+ All Categories
Home > Documents > Version 7.2 SP2 Administrator’s Guide

Version 7.2 SP2 Administrator’s Guide

Date post: 23-Mar-2022
Category:
Upload: others
View: 7 times
Download: 0 times
Share this document with a friend
1073
Version 7.2 SP2 Administrator’s Guide
Transcript

Version 7.2 SP2 Administrator’s Guide

Contents

1

Table of Contents

Introduction ........................................................................................................................................................ 12

IBM Resiliency Orchestration 7.2 SP2 .............................................................................................................. 12 Purpose ............................................................................................................................................................. 12 Getting Started .................................................................................................................................................. 13

Using Online Help ......................................................................................................................................... 14 Navigation Bar ............................................................................................................................................... 15 Breadcrumbs .................................................................................................................................................. 15 Working Area ................................................................................................................................................. 16 Right Pane ...................................................................................................................................................... 16 Administration Overview ............................................................................................................................... 16 About IBM Resiliency Orchestration ............................................................................................................. 17 Log Out .......................................................................................................................................................... 17 Help ................................................................................................................................................................ 17 Quick Start ..................................................................................................................................................... 18 Changing Password ........................................................................................................................................ 19

Reset Password ................................................................................................................................................. 19 Architecture Overview ....................................................................................................................................... 21 Overview ........................................................................................................................................................... 21

Key Features .................................................................................................................................................. 22 Key Benefits ................................................................................................................................................... 26 How IBM Resiliency Orchestration Works? .................................................................................................. 28 Understanding Concepts ................................................................................................................................ 29

Status of a Group ............................................................................................................................................... 36 Execution Mode ............................................................................................................................................. 37 Execution Status ............................................................................................................................................. 38 Recovery Status .............................................................................................................................................. 39

Business Continuity Modes ............................................................................................................................... 42 Business Continuity States ................................................................................................................................. 44 RPO-RTO .......................................................................................................................................................... 47 About RPO, RTO ............................................................................................................................................... 47

Recovery Point Objective .............................................................................................................................. 47 Recovery Time Objective .............................................................................................................................. 47

Managing RPO and RTO .................................................................................................................................. 47 Compute Current App RPO ........................................................................................................................... 47 Compute current Data RPO............................................................................................................................ 48 Compute current RTO and display the desired RTO and estimated RTO values .......................................... 48

Pre- requisites ................................................................................................................................................... 53 Additional Support ............................................................................................................................................ 53 Starting and Stopping IBM Resiliency Orchestration Server Services .............................................................. 53

On Server Restart ........................................................................................................................................... 54 Starting and Stopping IBM Resiliency Orchestration Agents ........................................................................... 54 Starting IBM Resiliency Orchestration Agents ................................................................................................. 54

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 2

Starting Agents on the UNIX Server ..............................................................................................................55 Stopping IBM Resiliency Orchestration Agents on Window Server ..................................................................56

Stopping Agents on the UNIX Server ............................................................................................................57 Verifying IBM Resiliency Orchestration Agents ................................................................................................58

Verifying Agents on Windows Server ...........................................................................................................58 Verifying Agents on UNIX Server .................................................................................................................59 Verifying the processes of Agents on UNIX Server ......................................................................................60

Refreshing Details .............................................................................................................................................61

Configuration ......................................................................................................................................................64

Configuring IBM Resiliency Orchestration .......................................................................................................64 Tomcat Configuration .......................................................................................................................................64

Tomcats logs rotation .....................................................................................................................................67 Agent Configuration ..........................................................................................................................................68

Configuring Agents ........................................................................................................................................68 Site Controller ................................................................................................................................................68 Agentless ........................................................................................................................................................71 Agent Listing ..................................................................................................................................................84 Configuring WAN Agent ...............................................................................................................................87

User Management .............................................................................................................................................89 Setting up Users .............................................................................................................................................89 Adding Users ..................................................................................................................................................90 Modifying Users .............................................................................................................................................94 Deleting Users ................................................................................................................................................95 Setting System Options for Users ..................................................................................................................95 Editing User Preferences ................................................................................................................................98 Configuring LDAP .........................................................................................................................................98 Configuring AD ...........................................................................................................................................103 Division of the User Management System ...................................................................................................108 Known Limitations .......................................................................................................................................112 Listing Configured Users .............................................................................................................................113 Appendix ......................................................................................................................................................116

Notifications ....................................................................................................................................................119 Configuring Notifications.............................................................................................................................119 Email Notification ........................................................................................................................................120 SMS Notification..........................................................................................................................................121 SNMP Notification .......................................................................................................................................121 Notification List ...........................................................................................................................................121 Configuring SNMP Trap Forwarder ............................................................................................................124 Configuring Email Server ............................................................................................................................126 Configuring Email Templates ......................................................................................................................127

Business Process Integration...........................................................................................................................128 Listing Business Process Schedules .............................................................................................................129 Adding Business Process .............................................................................................................................130 Configuring Business Process ......................................................................................................................131 Custom Event ...............................................................................................................................................131 Scheduling ....................................................................................................................................................133 Managing Business Process .........................................................................................................................134

Contents

3

Deleting Business Process ............................................................................................................................ 135 Continuity Workflows .................................................................................................................................. 136

Workflow Manager .......................................................................................................................................... 138 Working with Actions .................................................................................................................................. 139 Creating new workflow ................................................................................................................................ 153 Deleting Workflow....................................................................................................................................... 154 Importing or Exporting a Workflow ............................................................................................................ 155 Scheduling Business Process Workflow / Drills .......................................................................................... 157 Automatic Retry on Failure .......................................................................................................................... 160 Single Stepping Actions in Workflows ........................................................................................................ 161 Synchronizing Workflow with RPO/RTO ................................................................................................... 162 Publish/ Save as a Draft ............................................................................................................................... 163 Previewing Workflow .................................................................................................................................. 164 Workflow Version History/ Rollback .......................................................................................................... 164 Workflow Key Value List ............................................................................................................................ 165 Workflow Configuration Limitations ........................................................................................................... 169 Configuring Approver List ........................................................................................................................... 169

Recovery Automation Library (RAL) ............................................................................................................... 170 AWS ............................................................................................................................................................. 171 Description ................................................................................................................................................... 208 Inputs ............................................................................................................................................................ 208 Outputs ......................................................................................................................................................... 209 Description ................................................................................................................................................... 210 Inputs ............................................................................................................................................................ 210 Outputs ......................................................................................................................................................... 210 Description ................................................................................................................................................... 212 Inputs ............................................................................................................................................................ 212 Outputs ......................................................................................................................................................... 212 Description ................................................................................................................................................... 214 Inputs ............................................................................................................................................................ 214 Outputs ......................................................................................................................................................... 215 Description ................................................................................................................................................... 216 Inputs ............................................................................................................................................................ 216 Outputs ......................................................................................................................................................... 217 Database Level ............................................................................................................................................. 217 File ............................................................................................................................................................... 289 Process ......................................................................................................................................................... 306 Repeatable .................................................................................................................................................... 313 Replication Level ......................................................................................................................................... 313 Replication ................................................................................................................................................... 516 IBM Internal (This is not for field use.) ....................................................................................................... 518 Workflow ..................................................................................................................................................... 536

Trigger Site Level Drill ................................................................................................................................... 566 Trigger Site Level FO ...................................................................................................................................... 567 Zerto ................................................................................................................................................................ 568

Zerto Logon.................................................................................................................................................. 568 Zerto Logoff ................................................................................................................................................. 568 Zerto Change Recovery Host ....................................................................................................................... 568

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 4

Zerto Delete VRA ........................................................................................................................................569 Zerto Failover ...............................................................................................................................................569 Zerto Failover Test .......................................................................................................................................569 Zerto Force Sync VPG .................................................................................................................................569 Zerto Launch New VRA ..............................................................................................................................570 Zerto Resume VPG ......................................................................................................................................571 Zerto Unprotect VPG ...................................................................................................................................571 Zerto Wait for Task Complete ......................................................................................................................572 Zerto Is VPG Exist .......................................................................................................................................572 Zerto Create VPG Settings ...........................................................................................................................572 Zerto Delete VPG .........................................................................................................................................573

Low Touch Oracle DG ....................................................................................................................................573 Supported Features .......................................................................................................................................573 Overview ......................................................................................................................................................574 Prerequisites .................................................................................................................................................574 Low Touch Wizard - Primary Server ...........................................................................................................575 Primary Database .........................................................................................................................................577 AWS Information .........................................................................................................................................579 Low Touch Execution workflow ..................................................................................................................582

Configuration ..................................................................................................................................................585 Configuring RPO/ RTO ...............................................................................................................................585 Configuring Notification Regarding Events .................................................................................................589 Configuring Event Policy .............................................................................................................................590 Adding Polar Event Script ............................................................................................................................592

Site Ticker ........................................................................................................................................................593 Show Expired Ticker ....................................................................................................................................594 Add Site Ticker ............................................................................................................................................594

Vault Framework .............................................................................................................................................595 Introduction ..................................................................................................................................................595 Configuring Vault ........................................................................................................................................597 Vault Agent ..................................................................................................................................................608 Vault Features ..............................................................................................................................................609 Subsystems IBM Supports ...........................................................................................................................612

Dashboards ........................................................................................................................................................613

DR Operational Dashboard ............................................................................................................................613 DR Manager Dashboard .................................................................................................................................616

Manage ..............................................................................................................................................................620

Filters ..............................................................................................................................................................620 Group Health ...................................................................................................................................................622 Sites .................................................................................................................................................................622 Application Group ...........................................................................................................................................624

Application Group ........................................................................................................................................624 AG Listing ....................................................................................................................................................628 AG Details ....................................................................................................................................................629 Relationship ..................................................................................................................................................629

Recovery Group ...............................................................................................................................................631

Contents

5

Recovery Group ........................................................................................................................................... 631 RG Listing .................................................................................................................................................... 632 RG Details .................................................................................................................................................... 633 Relationship in RG ....................................................................................................................................... 633

Continuity Workflows ...................................................................................................................................... 635 Executing Workflows ....................................................................................................................................... 636

Executing Workflow .................................................................................................................................... 636 Health Monitoring ........................................................................................................................................... 639

Viewing Group Relationship ........................................................................................................................ 639 RPO and RTO Monitoring .............................................................................................................................. 640 Monitoring Replication ................................................................................................................................... 641 Viewing Recovery Group Replication Details ................................................................................................. 642

Monitor .............................................................................................................................................................. 643

Filters .............................................................................................................................................................. 643 Group Health................................................................................................................................................... 645 Sites ................................................................................................................................................................. 645 Application Group ........................................................................................................................................... 647

Application Group ........................................................................................................................................ 647 AG Listing.................................................................................................................................................... 652 AG Details.................................................................................................................................................... 652 Relationship ................................................................................................................................................. 652

Recovery Group ............................................................................................................................................... 654 Recovery Group ........................................................................................................................................... 654 RG Listing .................................................................................................................................................... 655 RG Details .................................................................................................................................................... 656 Relationship in RG ....................................................................................................................................... 656

Continuity Workflows ...................................................................................................................................... 657 Executing Workflows ....................................................................................................................................... 659

Executing Workflow .................................................................................................................................... 659 Health Monitoring ........................................................................................................................................... 662

Viewing Group Relationship ........................................................................................................................ 662 RPO and RTO Monitoring .............................................................................................................................. 664 Continuity Monitoring Overview ..................................................................................................................... 665 Monitoring Replication ................................................................................................................................... 665 Viewing Recovery Group Replication Details ................................................................................................. 666

Events ................................................................................................................................................................ 667

Event Alarm ..................................................................................................................................................... 668 View Events ..................................................................................................................................................... 668 Viewing Group Events ..................................................................................................................................... 671 Filtering Events ............................................................................................................................................... 672 Complete Listing of Events .............................................................................................................................. 673 Viewing Sequence of Events ............................................................................................................................ 678 System Events .................................................................................................................................................. 679 Monitoring Events ........................................................................................................................................... 680 Monitoring Users and Passwords for raised Events ....................................................................................... 680

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 6

Recovery Automation .......................................................................................................................................682

Managing Groups ............................................................................................................................................682 Group Maintenance - Working with Different Modes of Group ..................................................................682 Business Continuity Operations ...................................................................................................................687 Start and Stop Replication ............................................................................................................................702 Managing Events ..........................................................................................................................................706

Drills ..................................................................................................................................................................713

Configuring Drills ...........................................................................................................................................714 Switchover....................................................................................................................................................715 Switchback ...................................................................................................................................................716 Custom Drills ...............................................................................................................................................717 IntegrityCheck Test Place holder .................................................................................................................719 Listing Drill Schedules .................................................................................................................................719

Executing Drills ...............................................................................................................................................720 Drills State ....................................................................................................................................................722 Drill Listing ..................................................................................................................................................725 Tracking Drills .............................................................................................................................................725 Changing Drills Mode ..................................................................................................................................726 Drills Interfering with BCO .........................................................................................................................726 Identifying Group under Unrestricted Test Mode ........................................................................................726 Effect of Drills on Group Status ...................................................................................................................727 Viewing Drills ..............................................................................................................................................727 Viewing Drills for a Group ..........................................................................................................................727 Viewing automation status ...........................................................................................................................728 Viewing Drills History Report .....................................................................................................................729 Viewing Workflow Calendar .......................................................................................................................730 Viewing Recent Execution Drills Status ......................................................................................................731 Drills Management .......................................................................................................................................731

Scheduled.........................................................................................................................................................732 Viewing Scheduled ......................................................................................................................................732 Scheduling Workflows .................................................................................................................................733

Executing .........................................................................................................................................................734 Executing......................................................................................................................................................734

Summary ..........................................................................................................................................................736 Viewing Summary........................................................................................................................................736 Select Workflow ...........................................................................................................................................737 Viewing workflow details ............................................................................................................................737 Editing Workflows .......................................................................................................................................739

Viewing Published workflow by logged in user ...............................................................................................740 Viewing Published workflow by logged in user ..........................................................................................740

Working with Workflow Manager ..................................................................................................................741

Working with Workflow Manager ...................................................................................................................741 Workflow Execution Page ...............................................................................................................................742 Resuming workflow after IBM Server failure ..................................................................................................743 Dealing with Failures of Workflow Execution ................................................................................................744

Contents

7

Stopping Workflows ......................................................................................................................................... 745 Approving/Rejecting a workflow before execution .......................................................................................... 746

Approving a workflow ................................................................................................................................. 746 Rejecting a workflow ................................................................................................................................... 746

DryRun ............................................................................................................................................................ 747 Mode ............................................................................................................................................................ 747 Process ......................................................................................................................................................... 747

Workflow Enhancements ................................................................................................................................. 748 Confirmation of Workflow Execution ......................................................................................................... 748 Dryrun Execution ......................................................................................................................................... 748 Nested Workflow (Navigation to Workflow within a Workflow) ............................................................... 748 View Workflows .......................................................................................................................................... 749 Workflows Visual Distinction ...................................................................................................................... 749 Stopping/Aborting Parent Workflows .......................................................................................................... 749 Propagation of Nested Workflow Status ...................................................................................................... 749 Parent Workflow Summary Counts ............................................................................................................. 749 Glimpse of Nested Workflows ..................................................................................................................... 750 Validating and Fortifying Nested Workflows .............................................................................................. 750

Validation .......................................................................................................................................................... 751

View Rules ....................................................................................................................................................... 751 Listing Validation Rules .............................................................................................................................. 751

Tasks ................................................................................................................................................................ 752 Listing Tasks ................................................................................................................................................ 752 Creating Tasks .............................................................................................................................................. 753 Modifying Tasks .......................................................................................................................................... 755 Deleting Tasks .............................................................................................................................................. 755 Executing Tasks ........................................................................................................................................... 756 Viewing Execution History .......................................................................................................................... 756

Reports .............................................................................................................................................................. 759

Reports Overview ............................................................................................................................................ 759 You can generate the following reports: ...................................................................................................... 759

Viewing Reports .............................................................................................................................................. 761 Printing Reports .............................................................................................................................................. 772

Internet Explorer: ......................................................................................................................................... 772 Firefox: ......................................................................................................................................................... 772

Exporting a Report .......................................................................................................................................... 773 Customizing Reports ....................................................................................................................................... 773 Group Summary Report................................................................................................................................... 774 Test Summary Report ...................................................................................................................................... 777

To generate Test Summary Report:.............................................................................................................. 777 Custom Report Framework ............................................................................................................................. 780

Data Capturing Module to Generate Custom Reports .................................................................................. 781 Advanced Reports Module ........................................................................................................................... 790

Audit Logging .................................................................................................................................................. 798 Viewing Audit Log Report ........................................................................................................................... 800 Scheduling Audit Log Report ...................................................................................................................... 801

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 8

Listing Scheduled Audit Log Reports ..........................................................................................................804 Modifying Audit Log Report Schedule ........................................................................................................804 Deleting Audit Log Report Schedule ...........................................................................................................806

Discovery ...........................................................................................................................................................808

Sites .................................................................................................................................................................808 Adding Organization ....................................................................................................................................808 Adding Sites .................................................................................................................................................809 Modifying Sites ............................................................................................................................................811 Deleting Site .................................................................................................................................................812 Site Listing ...................................................................................................................................................812

Subsystem ........................................................................................................................................................813 Auto Discovery ............................................................................................................................................814 Credentials....................................................................................................................................................814 Create New Credential Using SSH...............................................................................................................815 Agent Upgrade .............................................................................................................................................818

Prerequisites ....................................................................................................................................................818 Component & WAN .........................................................................................................................................822

Datasets ........................................................................................................................................................830 Protection Schemes ......................................................................................................................................854

Modifying Protection Schemes ........................................................................................................................892 Deleting Protection Schemes ...........................................................................................................................893 Agent Node Configuration ...............................................................................................................................893 Converged .......................................................................................................................................................894

