Checklist 7: Actions for non-load source disk unit failure

This checklist shows the sequence of steps you should use to recover after a non-load-source disk unit failure but some data has been lost.

This checklist should be used for the following problem situation:

Failed unit:
Non-load source unit in system auxiliary storage pool (ASP)
Data loss:
Some
User ASP configured:
N/A

Before you begin your recovery, make a copy of this checklist. Fill in the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.

Most steps in the checklist include references to other topics in this document. Refer to these tasks if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.

Table 1. Recovery checklist for disk failureChecklist 7
Task What to do Where to read more about it
Actions to be performed by the service representative
___ Task 1 Save the disk unit data.  
___ Task 2 Attach the new disk unit.  
___ Task 3 Restore the disk unit data.  
Actions to be performed by the user
___ Task 4

If you are using an encrypting tape drive, verify that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive.

rzarmencryptrecovertape.htm
___ Task 5 Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. Restoring the operating system, task 1 through task 6.
___ Task 6

If you are restoring from an encrypted backup, the save/restore master key on the target system must match the save/restore key on the source system. If the save/restore master key does not match, set the target system's save/restore master key to recover all the master keys.

Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic.
___ Task 7 If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list, might have been reset to default values. Verify these values and correct them if necessary. Recovering system information.
___ Task 8 Reclaim storage. Reclaim Storage (RCLSTG) command.
___ Task 9 Evaluate the extent of the damage. Determine whether you will attempt to recover damaged objects or restore the entire system. Do not skip this step. Task 4: Recovering from damaged objects and unreadable sectors.
___ Task 10 If you have decided to do a complete restore operation, determine the correct procedure for recovering user information. Choosing the procedure to recover user information.
___ Task 11 If you have decided to attempt to recover damaged objects, perform the tasks in Task 4: Recovering from damaged objects and unreadable sectors.