Checklist 21: Recovering your entire system after a complete system loss including independent auxiliary storage pools
This checklist should be used if you need to restore your entire system that includes an independent ASP to a system that is running the same version of the IBM® i licensed program. Do not use this checklist if you are performing an upgrade.
Before you begin your recovery, make a copy of this checklist. Complete the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.
Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.
Task | What to do | Where to read more about it |
---|---|---|
Actions to be performed by the user | ||
___ Task 1 | Starting in V5R4, you no longer need to manually reset the Operations Console (LAN) service tools device ID password on the client. The client automatically attempts to resynchronize this password on all connections where a mismatch might occur. However, manually resetting the service tools device ID password on the server might still be required depending on your restore data. |
To resynchronize a previous release of Operations Console, see Console Advanced Topics. |
___ Task 2 | If you are using Operations Console, local area network (LAN) or direct connect, disconnect from your server and close Operations Console. Restart Operations Console and reconnect by using the user ID of 11111111 and password of 11111111 to sign on to your server. | |
___ Task 3 | If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive. |
Recovering from an encrypted backup using an encrypted tape. |
___ Task 4 | Prepare to load the Licensed Internal Code using the most recent Save System (SAVSYS) media. |
Preparing for loading the Licensed Internal Code |
___ Task 5 | Install the Licensed Internal Code using option 2 (Install Licensed Internal Code and Initialize System). | Loading the Licensed Internal Code |
___ Task 6 | Configure the disk units (assign
to ASP and set up disk protection). If you saved any user-defined
file systems (UDFSs), you must configure your user ASPs or the UDFSs
will not restore. Note: You will configure and restore independent
ASPs in a later step.
|
Configuring disks and disk protection and Working with auxiliary storage pools. |
___ Task 7 | To allow system value security changes during
your recovery, follow these steps:
|
|
___ Task 8 | Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. | Tasks to restoring the operating system. |
___ Task 9 | If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys. |
Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic. |
___ Task 10 | If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list might have been reset to default values. Verify these values and correct them if necessary. | Recovering system information. |
___ Task 11 | Recover user information
from your save media. Restore changed objects and apply journal entries.
If you are restoring to a different system, or a different logical
partition, you must specify ALWOBJDIF(*ALL) or ALWOBJDIF(*COMPATIBLE) on
the RSTxxx commands and SRM(*NONE) on the Restore
Configuration (RSTCFG) command. Note: You might want to wait to restore
authorities until after you have configured the independent ASPs.
You can also prompt on
RSTAUT and specify SAVASPDEV(*SYSBAS) .
This allows users to access objects in the system and basic ASPs,
while you complete recovery procedures for the independent ASPs. Both
options can eliminate restricting your server again.Note: If
you use Backup Recovery and Media Services (BRMS), refer to your BRMS recovery report to
recover your user information.
|
Choosing the procedure to recover user information. |
___ Task 12 | If you are not sure what the password
is for the QSECOFR profile that was restored from tape, change it
before signing off: CHGUSRPRF USRPRF(QSECOFR) PASSWORD(new-password) |
What happens when you restore user profiles. |
___ Task 13 | If you restored from distribution media, restore your system information to the correct settings. | Recovering system information. |
___ Task 14 | Perform either a or
a
Check the job log to ensure that all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any. Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the error, and then restore those objects from the media. |
|
___ Task 15 | Configure the Service Tools Server for IBM i in order to access disk management functions. | The Configuring the service tools server information center topic. |
___ Task 16 | You must perform a normal IPL at this time. | Performing a normal initial program load. |
___ Task 17 | If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server. |
Recovery for save operation of data in QNTC file system. |
___ Task 18 | Choose one of the following actions to configure independent ASPs:
Important: If you have the Encrypted ASP Enablement licensed program,
(5770-SS1, Option 45) installed, you can specify whether you
want to encrypt the independent ASP.
|
|
___ Task 19 | Verify the RESOURCE and make the independent ASP available now. This will create a directory for the independent ASP and automatically mount the UDFS to that directory. | Use the Vary Configuration (VRYCFG) command in the character-based interface, or the Make Available function in IBM i Navigator. |
___ Task 20 | Restore independent ASP data. |
Recovering an independent auxiliary storage pool and Restoring encrypted auxiliary storage pools. |
___ Task 21 | Update program temporary fix (PTF) information for all PTF save files in library QGPL by typing: UPDPTFINF. | Restoring changed objects and apply journaled changes. |
___ Task 22 | If the Save System Information (SAVSYSINF) has been used, then run the Restore System Information (RSTSYSINF) command. The Restore System Information (RSTSYSINF) command restores a subset of the system data and objects saved by the Save System Information (SAVSYSINF) command. | Restoring system information |
___ Task 23 | Restore authority. Type: RSTAUT |
Restoring object authorities. |
___ Task 24 | If IBM
Content Manager OnDemand for i is
installed, complete journaling for Content Manager OnDemand by typing
the following commands:
|
|
___ Task 25 | If you have the Cryptographic
Device Manager licensed program, 5733-CY2 or 5733-CY3, installed,
run this command: |
|
___ Task 26 | Review job logs or output from your restore operations to ensure that all objects were restored successfully. | Verifying whether objects are restored successfully. |
___ Task 27 | When you are ready to start clustering on the node you just recovered, you must start clustering from the active node. This will propagate the most current configuration information to the recovered node. | Starting nodes in the Implementing high availability information center topic. |