UCS Directors ..............................................................................................................................................895 UCS Director vDC Map for DR ...................................................................................................................897

Management Service .......................................................................................................................................902 Adding Management Service .......................................................................................................................902 Modifying Management Service ..................................................................................................................906 Deleting Management Service .....................................................................................................................907 Management Service List .............................................................................................................................908

SRA ..................................................................................................................................................................909 SRA Discovery .............................................................................................................................................909 SRA Listing ..................................................................................................................................................910

ADC Profile .....................................................................................................................................................911 Adding ADC Profile .....................................................................................................................................912 Modifying ADC Profile ...............................................................................................................................915 Deleting ADC Profile ...................................................................................................................................915 Listing ADC Profile .....................................................................................................................................916

Group Creation ...............................................................................................................................................917 Groups ..........................................................................................................................................................917 Creating / Editing Groups.............................................................................................................................918 Creating Recovery Groups ..........................................................................................................................919 Viewing Recovery Group Details ................................................................................................................925 Editing Recovery Group ...............................................................................................................................926 Application Group Workflow Auto Generation ...........................................................................................929 Network Component ....................................................................................................................................930 Support for Cluster .......................................................................................................................................930

Contents

9

Creating an Application Group .................................................................................................................... 931 Viewing Application Group details .............................................................................................................. 934 Editing Application Group ........................................................................................................................... 934 Deleting a Group .......................................................................................................................................... 935

IBM Resiliency Orchestration Logs ................................................................................................................ 937

Working with Logger ....................................................................................................................................... 937 Logger Overview ............................................................................................................................................. 938 Setting Debug Level ........................................................................................................................................ 941 Retaining Log .................................................................................................................................................. 941 Operational History ........................................................................................................................................ 943

Purge Log Now ............................................................................................................................................ 943 Setting Log File Size ........................................................................................................................................ 945 Fetching Log Files .......................................................................................................................................... 946 System Capture ................................................................................................................................................ 947 Listing Log Files.............................................................................................................................................. 950 Filtering Log Files and Advanced Log Fetching ............................................................................................. 951 Fetching Log files using CLI tools .................................................................................................................. 953

Resiliency Orchestration Log Fetching / Extracting .................................................................................... 953 Resiliency Orchestration Log Admin ........................................................................................................... 957

Licensing ........................................................................................................................................................... 959

Licensing ......................................................................................................................................................... 959 Licensing Introduction .................................................................................................................................... 960 Procuring and Uploading License .................................................................................................................. 961

Viewing License information procured ........................................................................................................ 961 Uploading License ....................................................................................................................................... 962 Upgrading license ........................................................................................................................................ 963

View the Uploaded License ............................................................................................................................. 964 Enabling / Disabling for a Group ................................................................................................................... 965 License Usage ................................................................................................................................................. 965 Home Page Options ........................................................................................................................................ 971

High Availability of IBM Resiliency Orchestration Server .......................................................................... 973

High Availability (HA) of IBM Resiliency Orchestration Server ................................................................... 973 Continuity Operation Recovery ....................................................................................................................... 974 Continuity Recovery ........................................................................................................................................ 974 Event Management Recovery .......................................................................................................................... 976 Drills Recovery ................................................................................................................................................ 976 IBM Resiliency Orchestration Meta Data Recovery ....................................................................................... 976

1. Group Status Recovery ............................................................................................................................ 977 2. Continuity Mode Recovery ...................................................................................................................... 977 3. Event Policy Recovery ............................................................................................................................. 977

IBM Resiliency Orchestration Server Recovery .............................................................................................. 978 IBM Resiliency Orchestration Server Failover ............................................................................................ 978 IBM Resiliency Orchestration Server Failover configured for UCS Director ............................................. 980 Monitoring Server Recovery ........................................................................................................................ 981 Metadata Replication using Automated Script ............................................................................................. 985

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 10

Metadata Replication with Manual Steps .....................................................................................................989 Script Design ................................................................................................................................................995 Backup .......................................................................................................................................................1000 Server Memory Management .....................................................................................................................1003

Interoperability Matrix ..................................................................................................................................1004

IBM Resiliency Orchestration Monitoring ....................................................................................................1004 Normal Monitoring ....................................................................................................................................1004 Reverse Monitoring ....................................................................................................................................1008

IBM Resiliency Orchestration Recovery Automation ....................................................................................1011 Normal Management ..................................................................................................................................1011 Reverse Management .................................................................................................................................1015

IBM Resiliency Orchestration Test Exercises ...............................................................................................1019 Switchover/Switchback ..............................................................................................................................1019

3rd Party Integration .....................................................................................................................................1022

3rd Party Integration .....................................................................................................................................1022 Email Notification ......................................................................................................................................1022 SMS Notification........................................................................................................................................1022 SNMP Notification .....................................................................................................................................1022 Web Service ...............................................................................................................................................1022

Web Service ...................................................................................................................................................1023 Resiliency Orchestration–Web Service ......................................................................................................1023 Subscriber Addition....................................................................................................................................1023 Subscriber Deletion ....................................................................................................................................1023 Asset Creation ............................................................................................................................................1023 Asset Deletion ............................................................................................................................................1023 CR Request.................................................................................................................................................1023 Usage API ..................................................................................................................................................1023

Glossary ...........................................................................................................................................................1024

Glossary ........................................................................................................................................................1027 Glossary ........................................................................................................................................................1029

Pop-Ups ...........................................................................................................................................................1031

AWS agent .....................................................................................................................................................1033 Base workflow configuration .........................................................................................................................1035 Listing Organizations ....................................................................................................................................1036 Flexi Functional Group .................................................................................................................................1038 Discovering AWS Component .......................................................................................................................1042 Group Level configuration ............................................................................................................................1047 Re-Discovering MySQL Dataset ...................................................................................................................1055 Re-Discovering SRDF Protection Scheme ....................................................................................................1056 Re-Discovering DB2 Dataset ........................................................................................................................1056 Re-Discovering MSSQL Dataset ...................................................................................................................1057 Re-Discovering Sybase Dataset .....................................................................................................................1057 Re-discovering Oracle Dataset .....................................................................................................................1058 Re-discovering PostgreSQL Dataset .............................................................................................................1059

Contents

11

Discovering HP 3PAR Protection Scheme .................................................................................................... 1059 Re-Discovering Netapp Protection Scheme .................................................................................................. 1061 Setting System Options for Users .................................................................................................................. 1065 Base workflow configuration ......................................................................................................................... 1071 Group Level configuration ............................................................................................................................ 1071

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 12

Introduction

IBM Resiliency Orchestration 7.2 SP2

IBM Resiliency Orchestration 7.2 SP2 is an industry leading software product for

Business Continuity that addresses Disaster Recovery (DR) challenges. The IBM

Resiliency Orchestration automates DR workflows by inter-operating with several

industry leading Database, Replication, and Cluster Products and provides

comprehensive Disaster Recovery Solution Management.

Purpose

This manual is your guide for the operation and maintenance of the product. The

document gives a detailed description of:

▪ All menu commands, icons and links available in the product.

▪ The terminologies used.

▪ Procedures to create, modify and delete various entities.

▪ Procedure to maintain an interface with a variety of features in order to

accomplish a particular task.

Thus the manual helps you to use the product with ease and makes you familiar with

IBM Resiliency Orchestration.

Introduction

13

Getting Started

If you have not started the IBM Resiliency Orchestration services during the installation,

start them manually before invoking the GUI. Refer to Start or Stop IBM Resiliency

Orchestration Server Services.

Perform the following steps to start working with IBM Resiliency Orchestration.

1. Enter the following URL on the Internet Explorer browser:

http://<ip-address of the IBM Resiliency Orchestration Server>:8080/PanacesGUI

Note:

Enter the following URL on the Internet Explorer browser to work in secure mode:

https://<ip-address of the IBM Resiliency Orchestration Server>:8443/PanacesGUI

The following page appears:

2. Enter User name and Password in the respective fields.

Note: The super administrator configures the user names.

3. Click Submit to open the IBM Resiliency Orchestration console.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 14

Using Online Help

About Online Help

The console includes an HTML-based, cross-platform online help system. It provides

information about using IBM Resiliency Orchestration features and enables you to find

information about a specific task.

For best results, view the help in Internet Explorer version 5.0 or later and Mozilla.

Launching Online Help

You can launch the online help system by clicking Help > Help Contents.

The online help opens in your default Web browser. In the Web browser, the left pane

contains the Contents, Index, Search and Glossary tabs. Navigate to different topics

by clicking on them.

The Browser Environment

You can use the browser's navigation aids to navigate through the online help. You can

resize the browser window to the desired size.

Use the Back button of the browser to return to the previously viewed topic. Use the

Forward button to go to the topic that was displayed prior to going back.

Hiding/ Showing the Navigation Pane

If you want to hide the navigation pane in the online help system, which includes the

Contents, Index, Search, and Glossary tabs, click at the top left of the navigation

pane. If you have hidden the navigation pane and want to see it again, click the

Contents, Index, Search, or Glossary button.

Introduction

15

Navigation Bar

The Navigation Bar on the IBM Resiliency Orchestration window provides shortcut

options to navigate through the different features of the product.

The Navigation Bar provides the following tabs. Click any of these tabs to use the

relevant features of IBM Resiliency Orchestration.

• Monitor

• Manage

• Drills

• Reports

• Discover

• Admin

• Logout

NOTE:

At any point, if you want to go to Home page, click icon.

Breadcrumbs

The IBM Resiliency Orchestration windows display breadcrumbs, a type of secondary

navigation that enables users to identify their location in the application. Breadcrumbs

provide a trail of the pages visited by the users. Links to these pages help the user to

access the required page from the current location with a single click.

Breadcrumbs appear horizontally below the navigation and title bars.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 16

Working Area

This is the key functional area of the IBM Resiliency Orchestration window. This area

displays windows for different features depending on the tabs chosen on the navigation

bar. You can also view the current execution windows and perform different BCO

operations.

Right Pane

This pane displays the list of configured Groups along with a drop-down menu from

which you can select the criteria for displaying the Group information.

This information is displayed on the Right pane for any tab chosen on the navigation bar.

Additionally, you can perform certain configuration operations by clicking the link or by

selecting different options displayed in the pane. For example, on the Notifications

window, click Add Notification List in the right pane to set up a new notification list to

receive Event notifications.

Administration Overview

IBM Resiliency Orchestration Administration console allows you to perform various

administration activities like creating, modifying or deleting the users, configuring

notification lists, agents, and backup manager, managing logs and handling IBM Cloud

Continuity™ server failover.

Navigate to the IBM Resiliency Orchestration Administration console by clicking the

Admin link on the navigation bar.

It displays the following links.

Go to Users

Go to Notifications

GO to Agents

Go to Logs

Go to Backup

Go to Server Failover

Go to Directory Server Details (Applicable only for Advanced User Role Management)

Go to System Events

Go to License

Go to Operational History

Introduction

17

About IBM Resiliency Orchestration

You can view the product license information by clicking Help > About on the navigation

bar. This window displays the following information about IBM Resiliency Orchestration:

▪ Current Version details

▪ IBM Resiliency Orchestration Environments

▪ Server Details

▪ Acknowledgements

▪ Version History

Alternatively, you can view the version of IBM Resiliency Orchestration by entering the

following command at $EAMSROOT/bin location in the IBM Resiliency Orchestration

server

▪ ./panaces version

Log Out

Logs out the current user from IBM Resiliency Orchestration. You are then taken to the

IBM Resiliency Orchestration Login page to log on to the product again.

Help

Select Help to navigate through the following options in the secondary navigation bar.

▪ Contents & Index - Provides quick accessibility to the online information about

the product.

▪ About IBM Resiliency Orchestration - Displays the following information on

IBM Resiliency Orchestration:

▪ Product information

▪ Version details

▪ Copyright information

NOTE:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 18

You can also view the version of IBM Resiliency Orchestration by entering the following

command at $EAMSROOT/bin location in IBM Resiliency Orchestration server:

./panaces version

▪ Quick Start - Guides to short, simple introductory steps to IBM Resiliency

Orchestration application.

Quick Start

You can quickly create site, subsystem, group and user by clicking Help > Quick Start

on the navigation bar. The Quick Start page consists of Quick Start and Group

Overview tabs.

Click the Quick Start tab to perform the following tasks:

Button Click

Create Site To create a new site.

Sites are the geographical locations where Continuity Group subsystems physically exist. A valid group must have at least one Primary and one DR site locations defined.

For more information about Create Site, refer to

Adding Sites.

Create Subsystem To create a new subsystem.

Group subsystems consist of Components, Datasets and Protection Schemes. A continuity group must have at least one each of these subsystems on both Primary and DR sites.

For more information about Subsystems, refer to

Discovering Subsystem.

Create Group To create a new group.

IBM Resiliency Orchestration has 3 types of groups with a hierarchical model.

Introduction

19

Button Click

▪ An AG comprises of many RGs.

▪ 3 Site Group essentially comprises of 3 AGs [Primary, Secondary and Remote] and these AGs contain RGs.

For more information about Groups, refer to

Creating / Editing Groups.

Changing Password

The Resiliency Orchestration administrator creates the login credentials of the user, the

user needs to login to the Resiliency Orchestration system to change the password. If

the user has logged in for the first time, changing password is mandatory. The following

figure displays the Resiliency Orchestration Change Password screen, which prompts the

user to change the password.

Note

The Resiliency Orchestration administrator creates the first login credentials for a user.

Reset Password

The Super Administrator only can reset the password of a user. The Super Administrator

can initiate the change password option through the admin screen. Then the user

receives an email to the email id configured in the profile, as shown in the following

figure:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 20

The user needs to click the password reset link to reset the password. The Super

Administrator needs to use this procedure to unblock the user.

Introduction

21

Architecture Overview

Overview

IBM Resiliency Orchestration is the industry leading application, continuity management

software for open system applications and databases. It is a framework based continuity

management software that enables consistent operational interfaces, and reduces the

expertise required to configure and operate the application continuity and disaster

recovery solutions.

IBM Resiliency Orchestration encapsulates all the required intelligence – processes and

procedures required to interface with application, replication mechanism, servers,

storage, and networks to automate deployment and operation of the continuity solution.

IBM Resiliency Orchestration offers a single console view of enterprise IT continuity

health. It interfaces with the various layers of the continuity solutions and reports

deviation on Recovery Point Objective (RPO) and Recovery Time Objective (RTO) of the

application, in real time.

With its application aware framework, IBM Resiliency Orchestration significantly reduces

the operational costs associated with the management of continuity assets, increases

the productivity of the operations staff and provides continuity assurance for mission

critical applications.

IBM Resiliency Orchestration provides coherent and consistent binding of the state of

applications and status of data at the time of an outage, so that recovery is quick,

reliable and needs little or no expertise.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 22

Key Features

Key features of IBM Resiliency Orchestration include:

1. Disaster recovery management for multi-site DR environments with the following

capabilities:

• Continuity Monitoring

▪ Provides a dashboard view of the real time status of disaster recovery

environment including the health of the sites, applications, replication

mechanisms and readiness of the disaster recovery systems for recovery.

▪ Provides visual representation of the entire disaster recovery environment.

▪ Application aware Event Manager provides support for multiple severity

events.

▪ Supports multiple notification mechanisms, including EMS, emails and text

messages.

▪ Computes and tracks current recovery point for each application and reports

deviations against set RPO.

▪ Detects application environment and configuration changes and provides

alerts on impact.

▪ Provides real time reports on data lag between primary and DR systems.

▪ Provides events dashboard across all applications.

▪ Correlates various infrastructure failures and events and provides support for

root cause analysis.

▪ Monitors and provides real time information on WAN link utilization and

health.

▪ Estimates the recovery time for the various components of the solution –

server, application, data recovery, data consistency. Provides breakup of

recovery steps, and estimated recovery time for each of these steps.

▪ Performs real time monitoring of replication infrastructure and provides

replication details including replicated data sizes, failure and success events

and vendor specific replication object details.

▪ Provides database specific transaction information on primary and remote

systems.

▪ Provides uniform replication monitoring interface to all replicators.

▪ Continuity Management

▪ Provides best practice template based application provisioning into the

Continuity infrastructure.

Introduction

23

▪ Provides extensive customization capability of the templates using a visual

workflow editor.

▪ Provides automated failover and fallback management, integrating into

industry standard databases and applications.

▪ Provides automated switchover and switchback management.

▪ Provides interfaces to start and stop continuity and replication operations for

maintenance purpose.

▪ Provides RPO management to maintain the current data loss within the

continuity objectives. Replication can be prioritized for applications managed

by IBM Resiliency Orchestration.

▪ Provides unified replication management, integrating into third party

replication products.

▪ Provides template based policies and automated execution of policies for

Events.

▪ Provides control to perform operations at an individual application level as

well as group of applications.

▪ Test Exercise Management

▪ Provides intrusive and non-intrusive testing capability and test DR readiness

without impacting production services.

▪ Allows test suite customization to meet specific environments.

▪ Provides pre-packaged template based test exercises.

▪ Restores the replication state after performing testing.

▪ Displays real time status of the test execution.

▪ Facilitates testing on snapshot copy apart from the target copy on the DR

site.

▪ Displays “pre-test” checks to improve test success.

▪ Provides option to start, stop, abort, roll back and continue test.

▪ Provides per application test dashboard.

▪ Continuity Reports

▪ Graphical and tabular reports on various continuity management and

monitoring areas including RPO, RTO, Continuity operations, data replication

and WAN utilization.

▪ Provide daily, weekly, monthly, quarterly and yearly reports per the

configurable options.

▪ Provides comprehensive filters based on RPO, RTO (list of filters to provide).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 24

▪ Discovery

▪ Provides a complete inventory of DR infrastructure including servers,

replication software, database, network and applications.

