Sun Microsystems 3.2 manual Volume requested as a bitmap for the remote, Remote mirror software

Page 31

TABLE 3-1Error Messages for the Sun StorEdge Availability Suite 3.2 Software (Continued)

Error Message

From

Meaning

Bitmap reconfig failed %s:%s

Kernel

A request to reconfigure the bitmap on the local host

 

 

has failed. This can happen for two reasons:

 

 

• The old bitmap cannot be read from to obtain

 

 

needed information.

 

 

• The new bitmap cannot be reserved because the

 

 

volume is not accessible or is already in use. Verify

 

 

that the new bitmap volume is accessible and is not

 

 

already in use.

bitmap <vol> is already in use by

RM

The volume requested as a bitmap for the remote

StorEdge Network Data Replicator

 

mirror set is already configured to be used by the

 

 

remote mirror software.

bitmap <vol> is in use by Instant

RM

The volume requested as a remote mirror bitmap

Image

 

volume is already configured to be a volume used by

 

 

the point-in-time copy software.

bitmap <vol> is in use by SCSI

RM

The volume requested as a remote mirror bitmap

Target Emulation

 

volume is already configured for use by STE (SCSI

 

 

Target Emulation).

Bitmap volume is already an

PITC

The volume that was specified as the bitmap volume

overflow volume

 

during an enable operation is already being used by

 

 

another set as an overflow volume.

Bitmap volume is not a character

PITC

The volume that was specified as the bitmap volume

device

 

during an enable operation is a block device and not a

 

 

character device.

bitmap volume name must start with

PITC

The volume that was specified as the bitmap volume

/dev

 

during an enable or import operation does not start

 

 

with /dev.

both <phost> and <shost> are local

RM

The set specifies the same host as both primary and

 

 

secondary. The primary and secondary hosts must be

 

 

different.

Cannot add %s:%s ==> %s:%s to group %s

Cannot change disk queue %s, Must be in logging mode

Can not check volume against mount table

Kernel

The set being added to a group cannot be added.

 

Typically, this happens because the set being added is

 

of a different type (sync or async) than the sets already

 

in the group.

Kernel

A disk queue cannot be added to or removed from a

 

set if it is not in logging mode. Place the set into

 

logging mode and then attempt to add or remove the

 

disk queue.

PITC

The iiadm operation attempted to determine whether

 

a volume on the command line belongs to a mounted

 

filesystem . The test for this has failed.

