Documente Academic
Documente Profesional
Documente Cultură
TigerLogic Corporation 25A Technology Dr. Suite 100 Irvine, CA 92618 www.tigerlogic.com
949 442-4400
Use the D3 File Sizer Utility to resize D3 NT or D3 UNIX files automatically or manually.
TigerLogic Corporation
Document Conventions
Different typefaces and type styles are used throughout this document to indicate specific information.
Syntax Conventions
Convention Mono and Mono Bold Description Code examples, syntax, commands, menu items, screen text, and other keywords recognized by the system. All such text is displayed in Mono Bold to allow for quick identification when the text is referenced within general descriptive text. Additionally, Mono Bold is used in code, syntax and screen text boxes to distinguish between typed text and text that is displayed or returned by the system. For example: Typed Text Returned Text Italic n{-m} Variables to be replaced by the value. It can be an actual name, word, or number. For example, file.name might be replaced with CUST.FILE. Non-linked references to other documents or topics within this document. Emphasis for impact or the first time a word is used. For example, resources and information make up the state of the application.
The letters n and m represent numbers. Numbers are usually input as a single string without commas. Numbers can also be used to define a range designation. The starting and ending numbers are typed with a hyphen between. For example, n{-m} could be replaced by 10 or by 1-31. Braces ( {} ) delimit a mutually exclusive set of options. The vertical line or pipe sign ( | ) separates a mutually exclusive set of options. Brackets ( [ ] ) indicate optional entries.
{} on | off [0 | line | ?]
D3 Naming Conventions
Throughout this guide there are references to D3, D3, and d3. This is fully intentional and care was taken that every reference is correct. D3 d3 Proper name of the DBMS software product that is referred to as D3 throughout this document. The name can appear as d3 when the name appears in the command language or file names.
TigerLogic Corporation
D3 Terms
These D3 terms are used throughout: Term log in connect Description This term refers to the Linux log in. A user logs in using the UNIX user name and optional password. ALinux user establishes a connection with a virtual machine. The default virtual machine name is pick0. If several virtual machines exist on the same system, the user identifies the virtual machine using a symbolic name such as d3_newyork_branch. Normally, this displays the D3 logon message. As noted elsewhere, the D3 log on and connect steps can be made automatic so a D3 user does not need aLinux login name and password. This is a logical connection, and has nothing to do with the serial port. There is no process-to-process communication or data movement of any kind. log on This term refers to logging on to D3. A user logs on by giving a D3 user name, and an optional master dictionary and password. On a turnkey system, this is the only interface the end-user sees. Generally, to disconnect from the D3 environment, execute the exit command. On a default, non-turnkey system, disconnecting releases the user to the UNIX shell and terminates the D3 session. On a turnkey process, disconnecting returns the user to the D3 logon prompt. A user logged on to the D3 virtual machine can disconnect temporarily, dropping to the Linux shell. The user is still logged on to the D3 virtual machine, suspending the D3 environment until they reconnect to the virtual machine and resume activity. Each D3 user process is an operating system process, making data exchange between the D3 environment and the operating system simple and efficient.
disconnect
process
Related Documentation
To download or order related documentation published by TigerLogic Corporation, please refer to the TigerLogic Web site at: http://www.tigerlogic.com/tigerlogic/pick/support/documentation/index.jsp
TigerLogic Corporation
TigerLogic Corporation
Turnkey Systems
The system may be set up so users only get a D3 logon message, not a UNIX login message. This type of system is called turnkey. Turnkey systems should allocate no more than 85% of the total physical memory to shared memory. Non-turnkey systems should allocate no more than 50% of the total physical memory to shared memory. As the number of users reaches 100 or more, a 50/50 memory split is recommended for best performance. Before creating a turnkey system, decide which devices will be UNIX terminals and which devices will be D3 terminals. Both serial tty connections and network Telnet connections can be reserved for D3 ports. Various methods to create a turnkey system are discussed below. Review these sections to determine the method that best fits your needs.
TigerLogic Corporation
For example, add this line under the server option line. server_args = -L /usr/bin/tnet Before the Telnet file is modified to add the script under the server_args option, the file looks like this: { flags = REUSE socket_type = stream wait = no user = root server = /usr/sbin/in.telnetd log_on_failure += USERID disable = no } After the Telnet file is modified to add the script under the server_args option, the file looks like this:
TigerLogic Corporation
{ flags = REUSE socket_type = stream wait = no user = root server = /usr/sbin/in.telnetd server_args = -L /usr/bin/tnet log_on_failure += USERID disable = no } 5. Restart the xinetd daemon (so the modification you performed in step three will take effect) by typing this script: /etc/rc.d/init.d/xinetd restart
This example creates the directory named d3net in the /usr/bin directory, and changes the permissions to read and execute for all users. mkdir /usr/bin/d3net chmod a+rx /usr/bin/d3net 2. Select a range of port numbers not currently in use on your system, and large enough for all your D3 PIBs. This example uses PIBs 1 through 20. The port range is 16001 to 16020. 3. Create a script to calculate the PIB from the port number and place it in the directory created in step 1. The script executes d3 passing the result of the subtraction as the only argument on the command line. The following sample script does this. For this example, assume the script name is netcon and the directory name is /usr/bin/d3net, the full path is /usr/bin/d3net/netcon. Enter: #!/bin/bash PIB=$(basename $0) PIB=$(($PIB 16000)) exec /usr/bin/d3 $PIB 4. Change the permissions to read and execute for all users. chmod a+rx /usr/bin/d3net/netcon 5. Create a symbolic link (ln s) for each port in the range, using the port number as the name of the link, and the script you created as the source. Remember, in our example the script name is netcon, and the port range is 16001 to 16020.
TigerLogic Corporation
ln ln ln ln ln ln
s s s s s s
When all the links are created, a long listing (ls l) of the directory looks like: total 50 lrwxrwxrwx lrwxrwxrwx lrwxrwxrwx lrwxrwxrwx lrwxrwxrwx lrwxrwxrwx -rwxr-xr-x 1 1 1 1 1 1 1 root root root root root root root root root root root root root root 6 6 6 6 6 6 72 Jan Jan Jan Jan Jan Jan Aug 14 14 14 14 14 14 7 18:47 18:47 18:47 18:47 18:47 18:47 14:03 16001 -> 16002 -> 16003 -> 16018 -> 16019 -> 16020 -> netcon /usr/bin/d3net/netcon /usr/bin/d3net/netcon /usr/bin/d3net/netcon /usr/bin/d3net/netcon /usr/bin/d3net/netcon /usr/bin/d3net/netcon
= = = = = = =
In the example above, note that the: Name of this file is d316001 (d3+ port number). The name of each file in your range of ports will be d3 + the next port number in the sequence of numbers chosen for your range of ports. For instance, the next file name for this example will be d316002. service d316001 line of our example uses the same name as the file name. server_args line must end with the same number used in the file name and the service d316001 line. port line of our example must reflect the same number as the service d3, and the server_args lines; note that in our example the port number is also 16001.
After all of the files in your range of ports have been created, issue this command to restart the deamon. /etc/rc.d/init.d/xinetd restart
TigerLogic Corporation
Network port at which to start (must be greater than 1024). The available TCP ports can be verified from the etc/services file. Number of telnet ports to start (1-65536). Starting D3 PIB (defaults to 1). Virtual Machine name (configuration file name). Name that defines this group of telnet sessions. Multiple pool names can be specified. d l r s Enables Data Carrier Detect (DCD) protocol handling. Displays a list of defined pools. Removes all nailed telnet ports. Suppresses killing existing telnet processes. Must be specified in conjunction with the (r option.
TigerLogic Corporation
Maintaining Compatibility
These sections discuss creating a turnkey system while maintaining consistency and compatibility with other D3 platforms and releases.
Serial Turnkey
A port designated as a serial turnkey process maintains compatibility. To create a turnkey system in this manner, include an entry similar to the example below in the inittab file. An example entry to respawn tty2 to D3 port 1 is: a1:2:respawn:d3 -n pick0 1 -t tty2 The label a1 is a unique two character ID. The d3 command follows the standard syntax defined in the D3 Reference Manual where: -n pick0 identifies the D3 configuration file 1 specifies the D3 PIB or port number -t tty2 identifies the tty to which the D3 process is attached
TigerLogic Corporation
10
Omitting the -T option from the command line in the inittab sets the serial line to use the default parameters. 2. Starting a nailed serial line to use the configuration parameters stored in the pick_term directory, for example: a5:2:respawn:/usr/bin/d3 -n pick0 5 -t tty5 -T Adding the -T option to the command line in the inittab sets the serial line to use the configuration stored in the pick_term directory. To create the files in the pick_term directory using the set-port command: The files in the pick_term directory contain stty serial configuration commands, and can be created and populated manually using the set-port command. When you use the set-port command to create the files for the pick_term directory, if a file does not already exist one will be created. If a file does exist, the existing configuration will be overwritten. Listed below are several commands that are supported: Baud Rate 110 150 300 600 1200 2400 4800 9600 19200 38400 Description = 110 baud = 150 baud = 300 baud = 600 baud = 1200 baud = 2400 baud = 4800 baud = 9600 baud = 19200 baud = 38400 baud
TigerLogic Corporation
11
parenb -parodd
= even parity
Serial Line Configuration Command (as it appears in the file) = 9600 cs8 -parenb -cstopb = 4800 cs7 parenb parodd cstopb = 38400 cs7 parenb -parodd -cstopb
An example of this command at the TCL prompt is: set-port 5,9600,8,N,1 where 5 is the PIB 9600 is the Baud Rate 8 is the Word Length N is no Parity 1 is one Stop Bit
TigerLogic Corporation
12
Changing inittab
When the serial port is not in use, a single D3 turnkey respawn can be disabled. Comment out the inittab entry with the # sign, as in: #a1:2:respawn:d3 -n pick0 1 -t tty2 Another way to do this is to delete the entry in question, or replace the process information for a tty with a valid /etc/getty command sequence, rather than d3. Execute the command init q to activate any changes to the inittab file. WARNING The file /etc/inittab is a highly sensitive UNIX system configuration script. Any changes made to this file must be accurate before exiting from the editor. Invalid entries can cause unpredictable events to occur in UNIX, including system hangs and rapidly respawning processes.