▪ Provides auto discovery for replicators.

▪ Provides relationship and detailed configuration of discovered Subsystems and

binds them as groups.

▪ Provides pre-packaged templates to assist in modeling the DR infrastructure.

2. Support for Heterogeneous technologies:

▪ Support for Clusters

Clustering is the common term for distributing a service over a number of servers in

order to increase fault tolerance and to support loads larger than a single server is able

to handle. It is often used for large scale and mission critical applications where there

can be no downtime. A cluster contains servers which share state at some level.

IBM Resiliency Orchestration supports Hardware Clustering and Software Clustering:

▪ High availability cluster (also called Failover clusters, Hardware Clustering,

etc) are used to make sure no loss of service occurs when the primary server

fails. Usually, in this case, secondary hardware is present to take over.

▪ Software Clustering (also called Application Clusters) is a method of turning

multiple computer servers into a cluster (a group of servers that acts like a

single system). Clustering software is installed in each of the servers in the

group. Each of the servers maintains the same information and collectively

they perform administrative tasks such as load balancing, determining node

failures, and assigning Failover task.

Hence, IBM Resiliency Orchestration supports application clusters by monitoring the

application cluster nodes, and ensuring when the entire cluster is not available to enable

remote disaster recovery site take over.

▪ Support for Software and Hardware Data Protection Technologies

In real-time data protection, the data is protected on a real time basis wherein the data

from the host server is copied onto the remote location as soon as the data is changed,

over the network. IBM Resiliency Orchestration supports the following types of

protection technologies:

▪ Storage-based replication

Storage-based replication does not operate on the host computer. This kind of

replication occurs at the storage device level. The disk arrays manage the replication of

data between sites, relieving the hosts of the replication process.

▪ Switch-based replication

The replication is at the storage network level. The switch replicates the data from one

site to a switch that receives the data at another site.

▪ Host-based replication

Introduction

25

Host-based replication typically resides at the file system or logical volume level within

the operating system. Like storage-based offerings, it's usually transparent to the

application, but certainly not transparent to the host operating system or hardware.

Advantages of this method of replication include, ability to replicate to heterogeneous

storage and similar (not necessarily identical) systems and ability to reduce required

bandwidth.

▪ File based Replication Technologies

▪ Host based file replicator products

The modified data at the primary site is identified based on the file modification time

stamps and shipped over the network using the file replicator. This method combines

the best of the benefits of remote mirroring technologies and software protection

technologies.

▪ Database Replication Technology

Data replication is at the logical level by re-constructing the database transactions at the

remote server. This method has the advantage of minimizing the bandwidth required. It

also supports protection against rolling disasters and user errors.

▪ Support for Databases and Cluster Applications

▪ IBM Resiliency Orchestration monitors all the servers and applications assets

across the sites and ensures workflow co-ordination among them.

▪ IBM Resiliency Orchestration performs database setup on the near site with

an initial copy of the database from the production to deploy new applications

into DR.

▪ Support for Infrastructure

▪ IBM Resiliency Orchestration is configured into various devices like servers,

storage, network, and WAN to monitor the continuity health of the devices.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 26

Key Benefits

IBM Resiliency Orchestration enables organization to effectively manage the continuity

solutions and provide continuity assurance to the business with the following

advantages:

▪ Accurate state information on the health of continuity systems, help IT managers

resolve problems quickly.

▪ Automated monitoring significantly reduces the load on the operations staff and

increases their productivity.

▪ Automated continuity management assures application continuity and makes

recovery reliable and uniform across the enterprise.

▪ Deep application integration reduces the load on various IT administrator/

operations staff and increases their productivity.

▪ Provisioning of new applications into continuity assets is very fast and non-

intrusive to production.

▪ Disaster readiness verification becomes practical and achievable with test

automation.

▪ Cost avoidance in DR drills, as more tests can be performed within the same

period with less vendor support.

▪ Increased uptime for the production applications, as production systems are not

impacted during testing.

▪ CIOs get consolidated business view of all the systems covered under Continuity.

▪ Detailed historical reports enable department and business unit heads identify

deviations with internal processes and enable corrective measures.

▪ SLA management becomes easy with real-time information availability on various

elements of the continuity infrastructure.

▪ By automating several monitoring functions, IBM Resiliency Orchestration

increases the productivity of the skilled administrative staff.

▪ Assists in identifying problems through event correlation and helps fix the DR

systems timely.

▪ Automated template based solutions makes provisioning of new applications into

DR, quick and non-intrusive to IT operations.

▪ Automated continuity operations and RPO management assures continuity and

makes the recovery uniform across the enterprise.

▪ Pre-defined and automated execution of policies ensures uniform event response

across the enterprise, irrespective of the time of day and non-availability of

people and expertise.

Introduction

27

▪ Automated testing ensures zero errors.

▪ No production downtime - Test DR site readiness without impacting production

services.

▪ Comprehensive reports provide a high level test status, execution details and

differences with past testing result.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 28

How IBM Resiliency Orchestration Works?

IBM Resiliency Orchestration architecture is a distributed approach that ties together

business goals, DR workflow and solution infrastructure management to deliver an

enterprise class continuity manager product.

The Business Layer provides a way to specify business goals and monitor and manage

how well they are met. Specifically, the Business Layer:

▪ Translates application continuity goals to RPO metrics.

▪ Translates time of day based responses to coordinated action for each part of the

solution.

The Process Layer provides proven, industry tailored templates for automating DR

workflow involved in deploying and supporting IT continuity solution. Specifically, the

Process Layer:

▪ Standardize interactions and automates sequences of steps required for data

consistency and application continuity.

▪ Provides Policy engine to program and automate time of day based responses to

events.

▪ Automates tasks such as scheduled testing, report generation and configuration

change discovery.

The Operations Layer interfaces with the various components in the solution to

monitor and manage to meet the overall business continuity goals. Specifically, the

Operations Layer:

▪ Supports a distributed framework for component management.

▪ Supports an event bus and interfaces with other management packages.

IBM Resiliency Orchestration offers a single web based console and wizard based setup

and configuration. It inter-operates with leading vendor applications, replication

products and server, storage and network environment.

Introduction

29

Understanding Concepts

Discovery

Discovery Overview

Discovery provides information on Sites, Subsystems, and Groups associated with the

DR environment. Discovery allows you to configure Subsystems into the DR

infrastructure. This has to be performed immediately after creating sites.

The IBM Resiliency Orchestration supports the following Discovery types:

▪ Manual Discovery – You can manually discover Components, Datasets, and

Protection Schemes in a DR environment.

▪ Auto Discovery - IBM Resiliency Orchestration automatically discovers the

Components, Datasets, and Protection Schemes in a DR environment.

Note:

User with Super Administrator and Administrator privileges can discover Components,

Datasets, and Protection Schemes.

You can configure Sites, Subsystems and Groups by clicking the Discovery tab on the

navigation bar.

The Discovery tab provides the following links:

▪ Sites

▪ Subsystems

▪ Groups

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 30

Sites Overview

A Site defines a location. It can be a PR site or a DR site or a Remote site. A site is the

location of Components, Datasets, and Protection Schemes in a DR environment.

IBM Resiliency Orchestration supports Disaster recovery management for two and three

sites DR environments.

The diagrammatic representation of two sites DR environment is as shown below:

The Sites area on the Home page window provides quick information on number of

configured sites.

The different status of a site is as follows:

Status Description

Active The site is Active when all the Groups of the site are Active.

Inactive The status refers to the non-working condition of site. The site is Inactive when none of the Groups belonging to the

site are Active.

Degraded A site is Degraded if there are few Groups that are Active and few other Groups that are Inactive or Degraded in this site.

N/A (Not Applicable)

Site status becomes Not Applicable when no Groups are available for the site.

Note:

When the group is in Maintenance mode, the site status might not get updated as site

status is computed based on the Group status.

Introduction

31

Home Page

This page is the start-up page that helps the user to connect to the various modules of

IBM Resiliency Orchestration application. It displays the information such as, user name,

number of managed groups, etc., that is configured on the application.

The four icons (Monitor, Manage, Drill, Reports) will be enabled if the module is licensed.

NOTE: Reports icon is always enabled, since it is always licensed.

Clicking the icons will direct to the following pages:

• Monitor: It directs you to the sites page.

• Manage: It directs you to the groups page.

• Drills: It directs to the Drills page.

• Reports: It directs to the Reports page.

The pane on the right hand side of the page contains the following information:

▪ Name of the customer.

▪ Number of groups that are currently being managed.

▪ The site names that are discovered.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 32

▪ DR Manager Dashboard: It directs to the DR Manager Dashboard page.

▪ DR Operational Dashboard: It directs to the DR Operational Dashboard page.

The links on the top will direct to the following pages:

▪ Admin: It directs to the Agents page.

▪ Discover: It directs to the Groups page.

▪ Help: It pops-up the online help file of IBM Resiliency Orchestration.

▪ Logout: This logs out the user.

Introduction

33

Subsystems Overview

A Subsystem can be a Component, Dataset, and Protection Scheme. Subsystems

together form a Group.

Click DISCOVER > Subsystems on the navigation bar, the Subsystems page appears.

The user can view the list of components, datasets, and protection schemes that have

been discovered. You can also view the total number of each subsystem set up in the

right pane.

Groups Overview

A Group comprises of Component, Dataset, and Protection Scheme that are referred as

Subsystems. Dataset and Protection Scheme are dependent on Component. Each Group

is connected to a pair of site (Production and DR site) and has independent protection

mechanism. IBM Resiliency Orchestration users can be associated with multiple Groups,

which in turn are connected to multiple sites.

The following list provides a detailed explanation on the group entities:

▪ Dataset - Represents an application whose data is to be protected.

▪ Component – Represents the physical infrastructure on which the dataset is

dependent.

▪ Protection Scheme - Represents the mechanism by which you want to protect

(replicate/ backup) the data.

Following is the pictorial representation of a Group:

A Continuity Group is called Recovery Group (RG). In general, the RG is a basic unit of

data. It is created for each application whose data protection has to be monitored and

managed by IBM Resiliency Orchestration. It comprises of Datasets, Protection Schemes

and Components. These with their interdependencies represent the data to be protected

(Datasets), location of the data (Component) and the mechanism used to protect the

data (Protection Scheme). One or more RG's are linked together to form an Application

Group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 34

You can list Groups by performing the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing

page appears.

3. Click the desired Group in GROUP NAME column to view the Group details in Group

Details window.

You can also create a Recovery and Application Group by clicking the Discover

Recovery Group or Discover Application Group button on the right side of the page.

Note:

▪ Click of GROUP NAME column to sort by Group states.

▪ Click of STATUS column to sort by Group continuity states.

▪ You can navigate to Monitor, Manage, Reports or Tests page of a displayed Group

by clicking the respective icon at the top right corner

of the window.

To change Group configuration, perform the following steps:

1. Click Edit icon across the desired Group in Groups page. The Edit Recovery Group

page appears.

2. Make the desired changes in the Group Details page and Click Next.

3. Make the desired changes in the Define Relationships page and Click Next.

4. Make the desired changes in the Solution Details page and click Next.

5. Make the desired changes in the Group Configuration page and click Submit. You can

click Reset to reset the settings or Cancel to cancel the operation.

Note:

▪ Modification of a Group can be done only when the Group is in Unmanaged

or Maintenance state.

▪ Group configuration can be done only when the respective workflow is not in

execution mode.

▪ Addition and deletion of actions in a workflow can be done based on the

user privileges.

Recovery Group

Introduction

35

A Recovery Group (RG) is a basic unit of data with associated protection and

infrastructure mappings that needs to be protected and managed by IBM Resiliency

Orchestration.

One or more RG's are associated together to form an Application Group (AG).

Application Group

An Application Group (AG) contains a set of RGs. A RG cannot be part of more than one

AG at a time. AGs can be considered as container of RGs.

RGs belonging to different solution signatures can be added into an AG. Any operation

which can be executed on an RG (if it is independent) can be executed even if it is a part

of an AG.

Example: A banking application requires three Oracle databases and one file system

directory on the Application server. There are four RG's created, one for each database

and another for the file system data. All these four RG's form a single AG.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 36

Status of a Group

Status of a Group

A Group (RG or AG) can undergo state change during its life cycle. The status of the

Group is shown along with its name in the Groups window of the DISCOVERY page.

The status value of a Group provides information such as:

▪ If any critical, serious or warning events are raised in the group.

▪ If the Group is being in Managed or Maintenance mode.

The Group status information is divided into two parts:

Execution Mode

Group Status

Introduction

37

Execution Mode

The Execution Mode of a Group is given below:

Execution Mode Description

Managed When the Group is in Managed mode, then you can perform all operations on it.

▪ The group status computation is turned on. Note that no monitoring information is available immediately after the group is

moved to managed. Hence the status can be Grey until events are raised on the group

▪ As soon as events are received the group status will be computed to Green or Amber or Red

Maintenance or Unmanaged ▪ The group status should be Grey

▪ When the Group is in Maintenance mode, you can modify the Group or maintain IBM Resiliency Orchestration server.

▪ No status computation (monitoring) can be carried out.

The Resiliency Orchestration Admin will not be able to view WAN events, network down

events, generic events,resource registration events in current events page and these

events should not affect group status.

The Resiliency Orchestration Admin should be able to view WorkFlowFailure event in

current events page which should not affect group status and an email should be sent.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 38

Execution Status

Execution state of a Group reflects health of the production data availability and also,

the status of all the dependent infrastructure components, protection and database

objects. This state information is valid only when the Group is in MANAGED mode.

This state information is ignored in other execution modes.

Following Execution State values are possible in MANAGED mode:

Execution Status Description

The production and DR data is available for the Group and all the dependent objects

are running.

Group status is green when there are no critical, serious and

warning events open and only info events are present.

Production or DR data is unavailable currently.

This may be due to the PR or DR server down condition. This state may also mean that

one or multiple (including all) dependent objects are down

currently.

Group status is changed to Red if there are any alertable critical events raised.

Production or DR data maybe in the database down condition.

However, one or multiple dependent objects of the Group are down either at the PR site or the DR site.

Group Status is changed to Amber if any alertable warning and serious events are raised.

Group Status is changed to Grey when no monitoring information is available.

When no monitoring information available( there are no

alertable events avialble).

When Monitoring license is not enabled for the group Eg: group status not applicable for Test only license.

Introduction

39

Group Health Status of a Group is computed automatically, whenever a change in the

state of any of the dependent objects is detected. During BCO execution, the Group will

have following change status for the described conditions:

Group Health Status

change during BCO

Description

Green to Amber This transition occurs, if any action associated with the Group fails or is awaiting input from you.

If the Group is already in Amber or Red state, the status will

not change.

Amber to Green If you have provided the required input and resumed the BCO

execution. If there are no further failures, the Group execution status will be changed from Amber to Green.

Amber to Green If you have aborted the action requiring the input, it will be taken as an input and the execution status will be changed to Active. However, the continuity status of the Group will

change to DR Impaired, as you have aborted the action.

For the above conditions, the change in RGs execution status will be immediate.

However,similar changes for AGs will take up to one minute.

Note:

Await for events to compute status when the group is in the maintenance mode.

After Switchover or Swichback, it takes time to display the group status.

Recovery Status

Recovery status reflects the current state of the Group with respect to either crash

recovery or backup/ recovery from IBM Resiliency Orchestration software metadata

(Internal Database).

Valid Recovery State values are:

Recovery status Description

NEED RECOVERY A Group will be put into this Recovery State, when the IBM Resiliency Orchestration server is started with a recovery option. In this state, no continuity operations are allowed to be executed. Events will

not be reported.

RECOVERING A Group, whose state information is being recovered by the Recovery Wizard, is put into this state. During

this state also, no new operations may be executed

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 40

Recovery status Description

on Group. Events will not be reported.

Note:

That a RG may be in one of the above Recovery states, while it is in any of the execution

modes. The system automatically sets this state depending on the above conditions.

The Execution Mode of the Application Group could be UNMANAGED, MANAGED and

MAINTENANCE. When an AG is moved from one mode / state to another, the associated

Recovery Groups will also move to the corresponding mode. The group status of the

Application Group is RED, even if one of the associated Recovery Group is RED i.e. only

if all the Recovery Groups are Green, the Application Group is GREEN. If at least one

Recovery Group is AMBER, the Application Group is AMBER.

The following chart explains the life-cycle of a Group.

Introduction

41

Continuity Operations on a Group

Points to remember while working with Continuity Operations:

1. If any BCO fails on a FG associated to an AG, then the BCO is considered to be failed

at AG level.

2. For a BCO on an AG to be successful, the same should be successful on all the FG's

associated to the AG.

3. Failover of an entire AG occurs when Failover on RG is triggered either manually or

because of any events.

4. Before Failover of AG, all the operations that are currently being performed on all

dependent RG's are stopped.

5. For RG's that are independent, Failover occurs at the respective RG level only.

6. Failover can happen at AG level and not at RG level. All the RG's are required to be

active for an AG to be active. There is an ordered dependency of RG's under an AG.

So, if a Failover or Fallback at AG should happen it happens on all RG's under it in

the order that is defined.

7. Every Group (AG and RG) has to be managed in the DR environment.

Note:

In all the list pages, the row is highlighted incase the group is in failover mode.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 42

Business Continuity Modes

Business Continuity Modes (BCM) represents the current mode of Continuity Group

whose data is protected. Typical modes are Normal, Failover and Fallback.

BCM defines one or multiple continuity operations, such as, Normal Copy and Failover.

These operations enable a Group to transit from one BCM to another mode and one

Business Continuity State to another state. Each continuity operation is represented by a

workflow. Every Business Continuity Solution defines this operation and provides

suitable configuration interfaces.

