messages Before You Read This Book PrefaceHow This Book Is Organized Using Unix CommandsTypographic Conventions Shell PromptsShell Shell superuserRelated Documentation Contacting Sun Technical Support Accessing Sun DocumentationSun Welcomes Your Comments Page Check for installation errors Troubleshooting ChecklistReboot Check the log file contentsImproving Performance Checking Log FilesSafeguarding the Vtoc Information Page Remote Mirror Software Troubleshooting Tips Check the integrity of the link Check for common errors Troubleshooting Log Files and ServicesChecking Log Files Checking That the rdc Service Is Running If the /dev/rdc Link Is Not Created Checking the Integrity of the Link Testing with ifconfig Nws822# snoop -d hme0 port rdc Enabled Software on Only One Host Correcting Common User ErrorsWrong Volume Set Name Specified Using the dsstat Command Incorrectly Accommodating Memory Requirements To Find the Volume Set NameRemote Mirror Software Troubleshooting Tips Page Line. This happens when the copy parameters option Iiadm was expecting a number to be on the commandIs used but the arguments for units and delay are Contains the volumes does not match the cluster tagSpecified set. Possible errors Overflow volume could not be attached toDsweempty No overflow volume was specified Dsweinuse The overflow volume is already beingMirror set is already configured to be used by Volume requested as a bitmap for the remoteVolume requested as a remote mirror bitmap Volume is already configured to be a volume used byDatabase. The set is not configured. Check the entry for Remote mirror set cannot be found in the configurationErrors Primary volume has a file system mounted on itVolume that is already in use as a secondary volume Kernel Set being enabled or resumed has a secondaryFor another remote mirror set. a volume cannot be Enabled as a secondary volume if it is already in use asPossible errors Copy or update operation could not be initiatedDsweempty No set was specified on the command Dsweoffline One or more volumes in the set isDsweinuse The volume that was specified is already An overflow volume couldn’t be initialized. PossibleVolume Dswersrvfail The kernel was unable to accessUnsuccessfully before attempting to disable the disk Kernel Request to disable the disk queue is alreadyIiadm command must be issued on the other Where the iiadm command was issuedReconfiguration operation is already in use by Disk queue volume specified forRemote mirror software as a data volume or bitmap Iiadm -ecommand expected dep or indNew sets can be enabled Could not enable volume. Possible errorsDsweempty One of the volumes names master Dsweinuse One of the volumes master, shadowFrom a set. Possible errors Iiadm had a problem detaching the overflow volumeDsweodependency The overflow volume is still Going from logging mode to replicating modeSets can be enabled Could not import shadow volume. Possible errorsDsweempty One of the volume names is blank. File a Dsweinuse One of the volumes is already in use byDsweempty a volume was missing on the command Could not join shadow volume back to the set. PossibleTrying to join the volume is not in the exported state Dsweinvalbmp The bitmap volume is not bigSet specified for the command cannot be found User attempted to enable a set using the shostsvolCurrent configuration. Check the set to ensure that It matches one of the configured sets. Use sndradmKernel. Possible errors Iiadm could not get a list of overflow volumes fromVolume the user specified to attach to a compact Master, shadow, or bitmap volumeSize of the secondary volume. Verify that Disk queue replace command can also be used toSecondary volume is not in an error state and can be AccessedVolume specified as the shadow volume is already User attempted to perform a copy or updateUse as an attached overflow volume Use as a shadow for a different master volumeVolume was already enabled, but with a different User attempted to enable a set in whichVolume in the remote mirror set Dswenotfound Could not find specified volumeBitmap device, but could not get access to it During an enable operation, iiadm tried to validateMaster device, but could not get access to it During a reset operation, iiadm was unable to findSunCluster could not find the specified disk service Be determined. Verify the settingsCould not find remote mirror group in configuration Could not find remote mirror set in configurationVolume specified for the bitmap could not be Lookup of the set ID in the configuration database forOpened. The volume might not exist or is already Iiadm attempted to access the configuration fileCommand failed. Possible errors One or more volumes in a group copy or updateSame as Update failed meaning but for a specific During a reset, iiadm tried to updateVolume vol is not being managed by Volumes are not all in the same cluster device groupIiadm detected that the master, shadow, and bitmap As required by the point-in-time copy softwareRelated Error Messages

3.2 specifications

Sun Microsystems 3.2, often referred to as SunOS 3.2, was a notable release of the Sun operating system that emerged during the rapidly evolving landscape of computer technology in the early 1980s. This operating platform was designed specifically for Sun Workstations, utilizing the robust hardware architecture developed by Sun Microsystems. The introduction of SunOS 3.2 marked a significant step forward in the development of UNIX-like operating systems optimized for entrepreneurship and scientific applications.

One of the main features of SunOS 3.2 was its adherence to the Berkeley Software Distribution (BSD) model, which allowed for advanced networking capabilities, enhanced performance, and efficient resource management. BSD's influence provided SunOS 3.2 with TCP/IP networking protocols, allowing users to connect to other devices seamlessly and manage network resources easily. This feature was crucial during a time when networking was becoming increasingly vital for organizations.

The system's support for virtual memory was another innovative characteristic. SunOS 3.2 utilized demand paging, which allowed programs to use more memory than was physically installed on their machines, significantly improving multitasking and overall system responsiveness. This capability was particularly advantageous for enterprises that relied on large-scale computations and data analysis.

SunOS 3.2 also introduced support for the Sun Window System, which meant users could utilize graphical user interfaces for interacting with applications, moving away from purely text-based command interfaces. This transition paved the way for more intuitive user experiences in the realm of computing, making powerful UNIX capabilities more accessible.

The inclusion of software utilities such as the C shell (csh) and a variety of development tools further strengthened SunOS 3.2’s position as a suitable platform for developers. The system provided robust development environments for programming in languages like C and assembly, catering to custom application requirements across different industries.

Lastly, security features were integrated into SunOS 3.2 to safeguard sensitive data and enhance system integrity. Permission settings and user authentication mechanisms were refined, allowing organizations to securely manage their computing resources.

In summary, SunOS 3.2 represented a landmark evolution in operating systems, showcasing a blend of advanced networking, memory management, graphical user interface, development tools, and security—elements that defined a generation of computing within the high-performance ecosystem of Sun Microsystems.