TigerLogic Corporation
13
TigerLogic Corporation
14
cache.flat
Sets the caching strategy of the ODBC server. The default is no, which indicates progressive caching. For flat caching, set the parameter to yes. Sets the maximum cache size of the ODBC server. If left blank, the default maximum cache size of 200 rows is used. Tells the ODBC server to provide debugging messages. The default is no. Debugging messages are directed to the file specified in the logfile parameter. Specifies the file where error messages will be logged. The default is /dev/null/, which indicates that messages are not logged to a file. Specifies the file where debugging messages will be logged. The default is /dev/null/, which indicates that messages are not logged to a file. Sets the TCP port number on which the ODBC client and server operates. The default is 1603. Specifies the number of minutes of inactivity to wait before disconnecting the process and logging off the server.
cache.rows debug
errorfile logfile
Starts the ODBC server using the parameters set in the Configure ODBC option. Displays a list of running servers and the prompt below: Enter port number to stop, <Enter> to stop all servers, or c to cancel: Enter the port number of that server (the rightmost number under the COMMAND column) to stop a particular server. Press ENTER to stop all ODBC servers. Type C to cancel the stopping of servers.
ODBC Status
TigerLogic Corporation
15
Hot Backup
This section provides an overview and describes the implementation of the D3 UNIX Hot Backup utility. The topics discussed are: Hot Backup Introduction Requirements Configuring Hot Backup Starting Hot Backup Using Hot Backup Hot Backup Errors
TigerLogic Corporation
16
These servers are connected via a TCP/IP connection. During normal operations, some or all updates to the database on the master server can be applied to the slave server, over the network. If the master server fails, users can be switched to the slave server, and the application restarted. Down-time is limited to the time it takes to switch servers (usually the time required for terminal connectors to establish an Ethernet connection to the slave server). Data loss is limited to any updates that have not been transmitted to the slave server (typically, this is limited to the updates that occurred in the last few seconds before the failure).
Definitions
server master slave transaction log queue A background process. Hot Backup servers work in pairs: one on each machine. Main server on which users normally work. The server running on the master system is called the master server. Backup for the master server. The server running on the slave system is called the slave server. Updates to the master server are placed in the transaction log queue on the master server, which is emptied regularly to the slave server in a FIFO manner. In normal operation, this queue should remain minimal in size. When a transaction is extracted from the queue, it is assigned a transaction number. Transactions are physically removed from the queue only when the slave server acknowledges them. This ensures that if an error occurs before the item is stored in the remote file, the transaction can be sent again to the slave. Updates to the slave server itself are not logged in the slave servers transaction log queue. However, it is possible to set up the system so that a slave server acts as a master server to another slave (to cascade updates). This type of Hot Backup configuration is set up using the Log slave update option in the Setup Server utility. It is possible to instruct a slave server not to modify the database on the slave server. Updates received from the master server are not applied to the slave database. Instead they are stored in a temporary file. The purpose is to have a quiescent database on the slave server without stopping the master server (for example, to allow a full save of the database). Updates can then be applied to the slave database at a later time.
apply updates
TigerLogic Corporation
17
Normal operation of Hot Backup is to have an exact image of the master database. Optionally, the slave server attempts to create any nonexistent accounts or files on the slave server. On the slave server, long operations, such as clearing large files, are not processed by the slave server itself, since it would not be able to process any incoming data. The slave server creates helpers (phantom processes) to perform these operations. Files with modulos larger than 100 are initially created by the slave server with a modulo of 101. A helper process then resizes the file to its actual size. This allows you to instantly create the file, making it available on the slave system without stopping the slave server. The slave server performs periodic checks on the helper to ensure that it completes. Slave systems sometimes create temporary files on the slave server to hold data that cannot be transmitted to its destination immediately. For example, when a clear-file command is run, a helper performs the actual clearing and a temporary hold file holds any updates to the file being cleared that are received after the clear command. This ensures that the updates are not deleted.
TigerLogic Corporation
18
Requirements
The following section described the requirements and restrictions for Hot Backup.
Hardware Requirements
The master and slave servers used in a Hot Backup configuration should be of equal performance and operating systems. The servers are connected using TCP/IP via Ethernet cards. It is recommended that Hot Backup transmissions use a different network card than the card used for normal user traffic.
Software Requirements
The servers involved in a Hot Backup configuration must be running the same base release of D3, and must be patched to the same level with the latest public patches from TigerLogic.
Restrictions
These restrictions apply to Hot Backup implementations.
save Command
Special care must be taken when using the (k option of the save command in a Hot Backup implementation. Additionally, the queue on the master server should be empty. Enqueuing on the master should be stopped until the save completes. The (k option reorganizes all file-of-files numbers sequentially on the tape. To use the (k option of the save command, you must ensure that Hot Backup is stopped on both servers. Once Hot Backup is stopped, you must run the save with the (k option on both servers.
File-of-Files D-Pointer
If the D-Pointer for the file-of-files is not set to DX, it is possible that, following a restore, updates to the slave server may not update the correct files. Additionally, transaction processing performance may degrade. These problems occur because the process cannot correctly identify the file-of-files record. If the process cannot identify the file-of-files record, a temporary file (servername*file-offilenumber) is created in the data section of the hb.log file where servername is the Hot Backup server name and file-of-filenumber is the file-of-files number for the file concerned. These files are created with a modulo of 31, and thus can quickly fill up with data and overflow, resulting in performance degradation. To avoid this problem, set the D-Pointer for the file-of-files to DX and perform a file-save and restore.
TigerLogic Corporation
19
TigerLogic Corporation
20
Database Configuration
The database accounts and files to be backed up with a Hot Backup configuration must be specified. There are two options for this specification: All files in the database (Not Recommended) Select Accounts/Files in the database
It is recommended that you only log those files that need to be logged to the slave server. To specify the account and files to log, the D-Pointers on these accounts and files must be changed using the set-dptr command. Various attribute types can be set and unset using the set-dptr command. The L attribute instructs the database to log the file. To turn the logging attribute on for an account: 1. Enter: set-dptr +L accountname (A where accountname is the name of the account. The example below illustrates running the set-dptr command on the hbtest account. Attribute 1 in all D-Pointers in the hbtest account is changed from D to DL for both dictionary and data levels. set-dptr +L hbtest Selecting files in 'hbtest' ... hbtest bp bp hbdata hbdata 5 file(s) changed (A account : : : : : D D D D D > > > > > DL DL DL DL DL
NOTE
The set-dptr command changes any item in the MD or dictionary level of a file whose attribute 1 value starts with a D. The (d option of the set-dptr command (when used with the +l attribute) ensures that newly logged files are synchronized with the Hot Backup slave or a Transaction Log tape.
To change multiple accounts, you can: or build a list containing the account names that you wish to process and run the set-dptr command on the active select-list. For example: :get-list acclist >set-dptr +L (A run the set-dptr command on each account.
TigerLogic Corporation
21
The example below illustrates the set-dptr command working with an active select-list containing file names. List 'filelist' in file 'pointer-file' saved. :get-list filelist [404] 9 items selected out set-dptr +L (P data5 : D > data5 : D > data6 : D > data6 : D > data7 : D > data7 : D > data8 : D > data8 : D > bp : D > bp : D > hbdata : D > hbdata : D > data2 : D > data2 : D > data3 : D > data3 : D > data4 : D > data4 : D > 18 file(s) changed :_ of 1 items. DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL DL
TigerLogic Corporation
22
3. Press ENTER to begin the server configuration. The Setup Server utility displays.
4. Enter the appropriate value for each of these fields: Server Name Name for the master server. Can be any alphabetical string up to eight characters.
TigerLogic Corporation
23
Server Type
Specifies whether the server is to be the Master or the Slave server. M = master S = slave
Type M for master. Remote Host name Name of the UNIX host where the associated slave server is located. Can also be the IP address of the remote host. NOTETo ensure that you use the correct host name or IP address, use the UNIX ping command from a UNIX prompt to ensure that you can communicate with the remote host. For example: ping [hostname|IP Address] TCP port number TCP port number, from 1024 to 32767, of the associated slave server. The default is 2000. NOTEUse the UNIX netstat command to locate a free port number. The required options for netstat are different per UNIX platform. Please consult the UNIX documentation for your system to obtain the correct options. Target VME name Protocol Log slave update Check period Name of the VME server on the slave machine. inet. Cannot be modified. For slave servers only. For master servers only. The master server routinely performs a variety of system tests. This value represents the time (in seconds) to wait between tests. For example, if set to 60, a test record is sent every 60 seconds to the slave server to ensure that the link is functioning. If no response is returned from the slave server, an error is reported. A value of 0 disables all tests. A period of 300 seconds (5 minutes) is suitable for most systems. For master servers only. Time (in seconds) the master server waits (after emptying the transaction log queue) to restart the process of emptying the transaction log queue again. A value of two or three seconds is suitable. List of D3 users (as defined in the D3 users file) or D3 port numbers to notify in case of error, separated by commas. The port numbers are expressed in a syntax similar to the TCL command msg. For example, to notify the users dm and bob, and line 0 (regardless of whether it is logged on): dm,bob,!0 Apply updates Auto create Comments For slave servers only. For slave servers only. Any comments.