Business Continuity State represents the relationship of the Production Dataset with

respect to the DR Dataset.

Supported Business Continuity States are:

▪ Normal

▪ Failover

▪ Fallback

Business Continuity Modes Operations

Normal The day-to-day process of data protection occurring

between PR and DR sites. There are two continuity operations in this mode.

NormalFullCopy (Initial) The process of copying the entire Dataset from PR site to DR site. This is a one time process.

This process can be paused and resumed by clicking the Pause/ Resume button respectively for the Application Recovery

on AWS solution

(VMware to AWS)

NormalCopy

(Recurring)

The data difference between the PR server and the DR server is transferred from PR site to DR site and applied on the DR server.

Introduction

43

Business Continuity Modes Operations

Failover The process of transferring control or business continuity from Production site to DR site when the

Production site is down or inactive.

Fallback

A full dump of data is taken on the current PR server and applied on the configured PR server. The

business control is transferred from the current PR server (DR server) to the configured PR server.

In this operation the PR server is brought in to production. At the end of this operation, the PR server's data is ready for replication and the DR

server is made standby.

FallbackResync This operation brings the production server and DR server in sync. The PR and DR servers are made

ready for NormalCopy operation.

Change Continuity State This continuity operation allow you to move the BCM of a Group from the current BCM to a new BCM.

This operation is possible only when the Group is not executing any continuity operations currently.

A Group may be moved into only four target BCM's:

1. NORMAL RESET

2. NORMAL INACTIVE

3. FAILOVER ACTIVE

4. FALLBACK ACTIVE

Note:

This operation may be used only by an advanced

administrator to by-pass certain operations or recover from certain failures. Usage of this operation may significantly impact the Continuity Management of the Group, if not performed correctly.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 44

Business Continuity States

Following table provides the definitions of each of the Business Continuity States along

with the corresponding message displayed on the GUI:

State Description Message Displayed on

the GUI

Normal Reset In this state, the DR dataset is not in a known replication

state. It has to be synchronized with the PR dataset for any DR activity to take place. This is the initial state of the Group.

DR impaired. DR operations not started.

Normal Transit A state change is occurring into Normal mode. Replication is not occurring in this state however, the PR and DR

datasets may be getting synchronized during this state. At the end, the Group goes to Normal Inactive state.

DR Enabled. Initial Synchronization in progress.

Normal Inactive In this state, the DR dataset and PR dataset are in a known replication state; but replication is not occurring between them.

DR Ready. Synchronization stopped.

Normal Active PR and DR datasets are in a known replication state and normal mode of data replication and restoration is occurring.

DR Ready. Synchronization in progress.

Normal Failed PR and DR datasets are in a known replication state however, normal mode of data

replication and restoration failed for some reason.

DR Ready. Synchronization stopped.

Normal Degraded PR and DR datasets are in replication state and normal mode of data replication and restoration is occurring. However, the system

DR Active. Failover recovery in progress.

Introduction

45

State Description Message Displayed on

the GUI

encountered intermittent errors in the normal mode of processing in the last ‘X’ minutes.

Failover Transit The PR is down and the system is transferred to DR site for production. Replication of log is suspended.

-

Failover Failed During the transit to Failover BCM, failures occurred. Functioning of PR is

down, replication is not occurring.

DR impaired.

Failover Active The control of business is switched to DR site. PR

dataset is down on PR site and replication does not occur in this site.

DR Active. Recovery complete.

Fallback Transit PR is transferred from DR site to the PR site. No replication

process is going on.

DR Ready. Fallback in progress.

Fallback Failed Transition to PR site failed. Resume Fallback again to recover. No process of replication is going on. PR is on DR site.

-

Fallback Active PR is switched to PR site. PR dataset may be up or down. But DR dataset and PR dataset are not ready for replication yet.

DR Ready. Fallback in progress.

Normal Shutdown If IBM Resiliency Orchestration software crashes or a forceful shutdown of the server is performed, Business

Continuity Operation at that time will be changed to Normal Shutdown state.

-

Normal Stopping This is a transient state operation. If Normal Copy is

-

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 46

State Description Message Displayed on

the GUI

stopped manually (i.e, by clicking the Stop Normal Copy button), then the Group is moved in to this state until the operation is completely

stopped.

Normal Test If a test exercise is initiated on a Group, the Group is moved

in to this state. Test exercise can be initiated only when the

Group is in Normal Inactive state.

-

Introduction

47

RPO-RTO

About RPO, RTO

Recovery Point Objective

It is an acceptable amount of data loss from the last good backup prior to the point of

failure.

For example, if you consider overnight backup, the Recovery Point Objective will often

be the end of the previous day's activity.

▪ Data RPO – This is for the replication mechanism in your set-up. Data RPO of 10

minutes means data till 10 minutes ago is replicated into DR from PR.

▪ App RPO – App RPO is based on the database transaction timestamps. App RPO of

10 minutes means the last transaction applied on DR and last transaction applied

on PR is differed by 10 minutes.

Recovery Time Objective

The time taken for the business to be back online after a disaster i.e. the time taken to

get back to Business Continuity.

Example: Let us assume that the data replication is happening between PR and DR

site. A retailer determines that, in case of a system failure at the PR site, it is acceptable

to lose business data of last two hours (RPO). But after two hours the retailer cannot

afford to lose business and somehow the data must be made available to restart the

business. This is done by bringing up the DR site as PR site until the PR site is up again.

The required time taken by the retailer to start the business application at the DR site

and to move the business forward is one hour, which is known as RTO.

Managing RPO and RTO

IBM Resiliency Orchestration provides constant monitoring of Recovery Point Objective

(RPO) and Recovery Time Objective (RTO) values and provides alerts to indicate any

deviations to these goals based on the configured tolerance limits. It also provides

enough control to tune some replication parameters using which, one can alter the RPO

value, subject to the constraints of the available WAN bandwidth.

IBM Resiliency Orchestration provides the following key capabilities for RPO and RTO

management, for each database under protection:

Compute Current App RPO

Displays the desired and current RPO values and the supporting solution specific

information, such as, last log/file transaction id or name and the time when the File

System was most recently updated or modified on the PR server.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 48

Compute current Data RPO

Displays the desired and current Data RPO values and the supporting replication specific

information, such as, last file modified timestamp for PR & DR.

Note: Data RPO is supported only for following replication mechanisms

▪ PFR

▪ EMC SRDF

▪ IBM Global Mirror

▪ NetApp Snap Mirror

The Resiliency Orchestration framework is also designed to support Data RPO for

replication mechanism that falls under the category Other Replicators. Refer Other

Replicator Features and Other Replicator Oracle Archive Logs for more information.

Compute current RTO and display the desired RTO and estimated RTO values

Monitors current RPO and RTO values and raise alerts, if deviations are noticed beyond a

configurable tolerance limit.

The reliability and latency of the WAN or network link plays an important role on RPO

value.

Terms Definition

Recovery Point Objective Acceptable amount of data loss from the last good backup prior to the point of failure.

Recovery Time Objective Time taken to bring a system back online following a failure.

The RPO/ RTO Manager provides support to configure RPO/ RTO values.

Note:

‘RPO Compute Interval’ determines the minimum time interval for the RPO graph.

RPO and RTO computations are completely dependent on the underlying Business

Continuity Solution (BCS) and are handled by the individual BCS. If RPO or RTO are

found to be outside their threshold values, an event is raised with appropriate severity

by BCS.

RPO/ RTO configured values and the current values are displayed in Monitor or

Manage page, under the Recovery Groups window. If RPO and RTO are set at AG level,

then the same is applicable to all the RG's associated to it. It is not necessary for every

RG of this AG to be consistent at any point in time.

Introduction

49

This window lists RPO/ RTO details as given in the following table:

Field Description

Current App RPO Value Displays recently computed App RPO value for the RG.

Current App RPO Time Displays recently computed App RPO time stamp.

For example: The current App RPO time stamp is 12p.m, Monday, 4th June 2004.

Current time is 12.30 P.M., Monday, 4th June 2004.

Therefore, App RPO time-stamp indicates

30 min time lag on the date.

Configured App RPO Value These are user specified values for accomplishing recovery within stipulated time.

Time when RPO computed It is the time when the App RPO was computed.

App RPO deviation Displays the percentage deviation between the current App RPO and the configured App RPO. When the current value exceeds the configured value, it flashes in red color.

Additional RPO details Displays the dataset and the RG specific details.

The following table explains the terms associated to RTO:

Field Description

Current RTO Value Displays the recently computed RTO value for the RG.

Current RTO Time Displays the recently computed RTO time stamp.

Configured RTO value

These are user specified values for accomplishing recovery within stipulated time.

Time when RTO computed

Displays the time when RTO was computed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 50

Field Description

RTO deviation

Displays the percentage deviation from the configured RTO. When the current value exceeds the configured value, it flashes

in red color.

Note:

Current RTO is always greater than the computed RTO.

RTO Breakup It specifies time duration to execute various recovery procedures that constitutes the overall recovery. i.e. Failover.

Recovery step name This tells about individual recovery procedure for the RGs.

Expected Completion time

This gives the amount of time remaining to complete the specified

step if recovery is in progress.

Introduction

51

The following are the additional details that are shown in ‘Additional App RPO Details’

section.

Field Description

Transaction ID

The transaction id in the database on both the PR and DR servers.

Transaction Time The time at which the last transaction happened on both the PR and DR server.

The additional details are displayed only during NormalCopy, when the replication is

happening.

Immediately after starting NormalCopy Operation, the DR database transaction time

stamp is always shown ahead of the PR, because the last action of NormalFullCopy is a

transaction on the DR. But once the first log is applied, timestamp is always shown of

the transaction on the Production.

Note:

The timestamps of both the PR and DR servers must be synchronized. Using a common

time server or synchronously changing the clock time on both Production and DR could

achieve synchronous timestamp. If timestamps of Production and DR are not same, the

RPO calculation may show zero or a negative value.

Recovery Point (RPO) of an AG is dependent on the following:

The highest RPO of RGs if they have been selected to have an impact on AG during the

AG group creation.

Recovery Time (RTO) of an AG is dependent on the following:

▪ Sum of RTO of all RG's (if serially failed over).

▪ Factor in parallel execution of Failover of Recovery Group.

The window below lists the details of RPO and RTO at Application Group level. This

displays the terms associated to RPO/RTO and displays the configured and current

values of the RPO/ RTO. The RPO/RTO values are shown during NormalFullCopy and

NormalCopy operations only.

During Failover Active mode, the RPO/ RTO page of Application Group is exactly similar

to the RPO/RTO page of the Recovery Group. Failover at AG level implies Failover on all

RG's associated to the AG. The Failover time of the AG is calculated as sum of recovery

time of all RG's associated to the AG.

The information of RPO/RTO window during Failover-Active mode is given below:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 52

Field Description

Current Continuity Mode Displays the mode of the continuity operation. The different modes could be NormalFullCopy, NormalCopy, Failover, Fallback and FallbackResync.

Current Continuity State Displays the current continuity state. The different continuity states are Active, Inactive and

Degraded.

Time of Failover Displays the time stamp when the Failover has complete.

The Data was recovered to Displays the time stamp when the data was recovered to the DR site.

Refer DR Solutions Supported by IBM Resiliency Orchestration for information on

solution specific RPO and RTO.

Introduction

53

Pre- requisites

▪ The network connection bandwidth must be sufficient to support replication from

primary to DR.

▪ Administrator/ root equivalent privileges are required for IBM agents.

▪ IBM requires remote console access to the servers.

▪ Disk space should be allocated on the database servers to hold transaction logs

for up to 3 business days and for full backup (equal to the size of the database

itself).

▪ There must be two sites (logical). First one termed the Production site, which

under normal operating conditions has the PR database/ application. The second

site is termed the DR site, which under normal conditions has the database/

application operating as a standby.

▪ The two sites are connected over an IP network connection. The network

connection bandwidth must be sufficient to support replication of log files from

the Production to the standby.

▪ IBM Resiliency Orchestration master server ideally resides on the DR site. There

is a IBM Resiliency Orchestration server on the Production site that is configured

as the standby IBM Resiliency Orchestration server.

▪ IBM Resiliency Orchestration master server has network access to the Production

and standby servers and all other components of the DR Solution.

Additional Support

In addition to providing documentation, IBM Technologies offers the following

services:

For assistance with IBM Resiliency Orchestration, contact technical support at

[email protected].

For customer support, contact our IBM help desk at

Phone: +91 80 40256811, +91 80 40256831

Toll Free: 1800 1027305

Starting and Stopping IBM Resiliency

Orchestration Server Services

To start and stop IBM Resiliency Orchestration server services manually, perform the

following steps:

1. Login to IBM Resiliency Orchestration server machine as root.

2. At the command prompt, enter one of the following commands to:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 54

▪ To start: $EAMSROOT/bin/panaces start

▪ To stop: $EAMSROOT/bin/panaces stop

NOTE:

When continuity operations are being executed, you should not stop IBM Resiliency

Orchestration server service.

If you are executing any BCO, perform the following steps to stop the executing BCO

before stopping the service:

1. Click Manage> Executing Workflows. The Executing workflows page is displayed.

2. Select Recovery Group filter from the drop-down list.

3. Click the Executing link in the Status column for the specific group name. The

workflow page appears.

4. Click Abort.

5. Log off from IBM Resiliency Orchestration GUI

On Server Restart

After restarting IBM Resiliency Orchestration server, continuing NormalCopy

automatically starts. If it does not start, you may need to increase the startup delay

settings for Agents.

To resume NormalCopy, open the panaces.properties file on IBM Resiliency

Orchestration server and set the below parameter to an appropriate value.

panaces.server.startupDelayForAgents

Starting and Stopping IBM Resiliency

Orchestration Agents

The scripts deployed at the time of agent installation, starts the agents when the server

is rebooted. However, the agents can be started manually without rebooting the server.

Similarly, they can be stopped using manual procedures. Moreover, the agent status can

be verified.

Starting IBM Resiliency Orchestration Agents

Starting of Agents on Windows Server

Note

Ensure that the clock setting on IBM Resiliency Orchestration server and the agent

server is in sync.

Introduction

55

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To view the agents installed on the server, perform the following steps:

1. Go to Control Panel and click Administrative Tools.

2. Click Services icon on the Administrative Tools window. You can see the agents

installed on the server.

3. Right click the respective service on the Services window and select Start from the

context menu to start the service.

Starting Agents on the UNIX Server

To start the Agents, enter the following in the command prompt as mentioned in the

table below:

Agent

Commands

OS Agent For Solaris:

# cd $EAMSROOT

# nohup ./SolarisOSAgent.sh start &

For Linux:

# cd $EAMSROOT

# nohup ./LinuxOSAgent.sh start &

For AIX:

# cd $EAMSROOT

# nohup ./AIXOSAgent.sh start &

For HPUX:

# cd $EAMSROOT

# nohup ./HPUXOSAgent.sh start &

SFR Service # cd $EAMSROOT

# nohup ./PFR.sh start &

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 56

Agent

Commands

PFR Agent

# cd $EAMSROOT

# nohup ./PFRAgent.sh start &

Sybase Agent

# cd $EAMSROOT

# nohup ./SybaseAgent.sh start &

SRS Agent # cd $EAMSROOT

# nohup ./SRSAgent.sh start &

Data Guard Agent # cd $EAMSROOT

# nohup ./DataGuardAgent.sh start &

SRDF Agent # cd $EAMSROOT

# nohup ./SRDFAgent.sh start &

Oracle Agent # cd $EAMSROOT

# nohup ./OracleAgent.sh start &

HP XP Agent # cd $EAMSROOT

# nohup ./HPXPAgent.sh start &

TrueCopy Agent # cd $EAMSROOT

# nohup ./TrueCopyAgent.sh start &

PostgreSQL Agent # cd $EAMSROOT

# nohup ./PostgresAgent.sh start &

Stopping IBM Resiliency Orchestration Agents on

Window Server

Note:

Introduction

57

Ensure that the clock setting on IBM Resiliency Orchestration server and the agent

server is in sync.

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To view the Agents installed on the Windows server, perform the following steps:

1. Go to Control Panel > Administrative Tools.

2. Click Services icon on the Administrative Tools window. You can see the agents

installed on the server.

3. Right click the respective service on the Services window and select Stop from the

context menu to stop the service.

Stopping Agents on the UNIX Server

To stop the Agents, enter the following in the command prompt as mentioned in the

table below:

Agent

Commands

OS Agent For Solaris:

# cd $EAMSROOT

# nohup ./SolarisOSAgent.sh stop &

For Linux:

# cd $EAMSROOT

# nohup ./LinuxOSAgent.sh stop &

For AIX:

# nohup ./AIXOSAgent.sh stop &

For HPUX:

# nohup ./HPUXOSAgent.sh stop &

SFR Service # cd $EAMSROOT

# nohup ./PFR.sh stop &

PFR Agent # cd $EAMSROOT

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 58

Agent

Commands

# nohup ./PFRAgent.sh stop &

Sybase Agent

# cd $EAMSROOT

# nohup ./SybaseAgent.sh stop &

SRS Agent # cd $EAMSROOT

# nohup ./SRSAgent.sh stop &

Data Guard Agent # cd $EAMSROOT

# nohup ./DataGuardAgent.sh stop &

SRDF Agent # cd $EAMSROOT

# nohup ./SRDFAgent.sh stop &

Oracle Agent # cd $EAMSROOT

# nohup ./OracleAgent.sh stop &

HP XP Agent # cd $EAMSROOT

# nohup ./HPXPAgent.sh stop &

TrueCopy Agent # cd $EAMSROOT

# nohup ./TrueCopyAgent.sh stop &

PostgreSQL Agent # cd $EAMSROOT

# nohup ./PostgresAgent.sh stop &

Verifying IBM Resiliency Orchestration Agents

Verifying Agents on Windows Server

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To view the agents installed on the server, perform following steps:

Introduction

59

1. Go to Control Panel > Administrative Tools.

2. Click Services icon on the Administrative Tools window. You can see the agents

installed on the server.

