Checklist 16: Actions for non-load source disk unit failure

This checklist shows the sequence of steps you should use to recover after a non-load-source disk unit in the system auxiliary storage pool (ASP) has failed.

This checklist should be used for the following problem situation:

Failed unit:
Non-load source unit in system auxiliary storage pool (ASP)
Data loss:
N/A. Disk unit cannot be replaced immediately

Before you begin your recovery, make a copy of this checklist. Fill in the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.

Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.

Table 1. Recovery checklist for disk failureChecklist 16
Task What to do Where to read more about it
Actions to be performed by the user
___ Task 1 Remove the failed disk unit from the configuration. Removing a disk unit from an auxiliary storage pool.
___ Task 2

If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive.

Recovering from an encrypted backup using an encrypted tape
___ Task 3

Restore the Licensed Internal Code using option 1 (Restore Licensed Internal Code) from the latest Save System (SAVSYS) media.

Preparing for loading the Licensed Internal Code and Loading the Licensed Internal Code
___ Task 4 Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. Restoring the operating system, task 1 through task 6.
___ Task 5

If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys.

Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic.
___ Task 6 If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list, might have been reset to default values. Verify these values and correct them if necessary. Recovering system information.
___ Task 7 Use Choosing the procedure to recover user information to determine the correct procedure for recovering user information.