TxLog timer
Notify list
TigerLogic Corporation
24
5. Type Y to confirm your changes. NOTE You can also type N to return to the above menu to make additional changes, or Q to quit without saving your changes.
6. (Optional) To limit the amount of free frames (the default is unlimited) to allocate to the transaction logger for processing record updates, select the Set Queue Limit option from the Transaction Log menu, then enter the new limit in frames. NOTE This value must be reset after a full restore (a full restore automatically sets the value to unlimited).
TigerLogic Corporation
25
3. Select the Special Operations option. The Special Operations menu displays.
4. Select the Setup Server option. The Setup Server menu displays (on the right side of the screen).
TigerLogic Corporation
26
5. Select the New Server option. The Setup Server utility displays (on the right side of the screen). This is the same menu that was used when creating the master server.
6. Enter the appropriate value for each of these fields: Server Name Server Type Name for the slave server. Can be any alphabetical string up to eight characters. Specifies whether the server is to be the Master or the Slave server. M = master S = slave
Type S for slave. Remote Host name TCP port number For master servers only. TCP port number, from 1024 to 32767, of the associated slave server. The default is 2000. NOTEThis should be the same port number defined on the master server. Target VME name Protocol Log slave update For master servers only. inet. Cannot be modified. This option is for Hot Backup implementations that employ multiple cascading servers. If set to ON, all updates received by the slave are logged in the transaction log queue, to be sent to another system. If set to OFF (default), the updates are not enqueued. For master servers only. For master servers only.
TigerLogic Corporation
27
Notify list
List of D3 users (as defined in the D3 users file) or D3 port numbers to notify in case of error, separated by commas. The port numbers are expressed in a syntax similar to the TCL command msg. For example, to notify the users dm and bob, and line 0 (regardless of whether it is logged on): dm,bob,!0
Apply updates
Instructs the slave server to apply the updates it receives from the master server immediately (ON) or delay them (OFF) until it receives an explicit command. Normally, this option should be set to ON. NOTEWhen the slave server starts, it reports the status of this option. Applying updates should not be disabled long, since the slave and master databases can be become out-of-sync when updates are not applied.
Auto create
Automatically creates any missing accounts and files on the slave server. NOTEIt is a good precaution to leave this option set to ON.
Comments
Any comments.
7. Type Y to confirm your changes. NOTE You can also type N to return to the above menu to make additional changes, or Q to quit without saving your changes.
TigerLogic Corporation
28
TigerLogic Corporation
29
TigerLogic Corporation
30
To start the master server: 1. Log on to the dm account on the master server. 2. At TCL, enter: hot-backup 3. If multiple servers are defined, select the server to start, then press ENTER. The Hot Backup Main Menu displays. 4. Select the Start Server option. 5. Select Yes when prompted for confirmation. The master server process starts.
TigerLogic Corporation
31
TigerLogic Corporation
32
TigerLogic Corporation
33
Testing D3 Processes
Use the procedure below to verify that D3 processes are running. To verify D3 processes are running: 1. Verify on which line the spooler process is running. At TCL, enter: !cat /usr/lib/pick/pick0 | grep npibs The number of PIBs (ports) defined to D3 displays. npibs 16 In the example above, 16 PIBs (PIBs 0 to 15) are defined. Thus, the spooler process is on line 16. The Hot Backup process starts on the last available PIB on the system. Therefore, in this example, the Hot Backup process runs on PIB 15. 2. Confirm the processes by entering the PIB numbers. Enter: where 15-16
NOTE
The above command is for this specific example. If, for example, 32 PIBs are defined, enter instead. where 31-3 2
The where command statistics for the specified PIBs display. :where 15-16 Ln PCB PIB 06 Mar 2004 FID Stat 0015 0000072F FF10 0016 00000730 BF10 sp.spoolout:086 ABS Stat P R1 & Return stack contents 12:50:09
The example above confirms that the Hot Backup process is running on PIB 15. The P displayed in the Stat column indicates it is running as a phantom process.
TigerLogic Corporation
34
TigerLogic Corporation
35
All Hot Backup operations are controlled through menus. If your terminal allows, use arrow keys where indicated. Otherwise, use these keys and key-combinations to move through the menus: CTRL+N CTRL+B CTRL+X Moves cursor down (down arrow). Moves cursor up (up arrow). Cancels. Applicable only when input is requested.
Use these keys to quit or exit Hot Backup or Hot Backup menus: ESC Q X Quits and returns to previous menu or back to TCL. This key also terminates all menus. Quits and returns to previous menu. Exits and returns to TCL from any menu.
TigerLogic Corporation
36
Server Selection
If there is more than one server defined in Hot Backup, the Select a Current Server menu displays when first entering Hot Backup:
After making a selection, the Hot Backup Main Menu displays. Note that the current server name displays at the top of the screen. To select another current server, press ESC or Q to return to the server selection menu.
TigerLogic Corporation
37
Main Menu
The Hot Backup Main Menu provides the ability to start and stop a server, display various statistics, and open other Hot Backup menus.
Menu Status
Description Displays the last messages displayed by the selected server. The title of the message section on the screen indicates the server name and additional information. The messages display in reverse chronological order (most recent first). The server does not need to be running to use this command. Queries the selected server. The server must be running. See Querying Servers for more information. Starts the selected server. NOTEDuring a coldstart, D3 automatically starts the last Hot Backup server that was started before the coldstart.
Stops the selected server. Displays the current configuration of the selected server. Type Y to return to the Hot Backup Main Menu. Displays transaction statistics. Both servers must be running. If run on the slave server, the result displays immediately. If run on the master server, a request is sent to the slave server, and statistics display later. The response time depends on how busy the slave server is. The slave server accumulates the statistics. Statistics are cleared with each slave server restart. NOTEYou can use this option from the master server to determine whether communication is established.
TigerLogic Corporation
38
Display queue
For master servers only. Displays the status of the transaction log queue. The information below displays: Number of frames in queue. This is a rough indication of the amount of data not yet transmitted. Whether the system is set up to log all files or only DL files. Whether file updates are enqueued for all processes. Current transaction number being transmitted, if nonzero. Last acknowledged transaction number. This is the last transaction that was received and successfully processed by the associated slave server. If the last ACK number is not reported, the query was performed at a moment when all transactions are acknowledged. First transaction not yet acknowledged by the associated server. This can be an update item, a delete item, and so on. In case of a problem, this is the first transaction that is retransmitted.
Opens the Special Operations Menu which allows you to perform miscellaneous operations such as setting up traces, servers, permanent log files, and applying updates. Opens the Transaction Log Menu which allows you to perform several transaction log operations.
TigerLogic Corporation
39
Description Displays the last messages displayed by the selected server. The title of the message section on the screen indicates the server name and additional information. Messages display in reverse chronological order (most recent first). The server does not need to be running to use this command. Turns traces ON for debugging purposes on the selected server. Traces can considerably slow server performance and should set to OFF in normal operations. Disables traces on the selected server. Opens the Setup Server Utility which allows you to create or edit a Hot Backup server. Deletes the selected server definition. If more than one server exists, the list of available servers displays. Lists the permanent log of all messages logged by all servers. These keystrokes allow you to navigate the log: CTRL+N to scroll forward through the logs CTRL+B to scroll backward through the logs T to jump to the top of the log B to jump to the bottom of the log : to enter a special command line that allows searching for the first log entry entered after a given date or time, and searching for a string Q or ESC to return to the Special Operations menu
Turn traces ON Turn traces OFF Setup server Delete Server List permanent log
TigerLogic Corporation
40
Clears the permanent log file. Three clear options are available: 1 Clear all entries 2 Clear entries older than 1 week 3 Clear entries older than 1 month
For slave servers only. Instructs the selected server to stop applying updates coming from its associated master server, and instead stores the updates in the hb.log,apply temporary hold file. Selecting this option also updates the server configuration. Thus, the next time the server is started, updates are not applied. To display the number of pending updates, select the Query Server option from the Hot Backup Main Menu. To re-apply updates, select the (Re)start applying updates option. NOTEIf Hot Backup is not running from the dm account, the apply data level must be created in the hb.log file in the dm account on both the master and slave servers before using this option. To create the apply data level, enter the command below in the dm account at TCL: create-file hb.log,apply 301 (x
For slave servers only. Applies any pending updates to the database and restarts the normal state of applying new updates as they arrive. Selecting this option also updates the server configuration. Thus, the next time the server is started, updates are applied. For slave servers only. If it becomes necessary to delete a file on the slave server (for example, after recovering from a missing file-of-files item on the master server (see the error message Cannot read FOF item)), the slave server must be instructed to close all the files it opened. If the files are accessed again, the slave server reopens them.