3. Check whether the agents are installed and started or not.

Verifying Agents on UNIX Server

To verify the Agents, enter the following in the command prompt as mentioned in the

table below:

Agent

Commands

OS Agent For Solaris:

# cd $EAMSROOT

# nohup ./SolarisOSAgent.sh status &

For Linux:

# cd $EAMSROOT

# nohup ./LinuxOSAgent.sh status &

For AIX:

# nohup ./AIXOSAgent.sh status &

For HPUX:

# nohup ./HPUXOSAgent.sh status &

SFR Service # cd $EAMSROOT

# nohup ./PFR.sh status &

PFR Agent

# cd $EAMSROOT

# nohup ./PFRAgent.sh status &

Sybase Agent

# cd $EAMSROOT

# nohup ./SybaseAgent.sh status &

SRS Agent # cd $EAMSROOT

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 60

Agent

Commands

# nohup ./SRSAgent.sh status &

Data Guard Agent # cd $EAMSROOT

# nohup ./DataGuardAgent.sh status &

SRDF Agent # cd $EAMSROOT

# nohup ./SRDFAgent.sh status &

Oracle Agent # cd $EAMSROOT

# nohup ./OracleAgent.sh status &

HP XP Agent # cd $EAMSROOT

# nohup ./HPXPAgent.sh status &

TrueCopy Agent # cd $EAMSROOT

# nohup ./TrueCopyAgent.sh status &

PostgreSQL Agent # cd $EAMSROOT

# nohup ./PostgresAgent.sh status &

Verifying the processes of Agents on UNIX Server

Enter the following command to check whether the processes of agents have been

running or not.

▪ # ps –ef | grep –i LAX

This command will list names of the agents that have been running.

Introduction

61

Refreshing Details

You can configure the Refresh rate of Recent Workflow Execution Status page. For

other pages, it is already configured.

The following table shows the refresh rates of each page and subsections.

Page/ tab Title Refresh Rate (in Seconds)

Main Dashboard Tables

Sites 30

Groups Continuity Summary

10

In Progress 10

Groups 20

Events Summary 10

Test Summary 20

Replication Summary 10

Users 20

Monitor

Continuity 20

Replication 20

Events 20

Recovery Group Dashboard

Group Snapshot tab 30

RPO/RTO tab 30

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 62

Page/ tab Title Refresh Rate (in Seconds)

Replication tab 30

Application Group Dashboard

Group Snapshot tab 8

Manage

Workflow List 10

Groups List 20

Manage Groups

Group Information tab 10

Normal Copy Advance Details section

4

Manage DR Solution tab 30

Manage Replication section 300

Recovery Workflows tab 300

Crash Recovery section 30

Drills

Drills 20

Group Workflow Listing 10

Test Exercise Dashboard 10

Reports

Reports Group List page 20

Discovery Sites

Introduction

63

Page/ tab Title Refresh Rate (in Seconds)

Sites List 10

Discovery Subsystems

Components tab 10

Datasets tab 10

Protection Scheme tab 10

Subsystems right pane section

10

Discovery Groups

Groups List 20

Admin

Agents 10

Workflow Recent Execution Status

Recent Execution Status section

50 (Configurable)

Workflow Graph & Inputs 50 (Configurable)

Workflow Actions 50 (Configurable)

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 64

Configuration

Configuring IBM Resiliency Orchestration

On completing the installation, configure IBM Resiliency Orchestration in the following order:

Tomcat Configuration

Configuring Agents

Sites

User Management

Discover Subsystem

Notifications

Business Process Integration

Workflow Manager

Group Creation

Recovery Automation Library (RAL)

Agent Node Configuration

Vault Integration

Converged

ADC Profile

Tomcat Configuration

Steps to enable HTTPS in tomcat:

1. Go to the machine tomcat installation directory

Configuration

65

2. Default IBM ”keystoreFile/Password(Certificate)” is shipped with product.To use

Customer certificate, get keystore file and password from customer and modify

keystoreFile value with keystore file path and keystorePass value with password (check

yellow marks for place holders)

3. Open $TOMCAT_HOME/conf/server.xml

4. Search for below snippet of code if not available add the below

Connector port=“8443” protocol=“HTTP/1.1” maxHttpHeaderSize=“8192”

maxThreads=“150” minSpareThreads=“25” maxSpareThreads=“75”

enableLookups=“false” disableUploadTimeout=“true”

acceptCount=“100” scheme=“https” secure=“true”

clientAuth=“false” sslProtocol=“TLS”

keystoreFile="/$EAMSROOT/installconfig/keystore/sanovi.keystore”

keystorePass="^vMkT%678#4-06Gjue672Kwo95dzg” SSLEnabled=“true”/>

All panaces should be pointed to the Resiliency Orchestration installation directory.

If connecter is commented uncomment and restart tomcat server.

5. Restart the Tomcat.

Note

If the machine doesnot start, restart the panaces.

Steps to disable HTTP in tomcat

1. Open $TOMCAT_HOME/webapps/{webapp_to_diable_HTTP}/WEB-INF/web.xml Ex:

$EAMSROOT/tomcat/webapps/PanacesGUI/WEB-INF/web.xml

2. Make sure redirectPort is set to HTTPS port.For example see the below snippets on

server.xml

<Connector port="8080" maxHttpHeaderSize="8192"

maxThreads="150" minSpareThreads="25" maxSpareThreads="75"

enableLookups="false" redirectPort="8443" acceptCount="100"

connectionTimeout="20000" disableUploadTimeout="true" URIEncoding="utf-8"

/>

<Connector port="8443" maxHttpHeaderSize="8192"

maxThreads="150" minSpareThreads="25" maxSpareThreads="75"

enableLookups="false" disableUploadTimeout="true"

acceptCount="100" scheme="https" secure="true"

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 66

clientAuth="false" sslProtocol="TLS"

keystoreFile="/opt/panaces/installconfig/keystore/IBM.keystore"

keystorePass="IBM"/>

3. Add below snippet of code after all Mappings

<security-constraint>

<web-resource-collection>

<web-resource-name>Entire Application</web-resource-name>

<url-pattern>/*</url-pattern>

</web-resource-collection>

<user-data-constraint>

<transport-guarantee>CONFIDENTIAL</transport-guarantee>

</user-data-constraint>

</security-constraint>

This code will automatically redirect all HTTP requests to HTTPS. This setting is per web

application.

Steps to change the port numbers 8080 or 8443 to different ones

1. Open $TOMCAT_HOME/conf/server.xml

2. Search for Connector and change port number. Port number should be in range of 1025

to 65535. For example see below snippet

<Connector port="8081" maxHttpHeaderSize="8192"

maxThreads="150" minSpareThreads="25" maxSpareThreads="75"

enableLookups="false" redirectPort="8443" acceptCount="100"

connectionTimeout="20000" disableUploadTimeout="true"

URIEncoding="utf-8" />

3. Before changing the port check/confirm is Firewall/IDS is not blocking the port and not

used by other application running on same server.

Steps to Enable Compression in Tomcat Server

Below tag in the server.xml enables compression.

Note:

Compression will be enabled if the file size is more than 2KB.

Configuration

67

Connector port=“8080” maxHttpHeaderSize=“8192”

maxThreads=“150” minSpareThreads=“25” maxSpareThreads=“75”

enableLookups=“false” redirectPort=“8443” acceptCount=“100”

compressionMinSize=“2048”

compression=“on”

compressableMimeType=“text/html,text/xml,text/plain,text/css, text/javascript,text/json,application/x-javascript,

application/javascript,application/json”

connectionTimeout=“20000” disableUploadTimeout=“true”

URIEncoding=“utf-8” />

<Connector port=“8443” maxHttpHeaderSize=“8192”

maxThreads=“150” minSpareThreads=“25” maxSpareThreads=“75”

enableLookups=“false” disableUploadTimeout=“true”

acceptCount=“100” scheme=“https” secure=“true”

compressionMinSize=“2048”

compression=“on”

compressableMimeType=“text/html,text/xml,text/plain,text/css,

text/javascript,text/json,application/x-javascript,

application/javascript,application/json”

clientAuth=“false” sslProtocol=“TLS”

keystoreFile="/opt/panaces/installconfig/keystore/IBM.keystore”

keystorePass=“IBM”/>

To start/ stop tomcat outside panaces script, follow the procedure below:

1. Change directory to $TOMCAT_HOME/bin

2. Run startup.sh/startup.bat depending on OS to start the server

3. Run shutdown.sh/shutdown.bat deepening on OS to stop the server

4. If tomcat is started using step 2, have to be stopped with step 3 only. Panaces script

can’t be used to stop tomcat.

Tomcats logs rotation

For Tomcat logs (catalina.out) rotation, follow the procedure below:

1. Create this file /etc/logrotate.d/tomcat

2. Copy the following contents into the above file.

$TOMCAT_HOME/logs/catalina.out {

copytruncate

daily

rotate 7

compress

missingok

size 10M

}

3. Run the following command to run the cron job manually

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 68

/usr/sbin/logrotate /etc/logrotate.conf

Agent Configuration

Configuring Agents

Agent is a software component that runs on your application server to manage and monitor a

specific Component, Dataset, or Protection Scheme. Agents are installed on remote servers

locally (using CD installations).

To monitor and modify the configured agents, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration Administration

page appears.

2. Scroll down to the Agents Summary and click Go to Agents. The Agents page appears.

To configure the solution specific agents, refer to the respective book under DR Solutions

Supported by IBM Resiliency Orchestration.

Site Controller

Agents communicate to Resiliency Orchestration Server over the network (LAN and WAN).

Agent communication to Resiliency Orchestration server over the WAN requires opening of

necessary ports between all the applicable PR/ DR (client) servers and Resiliency

Orchestration Server. Hence, the ports that need to be opened for communication is

proportional to number of PR/ DR servers.

Site controller augments by acting as a gateway for the set of agents for communicating to

Resiliency Orchestration server. Site controller is capable of managing its agents, hence

when Site controller is installed within LAN, it helps in reducing the bandwidth usage as the

communication over WAN to Resiliency Orchestration Server is greatly reduced.

Configuration

69

There are multiple supported configurations for site controller, they are:

1. Agents are configured to run locally – the agents are configured to communicate to a Site

controller and all the deployed site controller(s) are configured to communicate to

Resiliency Orchestration Server. Since Site controller acts as a gateway, ports for agent

communication needs to be opened between Site controller and Resiliency Orchestration

Server. Hence the ports that need to be opened is proportional to the number of SC

Server(s).

For Example: Site controller-PR is the Site controller on Primary and Resiliency Orchestration

is running on DR site. All the agents on primary are installed on PR Servers. The agents

leverage Site controller-PR for communication to Resiliency Orchestration, while Site

controller-PR will manage the health of the agents.

i. In the absence of Site controller, agent communication ports between every

PR/ DR server and Resiliency Orchestration Server needs to be opened over

WAN.

ii. With Site controller, only agent communication ports between Site controller-

PR and Resiliency Orchestration Server needs to be opened over WAN. The ports

for communication of agents and Site controller-PR needs to be opened but only

over LAN.

2. Agents Run remotely on Site Controller Server (s) – The Site controller augments

Agent Node functionality by acting as a gateway for all the agents running on that agent

node. This brings the advantages of remote agent, agent node and Site controller

together.

Example: Site controller-PR is the Site controller on Primary and Resiliency Orchestration is

running on DR site. All the agents on primary are installed on the same Site controller

Server. The agents leverage Site controller-PR for communication to Resiliency

Orchestration, while Site controller-PR will manage the health of the agents.

i. In the absence of Site controller, with dedicated Agent Node, agent communication

ports between the Agent Node and Resiliency Orchestration needs to be opened.

However, Resiliency Orchestration will manage the health of the agents over WAN.

ii. With Site controller, while only agent communication ports between Site controller-

PR and Resiliency Orchestration Server needs to be opened over WAN, the health of

agents is managed by Site controller and not by Resiliency Orchestration. Thus

reducing the network usage over WAN.

3. Some agents are local and some agents are remote (mixed) – this is combination of

above two deployment models.

Adding Site Controller to Resiliency Orchestration Server

CLI tool is introduced to add Site Controller details to Resiliency Orchestration Server. The

CLI tool used is: DRMSiteController.sh and is located in $EAMSROOT/cli.

Follow the commands to execute in the CLI:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 70

1. Login into IBM Resiliency Orchestration Server (Linux Server) and open a command

terminal.

2. Run $EAMSROOT/cli/>sh DRMSiteController.sh

OR

$EAMSROOT/cli/>./DRMSiteController.sh

1. Upon running the script, Sitecontroller prompt will be displayed: Sitecontroller>

2. Type the following syntax to add SiteController:

add sitecontroller -a <SiteController IPAddress> -n <Name of the Sitecontroller>

For example:

Sitecontroller>add sitecontroller -a 192.168.20.18 -n SC18

1. Press Enter.

Deleting SiteController from Resiliency Orchestration Server

CLI tool is used to delete Site Controller details to Resiliency Orchestration Server. The CLI

tool used is :DRMSiteController.sh and is located in $EAMSROOT/cli.

Follow the commands to execute in the CLI:

1. Login into IBM Resiliency Orchestration Server (Linux Server) and open a command

terminal.

2. Run $EAMSROOT/cli/>sh DRMSiteController.sh

OR

$EAMSROOT/cli/>./DRMSiteController.sh

3. Upon running the script, Sitecontroller prompt will be displayed: Sitecontroller>

4. Type the following syntax to add SiteController:

delete sitecontroller -a <SiteController IPAddress>

For example:

Sitecontroller>delete sitecontroller -a 192.168.20.18

5. Press Enter.

Configuration

71

Agentless

IBM Resiliency Orchestration software support Agentless model where user need not install

and run any Resiliency Orchestration specific software component on their data/ application

servers. Resiliency Orchestration software accesses the customer servers using Industry

standard remote access mechanism like SSH/ WMI/ JDBC.

Note:

▪ Agentless model is not supported for DB2, Sybase and SRS solutions.

▪ For remote agents: Create IBM Resiliency Orchestration node component as local.

▪ When we invoke a command from RAL into Resiliency Orchestration in the Agentless

model, we do not load the bash profile.

Example: If you set the Environmental variable, then the value of variable will not

appear.

▪ Command configuration in RAL with relative path will not work.

Pre- requisites

The target system should meet the following pre-requisites for IBM Resiliency Orchestration

to work in Agentless model:

Enabling SSH on Unix/Linux subsystem

1. Firewall setting: ssh port should be open for access from Resiliency Orchestration Server.

2. ssh server should be running on target server that allows connections from Resiliency

Orchestration Server for the configured user.

3. Sftp module should be enabled for ssh. Sftp module can be enabled by editing a file in

the operating system.

For example, in Linux edit /etc/ssh/sshd_config by un-commenting line 'Subsystem sftp

/usr/libexec/openssh/sftp-server, execute command service sshd reload.

Enabling WMI on Windows subsystem (High level)

1. Add permissions for Administrator (WMI user) at Component Services >

Computers > My Computer > COM Security (command: dcomcnfg)

2. Add permissions for Administrator (WMI User) at WMI Control > Security > Root >

CIMV2 > Security (command: wmimgmt.msc)

3. Modify Registry:

▪ For HKEY_CLASSES_ROOT > CLSID > {76A64158-CB41-11D1-8B02-

00600806D9B6}, create String AppID with value as {76A64158-CB41-11D1-

8B02-00600806D9B6}

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 72

▪ For HKEY_CLASSES_ROOT > AppID Create Key {76A64158-CB41-11D1-8B02-

00600806D9B6}

▪ For the created Key, in the right hand pane - create empty String DllSurrogate.

4. Open Ports between Resiliency Orchestration Server and Windows Servers.

▪ Open Ports 135, 137, 138, 139, 445 and Port Range 49152-65535 [No reboot

required].

▪ If you don’t want to open Port Range 49152-65535, then you can also open

range say 50000-50200,as IBM may use 5-10 ports max in parallel, however

many Microsoft services (like Active Directory/ file sharing/ named pipes etc.)

uses RPC extensively and hence good range is required. And to configure this

custom range you need to change registry and server reboot is required.

Enabling WMI on Windows subsystem (Detailed information):

i. A user should have local administrative and domain account privileges for the

managed Server

ii.DCOM setting on managed Server should be configured for the given user list, having

remote access to WMI services. For Connecting to WMI on Remote Computer

details, follow link - http://msdn.microsoft.com/en-

us/library/aa389290%28v=VS.85%29.aspx

iii.Changes required for CIM namespaces.

▪ Add access for the given user to root/ CIMV2 namespace.

▪ Execute Method privilege should be enabled for the given user account.

i.Details of how to configure them are at Setting Namespace Security with the WMI

Control - http://msdn.microsoft.com/en-

us/library/aa393613%28v=VS.85%29.aspx

ii.Firewall setting

▪ Open port WMI port (default 135) in firewall, if the firewall is present.

▪ Details of how to do it are given at Connecting Through Windows Firewall -

http://msdn.microsoft.com/en-us/library/aa389286%28VS.85%29.aspx

iii. Windows - WMI Remote command execution:

▪ All setting as described in Windows WMI setting.

▪ Firewall Setting:

▪ Open port 135, 137,138,139,445 and range 49152-65535 (tcp/ udp) in firewall

configuration if firewall is present.

▪ The given user account should have Execute Method and Remote Enable

permissions for root\cimv2. [Setting Namespace Security with the WMI

Control – http://msdn.microsoft.com/en-

us/library/aa393613%28v=VS.85%29.aspx

Configuration

73

vi. Required Registry Changes: This step is applicable only for Windows 2008

onwards.