Chapter 3 Error Messages 21

Image 31
Contents Sun Microsystems, Inc Please Recycle Contents Error Messages Before You Read This Book PrefaceHow This Book Is Organized Using Unix CommandsShell superuser Shell PromptsTypographic Conventions ShellRelated Documentation Contacting Sun Technical Support Accessing Sun DocumentationSun Welcomes Your Comments Page Check the log file contents Troubleshooting ChecklistCheck for installation errors RebootImproving Performance Checking Log FilesSafeguarding the Vtoc Information Page Remote Mirror Software Troubleshooting Tips Check the integrity of the link Check for common errors Troubleshooting Log Files and ServicesChecking Log Files Checking That the rdc Service Is Running If the /dev/rdc Link Is Not Created Checking the Integrity of the Link Testing with ifconfig Nws822# snoop -d hme0 port rdc Enabled Software on Only One Host Correcting Common User ErrorsWrong Volume Set Name Specified Using the dsstat Command Incorrectly Accommodating Memory Requirements To Find the Volume Set NameRemote Mirror Software Troubleshooting Tips Page Contains the volumes does not match the cluster tag Iiadm was expecting a number to be on the commandLine. This happens when the copy parameters option Is used but the arguments for units and delay areDsweinuse The overflow volume is already being Overflow volume could not be attached toSpecified set. Possible errors Dsweempty No overflow volume was specifiedVolume is already configured to be a volume used by Volume requested as a bitmap for the remoteMirror set is already configured to be used by Volume requested as a remote mirror bitmapPrimary volume has a file system mounted on it Remote mirror set cannot be found in the configurationDatabase. The set is not configured. Check the entry for ErrorsEnabled as a secondary volume if it is already in use as Kernel Set being enabled or resumed has a secondaryVolume that is already in use as a secondary volume For another remote mirror set. a volume cannot beDsweoffline One or more volumes in the set is Copy or update operation could not be initiatedPossible errors Dsweempty No set was specified on the commandDswersrvfail The kernel was unable to access An overflow volume couldn’t be initialized. PossibleDsweinuse The volume that was specified is already VolumeWhere the iiadm command was issued Kernel Request to disable the disk queue is alreadyUnsuccessfully before attempting to disable the disk Iiadm command must be issued on the otherIiadm -ecommand expected dep or ind Disk queue volume specified forReconfiguration operation is already in use by Remote mirror software as a data volume or bitmapDsweinuse One of the volumes master, shadow Could not enable volume. Possible errorsNew sets can be enabled Dsweempty One of the volumes names masterGoing from logging mode to replicating mode Iiadm had a problem detaching the overflow volumeFrom a set. Possible errors Dsweodependency The overflow volume is stillDsweinuse One of the volumes is already in use by Could not import shadow volume. Possible errorsSets can be enabled Dsweempty One of the volume names is blank. File aDsweinvalbmp The bitmap volume is not big Could not join shadow volume back to the set. PossibleDsweempty a volume was missing on the command Trying to join the volume is not in the exported stateIt matches one of the configured sets. Use sndradm User attempted to enable a set using the shostsvolSet specified for the command cannot be found Current configuration. Check the set to ensure thatMaster, shadow, or bitmap volume Iiadm could not get a list of overflow volumes fromKernel. Possible errors Volume the user specified to attach to a compactAccessed Disk queue replace command can also be used toSize of the secondary volume. Verify that Secondary volume is not in an error state and can beUse as a shadow for a different master volume User attempted to perform a copy or updateVolume specified as the shadow volume is already Use as an attached overflow volumeDswenotfound Could not find specified volume User attempted to enable a set in whichVolume was already enabled, but with a different Volume in the remote mirror setDuring a reset operation, iiadm was unable to find During an enable operation, iiadm tried to validateBitmap device, but could not get access to it Master device, but could not get access to itCould not find remote mirror set in configuration Be determined. Verify the settingsSunCluster could not find the specified disk service Could not find remote mirror group in configurationIiadm attempted to access the configuration file Lookup of the set ID in the configuration database forVolume specified for the bitmap could not be Opened. The volume might not exist or is alreadyDuring a reset, iiadm tried to update One or more volumes in a group copy or updateCommand failed. Possible errors Same as Update failed meaning but for a specificAs required by the point-in-time copy software Volumes are not all in the same cluster device groupVolume vol is not being managed by Iiadm detected that the master, shadow, and bitmapRelated Error Messages

3.2 specifications

Sun Microsystems 3.2, often referred to as SunOS 3.2, was a notable release of the Sun operating system that emerged during the rapidly evolving landscape of computer technology in the early 1980s. This operating platform was designed specifically for Sun Workstations, utilizing the robust hardware architecture developed by Sun Microsystems. The introduction of SunOS 3.2 marked a significant step forward in the development of UNIX-like operating systems optimized for entrepreneurship and scientific applications.

One of the main features of SunOS 3.2 was its adherence to the Berkeley Software Distribution (BSD) model, which allowed for advanced networking capabilities, enhanced performance, and efficient resource management. BSD's influence provided SunOS 3.2 with TCP/IP networking protocols, allowing users to connect to other devices seamlessly and manage network resources easily. This feature was crucial during a time when networking was becoming increasingly vital for organizations.

The system's support for virtual memory was another innovative characteristic. SunOS 3.2 utilized demand paging, which allowed programs to use more memory than was physically installed on their machines, significantly improving multitasking and overall system responsiveness. This capability was particularly advantageous for enterprises that relied on large-scale computations and data analysis.

SunOS 3.2 also introduced support for the Sun Window System, which meant users could utilize graphical user interfaces for interacting with applications, moving away from purely text-based command interfaces. This transition paved the way for more intuitive user experiences in the realm of computing, making powerful UNIX capabilities more accessible.

The inclusion of software utilities such as the C shell (csh) and a variety of development tools further strengthened SunOS 3.2’s position as a suitable platform for developers. The system provided robust development environments for programming in languages like C and assembly, catering to custom application requirements across different industries.

Lastly, security features were integrated into SunOS 3.2 to safeguard sensitive data and enhance system integrity. Permission settings and user authentication mechanisms were refined, allowing organizations to securely manage their computing resources.

In summary, SunOS 3.2 represented a landmark evolution in operating systems, showcasing a blend of advanced networking, memory management, graphical user interface, development tools, and security—elements that defined a generation of computing within the high-performance ecosystem of Sun Microsystems.