TigerLogic Corporation
41
Menu Option Display queue Log DL files only Log ALL files
Description Displays the status of the transaction log queue. This option is the same as the Display queue option in the Hot Backup Main Menu. Specifies to log only those files that contain a DL attribute in their D-Pointer. This option is applied to the entire system. Specifies to log all files on the system. Not recommended. NOTEAfter a full file-restore, the logging of files is automatically changed to DL type files only (even when the Log All files option is enabled). To re-instate, add the startlog (eo command to the user-coldstart macro to initiate the logging of all files during startup. NOTEThe slave server does not apply any modifications to selected files in the dm account on the slave server: ABS, accounts, alarm.file, backgrounds, devs, errors, file-of-files file, hb.log (Hot Backup control files), jobs, PIBs, resizing, and tcl-stack. NOTEIf the T flag is removed from the tcl-stack data-level D-Pointer, the logging of updates depends on the compatibility mode. For AP compatibility, updates from TCL are not logged (only updates from other channels, such as BASIC programs, are logged). For nonAP compatibility, updates from TCL and from other channels are logged
However, changes to the tcl-stack made from standard update channels are logged. CAUTIONUse this option with caution, since the slave server can create accounts and files to receive data. Stop enqueuing Stops enqueuing updates. NOTEThis option should be used with extreme care. If selected, updates to the master database do not transmit to the slave server. The only legitimate use of this option is to stop enqueuing updates following a major problem on the master server that requires switching users to the slave server. This event is logged in the errors file.
TigerLogic Corporation
42
Starts (or restarts) enqueuing updates. This event is logged in the errors file. Clears the transaction log queue. All queued updates are lost. This event is logged in the errors file. Allows you to specify the amount of free frames the transaction logger uses to record updates. The default is unlimited. NOTEThis value must be reset after a full restore (a full restore automatically sets the value to unlimited). NOTEA warning is sent when the queue size exceeds 50% of the specified value and the enqueueing of updates is disabled when it reaches the specified queue limit. The queue size is checked at the frequency set in the Check Period value (specified in the master server configuration). If the queue size exceeds the specified limit between checks (and subsequently diminishes prior to the next scheduled check), no warning is sent.
TigerLogic Corporation
43
Description Name for the server. This name references the server in all the other menus. If there is only one server defined on the D3 virtual machine, this server is implied in all commands. Specifies whether the server is to be the master or the slave server. m = master s = slave
Name of the UNIX host where the associated slave server is located. Can also be the IP address of the remote host. The master and slave servers should both be set to the same value. NOTETo ensure that you use the correct host name or IP address, use the UNIX ping command from a UNIX prompt to ensure that you can communicate with the remote host. For example: ping [hostname|IP Address]
For a slave server, TCP port number, from 1024 to 32767, on which it is listening. For a master server, TCP port number of the associated slave server.
NOTEYou can use the UNIX netstat command to locate a free port number. The required options for netstat are different per UNIX platform. Please consult the UNIX documentation for your system to obtain the correct options. Target VME name Protocol For master servers only. Name of the VME server on the slave machine. inet. Cannot be modified.
TigerLogic Corporation
44
For slave servers only. This option is for Hot Backup implementations that include multiple cascading servers. If set to ON, all updates the slave receives are logged in the transaction log queue, to be sent to another system. If set to OFF, the updates are not enqueued. The default is OFF. For master servers only. The master server routinely performs a variety of system tests. This value represents the time (in seconds) to wait between tests. For example, if set to 60, a test record is sent every 60 seconds to the slave server to ensure the link is functioning. If no response returns from the slave server, it reports an error. A value of 0 disables all tests. A period of 300 seconds (5 minutes) is suitable for most systems. For master servers only. Time (in seconds) the master server waits (after emptying the transaction log queue) to restart the process of emptying the transaction log queue again. A value of two or three seconds is suitable. List of D3 users (as defined in the D3 users file) or D3 port numbers to notify in case of error, separated by commas. The port numbers are expressed in a syntax similar to the TCL command msg. For example, to notify the users dm and bob, and line 0 (regardless of whether it is logged on): dm,bob,!0
Check period
Apply updates
For slave servers only. Instructs the slave server to apply the updates it receives from the master server immediately (ON) or delay them (OFF) until it receives an explicit command. Normally, this option should be set to ON. NOTEWhen the slave server starts, it reports the status of this option. Applying updates should not be disabled long, since the slave and master databases can be become out-of-sync when updates are not applied.
Auto create
For slave servers only. Automatically creates any missing accounts and files on the slave server. NOTEIt is a good precaution to leave this option set to ON.
Comments
Any comments.
TigerLogic Corporation
45
Querying Servers
This information displays when running the Query Server option from the Hot Backup Main Menu. Note that the message format may differ depending upon whether this option is run on the master or the slave server: Server 'hbslave'. PIB 14. PID 40774. Server type Slave. Traces OFF Total Recvd O K. Cur trans 1. ACK'ed trans 1. Updates applied Status: Reading network
Name of the server. D3 port number of the server (PIB). UNIX process ID of the server (PID). For slave servers only. Current transaction number received by the slave server. This number should increase as data is exchanged between the servers. Current transaction number successfully acknowledged by the slave server. Unless the queue is empty, the acknowledged transaction number should be slightly less than the transaction number received by the slave. For slave servers only. Indication of whether updates received from the master server have been applied to the slave database. Total size, in kilobytes, received for the current day. The master reports a slightly higher number than the slave, due to additional protocol information. For slave servers only. Indication of whether the slave server received requests to open files and was not able to do so. The number of files that do not open displays. At any given time, there may be a few pending open files, so repeat the command to verify whether or not problems exist. Examine the permanent log file to obtain more information. For slave servers only. Indication of whether updates to the slave database are currently disabled, and the number of pending updates. Server status Possible status value: Reading network Wait response to call Wait incoming call Stopped Connected Normal state of the slave server. For master servers only. Master server is attempting to call its associated slave. For slave servers only. Slave server is waiting for its associated master server to establish communication. Server has stopped. The previous message in the status or permanent log file indicates the reason for the termination. Indicates that a connection is established.
TigerLogic Corporation
46
Writing to network
Sending data to the associated server. If this state persists and no data transfer occurs, this indicates that the receiver is not reading data. A 30-second time-out occurs, after which the connection is shut down and restarted. For master servers only. Waits for an acknowledgment from the associated slave server. For master servers only. Queue is empty and there is no traffic. For master servers only. Intermediate state while the master server is extracting messages from the transaction log queue.
NOTE
Additional information on the slave server is available in the hb.log,stats file. The item datetime.pib, where datetime is the date and time when the server was last started, and pib is server on which it is running, contains statistics for number of updates, deletes, file creates, file deletes, file clears, file renames, index creates, index deletes and index clears since the last server start.
TigerLogic Corporation
47
Additional Information
Resizing Files Online D3 files can be resized using the on-line file resizing utility on the master server. The files are resized on both the master and slave server. D-Pointer Controls To write data to files, the slave server performs controls on the file-defining D-Pointers located on the slave server. The slave server does not automatically change the file-defining D-Pointers. Some of the controls the slave server performs include: Update protections are removed to ensure that the slave server is able to write to the file. callx correlatives are changed to use explicit path names to the subroutines. The account and file name where the subroutine resides is found in the cataloged object in the master dictionary of the account where the file is located. If the subroutine is not found, the callx correlative is removed. Bridges to other files are controlled to use an explicit path name to the target file. If the file cannot be found, the bridge is removed. The amount of control is limited. For example, references to files in FlashBASIC and a correlatives are not controlled. Therefore, if precautions are not taken, it is possible that the slave server will abort trying to update such a file. Note that no data loss occurs because the offending transaction acknowledges and retransmits. Starting the server with the traces feature set to ON identifies which items and files cause the problem.
CAUTION
lost+found File When a slave server is unable to process a transaction (for example, the account does not exist and the automatic creation of missing accounts is disabled), the transaction is stored in the hb.log,lost+found trash file. The item-IDs of these files are unique timedate stamps. This file can be used to recover the salvaged data. The format of an item is:
TigerLogic Corporation
48
Item type. Can be one of these: Unknown transaction code. Slave server was reset. Internal error. Time out on transaction can occur when stopping the master server. Bad network message. Cannot perform the operation. An error message usually indicates the cause of the problem. Cannot update D-Pointer. There is a D-Pointer-like element in the master dictionary or file dictionary preventing the creation of the file. This item was deleted to allow the file creation and its content written starting at the attribute 10. Master dictionary of the account in which the slave server is running (for example, dm) contains an item that collides with the name of an account. Though this is normally authorized, this is not a good practice. The server removes this item and dumps the content of this item. Slave server removed a correlative from a D-Pointer because it could not resolve a reference to a callx subroutine or to a bridge. The lost+found item contains the removed correlative. Transaction could not be processed when applying delayed updates. Incorrect transaction length.
Transaction opcode, if applicable, or question mark. Server name. Log internal time. Log internal date. Transaction number. Last ACK transaction number. Message. Time and date in external format. Body of the transaction that could not be processed or any data the server could not handle, in hexadecimal.
NOTE
TigerLogic Corporation
49
Phantom process started and is waiting for the server to initialize itself.