Note

Administrator user requires taking ownership to perform registry

operation for CLSID/AppID. Please refer procedure at Change/Replace

Ownership

1. Start > Run > regedit. The Registry Editor screen appears.

2. Perform below operations:

▪ At HKEY_CLASSES_ROOT , Select CLSID ,

▪ Select key {76A64158-CB41-11D1-8B02-00600806D9B6}

▪ In the right hand pane right click and select New > String Value. String name as

AppID with value as {76A64158-CB41-11D1-8B02-00600806D9B6}

▪ At HKEY_CLASSES_ROOT , Select AppID ,

▪ Create key as {76A64158-CB41-11D1-8B02-00600806D9B6} if it’s not present.

▪ Select created key {76A64158-CB41-11D1-8B02-00600806D9B6} then In the

right hand pane, right click and select New > String Value as DllSurrogate with

empty value (ie. Value Data should be empty.

i.This step is applicable only for Windows 2008 onwards. When the user is not a

domain or built-in Administrator user, the following steps has to done:

Note:

There is a difference between Administrator and users even in Administrators built-in group

for the UAC (User Account Control) feature in Windows Vista and Windows Server 2008.

Under UAC, accounts in the local Administrators group have two access tokens, standard

user and administrator privileges. Because of UAC access token filtering, a remote WMI

query is always run under the standard user token. So for a computer in workgroup, even if

the account is in the Administrators group, UAC filtering means that a script runs as a

standard user. A best practice is to create a dedicated local user account on the target

computer with explicit DCOM and WMI namespace access rights granted specifically for

remote connections (Microsoft Developer Network website).

To connect remotely to DCOM, follow the below steps:

1. Start > run > dcomcnfg. The Component Services page appears.

2. Expand Component Services > Computers.

3. Right click om My Computer > select Properties. The My Computer Properties

window appears.

4. Click the COM Security tab and in Launch and Activation Permissions section do

the following:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 74

▪ Select Edit Limits button and do the step from 5 – 7.

▪ Select Edit default button and do the step from 5 – 7.

The Launch Permission screen appears.

5. Select under Group or User names as Administrator.

Note:

If the Administrator option is not available, create new.

i.Select the Add button

ii.Enter Administrator in Enter the Object names to select field.

iii.Click Check Names button and click OK.

6. Under Permissions for Administrators section, select the Allow check boxes of the

below options:

▪ Local Launch

▪ Remote Launch

▪ Local Activation

▪ Remote Activation

7. Click OK.

To connect remotely to WMI, follow the below steps:

1. From the Start menu > click run > type wmimgmt.msc. The Windows

Management Infrastructure page appears.

2. Right click on WMI control and select Properties. The WMI Control (Local)

Properties page appears.

3. Select the Security tab. Select Roots > CIMV2. The Security page appears.

4. Select under Group or User names as Administrator.

Note:

If the Administrator option is not available, create new.

i.Select the Add button

ii.Enter Administrator in Enter the Object names to select field.

iii.Click Check Names button and click OK.

5. Select the check boxes of Execute Method and Remote Enable.

Configuration

75

6. Click OK.

Change/ Replace Ownership:

Administrator user requires taking ownership to perform registry operation for

CLSID/AppID. If user is unable to create Strings for CLSID keys, do the following( for

AppID follow same)

1. Start > run > regedit. The Registry Editor page appears.

2. HKEY_CLASSES_ROOT > CLSID > {76A64158-CB41-11D1-8B02-

00600806D9B6}.

3. In the right hand pane, right click New > String Value.

Note:

If you get an error message displaying “Error creating value”, do the following:

▪ Select the key value {76A64158-CB41-11D1-8B02-00600806D9B6} > Right

click > Permissions. The Permission screen appears.

▪ Under Security tab, select Administrator and select Advanced button.

Note:

If the Administrator option is not available, create new.

▪ Select the Add button

▪ Enter Administrator in Enter the Object names to select field.

▪ Click Check Names button and click OK.

▪ Double click on Administrator. The Advanced Security Settting window appears.

▪ Go to Owner tab, select the Administator in Change owner to section.

▪ Select Replace owners and subcontainers in objects checkbox and click OK.

1.

Open Custom Range of ports WMI/ RPC :

To enable WMI, we need to have open ports between 49152-65535. If you don’t want to

open the full range, then you can also configure in Registry Editor with specific range

example: 50000-50100 ( this will be used for any RPC ,WMI etc)

In Windows Server 2008 and later versions ,and in Windows Vista and later versions, the

default dynamic port range changed to the Start port: 49152 - End port: 65535

Note:

If your computer network environment uses only Windows Server 2012, Windows Server

2008 R2, Windows Server 2008, Windows 8, Windows 7 or Windows Vista, you must enable

connectivity over the high port range from 49152-65535.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 76

Range configuration for WMI/RPC

1. Start > run > regedit. The Registry Editor page appears.

2. Select HKEY_LOCAL_MACHINE > Software.

3. Select Microsoft > Rpc > Internet.

Note:

If Internet key is not available, create a new key. Right click under Rpc > New > Key >

enter the name as Internet.

4. Select the Internet key and In the right hand pane,

i.Right click New > Multi string Value (to create multi string value).

ii.Right click New > String Value (to create string value).

Note:

Create totally 3 strings – 1 with multi string value and 2 with string value as shown below

values.

▪ "Ports" (MULTI_SZ),

▪ "PortsInternetAvailable" (REG_SZ),

▪ "UseInternetPorts" (REG_SZ).

For example, the new registry key appears as follows:

Ports: REG_MULTI_SZ: 50000-50200

PortsInternetAvailable: REG_SZ: Y

UseInternetPorts: REG_SZ: Y

5. Restart the server. All applications that use RPC dynamic port allocation use ports

50000 through 50200, inclusive.

Note:

In most environments, a minimum of 200 ports should be opened, because several system

services rely on these RPC ports to communicate with each other.

Additional settings on PFR subsystem

Firewall settings:

▪ Port 46000 and 46001, where PFR service is listening should be open for IBM

Resiliency Orchestration Server access.

▪ PFR Agent version and SFR Service version should be same.

Configuration

77

Configuration

When Agentless model is used,Resiliency Orchestration software needs additional

configuration.

As part of subsystem discovery, user needs to provide additional information which is used to

access customer servers remotely. This include credential information to access a customer

server. These are described in subsystem discovery page in detail.

If multiple servers can be accessed using same credential information, Resiliency

Orchestration provides option to enter the credentials once and then can be attached to any

number of subsystems. This is explained under Credentials.

To use IBM Resiliency Orchestration as an Agentless model, user needs to discover

Resiliency Orchestration server machine as a component and start an agent on the Resiliency

Orchestration server system.

Refer Management, to start agent and refer Configuration, to discover a component. Once

this step is done, user can go ahead with other subsystems and group discovery.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 78

Monitoring

When Agentless model is used, Resiliency Orchestration software provides additional

monitoring.

IBM Resiliency Orchestration software keeps monitoring the credential information and

inform user about failure by raising alerts and changing the status. Following events are

raised to indicate the change in credential status.

Event ID Event Description Event Impact

LoginFailedOnDRServer

Login failing on DR Server

Recovery and Monitoring may be impacted

LoginFailedOnPrimaryServer Login failing on Primary Server

Recovery and Monitoring may be impacted

LoginSuccessOnDRServer Login Success on DR Server

Recovery and Monitoring will work normally

LoginSuccessOnPrimaryServer Login Success on Primary Server

Recovery and Monitoring will work normally

PrimaryServerAccessible Primary Server is accessible

Recovery and Monitoring will work normally

PrimaryServerNotAccessible Unable to connect to Primary Server

Recovery and Monitoring may be impacted

DRServerAccessible DR Server is accessible Recovery and Monitoring will work normally

DRServerNotAccessible Unable to connect to DR Server

Recovery and Monitoring may be impacted

The status of the credentials are shown for each subsystem at subsystem listing page or

subsystem details page. Click Discover>Subsystems to view the credentials.

Following icons displays the credential status:

Configuration

79

- given credentials are good.

- given credentials are failing.

N.A - Not applicable – when agent run locally or credentials not required for technology.

Unknown – Initial status or when no credentials are provided.

Note:

If the target system is down or agent is down, the credential status will remain last known

status.

Management

When Agentless model is used, Resiliency Orchestration software provides additional Agent

management.

1. At any point of time or for maintenance, user can stop/start Agents as follows:

2. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears.

3. Scroll down to the Agents Summary and click Go to Agents. The Agents page

appears.

4. Click Stop/ Start button for the required Subsystem.

No further call will go to target server after stopping the Agent for the server. User will get

alert message saying "agent managing the subsystem is down/ up" depending on Stop/ Start

option.

Note:

Start / Stop all the Agents individually for a component.

User can also start and stop these processes using command line. Go to $EAMSROOT/bin

and enter the following command:

Servers

Commands

SOLARIS Go to $EAMSROOT/bin

> SolarisOSAgent.sh <start|stop> <ip address> SOLARISSERVER

LINUX # cd $EAMSROOT/bin

> LinuxOSAgent.sh <start|stop> <ip address> LINUXSERVER

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 80

Servers

Commands

HPUX

# cd $EAMSROOT/bin

> HPUXOSAgent.sh <start|stop> <ip address> HPUXSERVER

AIX # cd $EAMSROOT/bin

> AIXOSAgent.sh <start|stop> <ip address> AIXSERVER

WINDOWS # cd $EAMSROOT/bin

> WindowsOSAgent.sh <start|stop> <ip address> NTSERVER

ORACLE # cd $EAMSROOT/bin

> OracleAgent.sh <start|stop> <ip address>

<SOLARISSERVER|LINUXSERVER|HPUXSERVER|AIXSERVER|NTSERVER>

DATAGUARD # cd $EAMSROOT/bin

> DataGuardAgent.sh <start|stop> <ip address> <SOLARISSERVER|LINUXSERVER|HPUXSERVER|AIXSERVER|NTSERVER>

TrueCopy # cd $EAMSROOT/bin

> TrueCopyAgent.sh <start|stop> <ip address> <SOLARISSERVER|LINUXSERVER|HPUXSERVER|AIXSERVER>

HPXP # cd $EAMSROOT/bin

> HPXPAgent.sh <start|stop> <ip address> <SOLARISSERVER|LINUXSERVER|HPUXSERVER|AIXSERVER>

PFR # cd $EAMSROOT/bin

> PFRAgent.sh <start|stop> <ip address>

<SOLARISSERVER|LINUXSERVER|HPUXSERVER|AIXSERVER|NTSERVER>

If the user wants to start/ stop/ check the status of multiple subsystem agents, do the

following:

▪ To START: DRMAgentsStart.sh

Configuration

81

This can be used to start multiple agents as specified by options. The options arguments are

described in the table below. This is primarily used during patch process. This command start

agents that are currently not running and user has not specifically stopped it (User has

stopped the agent from GUI).

DRMAgentsStart.sh <option1> [option2 option3 ...]

example: > DRMAgentsStart.sh WINDOWSOS LINUXOS

▪ To STOP: DRMAgentsStop.sh

This can be used to stop multiple agents (remote agents) as specified by options. This is

primarily used during patch process.

DRMAgentsStop.sh <option1> [option2 option3 ...]

example: > DRMAgentsStop.sh WINDOWSOS LINUXOS

▪ To Check the Status: DRMAgentsStatus.sh

User can use this to see the current status of agents according to the options specified.

DRMAgentsStatus.sh <option1> [option2 option3 ...]

example:> DRMAgentsStatus.sh WINDOWSOS LINUXOS

The "options" arguments can be one or many. The full list of options are listed in the table.

Resiliency Orchestration Agents

option argument

Description

WINDOWSOS All Windows OS.

LINUXOS All Linux OS agents.

AIXOS All AIX OS agents.

HPUXOS All HPUX OS agents.

SOLARISOS All Solaris OS agents.

OSAGENTS All OS agents.

ORACLE All Oracle dataset agents.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 82

Resiliency Orchestration Agents

option argument

Description

MSSQL All MSSQL dataset agents.

DATASETAGENTS All dataset agents.

PFR All PFR protection agents.

TRUECOPY All TrueCopyprotection agents.

DATAGUARD All Data Guard protection agents.

HPXP All HPXP protection agents.

PROTECTIONAGENTS All protection agents.

NETAPPONTAPOS All NetAppOnTAP OS agents.

PostgreSQL All PostgreSQL dataset agents.

MSExch All MS Exchange dataset agents.

ALL All OS agents, All dataset agents, All protection agents, ALL Management Service Agents.

NETAPP All NetApp protection agents.

SybaseASE - All Sybase dataset agents.

Configuration

83

Resiliency Orchestration Agents

option argument

Description

DATASETAGENTS All dataset agents.

SRDF All EMC SRDF protection agents.

UCSD All UCSD Mgmt Service agents.

AWS All AWS Mgmt Service agents.

VCENTER All VCENTER Mgmt Service agents.

MANAGEMENTSERVICEAGENTS ALL Management Service Agents.

Note:

1. For incorrect inputs or if no inputs are provided for the script, then the exit status is 1

or else it is 0.

2. If an agent is started by a script, then it displays "AGENT_TYPE agent started

successfully for IP: IP_ADDRESS".

3. If an agent is already running, then it displays "AGENT_TYPE agent is already running

for IP: IP_ADDRESS".

4. If an agent fails to start, then it displays "AGENT_TYPE agent could not be started for

IP: IP_ADDRESS".

5. If there are no remote agents found for a given agent type, it will display "No

AGENT_TYPE agents found".

6. The script will take a valid input only once, even if the same input is given more than

once.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 84

Agent Listing

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To view the configured agents, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears.

2. Scroll down to the Agents Summary and click Go to Agents. The Agents page

appears with following information:

Field Description

AGENT Lists the agent’s name.

VERSION Displays the version of the agent when the agent is connected.

If the agent version is not available or agent is not connected, then "-" will be shown.

STATUS

Displays the agent’s status. The various status are:

▪ CONNECTED – Agent is connected to the server.

▪ NOT CONNECTED – Connection to server does

not exist due to some failure.

▪ CONNECTING / NOT CONNECTING - The process of establishing a connection or disconnecting with the server during establishing a connection.

Note:

Only if the server is remotely managed, the Start/Stop

option will be displayed.

COMPONENT Displays the server machine on which the agent is installed.

AGENT NODE Displays the name of agent node server, from where the agent is running, only if the server is remotely managed.

CONNECTED AT Displays the time when the agent last connected to the IBM Resiliency Orchestrationserver.

Configuration

85

Field Description

The agent can be installed on more than one server machine. Click respective Agent link to

view agent details and statistics. In the right pane, you can view the Event Polling Interval

in seconds, configured for the respective agents.

The Agent Details page displays the following:

Agent Details

Agent Name Displays the Agent’s name.

Description Displays the description about the Agent.

Agent Version Displays the version of the agent when the agent is connected.

If the agent version is not available or agent is not connected, then "-" will be shown.

Status Displays the current status of the Agent.

Object Class

Displays whether the agent is related to a Component, Dataset, or Protection Scheme.

Object Type

Displays the type of the object that is being managed by the respective agent.

For example, if the Object class is ‘Component’, then this specifies whether the Components is of type ‘NT Server’ or ‘Solaris Server' etc.

IP Address

Displays the IP address of the server on which the agent is installed.

Time of Install

Displays the time of installation of the Agent on the server.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 86

Agent Details

Agent Statistics

Time when Agent connected Displays time at which the agents was connected to the IBM Resiliency Orchestration server. (put the def of Time when connection established after getting

the confirmation from GUI).

Number of times Agent connected Since IBM Resiliency Orchestration ™

Server Startup

Displays the number of times the agent was connected to IBM Resiliency Orchestration ™ server since the server is active.

Number of events received Displays the number of events received.

Time when last event received Displays time of last received event.

Number of RPC calls made since connected

Displays the number of RPC (Remote Procedure Call) made since connected to the IBM Resiliency

Orchestration ™ server.

Time when last RPC call was made

Displays the time of the last RPC call.

Last RPC call

Displays the name of the last RPC call.

Last RPC status

Displays the status of the last RPC call.

Number of Health- Checks made since Agent Connected.

Displays the number of health checks made since agent is connected.

Time when last Health check was made

Displays the time of last health check.

Previous Status Displays the previous status of the agent.

Configuration

87

Agent Details

Current Status

Displays the current status of the agent.

You can modify the configured agent by clicking the icon.

Configuring WAN Agent

WAN agents monitor the WAN devices present in DR environment. The WAN Agent is

installed on IBM Resiliency Orchestration server at the time of installation. The WAN agent

configuration will be done on a per device and as per port basis. The WAN agent needs to be

configured to check the bandwidth utilization, and operational status. The usable bandwidth

and upper threshold of the WAN device is used to configure the WAN agent. The usable

bandwidth is defined as the maximum speed at which the interfaces can send or receive

data. The upper threshold is the percentage of the usable bandwidth, which the interface can

use.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To configure the WAN agents, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Agents Summary and click Go to

Agents. The Agents page appears.

2. Click corresponding to the WAN Agent. This pops up the WAN Configuration page.

Field Description

Select the WAN device to configure

Select a WAN device from the drop-down list.

Community Name Enter the community name.

This field is mandatory.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 88

Poll Interval Enter Poll Interval in seconds.

This field is mandatory.

The Poll Interval text box gives time interval at which the IBM Resiliency Orchestration server communicates with the SNMP device.

3. Click Apply to save the changes. The WAN Agent Configuration window appears.

The following table gives some information on the terms used while configuring the WAN

Agent:

Field Description

Select the Port to Configure

Select the port to be configured from the drop-down list.

