Caché Data Integrity Guide
Contents
 
   
Server:docs1
Instance:LATEST
User:UnknownUser
 
-
Go to:
Search:    

 
Contents

Preface : 
 
 
Chapter 1: 
 
  • 1.1 Fundamental Data Integrity Protection
  • 1.2 Integrity Verification and Recovery Mechanisms
  • 1.3 Verifying Structural Integrity
  • 1.3.1 Integrity Check False Positives
  • 1.3.2 Integrity Check Output
  • 1.3.3 Checking Database Integrity Using the Management Portal
  • 1.3.4 Checking Database Integrity Using the ^Integrity Utility
  • Chapter 2: 
     
  • 2.1 Write Image Journaling
  • 2.1.1 Write Image Journal (WIJ)
  • 2.1.2 Two-Phase Write Protocol
  • 2.2 Recovery
  • 2.2.1 WIJ Restore
  • 2.2.2 WIJ Block Comparison
  • 2.3 Limitations of Write Image Journaling
  • Chapter 3: 
     
  • 3.1 Backup Integrity and Recoverability
  • 3.2 Importance of Journals
  • 3.3 Backup Strategies
  • 3.3.1 External Backup
  • 3.3.2 Caché Online Backup
  • 3.3.3 Cold Backup
  • 3.3.4 Legacy Concurrent External Backup
  • 3.4 Restoring from a Backup
  • 3.4.1 Backup Restore Scenarios
  • 3.4.2 Starting Caché for Maintenance
  • 3.4.3 Journal Restore Following Backup Restore
  • 3.4.4 Starting Caché Without Automatic WIJ and Journal Recovery
  • 3.5 Configuring Caché Online Backup Settings
  • 3.5.1 Define Database Backup List
  • 3.5.2 Configure Backup Tasks
  • 3.5.3 Schedule Backup Tasks
  • 3.6 Managing Caché Online Backups
  • 3.6.1 Run Backup Tasks
  • 3.6.2 View Backup Status
  • 3.6.3 Abort a Running Backup
  • 3.6.4 View Backup History
  • 3.7 Caché Online Backup Utilities
  • 3.7.1 Estimate Backup Size Using ^DBSIZE
  • 3.7.2 Perform Backup and Restore Tasks Using ^BACKUP
  • 3.7.3 Back Up Databases Using ^DBACK
  • 3.7.4 Edit/Display List of Directories for Backup Using ^BACKUP
  • 3.7.5 Abort a Running Backup Using ^BACKUP
  • 3.7.6 Display Information About a Backup Volume Using ^BACKUP
  • 3.7.7 Monitor Backup or Restore Progress Using ^BACKUP
  • 3.8 Caché Online Backup Restore Utility
  • 3.8.1 Restore All Databases Using ^DBREST
  • 3.8.2 Restore Selected or Renamed Databases Using ^DBREST
  • 3.8.3 Restoring Databases Using the Backup History
  • 3.8.4 External Entry Points of ^DBREST
  • 3.8.5 Mirrored Database Considerations
  • Chapter 4: 
     