Phantom process failed to start. Check the scheduler to verify there are not too many queued jobs and use list-jobs to determine the cause of the abort. Phantom process started normally, but the server could not complete its initialization. Use the status option from the Hot Backup Main Menu to verify the cause of the failure. The most common cause is a BIND error, indicating that the TCP port is already in use. Often, when stopping a server, the TCP connection is not purged immediately and the TCP port remains in use. This usually cleans itself up after the various TCP protocol time outs have expired. Stop the master server and re-attempt a few minutes later. If the BIND error persists, change the port number using the Setup Server option from the Special Operations menu in Hot Backup. The port must be changed on both the master and the slave servers. A start server failed because the server appears to be already running. This has no action on a running server. If the server is not running, and this message continues to display, this might indicate a corruption of the Hot Backup control file. Make sure the server is not running (using the where command) and run: delete hb.log servername
TigerLogic Corporation
50
WARNING: Transactions are not enqueued WARNING: Transaction queue has grown to xxx frames malloc error. err=xxx
Issued by the master server to indicate that updates to the database are not being enqueued, and therefore are not being transferred to the slave server. The databases are now out of sync. Periodically, the master server checks if the queue has grown to more than 500 frames above the previous value, indicating that the slave server is not able to keep up with the load. Ensure that the input server is not stopped, or has not aborted. This message may be normal in situations where massive updates are performed. System could not allocate memory. WARNINGThis is an indication of a serious UNIX problem. Check the swap space. Master server cannot establish a communication. The error code is implementation dependent. Ensure that the host is available by using the UNIX command ping hostname. If available, the most likely reason is that the slave server has encountered an error or is not started. Use the status option from the Hot Backup Main Menu on the slave server to verify. Due to a corruption in the file-of-files file on the master server, the system is unable to identify the file being updated. 'xxx' is the file number (as known on the master server). Data is normally transferred to the slave server, but stored in a temporary hold file named hb.missing,master.name*xxx, where master.name is the name of the master server, and xxx the file number. To correct this situation, rebuild the file-of-files file on the master server by performing a full file-save (possibly a dummy save), with the (s option. The missing file-of-files file item can also be rebuilt manually if the file name can be identified from the content of the file being stored in the temporary hold file on the backup system. The data can then be copied to the real file. Instruct the slave server to close its opened files using the Close opened files option from the Special Operation menu to force it to open the new file.
TigerLogic Corporation
51
Description Tape. UNIX file path of the tape device. This device must already exist (with any drivers already loaded) for D3 to properly use the device. The device paths listed above are examples only; your device paths can be different. Note that these file paths refer to the no rewind devices, which are required for all D3 tape devices. For example, tape /dev/pipein where the device code = c. Block size of the device. NOTEThird parameter no longer serves a useful purpose, other than marking a space during parsing of the configuration file, and is required. The exception is the compressed pseudo tape device. The block size is set according to these conventions: For floppy devices, this is usually 500. For half inch tape devices, this is usually 4096 or 8192. For other tape devices, this is usually 16384.
Third
The block size is used only for compressed pseudo tape devices. It contains the number of 1 KB (1024 byte) blocks to write prior to compression before the file is closed and the tape operation cascades to a new file. If this number is less than 1000, the device does not cascade and may run into UNIX file size limitations. Fourth Specifies the type of tape (magnetic media) device code. Valid types are: f q d Floppy disk or uncompressed pseudo tape Quarter-inch streaming tape 4mm digital tape
TigerLogic Corporation
52
v h c p Fifth
8mm digital tape Half-inch tape No rewind device (pipe) Compressed pseudo tape (cascading)
Specifies the read/write density of the device. Device q d v h Default Density l l l l Low Density ld . . ld Medium Density . . . lm High Density lh lh lh lh
The above device type parameters are ignored by the system and used as a place marker. c f (floppy) p, f (pseudo) lx lx lx . ld . . . . . lq .
TigerLogic Corporation
53
Peripherals
This section provides information to set up different D3 peripheral devices after installation. The following topics are discussed: Disks Printers Tapes
TigerLogic Corporation
54
Disks
Review the information below regarding disks.
SCSI Disks
SCSI disk names depend on the particular controller used and the SCSI ID of the disk. For most controllers, the name is ordered according to either ascending SCSI ID or descending SCSI ID. The name of a SCSI disk is /dev/sd x where x can be a, b, c, d, e, f, g, /dev/sda would be the first SCSI disk, /dev/sdb would be the second SCSI disk, and so on. SCSI disks share the same naming structure for partitions as all other disks.
(E)IDE
(E)IDE disk names depend on their location and configuration (Master or Slave) on the (E)IDE bus. Unlike SCSI devices, (E)IDE disk names are shared with (E)IDE CD-ROM devices. /dev/hda /dev/hdb /dev/hdc /dev/hdd The master on the first IDE bus. The slave on the first IDE bus. The master on the second IDE bus. The slave on the second IDE bus.
Partition Names
The partition naming scheme is the name of the disk, with a suffix designating the partition. The first 4 partitions are the primary or extended partitions and any partition number greater than 5 is an extended partition. So, /dev/hda1 would be the first partition on the master hard drive on the first IDE bus.
Floppy Disks
Writing to a Floppy Disk
The UNIX designation of the floppy disk in Linux is /dev/fd0H1440. This is a 1.44 MB floppy disk drive.
Device is write-protected
When Linux is installed, the permissions are set to 660 for the 3.5 inch 1.44 floppy device /dev/fd0H1440 and for the tape device /dev/nst0. Because the user pick is not a root user, the permissions are not sufficient for D3. As a result, when a D3 process attempts to write to the floppy, a message displays indicating that the drive is write-protected. To write to the device from D3 execute the command:
TigerLogic Corporation
55
If using floppy: chmod 666 /dev/fd0H1440 If using tape: chmod 666 /dev/nst0
WARNING
When writing to a floppy disk (for example, if you are performing an account-save or a t-dump), you must execute either the t-det (detach the tape) or t-rew (rewind the tape) command and wait for the device light to turn off before removing the floppy disk from the device. The floppy device may not clear the last buffer if one of the two commands is not executed. Consequently, some of the data may not be written to the floppy disk.
TigerLogic Corporation
56
Printers
The following topics are presented: D3 Printers Reserved Printers Shared Printers
TigerLogic Corporation
57
D3 Printers
For a D3 virtual machine, all printers are treated as serial printers, even if they are parallel. The difference is handled transparently by UNIX. Therefore, the D3 startptr command must always use the s printer type, and never use the p printer type.
TigerLogic Corporation
58
Reserved Printers
A reserved printer is a printer to which only D3 can print. A printer can be attached to a serial or parallel port and reserved for a D3 virtual machine. Reserved printers are managed by the D3 spooler which submits jobs to D3 printer processes serving specified form queues. A reserved printer can be defined and started in a user-defined macro called user-coldstart in the dm account. This macro is used automatically during a coldstart or the normal boot process.
NOTE
If no items have been previously placed in the user-coldstart, it opens as a new item.
In this example, theLinuxparallel printer device name is /dev/lp0. NOTE The options to the TCL startptr command, such as the form queue number, printer number, and so on may vary.
Serial Port 1. Log on to D3, then enter user-ID dm and master dictionary dm. 2. Select any unused D3 line number on which to start the printer. In the example below, for a 128 user system, the last line number (127) is used. 3. Insert the statements below in the user-coldstart macro in the master dictionary of the dm account. Note that the options to the startptr TCL command, such as the form queue number, printer number, and so on may vary. !exec d3 -127 -t ttyxx startptr 0,0,0,s127 -printer &
These statements define a serial printer on line 127 that is associated with /dev/ttyxx with a baud rate of 9600 (the default). The first line describes the printer port for UNIX. UNIX will start a D3 process (D3 PIB 127) on ttyxx.
TigerLogic Corporation
59
The second line describes the printer for D3. D3 will start printer 0, use D3 spooler form queue 0, with 0 page ejects on serial line (D3 PIB) 127. Note that the printer number and output queue number are set to zero.
TigerLogic Corporation
60
Shared Printers
A printer can be shared between UNIX and D3, so that both D3 and UNIX users can access it transparently. On a D3 virtual machine, both shared and reserved printers can coexist. This approach allows users to take advantage of D3 spooler features like alignment, hold files, and multiple copies, while still utilizing the UNIX spooler for final output. If such D3 spooler functionality is not required, it is possible to spool data directly to the UNIX spooler bypassing the D3 printer processor altogether. The general principle of a shared printer consisting of a system with one reserved printer, two shared printers, and a remote printer is shown in the next figure. Shared printers look the same as reserved printers to D3 users; they are managed by the D3 spooler which submits jobs to D3 printer processes serving specified form queues. Instead of sending the output directly to a device, as is the case for reserved printers, the shared printer process output is redirected to a filter which interfaces to UNIX and sends the job to the UNIX spooler. Another difference is that spooling out of the virtual machine is nearly instantaneous since the filter writes the print job to a UNIX print file. It is almost impossible to use sp-kill to cancel a job from D3; it must be performed using the UNIX cancel command. The association between the D3 form queue and the printer follows these rules: A form queue is associated to a printer process. A D3 printer process is associated to a filter when the shared printer is started. A filter is associated to one UNIX queue. A UNIX queue is serviced by one or more printers.
TigerLogic Corporation
61
The following topics are presented: Adding and Removing Shared Printers Troubleshooting
TigerLogic Corporation
62
Printer should start successfully after the startshp command is issued. Typing pid {port#} should return a process ID. Shared printers must specify a device name for the printer. lp.unix (located in the file devices in the account dm) is provided for simple ASCII printers. The purpose of this form queue is to define an inter-job sequence that the filter uses to cut the D3 printer process data stream into UNIX print jobs. The inter-job sequence is defined as function @(-269).
To add a shared printer: 1. Ensure that the UNIX spooler is started and at least one UNIX queue is started. Type: lpc status 2. Ensure that the printer works with UNIX. For example, type: lpr -P[unix.formqueue.name] unix.file.name When the unix.file.name prints on the printer, the printer is shared in UNIX and is ready to be shared in D3.