Port Name Enter the Port Name.

This field is mandatory.

Port IP Enter the IP Address of the port.

This field is mandatory.

Subnet Mask Enter the Subnet mask of Port IP.

The Subnet mask is the network address and bits reserved for identifying the sub network. This can be used to identify the subnet to which an IP

address belongs by performing a bitwise AND

operation on the mask and the IP address.

This field is mandatory.

Usable Bandwidth (Port Speed)

Enter the usable bandwidth.

It is the load of data transfer across the WAN device

Configuration

89

Field Description

port by Up or Down stream and is represented in Kbps.

This field is mandatory.

Upper threshold

Enter the upper threshold limit in percentage.

It is the maximum bandwidth this WAN device port is expected to use. This is expressed as % of usable

bandwidth.

An event is raised if the usage reaches or exceeds this limit.

This field is mandatory.

Lower threshold Enter the lower threshold limit in percentage.

This field is mandatory.

When the bandwidth usage exceeds or reaches the upper threshold limit, an event will be

raised to indicate the bandwidth usage.

4. Click Save to save the entries.

Or

Click Cancel to cancel the current operation.

User Management

Setting up Users

This chapter describes how to configure and setup users in the IBM Resiliency Orchestration

environment.

This section explains the following:

Adding Users

Modifying Users

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 90

Deleting Users

Setting System Options for Users

Basic User Role management

Adding Users

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To add a new user, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the User Summary and click Go to Users.

The IBM Resiliency Orchestration Users page appears.

Note:

Only Super Administrator has the authority to add users.

2. Click Create New User at the top right corner of IBM Resiliency Orchestration

Users page. The Create New User page appears.

Create a user by providing following information. In this page the mandatory fields are

marked with a red asterisk. This window has details of the user along with their login

information (user name and password).

Field Description

Login Information

IBM Resiliency Orchestration ID

IBM Resiliency Orchestration ID is the IBM Resiliency Orchestration user name that you enter while logging into IBM Resiliency Orchestration.

▪ This field accepts up to 16 alphanumeric characters

and must begin with a letter.

Configuration

91

Field Description

Choose Password The password is used to authenticate the IBM Resiliency Orchestration user within IBM Resiliency Orchestration ™.

This field accepts up to 16 alphanumeric characters including at least one digit.

Note:

The password cannot contain the character patterns listed

below.

▪ <script>(.*?)</script>

▪ Src=*

▪ Eval

▪ Expression

▪ JavaScript

▪ VBScript

▪ Onload

▪ Iframe

▪ <*>

Password Strength When you type your password, the color of Password Strength changes.

This field displays any one of the following values - Weak/ Medium/ Good/ Strong.

Confirm Password Re-enter the password to confirm it.

User Details

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 92

Field Description

Full name Provide the user's full name.

▪ This field is mandatory.

▪ This field accepts up to 64 characters, including alphanumeric, spaces and underscores.

Role Select any one of the following option to assign role to the

user.

▪ Super Administrator

▪ Administrator

▪ Operator

▪ Notification-Member

Assign Groups

▪ Click a group to select the Group that the user should be associated with from the list.

▪ To select multiple Groups, keep the CTRL key pressed and click the desired Groups one by one.

Preferences

Home Page Select the landing page that is displayed after logging on to IBM Resiliency Orchestration.

Home page options in the drop-down list.

Note

If you are creating an user with Operator level permissions,

the list of possible Home Pages will contain only those pages that a Operator can see.

Groups When you select Group Dashboard in the Home Page drop-down list, this drop-down list is enabled.

Select a group from the drop-down list.

Configuration

93

Field Description

Professional Details

Company Name Enter the user company name.

This field accepts maximum of 255 characters.

Designation

Enter user designation.

This field accepts maximum of 255 characters.

Department

Enter user department.

This field accepts maximum of 255 characters.

Working hours, In Time Enter start time of the user working hours.

The time format is HH:MM:AM/ PM.

Working hours, Out Time Enter end time of the user working hours.

The time format is HH:MM:AM/ PM.

Contact Details

Address

Enter the contact address of the user.

This field accepts maximum of 255 characters.

Phone (1)

Enter the primary telephone number of the user.

This field accepts only numerals and allows up to 15 characters.

Phone (2) Enter the primary telephone number of the user.

This field accepts only numerals and allows up to 15 characters.

Mobile Enter the mobile number of the user.

This field accepts only numerals and allows up to 15 characters.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 94

Field Description

Pager Enter the pager number of the user.

This field accepts only numerals and allows up to 12 characters.

Email

Enter the e-mail address of the user.

This accepts valid email addresses in the form of [email protected] (e.g., [email protected])

Mobile Email Enter the mobile e-mail address of the user.

This accepts alphanumeric characters, period mark and @ only.

Preferred Mode of Communication

Enter the mode of communication. The available choices are:

▪ Email

▪ Mobile

▪ Telephone

▪ Pager

Note

Based on your selection of above mentioned choices, make sure that appropriate values are specified in the associated fields.

3. Click Save to add the user.

OR

Click Cancel to quit current operation.

4. On successfully adding a user, a message box is displayed.

5. Click OK in the message box to return to the IBM Resiliency Orchestration Users

page.

Modifying Users

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

Configuration

95

To modify user details perform the following:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration Administration

page appears. Scroll down to the User Summary and click Go to Users. The IBM

Resiliency Orchestration Users page appears.

2. Click icon corresponding to the user whose details you want to modify. This opens Edit

User window. Change the required fields. Refer Adding Users for field description.

Note:

You cannot modify IBM Resiliency Orchestration ID.

3. Click Save to save the modifications.

OR

Click Cancel to quit current operation.

4. On successful modification, a message box indicating ‘User Modified Successfully’ is

displayed.

5. Click OK in the message box to return to the IBM Resiliency Orchestration Users

page.

Deleting Users

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To delete a User perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the User Summary and click Go to

Users. The IBM Resiliency Orchestration Users page appears.

2. Click icon corresponding to the user that you want to delete. A message box is

displayed confirming the deletion.

3. Click OK in the message box.

Note:

▪ You cannot delete a user with which you are currently logged in.

▪ Only Super Administrator has the authority to delete users.

Setting System Options for Users

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 96

Super Administrator has the privileges to set default settings for users.

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To establish settings for default users:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the User Summary and click Go to

Users. The IBM Resiliency Orchestration Users page appears.

2. Click the Set System Options for Users link at the top right corner of the page. The

Set System Options for Users page appears.

Super Administrator can set the following privileges:

Field Description

Preferences

Home Page Select the landing page for all users that is displayed after logging on to IBM Resiliency

Orchestration.

Edit Options

User Details Select users who could be allowed to edit their own details.

Password

All User Passwords expire in Select the duration for the expiry of passwords.

a. Enter the numeral in the text box, and

b. Select the unit of time from the drop down. The available options are: Never, Days, Weeks,

and Months.

Note:

Select "Never" if you do not want the password to expire.

Notify User on Password expiry

(Days before)

Enter the number of days before expiry you want to notify the user regarding expiration of password.

Configuration

97

Field Description

Professional Details

Company Name Enter name of your company.

Note:

This field accepts maximum 255 characters.

Working hours in Select the hour and minute when you start work.

The time format is HH:MM:AM/PM.

Working hours out Select the hour and minute when you finish work.

The time format is HH:MM:AM/PM.

Mode of Communication

Preferred Mode of Communication(s)

Select the mode of communication. The available choices are:

▪ Email

▪ Mobile

▪ Telephone

▪ Pager

Note:

Based on your selection of above mentioned choices, make sure that appropriate values are specified in the associated fields.

3. Click Save to save the changes, or Cancel to close the window without saving the

changes.

4. In Default User Settings window:

▪ Click Users List at the top right corner of the window, to see list of all users.

▪ Click Create New User at the top right corner of the window, to create a new user.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 98

Editing User Preferences

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To edit user preferences:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the User Summary and click Go to

Users. The IBM Resiliency Orchestration Users page appears.

2. Click User Preferences at the top right corner of the page. The Edit User

Preferences page appears.

3. Change the required fields.

Note:

You can change only your password and home page details.

4. Click Save to save the changes, or Cancel to close the window without saving the

changes.

Configuring LDAP

Note:

The steps provided below are regarding 389 Directory Structure on Fedora.

1. Install the LDAP Directory Server on the Linux machine.

2. Login to the Admin console of the Directory Server.

Creating custom Class and Attributes

A “Custom class” for holding IBM Resiliency Orchestration roles has to be created with

appropriate custom attributes. This custom class will be a child of the “groups” class.

1. Login to the LDAP server.

2. New custom attributes can be provided in the Schema tab.

The following attributes for IBM Resiliency Orchestration will have to be created with the type

Boolean:

Configuration

99

Attribute name Type

bp-edit Boolean

bp-execute Boolean

failover-edit Boolean

failover-execute Boolean

fallback-edit Boolean

fallback-execute Boolean

fallbackresync-edit Boolean

fallbackresync-execute Boolean

groups-edit Boolean

newdrill-edit Boolean

newdrill-execute Boolean

normalcopy-edit Boolean

normalcopy-execute Boolean

normalfullcopy-edit Boolean

normalfullcopy-execute

Boolean

policy-edit Boolean

policy-execute Boolean

reversenormalcopy-edit

Boolean

reversenormalcopy-execute

Boolean

switchback-edit Boolean

switchback-execute Boolean

switchover-edit Boolean

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 100

Attribute name Type

switchover-execute Boolean

3. For example, to create “bp-edit” attribute, enter the Attribute name as bp-edit and

select the Syntax as Boolean.

4. Create attributes for rest of the values given in the table above. Ensure the feature

operation attributes are in lower case and there is no mismatch in the spelling.

5. For creating the custom class, go to the Object Classes tab.

6. Provide the name for the custom class as IBMResiliencyOrchestrationrole. Select

a Parent to the class name groupofuniquenames.

7. The custom attributes created previously should be added into the custom class.

Select the required custom attributes from the Available Attributes list. Ensure all the

relevant attributes are added and submit.

Creating pre-packaged roles for IBM Resiliency Orchestration

The following pre-packaged roles are supported in IBM Resiliency Orchestration, and the

same should be created on the LDAP server:

Role name Role name in LDAP

SUPER

ADMINISTRATOR

IBM-SUPER

ADMINISTRATOR

ADMINISTRATOR IBM-ADMINISTRATOR

OPERATOR IBM-OPERATOR

NOTIFICATION MEMBER

IBM-NOTIFICATION MEMBER

1. Login to LDAP server and go to the Domain Component in which IBM Resiliency

Orchestration roles will reside. For example, the Domain Component IBM is selected and

it will have the following dc=IBM, dc=com.

2. An organizational unit with the name Roles has to be created for storing IBM

Resiliency Orchestration roles. Create the same in the Domain Component selected.

Configuration

101

3. To create a new role, for example, a SUPER ADMINISTRATOR, go to the

organizational unit Roles created in the previous step and create a new object with the

type being IBMdrmrole. The role name should have the prefix “IBM-” to identify them

as roles created for IBM Resiliency Orchestration. For example, for a SUPER

ADMINISTRATOR role, enter group name as IBM-SUPER ADMINISTRATOR.

4. Users can be added to the newly created roles through the role properties.

5. Similarly add the other pre-packaged roles and the required users.

Note:

The role name format after the prefix should not contain hyphen. This is because the hyphen

is used as a delimiter to separate the role-prefix and the actual role name.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 102

Creating custom roles for IBM Resiliency Orchestration

Custom roles can be created using any of the following feature-operations and assigned to

users who already have OPERATOR role assigned to them.

Features/Operations Execute

[Includes

Start/Stop]

Edit [Includes

Create/Edit/Delete]

Switchback X X

Switchover X X

Failover X X

Fallback X X

FallbackResync X X

NormalCopy X X

NormalFullCopy X X

ReverseNormalCopy X X

Policy X X

BP X X

Tests X X

Groups X

1. To create a new custom role, for example, a SUPER ADMINISTRATOR, go to the

organisational unit Roles and create a new object with the type being

IBMResiliencyOrchestrationrole. The role name should have the prefix “IBM-” to

identify them as roles created for IBM Resiliency Orchestration. For example, for the

custom role having GROUPS-EDIT feature-operation provide a role name like IBM-

GROUPS ROLE.

2. Users can be added to the newly created roles through the role properties.

3. Add the required custom attribute for the custom role through the role properties. For

example for the role IBM-GROUPS ROLE the attributes groups-edit can be added to the

custom role. Ensure the attribute value is set to TRUE to enable it for the role.

4. Similarly create custom roles for other required feature-operations.

Configuration

103

Note:

The role name format after the prefix should not contain hyphen. This is because the hyphen

is used as a delimiter to separate the role-prefix and the actual role name.

External Directory Server Details

To view the External Directory Server Details for LDAP Server, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Directory Server Details and click Go

to Directory Server Details. The External Directory Server Details page appears.

2. The LDAP Server can be selected and it has the following options:

i.Server URL

ii.Search Base for reading roles

User Account for reading directories

▪ User Name

▪ Password

Note:

If anonymous directory lookup is enabled, then the configured user for accessing the

directory server will be able to lookup the directory even if the credentials given are wrong.

LDAP Query

Roles are searched from the organizational unit ou=Roles

Users associated with the role are read by reading the attribute uniquemember from the

role.

Configuring AD

1. Login to the AD server.

2. An organizational unit with the name Roles has to be created for storing IBM

Resiliency Orchestration roles. Create the same in the required Domain Component.

3. Ensure the following tools are installed on the Advanced Directory server machine:

schmmgmt - Appendix A : Installation of schmmgmt tool on Active Directory machine.

ADSI Edit - Appendix B: Installation of ADSI Edit tool on Active Directory machine.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 104

Also the Unique X.500 Object Id for the machine running the AD server is required while

creating the

custom class and custom attributes.

Creating custom Class and Attributes

The schmmgmt tool will display the list of classes and attributes being loaded into the AD

server through the schema.

The following attributes for IBM Resiliency Orchestration will have to be created with the

type Boolean using the schmmgmt tool.

Attribute name Type

bp-edit Boolean

bp-execute Boolean

failover-edit Boolean

failover-execute Boolean

fallback-edit Boolean

fallback-execute Boolean

fallbackresync-edit Boolean

fallbackresync-execute Boolean

groups-edit Boolean

newdrill-edit Boolean

newdrill-execute Boolean

normalcopy-edit Boolean

normalcopy-execute Boolean

normalfullcopy-edit Boolean

normalfullcopy-execute

Boolean

policy-edit Boolean

Configuration

105

Attribute name Type

policy-execute Boolean

reversenormalcopy-edit

Boolean

reversenormalcopy-execute

Boolean

switchback-edit Boolean

switchback-execute Boolean

switchover-edit Boolean

switchover-execute Boolean

1. For example, to create bp-edit, the common name and LDAP Display name for

the attribute is bp-edit. Assign a Unique X500 Object ID for the attribute and ensure

syntax for the attribute is Boolean.

2. Similarly, create the custom attributes and ensure that each of these attributes use

a unique ending sequence number for the unique X500 Object ID.

3. Create a custom class in the schmmgmt window and provide common name and

LDAP Display name as IBM-role. Assign a Unique X500 Object ID for the class. Ensure

that cn is a Mandatory attribute in the custom class and all the IBM Resiliency

Orchestration relevant custom attributes as Optional attributes.

Creating pre-packaged roles for IBM Resiliency Orchestration

The following pre-packaged roles are supported in IBM Resiliency Orchestration, and the

same should be created on the AD server:

Role name Role name in AD

SUPER

ADMINISTRATOR

IBM-SUPER

ADMINISTRATOR

ADMINISTRATOR IBM-ADMINISTRATOR

OPERATOR IBM-OPERATOR

NOTIFICATION

MEMBER

IBM-NOTIFICATION

MEMBER

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 106

1. The Adsiedit tool can be used to create pre-packaged roles.

All roles should have the prefix “IBM-” to identify them as roles created for IBM Resiliency

Orchestration.

2. To create a pre-packaged role, for example SUPER ADMINISTRATOR, create a new

object with type IBM-role. Provide cn and sAMAccountName as IBM-SUPER

ADMINISTRATOR

3. A user can be added to a role by adding it as a member of the role through its properties.

Similarly create the other pre-packaged roles.

Creating custom roles for IBM Resiliency Orchestration

Custom roles can be created using any of the following feature-operations and assigned to

users who already have OPERATOR role assigned to them.

Features/Operations Execute

[Includes

Start/Stop]

Edit [Includes

Create/Edit/Delete]

Switchback X X

Switchover X X

Failover X X

Fallback X X

FallbackResync X X

NormalCopy X X

NormalFullCopy X X

ReverseNormalCopy X X

Policy X X

BP X X

Tests X X

Groups X

1. The Adsiedit tool can be used to create custom roles.

2. All roles should have the prefix “IBM-” to identify them as roles created for IBM

Resiliency Orchestration.

Configuration

107

3. To create a custom role which will handle, for example the feature GROUPS-EDIT ,

create a new object with type IBM-role. Provide cn and sAMAccountName as say IBM-

GROUPS ROLE

4. Add the required custom attributes to the role. For example, add groups-edit to the role

and ensure it's value is set to TRUE to enable it for the role.

5. A user can be added to a role by adding it as a member of the role through its properties.

Similarly create the other required custom roles.

Note:

The role name format after the prefix should not contain hyphen. This is because the hyphen

is used as a delimiter to separate the role-prefix and the actual role name.

External Directory Server Details

To view the External Directory Server Details for AD Server, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Directory Server Details and click Go

to Directory Server Details. The External Directory Server Details page appears.

