Checklist 20: Recovering your entire system after a complete system loss

This checklist should be used if you need to restore your entire system to a system that is running the same version of the i5/OS licensed program. Do not use this checklist if you are performing an upgrade.

Note: If the system you must recover contains an independent auxiliary storage pool (ASP), see the Checklist 21: Recovering your entire system after a complete system loss including independent auxiliary storage pools topic.
Attention: If you use the Hardware Management Console (HMC), you must recover the HMC before you perform the following tasks in your recovery.

Before you begin your recovery, make a copy of this checklist. Complete the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.

Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.

Table 1. Recovery checklist for complete system loss–Checklist 20
Task What to do Where to read more about it
Actions to be performed by the user
___ Task 1

Starting in V5R4, you no longer need to manually reset the Operations Console (LAN) service tools device ID password on the client. The client automatically attempts to resynchronize this password on all connections where a mismatch might occur. However, manually resetting the service tools device ID password on the system might still be required depending on your restore data.

To resynchronize a previous release of Operations Console, see the Operations Console topic.
___ Task 2 If you are using Operations Console, local area network (LAN), or direct connection, disconnect from your system and close Operations Console. Restart Operations Console and reconnect by using the user ID of 11111111 and password of 11111111 to sign on to your system.  
___ Task 3

If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive.

Recovering from an encrypted backup using an encrypted tape.
___ Task 4

Prepare to load the Licensed Internal Code using the most recent Save System (SAVSYS) media.

Preparing for loading the Licensed Internal Code.
___ Task 5 Install the Licensed Internal Code using option 2 (Install Licensed Internal Code and Initialize System)1. Loading the Licensed Internal Code.
___ Task 6

Configure the disk units (assign to ASP and set up disk protection). If you saved any user-defined file systems (UDFSs), you must configure your user ASPs or the UDFSs will not restore.

Specify whether you want to create encrypted or unencrypted user ASPs.

Configuring disks and disk protection and Creating a disk pool.
___ Task 7 To allow system value security changes during your recovery, follow these steps:
  1. On the IPL or Install the System display, select option 3 (Use Dedicated Service Tools (DST)). Press Enter to continue.
  2. Sign on to DST using your DST service tools user name and password.
  3. Select option 13 (Work with system security).
  4. Type 1 in the Allow system value security changes field and press Enter.
  5. Press F3 or F12 to get back to the IPL or Install the System display.
 
___ Task 8 Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. Tasks to restoring the operating system.
___ Task 9

If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys.

Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic.
___ Task 10 If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list might have been reset to default values. Verify these values and correct them if necessary. Recovering system information.
___ Task 11 Start of changeRecover user information from your save media. Restore changed objects and apply journal entries. If you are restoring to a different system, or a different logical partition, you must specify ALWOBJDIF(*ALL) or ALWOBJDIF(*COMPATIBLE) on the RSTxxx commands.
Note: If you use Backup Recovery and Media Services (BRMS), refer to your BRMS recovery report to recover your user information.
End of change
Choosing the procedure to recover user information.
___ Task 12 If you are not sure what the password is for the QSECOFR profile that was restored from tape, change it before signing off: CHGUSRPRF USRPRF(QSECOFR) PASSWORD(new-password) What happens when you restore user profiles.
___ Task 13 If you restored from distribution media, restore your system information to the correct settings. Recovering system information.
___ Task 14 Perform either a
SIGNOFF *LIST
or a
DSPJOBLOG * *PRINT

Check the job log to ensure that all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any.

Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the error, and then restore those objects from the media.

 
___ Task 15 You must perform a normal IPL at this time. Performing a normal initial program load.
___ Task 16

If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server.

Recovery for save operation of data in QNTC file system.
___ Task 17 If IBM DB2® Content Manager OnDemand for i5/OS is installed, complete journaling for Content Manager OnDemand by typing the following commands: Start of change
CALL QRDARS/QRLCSTRJ PARM('RLC')
CALL QRDARS/QRLCSTRJ PARM('RLR')
End of change
 
___ Task 18

Start of changeIf you have the Cryptographic Device Manager licensed program, 5733-CY2 or 5733-CY3, installed, run this command: CALL QCCADEV/QCCAELOADEnd of change

 
___ Task 19 Review job logs or output from your restore operations to ensure that all objects were restored successfully. Verifying whether objects are restored successfully.