TigerLogic Corporation
63
3. Insert these statements in the user-coldstart macro in the dm account: startshp 1,1,0,s126,lp.unix startshp 2,2,0,s127,lp.unix,(lpr -Plp1) These statements use the previous example to show how two shared printers are set up. First statement starts the printer on the shared printer servicing the default UNIX queue (lp0 in this example, which is the default). Second statement specifies a complete lpr command since the output is sent to the non-default UNIX queue.
printer#,formqueue#,page.eject,S{port#},lp.unix,(lpr command)
where printer#,formqueue#,page.eject,S{port#} are all the same values as used with a regular startptr command. For more information, see the D3 Reference Manual. NOTE In UNIX, it is always a Serial (S) printer, and the port# must be less than npibs (never put a printer on D3 port 0).
The startshp command: Creates a process on port#. Assigns the form queue lp.unix to that shared printer. Sets up the routing of print jobs to whatever UNIX print command was specified.
To use a more complex printer definition item: 1. Locate the line containing =x in the item. This entry corresponds to @(-99). 2. Locate the line which should be associated to @(-269), 170 entries later. Note that a line starting with an exclamation mark is a comment and does not count. 3. Add the line: d,c'End of Job',< -269 4. Compile the form queue item, then enter: assignfq formqueue,device (c With this setting, the printer process sends an End of Job string between each job. The filter scans the data stream, looking for this inter-job sequence to separate the data into different UNIX print jobs. The inter-job sequence can be any character or sequence of characters that does not occur in a normal print job. NOTE It is strongly advised to include a nonprintable character in the inter-job sequence, such as: d,x'ff',c'End of Job',x'ff',< -269 Never use the TCL command startptr on a shared printer as it does not spawn the necessary filter process.
TigerLogic Corporation
64
Removing a Shared Printer A shared printer can be stopped with the shp-kill command. This command executes an sp-kill of the D3 printer and kills the underlying D3 process and the filter.
TigerLogic Corporation
65
Troubleshooting
Shared printers can be difficult to maintain because of the multiple processes that interact before the job is output. For this section, a shared printer had been previously started with the command startshp 3,1,0,s17,lp.unix. When a problem occurs, follow this troubleshooting list: 1. Verify that the UNIX queue is started by typing: lpc status The designated queue should display as Ready. 2. Verify the D3 printer status at TCL by typing: shp-status This command displays some information on the status of the D3 printer process and its associated filter. 3. Verify if there is a UNIX process started on the D3 line number at TCL by typing: pid line.number The result should display a nonzero PID. 4. Verify that the filter process is running by typing: ps aux | grep lppick The filter program and some of its options should display. 5. (Optional) Kill the shared printer by executing the steps below if the shared printer cannot be restarted after using shp-kill. startshp 3,1,0,s17,lp.unix a. Use the sp-kill command to kill the printer. sp-kill d3 b. Manually kill the UNIX printer process. kill p17 c. Remove the file /tmp/lppick. !rm /tmp/lppick/pick0_3_17 d. Restart the printer. 6. If any of these steps do not provide the expected result, try to restart the shared printer with the startshp command. NOTE The startshp command has some tracing facility. See the D3 Reference Manual for more details.
TigerLogic Corporation
66
Tapes
Review this topic for more information on tapes.
Pseudo tape devices do not need to be compressed. For compressed pseudo tape devices, data is written compressed and read uncompressed using gzip utilities (to eliminate the 2 GB file size limitation on compressed tape devices). At user specified limits (before compression), the UNIX file name changes and cascades the pseudo tape device to the new file name. For example, given this tape definition in the pick0 configuration file: tape /tmp/pseudo 10000 p lx # compressed tape If a data save has more data than the limit specified (10,000 1024 byte blocks, on 10 MB), the device /tmp/pseudo is closed and the save cascades to /tmp/pseudo-1. After the second 10 MB is written, the device /tmp/pseudo-1 is closed and the save cascades to /tmp/pseudo-2. This process continues until the save is finished. NOTE There must be space in the UNIX file system, /tmp in this example, to store these compressed files.
TigerLogic Corporation
67
SCSI Tapes
SCSI tapes in D3 Linux all share the same naming convention regardless of type. Names prefixed with n refer to the non-rewinding version of the device, which will be used in D3 Linux. Device names use the format: /dev/nstN where N is a number. The mapping between the number and the actual tape drive depends on the SCSI ID and the SCSI controller used.
Multireel Saves
By default, D3 Linux does not support multireel saves. However, it can be configured to support multireel saves. If there is no intention to ever use multireel saves, do not enable this feature. Enabling multireel saves produces more wear on the tape. Multireel tape processing takes considerably longer than single-reel processing. NOTE The user must have root privileges and the D3 port must be started by entering d3 -0 l (lowercase L).
To enable multireel saves: 1. Insert the media into the drive. 2. Execute these commands from line 0 (the console) at TCL, where device.name is the UNIX device name listed in the TCL command: !mt -f device.name drvbuffer 0 !mt -f device.name stoptions 4 list-device This disables the internal buffers, ensuring reliable end-of-media detection. As such, it may reduce tape streaming. To restore the original state of tape operations: 1. Insert the media into the drive. 2. Execute these commands from line 0 (the console) at TCL, where device.name is the UNIX device name listed in the TCL command: !mt -f device.name drvbuffer 1 !mt -f device.name stoptions 7 list-device This re-enables drive buffering to assist streaming and reduce tape drive wear, but prevents reliable end-of-media detection.
TigerLogic Corporation
68
However, when you change the block size to anything other than the variable zero (0), that change becomes the default block size for all other tape drives on the system. NOTE It is highly recommended that the default block size always be set to variable block size mode (0) because you can only perform a file restore when the block size is set to 0. In order to restore multireel tape saves, the block size should be set to variable block size mode (0).
There are three methods available to set the block size for a tape that is not in the tape drive. Method 1 Execute this command from the TCL prompt (or place the command in the dm,md, usercoldstart item (to ensure that the command is executed at system start up) by typing: set-def-tape-blk block.size tape.number For example, the tape device number is 5 and the physical block size is 0. set-def-tape-blk 0 5 Choosing 0 sets the physical block size to a variable value. If you want to set the physical block size to a specific numeric value you can. In this instance, replace the variable value (0) with a numeric value. For example, the variable block size 0 in the first example is replaced by the numeric value 512. set-def-tape-blk 512 5 Method 2 Method 3 Execute these commands from the TCL prompt by typing: set-device tape.number set-def-tape-blk block.size The last way to set a numeric value to a block size is to execute this command from the TCL prompt by typing: !mt -f device.name defblksize block.size
TigerLogic Corporation
69
Method 2
Execute these commands from the TCL prompt by typing: set-device tape.number set-tape-blk block.size If you do not designate a tape number in step one, the block size will be set for the tape device to which the TigerLogic user is currently attached.
Method 3
Execute this command from the TCL prompt by typing: !mt -f device.name setblk block.size
TigerLogic Corporation
70
and automatically resizes them to ensure proper system performance. Manual Resizing The D3 File Sizer Utility also allows the manual resizing of files at any time. The user can build a list of selected files to resize, and view information about individual files. Files can be resized manually regardless of Background Monitor status. The Background Monitor tracks files on your database daily, weekly, or monthly (depending on how often you specify) to ensure that they are sized according to the default maximum ratio or according to individually set maximum ratios. The following options may be edited by the user: Resizing Individual Files Wake-up date Wake-up time Check files (specifies how frequently the files are checked) Day of month Day of week Monitor Default Maximum Fill Default Action
Files can be resized on an individual basis at any time. To track the files being resized, build a list of selected files. Using the list of selected files, you can view individual file information, search the list for a specific character string, or resize a file. File statistics displayed within the various D3 File Sizer screens are regenerated by performing a file-save or account-save, running the D3 File Sizer Utility, then performing another file-save or account-save. Detailed instructions are provided in the remaining pages of this document (see Viewing File Information).
TigerLogic Corporation
71
The following topics are presented: Accessing the Background Monitor Starting the D3 File Sizer Utility Viewing File Information Modifying Individual File Entries Using the Log File D3 File Sizer Utility Commands
TigerLogic Corporation
72
Use the Background Monitor for: Starting the Background Monitor Stopping the Background Monitor Displaying the Background Monitor Status Modifying the Wake-up Date and Time Modifying Background Monitor Options
TigerLogic Corporation
73
3. Select the Start Background Monitor option from the Main Menu. This message displays. Start Background Monitor. Confirm (<y>/n)? 4. Do one of the following: Press Y to start the Background Monitor. Press N to return to the Main Menu without starting the Background Monitor.
TigerLogic Corporation
74
TigerLogic Corporation
75
To exit the Background Monitor Status: Press ESC to exit the Background Monitor Status screen and return to the Main Menu without making any changes. To modify these options, see Modifying the Wake-up Date and Time. This table lists the Background Monitor status fields, including the parameter, editable fields, default values, and how it is generated. Parameter Status Editable Field No Default Value and How it is Generated Depends on the Background Monitor. Possible statuses include: RunningBackground Monitor is actively checking the files specified in Background Monitor Options. SleepingBackground Monitor is running but inactive, waiting until the time specified in Background Monitor Options to wake-up and check files. StoppedBackground Monitor is disabled. Start RequestedBackground Monitor is in the process of being started. Stop RequestedBackground Monitor is in the process of being stopped.
PIB number where the background Monitor is running. Date that the Background Monitor is scheduled to wake-up and check files.
TigerLogic Corporation
76
Yes No No No
Time that the Background Monitor is scheduled to wake-up. Last user who started the Background Monitor. Date when the Background Monitor was last started. Time when the Background Monitor was last started.
