Checklist 20: Recovering your entire system after a complete system loss
This checklist should be used if you need to restore your entire system to a system that is running the same version of the i5/OS licensed program. Do not use this checklist if you are performing an upgrade.
Before you begin your recovery, make a copy of this checklist. Complete the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.
Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.
Task | What to do | Where to read more about it |
---|---|---|
Actions to be performed by the user | ||
___ Task 1 | Starting in V5R4, you no longer need to manually reset the Operations Console (LAN) service tools device ID password on the client. The client automatically attempts to resynchronize this password on all connections where a mismatch might occur. However, manually resetting the service tools device ID password on the system might still be required depending on your restore data. |
To resynchronize a previous release of Operations Console, see the Operations Console topic. |
___ Task 2 | If you are using Operations Console, local area network (LAN), or direct connection, disconnect from your system and close Operations Console. Restart Operations Console and reconnect by using the user ID of 11111111 and password of 11111111 to sign on to your system. | |
___ Task 3 | If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive. |
Recovering from an encrypted backup using an encrypted tape. |
___ Task 4 | Prepare to load the Licensed Internal Code using the most recent Save System (SAVSYS) media. |
Preparing for loading the Licensed Internal Code. |
___ Task 5 | Install the Licensed Internal Code using option 2 (Install Licensed Internal Code and Initialize System)1. | Loading the Licensed Internal Code. |
___ Task 6 | Configure the disk units (assign to ASP and set up disk protection). If you saved any user-defined file systems (UDFSs), you must configure your user ASPs or the UDFSs will not restore. Specify whether you want to create encrypted or unencrypted user ASPs. |
Configuring disks and disk protection and Creating a disk pool. |
___ Task 7 | To allow system value security changes during
your recovery, follow these steps:
|
|
___ Task 8 | Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. | Tasks to restoring the operating system. |
___ Task 9 | If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys. |
Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic. |
___ Task 10 | If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list might have been reset to default values. Verify these values and correct them if necessary. | Recovering system information. |
___ Task 11 | Recover user information
from your save media. Restore changed objects and apply journal entries.
If you are restoring to a different system, or a different logical
partition, you must specify ALWOBJDIF(*ALL) or ALWOBJDIF(*COMPATIBLE) on
the RSTxxx commands. Note: If you use Backup Recovery and Media Services (BRMS), refer to your BRMS recovery report to
recover your user information.
|
Choosing the procedure to recover user information. |
___ Task 12 | If you are not sure what the password is for the QSECOFR profile that was restored from tape, change it before signing off: CHGUSRPRF USRPRF(QSECOFR) PASSWORD(new-password) | What happens when you restore user profiles. |
___ Task 13 | If you restored from distribution media, restore your system information to the correct settings. | Recovering system information. |
___ Task 14 | Perform either a
or
a
Check the job log to ensure that all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any. Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the error, and then restore those objects from the media. |
|
___ Task 15 | You must perform a normal IPL at this time. | Performing a normal initial program load. |
___ Task 16 | If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server. |
Recovery for save operation of data in QNTC file system. |
___ Task 17 | If IBM DB2® Content
Manager OnDemand for i5/OS is installed,
complete journaling for Content Manager OnDemand by
typing the following commands:
|
|
___ Task 18 | If you have the Cryptographic Device Manager licensed program, 5733-CY2 or 5733-CY3, installed, run this command: CALL QCCADEV/QCCAELOAD |
|
___ Task 19 | Review job logs or output from your restore operations to ensure that all objects were restored successfully. | Verifying whether objects are restored successfully. |