Checklist 21: Recovering your entire system after a complete system loss including independent auxiliary storage pools

This checklist should be used if you need to restore your entire system that includes an independent ASP to a system that is running the same version of the IBM® i licensed program. Do not use this checklist if you are performing an upgrade.

Note: If you are restoring a clustered system with independent ASPs, see the Scenario: Performing backups in geographic mirroring environment topic along with this checklist.
Attention: If you use the Hardware Management Console (HMC), you must recover the HMC before you perform the following tasks in your recovery.

Before you begin your recovery, make a copy of this checklist. Complete the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.

Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.

Table 1. Recovery checklist for complete system loss–Checklist 21
Task What to do Where to read more about it
Actions to be performed by the user
___ Task 1

Starting in V5R4, you no longer need to manually reset the Operations Console (LAN) service tools device ID password on the client. The client automatically attempts to resynchronize this password on all connections where a mismatch might occur. However, manually resetting the service tools device ID password on the server might still be required depending on your restore data.

To resynchronize a previous release of Operations Console, see Console Advanced Topics.
___ Task 2 If you are using Operations Console, local area network (LAN) or direct connect, disconnect from your server and close Operations Console. Restart Operations Console and reconnect by using the user ID of 11111111 and password of 11111111 to sign on to your server.  
___ Task 3

If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive.

Recovering from an encrypted backup using an encrypted tape.
___ Task 4

Prepare to load the Licensed Internal Code using the most recent Save System (SAVSYS) media.

Preparing for loading the Licensed Internal Code
___ Task 5 Install the Licensed Internal Code using option 2 (Install Licensed Internal Code and Initialize System). Loading the Licensed Internal Code
___ Task 6 Configure the disk units (assign to ASP and set up disk protection). If you saved any user-defined file systems (UDFSs), you must configure your user ASPs or the UDFSs will not restore.
Note: You will configure and restore independent ASPs in a later step.
Configuring disks and disk protection and Working with auxiliary storage pools.
___ Task 7 To allow system value security changes during your recovery, follow these steps:
  1. On the IPL or Install the System display, select 3 (Use Dedicated Service Tools (DST)). Press Enter to continue.
  2. Sign on to DST using your DST service tools user name and password.
  3. Select option 13 (Work with system security).
  4. Type 1 in the Allow system value security changes field and press Enter.
  5. Press F3 or F12 to get back to the IPL or Install the System display.
 
___ Task 8 Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. Tasks to restoring the operating system.
___ Task 9

If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys.

Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic.
___ Task 10 If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list might have been reset to default values. Verify these values and correct them if necessary. Recovering system information.
___ Task 11 Recover user information from your save media. Restore changed objects and apply journal entries. If you are restoring to a different system, or a different logical partition, you must specify ALWOBJDIF(*ALL) or ALWOBJDIF(*COMPATIBLE) on the RSTxxx commands and SRM(*NONE) on the Restore Configuration (RSTCFG) command.
Note: You might want to wait to restore authorities until after you have configured the independent ASPs. You can also prompt on RSTAUT and specify SAVASPDEV(*SYSBAS). This allows users to access objects in the system and basic ASPs, while you complete recovery procedures for the independent ASPs. Both options can eliminate restricting your server again.
Note: If you use Backup Recovery and Media Services (BRMS), refer to your BRMS recovery report to recover your user information.
Choosing the procedure to recover user information.
___ Task 12 If you are not sure what the password is for the QSECOFR profile that was restored from tape, change it before signing off: CHGUSRPRF USRPRF(QSECOFR) PASSWORD(new-password) What happens when you restore user profiles.
___ Task 13 If you restored from distribution media, restore your system information to the correct settings. Recovering system information.
___ Task 14 Perform either a
SIGNOFF *LIST
or a
DSPJOBLOG * *PRINT

Check the job log to ensure that all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any.

Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the error, and then restore those objects from the media.

 
___ Task 15 Configure the Service Tools Server for IBM i in order to access disk management functions. The Configuring the service tools server information center topic.
___ Task 16 You must perform a normal IPL at this time. Performing a normal initial program load.
___ Task 17

If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server.

Recovery for save operation of data in QNTC file system.
___ Task 18
Start of changeChoose one of the following actions to configure independent ASPs:
  • Use the Configure Device ASP (CFGDEVASP) command.
  • Use IBM i Navigator.
End of change
Important: If you have the Encrypted ASP Enablement licensed program, (5770-SS1, Option 45) installed, you can specify whether you want to encrypt the independent ASP.

Start of changeCreating an independent disk poolEnd of change

___ Task 19 Verify the RESOURCE and make the independent ASP available now. This will create a directory for the independent ASP and automatically mount the UDFS to that directory. Use the Vary Configuration (VRYCFG) command in the character-based interface, or the Make Available function in IBM i Navigator.
___ Task 20

Restore independent ASP data.

Recovering an independent auxiliary storage pool and Restoring encrypted auxiliary storage pools.
___ Task 21 Update program temporary fix (PTF) information for all PTF save files in library QGPL by typing: UPDPTFINF. Restoring changed objects and apply journaled changes.
___ Task 22 If the Save System Information (SAVSYSINF) has been used, then run the Restore System Information (RSTSYSINF) command. The Restore System Information (RSTSYSINF) command restores a subset of the system data and objects saved by the Save System Information (SAVSYSINF) command. Restoring system information
___ Task 23 Restore authority. Type: RSTAUT Restoring object authorities.
___ Task 24 If IBM Content Manager OnDemand for i is installed, complete journaling for Content Manager OnDemand by typing the following commands:
CALL QRDARS/QRLCSTRJ PARM('RLC')
CALL QRDARS/QRLCSTRJ PARM('RLR')
 
___ Task 25

If you have the Cryptographic Device Manager licensed program, 5733-CY2 or 5733-CY3, installed, run this command: CALL QCCADEV/QCCAELOAD

 
___ Task 26 Review job logs or output from your restore operations to ensure that all objects were restored successfully. Verifying whether objects are restored successfully.
___ Task 27 When you are ready to start clustering on the node you just recovered, you must start clustering from the active node. This will propagate the most current configuration information to the recovered node. Starting nodes in the Implementing high availability information center topic.