TigerLogic Corporation
77
To modify the Wake-up Date and Time: 1. Select the Background Monitor Status option from the Main Menu. 2. Select the Wake-up Date field. 3. Change the date, then press ENTER. The date can be entered MM/DD/YY or DD/MM/YY (depending on the international date setting), where MM is the month, DD is the day, YY is the year. You must type the slash (/). 4. Select the Wake-up Time field. 5. Change the Wake-up Time. The time must be entered HH:MM, where HH is the hour, MM is the minutes. You must type the colon (:). Enter either military or standard time; however, AM or PM must be specified for standard time. This message displays. Make these changes to the schedule (<y>/n)? 6. Do one of the following: Press Y to save any changes and return to the Main Menu. Press N to return to the Main Menu without saving the changes.
TigerLogic Corporation
78
Sets the day of the month the Background Monitor checks the files when Monthly is selected at the Check Files field. The default value is 5. Sets day of the week the Background Monitor checks the files when Weekly is selected at the Check Files field. The default value is Saturday. Defines what time of day the Background Monitor is scheduled to wake-up and check files. The first choice time can be changed. The first choice value is 6:00 PM. Displays the list of files to monitor. This value can be set to either All Files on System or List of Selected Files. The first choice value is All Files on System. Displays the maximum ratio allowed before the Background Monitor considers the file to be undersized. The Maximum Fill Ratio is the extent to which the allocated space for a file is filled. The default value is 125. Displays the action to take when a file becomes undersized. The default value is Write Entry in Log File.
Yes
Yes
Yes
Yes
Default Action
Yes
NOTE
First choice values are not defaults. They are values placed in the field by the D3 File Sizer Utility when the Background Monitor Options screen is first accessed.
To modify the Background Monitor Options: 1. Select the Background Monitor Options option from the Main Menu. The Background Monitor Options screen displays.
TigerLogic Corporation
79
2. Press ENTER to move to the desired field. 3. Press TAB to display options. 4. Select and make changes to options you want to modify. 5. Do one of the following: Press ENTER to move to the next field. Press ESC at any field to exit the Background Monitor Options screen.
TigerLogic Corporation
80
To start the D3 File Sizer Utility: 1. Log on to the dm account. 2. Run the D3 File Sizer Utility. At the TCL prompt, type: file-sizer The Main Menu displays. Use the navigation commands listed on the bottom of the Main Menu to move within the screen. If the Arrow and ESC keys do not work on your terminal emulator, use these as an alternative: CTRL+B CTRL+N or ENTER CTRL+X Move up a field. Move down a field. Return to the Main Menu.
TigerLogic Corporation
81
Add, clear, delete, resize, and search list the characteristics of the files displaying. Change the Maximum Fill Ratio or the action that is taken when that ratio is met. Use the commands below the File Statistics Generated screen to edit the list of files.
Use the TAB key to view additional information on a specific file. The dm account is used in this example.
TigerLogic Corporation
82
Only the individual file displayed changes when the editable fields are modified. A global change can be made only when the Background Monitor Options are specified. The following table defines the fields in the File Statistics Generated screen. Parameter Account Filename Dataname Last Saved Bytes Suggested Modulo Current Modulo Cur. Fill Ratio Max. Fill Ratio Action Editable Field No No No No No No No No Yes Yes Explanation of Parameter Account where monitored file resides. Dict name of monitored file. Data name of monitored file. Date when file was last saved. Number of bytes in the file. Recommended modulo for the file, based on the Maximum Fill Ratio specified. Current modulo of the file. Current fill ratio of the file. Ratio of file that is considered undersized (List of Selected Files only). Action to take if file becomes undersized (List of Selected Files only).
TigerLogic Corporation
83
2. Select the Display All Files option from the File Information Menu. The File Statistics Generated screen displays.
TigerLogic Corporation
84
To display selected files: 1. Select the View File Information option from the Main Menu. 2. Select Display List of Selected Files option from the File Information Menu. The File Statistics Generated screen displays.
TigerLogic Corporation
85
NOTE
The Select Account screen displays after a file-save is performed. Anytime after the first file-save is performed, to modify the account, the File Statistics Generated screen for undersized files must be cleared. For details on clearing the list, see Clearing the List of Selected Files.
3. Select the account that contains the undersized files you want to view in the Select Account screen, then press ENTER. A list of files contained in the selected account displays.
TigerLogic Corporation
86
To display monitored files: 1. Select the View File Information option from the Main Menu, then press ENTER. 2. Select the Display Files Being Monitored option from the File Information Menu, then press ENTER.
TigerLogic Corporation
87
TigerLogic Corporation
88
TigerLogic Corporation
89
TigerLogic Corporation
90
TigerLogic Corporation
91
This message displays. Resize file file.name from A to B (y/n)? The file.name represents the name of the file to be resized, A represents the old file size, and B represents the new file size. 2. Do one of the following: Press Y to resize the file. Press N to return to the File Statistics Generated screen.
This message displays (if you pressed Y). Do you want to use a phantom process to resize this file (<y>/n)? 3. Do one of the following: Press Y to use a phantom process, then press ENTER to return to the File Statistics Generated screen and continue working while the file is resized.
TigerLogic Corporation
92
Using a phantom process enables you to continue working in the D3 File Sizer Utility while the file is being resized. This message displays. Phantom process spawned. Press <Enter>: Press N to resize the file without using a phantom process. If you decide not to use a phantom process, you must wait for your file to be resized before continuing to use the D3 File Sizer Utility. NOTE The system displays ** until the resize is complete. Files can only be optimized by File Sizer after a file-save because the File Sizer Utility uses the file-of-files which contains statistical information for each file on the system, and is only updated by performing a file-save or an account-save (s.
TigerLogic Corporation
93
To search a list for a specific character string: 1. Press S from the File Statistics Generated screen. 2. Enter a search string, then press ENTER. The D3 File Sizer locates the next occurrence of the string you specified.
TigerLogic Corporation
94
To display the Log File: 1. Select the Display Log File option from the Main Menu, then press ENTER. This message displays. Send Log to (T)erminal, (P)rinter, or (C)ancel 2. Enter one of the following: T P C To display the log file on screen. When finished viewing the log file, press ENTER to return to the Main Menu. To send the log file as a print job to the printer which is currently set through spassign. After the print job is sent, the utility returns to the Main Menu. To cancel and return to the Main Menu without displaying the log file.
NOTE
TigerLogic Corporation
95
Clear log file (y/<n>)? 2. Do one of the following: Enter Y to clear the log file, then press ENTER to return to the Main Menu. This message displays. Monitor log cleared. Press <Enter>: Enter N to return to the Main Menu without clearing the log file.
TigerLogic Corporation
96
Add a file to the List of Selected Files. Clear the list of all entries (available for List of Selected Files only). Delete the selected file from the list (available for List of Selected Files only). Resize the file. If the file needs to be resized, type the new size of the file. If the file does not need to be resized, a message indicating that the file is appropriately sized displays. Search the list for the first appearance of a specified character string that you specify.
