Checklist 8: Actions for non-load source disk unit failure
This checklist shows the sequence of steps you should use to recover after a non-load-source disk unit failure after a complete data loss.
This checklist should be used for the following problem situation:
- Failed unit:
- Non-load source unit in system auxiliary storage pool (ASP)
- Data loss:
- All
- User ASP configured:
- No
Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.
Task | What to do | Where to read more about it |
---|---|---|
Actions to be performed by the service representative | ||
___ Task 1 | Attach the new disk unit. | |
___ Task 2 | Delete the ASP data. | |
___ Task 3 | Restore the Licensed Internal Code using option 1 (Restore Licensed Internal Code) from the latest Save System (SAVSYS) media. If user ASPs are configured, they remain intact. |
Preparing for loading the Licensed Internal Code and Loading the Licensed Internal Code. |
Actions to be performed by the user | ||
___ Task 4 | If you are using an encrypting tape drive, verify that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive. |
rzarmencryptrecovertape.htm |
___ Task 5 | Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. | Restoring the operating system, task 1 through task 6. |
___ Task 6 | If you are restoring from an encrypted backup, the save/restore master key on the target system must match the save/restore key on the source system. If the save/restore master key does not match, set the target system's save/restore master key to recover all the master keys. |
Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography IBM i documentation topic. |
___ Task 7 | If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list, might have been reset to default values. Verify these values and correct them if necessary. | Recovering system information. |
___ Task 8 | Reclaim storage. | Reclaim Storage (RCLSTG) command. |
___ Task 9 | Use Choosing the procedure to recover user information to determine the correct procedure for recovering user information. |