Checklist 22: Restoring a logical partition to another logical partition

This checklist should be used if you need to restore one logical partition (LPAR) to another logical partition.

If you have independent auxiliary storage pools (ASPs) configured in your logical partition, refer to the Checklist 21: Recovering your entire system after a complete system loss including independent auxiliary storage pools topic as well.

Before you begin your recovery, make a copy of this checklist. Fill in the appropriate areas as you and the service representative perform the recovery steps. This checklist provides an important record of your recovery actions. It can help you to diagnose any problems that occur after the recovery. It might also be useful in evaluating your backup strategy.

Most steps in the checklist include references to other topics in this document. Refer to these topics if you need more information about how to perform a particular step. You might not need to perform some steps, such as restoring changed objects, if they do not apply in your situation.

Table 1. Recovery checklist for complete system loss–Checklist 22
Task What to do Where to read more about it
Actions to be performed by the user
___ Task 1

If you are using an encrypting tape drive, ensure that the Encryption Key Manager (EKM) is running and connected to the tape library before you begin the recovery operation. The EKM contains the encryption keys that are needed for the recovery operation. Skip this step if you are not using an encrypting tape drive.

Recovering from an encrypted backup using an encrypted tape
___ Task 2 Prepare to load the Licensed Internal Code1 from the latest Save System (SAVSYS) media. Preparing for loading the Licensed Internal Code.
___ Task 3 Install the Licensed Internal Code using option 3 (Install Licensed Internal Code and Recover Configuration). Loading the Licensed Internal Code
___ Task 4

Configure the disk units (assign to ASP and set up disk protection). If you saved any user-defined file systems (UDFSs), you must configure your user ASPs or the UDFS will not restore.

Specify whether you want to create encrypted or unencrypted user ASPs.

Configuring disks and disk protection and Creating a disk pool.
___ Task 5 Restore the operating system, beginning with Task 1: Starting to restore the operating system. You are performing a complete restore operation. Tasks to restoring the operating system.
___ Task 6

If you are restoring from an encrypted backup and the save/restore master key value on the target system does not match the save/restore key on the source system, you need to set the save/restore master key to recover all of the master keys.

Recovering from an encrypted backup using software encryption and Loading and setting save/restore master key in the Cryptography information center topic.
___ Task 7 If you restored the operating system using distribution media, some system information, such as access path recovery times and the system reply list might have been reset to default values. Verify these values and correct them if necessary. Recovering system information.
___ Task 8 Recover user information from your save media. Restore changed objects and apply journal entries. If you are restoring to a different system, or a different logical partition, you must specifyALWOBJDIF(*ALL) on the RSTxxx commands. Choosing the procedure to recover user information.
___ Task 9 If you are not sure what the password is for the QSECOFR profile that was restored from tape, change it before signing off: CHGUSRPRF USRPRF(QSECOFR) PASSWORD(new-password) What happens when you restore user profiles.
___ Task 10 If you restored from distribution media, restore your system information to the correct settings. Recovering system information.
___ Task 11 Perform either a
SIGNOFF *LIST
or a
DSPJOBLOG * *PRINT

Check the job log to ensure that all objects were restored. The job log contains information about the restore operation. To verify that all objects were restored, spool the job log for printing along with the job's remaining spooled output, if any.

Message CPC3703 is sent to the job log for each library that was successfully restored. Message CPF3773 is sent to tell you how many objects were restored. Objects are not restored for various reasons. Check for any error messages, correct the error, and then restore those objects from the media.

 
___ Task 12 You must perform a normal initial program load (IPL) at this time. Performing a normal initial program load.
___ Task 13

If you use an integrated server and saved individual files in the QNTC directory, complete recovery for the integrated server.

Recovery for save operation of data in QNTC file system.
___ Task 14 If IBM Content Manager OnDemand for i is installed, complete journaling for Content Manager OnDemand by typing the following commands:
CALL QRDARS/QRLCSTRJ PARM('RLC')
CALL QRDARS/QRLCSTRJ PARM('RLR')
 
___ Task 15

If you have the Cryptographic Device Manager licensed program, 5733-CY2 or 5733-CY3 installed, run this command: CALL QCCADEV/QCCAELOAD

 
___ Task 16 Review job logs or output from your restore operations to ensure that all objects were restored successfully. Verifying whether objects are restored successfully.