  • 4.1 Journaling Overview
  • 4.1.1 Differences Between Journaling and Write Image Journaling
  • 4.1.2 Protecting Database Integrity
  • 4.1.3 Automatic Journaling of Transactions
  • 4.1.4 Rolling Back Incomplete Transactions
  • 4.1.5 Consequences of Not Journaling Databases
  • 4.1.6 The Journal Write Cycle
  • 4.1.7 Journal Files and Journal History Log
  • 4.1.8 Using Temporary Globals and CACHETEMP
  • 4.1.9 Journal Management Classes and Globals
  • 4.2 Configuring Journaling
  • 4.2.1 Enabling Journaling
  • 4.2.2 Journal File Naming
  • 4.2.3 Journaling Best Practices
  • 4.2.4 Configuring Journal Settings
  • 4.3 Journaling Operation Tasks
  • 4.3.1 Start Journaling
  • 4.3.2 Stop Journaling
  • 4.3.3 View Journal Files
  • 4.3.4 Switch Journal Files
  • 4.3.5 Switch Journal Directories
  • 4.3.6 Display Journal File Profiles
  • 4.3.7 Check Journal File Integrity
  • 4.3.8 View Journal File Summaries
  • 4.3.9 Purge Journal Files
  • 4.3.10 Purging Mirror Journal Files
  • 4.3.11 Restore Journal Files
  • 4.4 Journaling Utilities
  • 4.4.1 Perform Journaling Tasks Using ^JOURNAL
  • 4.4.2 Recover from Startup Errors Using ^STURECOV
  • 4.4.3 Convert Journal Files Using ^JCONVERT and ^%JREAD
  • 4.4.4 Set Journal Markers Using ^JRNMARK
  • 4.4.5 Manipulate Journal Files Using ^JRNUTIL
  • 4.4.6 Manage Journaling at the Process Level Using %NOJRN
  • 4.5 Journal I/O Errors
  • 4.5.1 Journal Freeze on Error Setting is No
  • 4.5.2 Journal Freeze on Error Setting is Yes
  • 4.5.3 Impact of Journal Freeze on Error Setting on Transaction Rollback with TROLLBACK
  • 4.6 Special Considerations for Journaling
  • 4.6.1 Performance
  • 4.6.2 UNIX® File System Recommendations
  • 4.6.3 System Clock Recommendations
  • 4.6.4 Disabling Journaling for Filing Operations
  • Chapter 5: 
     
  • 5.1 Shadowing Overview
  • 5.2 Configuring Shadowing
  • 5.2.1 Configuring the Source Database Server
  • 5.2.2 Configuring the Destination Shadow
  • 5.3 Managing and Monitoring Shadowing
  • 5.3.1 Shadow States and Actions
  • 5.3.2 Shadow Processing Considerations
  • 5.3.3 Shadow Checkpoints
  • 5.3.4 Shadow Administration Tasks
  • 5.3.5 Shadow Operations Tasks
  • 5.4 Using Shadowing for Disaster Recovery
  • 5.4.1 Planned Production Transfer to the Shadow Destination
  • 5.4.2 Disaster Recovery Using the Shadow Destination
  • Chapter 6: 
     
  • 6.1 Journaling on Clusters
  • 6.1.1 Cluster Journal Log
  • 6.1.2 Cluster Journal Sequence Numbers
  • 6.2 Cluster Failover
  • 6.2.1 Cluster Recovery
  • 6.2.2 Cluster Restore
  • 6.2.3 Failover Error Conditions
  • 6.3 Cluster Shadowing
  • 6.3.1 Configuring a Cluster Shadow
  • 6.3.2 Cluster Shadowing Limitations
  • 6.4 Tools and Utilities
  • 6.5 Cluster Journal Restore
  • 6.5.1 Perform a Cluster Journal Restore
  • 6.5.2 Generate a Common Journal File
  • 6.5.3 Perform a Cluster Journal Restore after a Backup Restore
  • 6.5.4 Perform a Cluster Journal Restore Based on Caché Backups
  • 6.6 Journal Dump Utility
  • 6.7 Startup Recovery Routine
  • 6.8 Setting Journal Markers on a Clustered System
  • 6.9 Cluster Journal Information Global
  • 6.10 Shadow Information Global and Utilities
  • Chapter 7: 
     
  • 7.1 DataCheck Overview
  • 7.1.1 DataCheck Queries
  • 7.1.2 DataCheck Jobs
  • 7.1.3 DataCheck Results
  • 7.1.4 DataCheck Workflow
  • 7.2 DataCheck for Mirror Configurations
  • 7.2.1 Planning DataCheck within the Mirror
  • 7.2.2 Selecting Globals to Check
  • 7.3 DataCheck Setup Procedure
  • 7.3.1 Enabling the DataCheck Service
  • 7.3.2 Specifying Globals and Subscript Ranges to Check
  • 7.4 ^DATACHECK Routine
  • 7.4.1 Create New Configuration
  • 7.4.2 Edit Configuration
  • 7.4.3 View Details
  • 7.4.4 Incoming Connections to this System as a DataCheck Source
  • 7.5 Special Considerations for Data Checking
  • 7.5.1 Performance Considerations
  • 7.5.2 Security Considerations