TigerLogic Corporation
97
Copyright
Copyright (c) 1982, 2012. TigerLogic Corporation. All rights reserved. TigerLogic, D3 (D3), Pick, Omnis, mvDesigner, and mvEnterprise are trademarks of TigerLogic Corporation. This product may include or be accompanied by software developed by third parties, including those listed below. Software from third parties may be subject to additional or different license terms. For details, please see the TigerLogic End User License Agreement, the third party license agreements that accompany the product, and the products documentation. Customers of TigerLogic may find the following third party open source programs of use ("Open Source Programs"): These Open Source Programs are publicly available at no charge. As a convenience to you, TigerLogic may provide you with copies of these Open Source Programs in the same package as TigerLogic products. However, these Open Source Programs are not part of TigerLogics product and are not subject to the TigerLogic End User License Agreement. Rather, these Open Source Programs are free software; you can redistribute them and/or modify them under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License or (at your option) any later version. These Open Source Programs are distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You will find a copy of the GNU General Public License accompanying these Open Source Programs. If you do not, please contact TigerLogic. For those Open Source Programs that are provided, source code should also be included on the accompanying media. If not, please contact TigerLogic at any time within three (3) years after you acquire this TigerLogic product to request a free copy the source code for these Open Source Programs. D3 Version: 9.0 Linux Doc Version: April 2011
TigerLogic Corporation
98
TigerLogic Corporation
99
Index
( (E)IDE Disks ......................................... 57 / /etc/inittab file ...............................12, 15 4 4mm Tapes ......................................... 69 8 8mm Tapes ......................................... 69 A ABS Patches, Loading ............................. 21 Accessing the Background Monitor ............. 75 Adding...................................... 61, 65, 91 A File to the List of Selected Files ........... 91 Reserved Printers............................... 61 Shared Printers ................................. 65 Administering UNIX ODBC Servers .............. 16 Apply Updates .................................19, 46 Auto Create ........................................ 46 B Background Monitor........ 75, 76, 77, 78, 80, 81 Accessing ........................................ 75 Displaying the Status........................... 78 Modifying Options .............................. 81 Modifying the Wake-uo Date Time ........... 80 Starting .......................................... 76 Stopping.......................................... 77 Boot File ............................................ 12 C Changing the inittab file ......................... 15 Check Files ......................................... 81 Check Period ....................................... 46 Clear Log Queue ................................... 44 Clear Permanent Log ............................. 42 Clearing .........................................92, 97 List of Selected Files ........................... 92 Log File........................................... 97 Close Opened Files ................................ 42 Commands, D3 File Sizer Utility ................ 99 Comments .......................................... 46 Compatibility, Maintaining ...................... 12 Configuration File Tape Statements, D3 ...... 54 Configuring .....................................11, 22 Blocks of Telnet Ports on D3 .................. 11 Hot Backup ...................................... 22 Connected .......................................... 48 Connecting ........................................... 8 Next Available D3 Port .......................... Specific D3 PIB ................................... Conventions ......................................... Creating a Turnkey System ....................... D D3 .............................. 3, 11, 54, 56, 60, 73 Administration Guide Introduction ........... 3 Configuration File Tape Statements ......... 54 Configuring Blocks of Telnet Ports ........... 11 D3 File Sizer Utility............................. 73 Peripherals ...................................... 56 Printers ........................................... 60 D3 File Sizer Utility .. 73, 75, 76, 77, 78, 80, 81, 83, 84, 86, 87, 88, 89, 90, 91, 92, 93, 94, 96, 97, 99 Accessing the Background Monitor ........... 75 Adding a File to the List of Selected Files .. 91 Clearing the List of Selected Files ........... 92 Clearing the Log File ........................... 97 Commands ....................................... 99 Deleting Files from the List of Selected Files .................................................. 93 Displaying All Files ............................. 86 Displaying Monitored Files .................... 89 Displaying Selected Files ...................... 87 Displaying the Background Monitor Status .. 78 Displaying the Log File ......................... 97 Displaying Undersized Files ................... 88 Modifying Background Monitor Options ..... 81 Modifying Individual File Entries ............. 90 Modifying the Wake-uo Date Time ........... 80 Resizing an Individual File..................... 94 Searching the List for a Specific Character String .......................................... 96 Starting ........................................... 83 Starting the Background Monitor ............. 76 Stopping the Background Monitor ............ 77 Using the Log File .............................. 97 Viewing File Information ...................... 84 D3 Processes, Testing ............................. 36 Database Configuration, Hot Backup ........... 23 Day of Month ....................................... 81 Day of Week ........................................ 81 Default Action ..................................... 81 Default Max.Fill .................................... 81 Deleting Files from the List of Selected Files. 93 Disks ................................................. 57 (E)IDE ............................................. 57 Floppy ............................................ 57 SCSI ............................................... 57 8 8 4 6
TigerLogic Corporation
100
Display Queue..................................40, 44 Displaying.................... 78, 86, 87, 88, 89, 97 All Files .......................................... 86 Background Monitor Status.................... 78 Log File........................................... 97 Monitored Files ................................. 89 Selected Files ................................... 87 Undersized Files ................................ 88 Document Conventions ............................. 4 D-Pointer Controls, Hot Backup ................. 50 E Errors, Hot Backup ................................ 52 F File and Account Auto-Create ................... 19 File Information, Viewing ........................ 84 File-of-Files D-Pointer ............................ 21 Files .. 73, 86, 87, 88, 89, 90, 91, 92, 93, 94, 96 Adding a File to the List of Selected Files .. 91 Clearing the List of Selected Files ........... 92 Deleting from the List of Selected Files .... 93 Displaying All .................................... 86 Displaying Monitored ........................... 89 Displaying Selected ............................ 87 Displaying Undersized Files ................... 88 Modifying Individual Entries .................. 90 Resizing .......................................... 73 Resizing Individual ............................. 94 Searching for a Specific Character String .. 96 Floppy Disks ........................................ 57 H Hardware Requirements, Hot Backup .......... 21 hbmaster ........................................... 39 hbslave .............................................. 39 Helper ............................................... 19 Hot Backup ... 18, 19, 21, 22, 23, 25, 28, 31, 32, 33, 34, 35, 37, 38, 39, 40, 42, 44, 46, 48, 50, 52 Configuring ...................................... 22 Database Configuration........................ 23 Definitions ....................................... 19 D-Pointer Controls.............................. 50 Errors ............................................. 52 Introduction ..................................... 19 lost + found File ................................ 50 Main Menu ....................................... 40 Master Server Configuration .................. 25 Menu Navigation ................................ 38 Querying Servers................................ 48 Requirements ................................... 21 Resizing Files Online ........................... 50 Restrictions ...................................... 21 Server Selection Menu ......................... 39 Setup Server Utility ............................ 46
Slave Server Configuration .................... 28 Special Operations Menu ...................... 42 Starting ........................................... 32 Starting the Master Server .................... 33 Starting the Slave Server ...................... 34 Synchronizing the Servers ..................... 31 Testing the Servers ............................. 35 Transaction Log Menu .......................... 44 Using .............................................. 37 I Idle .................................................. 48 inittab File, Changing............................. 15 Introduction ......................................... 3 L Large File Creation ................................ 19 List Permanent Log ............................... 42 Loading ABS Patches .............................. 21 Log All Files ........................................ 44 Log DL Files Only .................................. 44 Log File ............................................. 97 Clearing .......................................... 97 Displaying ........................................ 97 Using .............................................. 97 Log Slave Updates ............................ 19, 46 lost + found File, Hot Backup ................... 50 M Main Menu, Hot Backup .......................... 40 Maintaining Compatibility........................ 12 Master ............................................... 19 Master Server Configuration ..................... 25 Hot Backup ...................................... 25 Master Server, Starting ........................... 33 Maximum Fill Ratio ................................ 81 Menu Navigation, Hot Backup ................... 38 Modifying ...................................... 80, 90 Individual File Entries .......................... 90 Wake-up Date Time ............................ 80 Monitor .............................................. 81 Multireel Saves..................................... 69 N Notify List .......................................... 46 O ODBC Servers, Administering .................... 16 Options, Background Monitor .................... 81 P Peripherals ......................................... 56 Printers .......................... 59, 60, 61, 63, 65 Adding Reserved ................................ 61 Adding Shared ................................... 65 D3 ................................................. 60 Removing Reserved............................. 61
TigerLogic Corporation
101
Removing Shared ............................... 65 Shared ............................................ 63 Protocol............................................. 46 Pseudo Tape Devices ............................. 69 Q Query Server ....................................... 40 Querying Servers, Hot Backup................... 48 R Readign Network .................................. 48 Reading Queue..................................... 48 Remote Host Name ............................... 46 Removing Reserved Printers ..................... 61 Removing Shared Printers ....................... 65 Reserved Printers ................................. 61 Adding ............................................ 61 Removing ........................................ 61 Resizing .........................................73, 94 Files .............................................. 73 Individual Files .................................. 94 Resizing Files Online, Hot Backup .............. 50 Restart Applying Updates ........................ 42 S save Command..................................... 21 SCSI Disks ........................................... 57 SCSI Tapes .......................................... 69 Searching the List for a Specific Character String ............................................. 96 Serial Turnkey ..................................... 12 Server ............................................... 19 Server Configuration, Hot Backup Master ..... 25 Server Configuration, Hot Backup Slave ....... 28 Server Name ....................................... 46 Server Selection Menu, Hot Backup ............ 39 Server Type ........................................ 46 Servers ..................................... 31, 35, 48 Querying Hot Backup .......................... 48 Synchronizing Hot Backup ..................... 31 Testing Hot Backup ............................ 35 Set Queue Limit ................................... 44 Setup Server ....................................... 42 Setup Server Utility, Hot Backup ............... 46 Shared Printers ........................... 63, 65, 68 Adding ............................................ 65 Removing ........................................ 65 Troubleshooting ................................ 68 Show Server ........................................ 40 Show Statistics..................................... 40 Slave ................................................ 19 Slave Server Configuration, Hot Backup ....... 28 Slave Server, Starting ............................ 34 Software Requirements, Hot Backup........... 21 Special Operations ................................ 40 Special Operations Menu, Hot Backup ......... 42
Start Enqueueing .................................. 44 Start Server ........................................ 40 Starting .......................... 32, 33, 34, 76, 83 Background Monitor ............................ 76 D3 File Sizer Utility............................. 83 Hot Backup ...................................... 32 Hot Backup Master Server ..................... 33 Hot Backup Slave Server....................... 34 Status .......................................... 40, 42 Stop Applying Updates............................ 42 Stop Enqueueing ................................... 44 Stop Server ......................................... 40 Stopped ............................................. 48 Stopping the Background Monitor .............. 77 T Tape Statements, Configuration File........... 54 Tapes ................................................ 69 4mm .............................................. 69 8mm .............................................. 69 Multireel Saves .................................. 69 Pseudo ............................................ 69 Scsi ................................................ 69 Target VME Name ................................. 46 TCP Port Number .................................. 46 Telnet Ports on D3, Configuring ................ 11 Telnet Turnkey Increased Functionality ........ 8 Temporary Hold Files ............................. 19 Testing ......................................... 35, 36 D3 Processes ..................................... 36 Hot Backup Servers ............................. 35 Topic Description ................................... 3 Transaction Log Menu ....................... 40, 44 Hot Backup ...................................... 44 Transaction Log Queue ........................... 19 Troubleshooting Shared Printers ................ 68 Turn Traces Off .................................... 42 Turn Traces On .................................... 42 Turnkey System .................................. 6, 7 Creating ........................................... 6 TxLog Timer ........................................ 46 U UNIX ODBC Servers. Administering ............. 16 Using ........................................... 37, 97 Hot Backup ...................................... 37 Log File ........................................... 97 V Viewing, File Information ........................ 84 W Wait Incoming Call ................................ 48 Wait Response to Call ............................ 48 Waiting for ACK .................................... 48 Wake-uo Date Time, Modifying ................. 80
TigerLogic Corporation
102
TigerLogic Corporation
103