2. The AD Server can be selected and it has the following options:

▪ Server URL

▪ Search Base for reading roles

▪ Server domain

User Account for reading directories

▪ User Name

▪ Password

Note

If anonymous directory lookup is enabled, then the configured user for accessing the

directory server will be able to lookup the directory even if the credentials given are wrong.

AD Query

Role names are read using the query (&(objectClass=IBM-role)) and searching for

attribute name and searching for roles in the organizational unit ou=Roles

Users associated with the role are read by reading the attribute member from the role.

User login name (used for authentication in IBM Resiliency Orchestration) is read using the

query (&(objectClass=user)(cn=<common name of user>)). The common name of

user is obtained from the role as mentioned previously.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 108

Division of the User Management System

The User Management System will use an LDAP/ Active Directory server in the back end for

authentication and authorization (which includes user creation, role creation and user-role

mapping management).

The following roles should be made available in the external server for authorization

purposes of IBM Resiliency Orchestration:

Role Name Description

NOTIFICATION MEMBER

Only notification allowed. Login not allowed

OPERATOR Can view everything in Monitor/Manage/Reports/Discover/Agents/Admin. The privileges on the OPERATOR can be further enhanced by the custom roles created using the feature-operation mentioned in the next table.

ADMINISTRATOR All applicable operations on all features except Create/Edit other users.

SUPER ADMINISTRATOR

All applicable operations on all features.

Note:

User account support will be provided for in Advanced User Management system also. The

authentication for the user account support will be done against IBM Resiliency

Orchestration. If later the User Management system mode is modified to Basic User

Management, then the ResiliencyOrchestrationAdmin user will also be available and will

be authenticated against the IBM Resiliency Orchestration.

In the LDAP/ Active Directory server, the 4 roles as present in the Basic User Management

System should be created. They will function as per the Basic User Management System. The

difference here lies with the OPERATOR role. This role can be enhanced with other custom

roles.

These custom roles will contain attributes which relate to the following feature operations:

Features/Operations Execute

[Includes

Start/Stop]

Edit [Includes

Create/Edit/Delete]

Additional

Privileges

Switchback X X Will also include REPL-EXECUTE

Switchover X X Will also include

Configuration

109

Features/Operations Execute

[Includes

Start/Stop]

Edit [Includes

Create/Edit/Delete]

Additional

Privileges

REPL-EXECUTE

Failover X X Will also include REPL-EXECUTE

Fallback X X Will also include REPL-EXECUTE

FallbackResync X X Will also include REPL-EXECUTE

NormalCopy X X Will also include REPL-EXECUTE

NormalFullCopy X X Will also include REPL-EXECUTE

ReverseNormalCopy X X Will also include REPL-EXECUTE

Policy X X -NA-

BP X X -NA-

Tests[NEWDRILL] X X -NA-

Groups X Will also include the following:

1 SOLUTION_DETAILS-EDIT

2 GROUP_NOTIFICATION-EDIT

3 GROUP_LICENS

E-EDIT

4 GROUP_EVENT

S-EDIT

5 RPO-EDIT

6 RTO-EDIT

7 DATALAG-EDIT

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 110

The custom roles will have a set of attributes which correspond to a combination of the

feature-operation mentioned in the table above. Assigning these attributes a value of

TRUE/FALSE will create a customized role. There will be no change in the GUI for supporting

role creation/customization and user management.

Note:

A user can also be assigned a custom role directly without being assigned an OPERATOR role.

By default the user will be assigned OPERATOR privileges internally and will be allowed to log

in and do operations pertaining to the custom role assigned.

For the User Management System, IBM Resiliency Orchestration will not ship with an

LDAP/ AD server. The server will have to configured/ provided by the customer at the site.

Testing of this module in Development and SQA environments will be done using OpenLDAP

[or 389 Directory Server in Fedora] on Linux and Active Directory on Windows.

On installation of IBM Resiliency Orchestration, a choice will be provided in the installer on

whether the Basic or Advanced User Management System has to be used.

The support user provided will function as in the previous releases.

Note:

▪ The ResiliencyOrchestrationAdmin user need not be created on the external

server in User Management mode. The product should function even without the

ResiliencyOrchestrationAdmin user account being created on the external server.

▪ Any of the internal processes (like executing policy workflows, scheduled workflows,

replication workflows etc) which are using the ResiliencyOrchestrationAdmin user

by default will be modified to take system as the user. So, in the audit log/ reports

the user who triggered the workflow will be shown as system [if audit log is

applicable] which gives a better understanding to the user since this will also avoid

the confusion of whether the workflow was triggered by somebody logging in as

ResiliencyOrchestrationAdmin or automatically started by the system.

▪ For any user that is created in the external server, a record is maintained for that

user for it's preferences with respect to the IBM Resiliency Orchestration. If the user

name is modified, the modified user name will be treated as a new user and the

record for the old user name will not be accessed on login. If the user is deleted in the

external system, the record for the deleted user in IBM Resiliency Orchestration will

still remain as there is no way to indicate back to the Resiliency Orchestration server

that the user is deleted.

Features and Relevant Operations To Be Handled

Features/

Operations

Create Read Update/

Edit

Delete Execut

e

Termi

nate

Advanced_Reports X X

Configuration

111

Features/

Operations

Create Read Update/

Edit

Delete Execut

e

Termi

nate

Agents X X X X

Backup X X X

BP X X X X X X

Credentials X X X X X

Datalag X X X

Failover X X X X

Fallback X X X X

FallbackResync X X X X

Groups X X X X X

Group_Events X X X

Group_License X X X

LICENSE X X

Logs X

NEWDRILL X X X X X

NormalCopy X X X

NormalFullCopy X X X

Group_Notification X X X X

Operational_History X X

Policy X X X

REPL X X X

Reports X

ReverseNormalCopy

X X X

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 112

Features/

Operations

Create Read Update/

Edit

Delete Execut

e

Termi

nate

RPO X X X

RTO X X X

Server_Failover X X

Sites X X X X

Solution_Details X X

Subsystems X X X X

Switchback X X X

Switchover X X X

System_Events X X

System_Preferences

X X

Users X X X X

Directory_Server X X

Server_Notification X X X X

Note:

In User Management mode, if a user is modified/ deleted in the LDAP/ AD server, then the

cache on the Server will be refreshed only if any of the following scenarios occur:

▪ On restart of the Resiliency Orchestration Server.

▪ When any user logs in successfully.

Known Limitations

1. User Role Management: For any changes (such as, add/ delete roles or users)

made in the LDAP/ AD server, in order that these changes take effect in user roles, the

user has to logout and then login to the Resiliency Orchestration Server.

Configuration

113

2. Manual deletion of entries from user role’s in LDAP server: In LDAP server, if a

user having a role is deleted, then the corresponding entry from the role must also be

deleted. Currently LDAP does not delete the entry in the role for the user, if that user is

deleted. The deletion has to be done manually.

3. User Management mode: If a user account is attached to an empty role (a role

without any attributes or attributes set to false), the user will not be allowed to login.

However other users will be able to see the empty role attached to that user in the User

listing page.

Listing Configured Users

Users can perform specific functions based on the assigned privileges.

IBM Resiliency Orchestration users are categorized at the time of user creation. Users with

Super Administrator and Administrator privileges can monitor and manage the Groups,

users, components, agents etc. Users with Operator privileges can only monitor the Groups.

The following table lists the types of users with the privileges:

Types of

Users

Description

Super Administrator

The Super Administrator is a user who has privileges to access all aspects of the configuration and operation of the IBM Resiliency Orchestration.

With Super Administrator privilege, you can:

▪ Manage and monitor all the Groups under IBM Resiliency Orchestration.

▪ Create, modify, and delete different types of users supported by IBM Resiliency Orchestration and their passwords.

▪ Create, modify, and delete Groups.

▪ Assign Groups to the users.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 114

Types of

Users

Description

Administrator An administrator has privileges only with respect to the Group(s) assigned to him.

With Administrator privilege, you can:

▪ Cannot create, delete or modify users.

▪ Create and modify Groups.

▪ Can delete Groups that belongs to the Administrator.

▪ Not assign Groups to the users.

Operator

An Operator can only monitor the Group that has been assigned except for the test exercises.

Operator can view the report list, agents list, users list etc.

Notification Member

Notification members are the point of contact for recovery at the time of disaster. The notification member does not have any login access.

You can view the list of users configured to IBM Resiliency Orchestration Server, by

performing the following steps:

1. Clicking Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears.

2. Scroll down to the User Summary and click Go to Users. The IBM Resiliency

Orchestration Users page appears with the following:

Column Description

User name Displays the name of the user.

Login name Displays the login name of the user.

User type Displays the type of the user.

The user types are Super Administrator,

Administrator, Operator and Notification

Configuration

115

Member.

Click this icon to edit the user details.

Click this icon to delete the user.

User Reports

You can generate IBM Resiliency Orchestration user login information like login time, logout

time, and the IP address of the terminal through which user has logged into IBM Resiliency

Orchestration ™ for a specific time duration. Users with Administrator and Operator

privileges can generate user reports.

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To generate a user report, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the User Summary and click Go to

Users. The IBM Resiliency Orchestration Users page appears.

2. The IBM Resiliency Orchestration Users page lists the user and login names of all

users of IBM along with their user type. For information on the different user types, refer

Listing Configured Users topic.

3. In the right pane, under User Activity Report, select For Past radio button to select

the time duration or the Date Range radio button to specify From and To time stamp

between which you require the login or logout activity report.

4. If you have selected the For Past radio button, select the time duration.

The options available are:

• 1 Day

• 1 Week

• 30 Days

▪ User specified number of days - You can specify number of days

5. If you have selected the Date Range radio button, select the dates for the From and

To fields by clicking the corresponding icon.

6. Click View in the right pane to view the result. The User Activity window appears

with the following information:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 116

Column Description

User Name Displays the name of the IBM user.

Login Time Displays the date and time (yyyy-mm-dd hr:min:sec) at which the particular user has logged

in.

Logout Time Displays the date and time (yyyy-mm-dd hr:min:sec) at which the particular user has logged

out.

this field displays ‘Currently Logged in’ if the particular user is currently logged on to IBM Resiliency Orchestration.

Note:

If browser is closed without logging out, the status of the user will remain as "Currently Logged in" until

the session gets timed out. After displaying the status as "User Login session timed out" for a certain time, it displays the time at which the session got expired.

Duration Displays the duration (hh:min:sec) for which the user logged in.

Host IP Displays IP address of the terminal through which the user is logged-in.

7. Click Back to User List to go back to the IBM Users page.

Appendix

Installing the schmmgmt tool on Active Directory machine

It applies to:

▪ Windows Server 2003

▪ Windows Server 2003 R2

▪ Windows Server 2003 with SP1

Configuration

117

▪ Windows Server 2003 with SP2

The steps followed to install the Active Directory Schema snap-in are:

1. Open Command Prompt.

2. Type regsvr32 schmmgmt.dll

This command will register Schmmgmt.dll on your computer. For more information on

using regsvr32, see Related Documents.

3. Click Start -> Run, type mmc /a, and click OK.

4. On the File menu, click Add/Remove Snap-in, and then click Add.

5. Under Available Standalone Snap-ins, double-click Active Directory Schema. Click

Close and click OK.

6. To save this console, on the File menu, click Save.

7. In Save in, point to the systemroot\system32 directory.

8. In File name, type schmmgmt.msc, and then click Save.

9. To create a shortcut on your Start menu:

▪ Right-click Start and click Open All Users. Double-click the programs folder and then

double-click the Administrative Tools folder.

▪ On the File menu, point to New, and then click Shortcut.

▪ In the Create Shortcut Wizard, in Type the location of the item, type schmmgmt.msc,

and then click Next.

▪ On the Select a Title for the program page, in Type a name for this shortcut, type

Active Directory Schema, and then click Finish.

Caution:

▪ Modifying the schema is an advanced operation best performed by experienced

programmers and system administrators. For detailed information about modifying

the schema, see the Active Directory programmer's Guide at the Microsoft Web site.

Note:

▪ To perform this procedure, you must be a member of the Domain Admins group or

the Enterprise Admins group in Active Directory, or you must have been delegated the

appropriate authority. As a security best practice, consider using Run as to perform

this procedure. For more information, see Default local groups, Default groups, and

Using Run as.

▪ You can also run the Active Directory Schema snap-in from a computer running

Windows XP Professional. Simply install the Windows Server 2003 Administration

Tools Pack on the computer, and then complete step 9 above.

▪ The Windows Server 2003 Administration Tools Pack cannot be installed on computers

running Windows 2000 Professional or Windows 2000 Server.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 118

Installing the ADSI Edit tool on Active Directory machine

It applies to:

▪ Windows SBS 2008

▪ Windows Server 2003

▪ Windows Server 2003 R2

▪ Windows Server 2003 with SP1

▪ Windows Server 2003 with SP2

▪ Windows Server 2008

▪ Windows Server 2008 R2

Active Directory® Service Interfaces Editor (ADSI Edit) is a Lightweight Directory Access

Protocol (LDAP) editor that you can use to manage objects and attributes in Active Directory.

ADSI Edit (adsiedit.msc) provides a view of every object and attribute in an Active Directory

forest. You can use ADSI Edit to query, view, and edit attributes that are not exposed

through other Active Directory Microsoft Management Console (MMC) snap-ins: Active

Directory Users and Computers, Active Directory Sites and Services, Active Directory

Domains and Trusts, and Active Directory Schema.

This topic includes the following sections:

▪ Installing ADSI Edit

▪ Using ADSI Edit

Installing ADSI Edit

To install ADSI Edit on computers running Windows Server® 2003 or Windows® XP

operating systems, install Windows Server 2003 Support Tools from the Windows Server

2003 product CD or from the Microsoft Download Center

(http://go.microsoft.com/fwlink/?LinkId=100114). For more information about how to install

Windows Support Tools from the product CD, see Install Windows Support Tools

(http://go.microsoft.com/fwlink/?LinkId=62270).

On servers running Windows Server 2008 or Windows Server 2008 R2, ADSI Edit is installed

when you install the Active Directory Domain Services (AD DS) role to make a server a

domain controller. You can also install Windows Server 2008 Remote Server Administration

Tools (RSAT) on domain member servers or stand-alone servers. For specific instructions,

see Installing or Removing the Remote Server Administration Tools Pack

(http://go.microsoft.com/fwlink/?LinkId=143345).

To install ADSI Edit on computers running Windows Vista® with Service Pack 1 (SP1) or

Windows 7, you must install RSAT. For more information and to download RSAT, see article

941314 in the Microsoft Knowledge Base (http://go.microsoft.com/fwlink/?LinkID=116179).

Configuration

119

Note:

▪ Adsiedit.msc will not run unless the Adsiedit.dll file is registered. This happens

automatically if the support tools are installed. However, if the support tool files are

copied instead of installed, you must run the regsvr32 command to register

Adsiedit.dll before you run the Adsiedit.msc snap-in. To register adsiedit.dll, type

the following command (you must navigate to the directory containing the

adsiedit.dll file): regsvr32 adsiedit.dll

▪ You can run ADSI Edit from a client computer or server. The computer does not have

to be a member of a domain. However, to see domain objects using Adsiedit.msc,

you must have the rights to view the Active Directory domain that you connect to. By

default, members of the Domain Users group have these rights. To modify objects

using ADSIEdit, you must have at least the Edit permission on the Active Directory

objects that you want to change. By default, members of the Domain Admins group

have this permission.

Using ADSI Edit

ADSI Edit (Adsiedit.msc) is an MMC snap-in. You can add the snap-in to any .msc file

through the Add/Remove Snap-in menu option in MMC, or just open the Adsiedit.msc file

from Windows Explorer. The following figure illustrates the ADSI Edit interface. In the

console tree on the left, you can see the major partitions Domain, Configuration, and

Schema. The figure shows the Builtin container of the Contoso.com domain selected. In the

details pane on the right, you can see the Builtin groups of Active Directory.

Note:

▪ Adsiedit.msc automatically attempts to load the current domain to which the user is

logged on. If the computer is installed in a workgroup or otherwise not logged on to a

domain, the message "The specified domain does not exist" displays repeatedly. To

resolve this issue, you may want to open an MMC, add the ADSI Edit snap-in, make

connections as appropriate, and then save the console file.

Notifications

Configuring Notifications

Notifications lists the users categorized under various notification names. You can configure

notifications to be sent to a selected set of users on occurrence of an event. These users can

only receive the notifications, but, cannot login into IBM Resiliency Orchestration.

The notifications are sent to the users through three modes of communications. They are:

▪ Email Notifications

▪ SMS Notifications

▪ SNMP Notifications

To view the list of members included in the notification list, perform the following steps:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 120

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears.

2. Scroll down to the Notification Summary and click Go to Notification. The

Notifications page appears.

Note: This page provides information on the following:

▪ E-mail Server details: Details of E-mail server configuration for sending and

receiving E-mails.

▪ Notification list: Provides information on configured list and its members with

options to edit or delete respective notification list.

▪ SNMP Trap Forwarder list: Provides information on configured SNMP Trap

Forwarder list with an option to delete respective SNMP Trap Forwarder list.

Email Notification

Each event is associated with a member or group of members. The notification regarding the

event is automatically sent to the email address of the user. Email notification is set up

through email server configuration.

When a BCO is initiated on an AG, notifications are sent to users in the notification list of the

AG. Following is a sample notification sent to the users configured to an AG and it’s

associated RG's.

Subject:

IBM Resiliency Orchestration: testAG1: Failover started at 2005-05-10 21:10:49.74

Notification:

Notification List: Test_NL1,

Group Details:

…Name: testAG1

Description: this is testAG1

Type: APPLICATION GROUP

Current Status: MANAGED, INACTIVE

Operational Details:

Continuity Operation: Failover

Status: Failover started

Configuration

121

Start Time: 2005-05-10 21:10:49.74

End Time: -

Actions to be performed by User: None

SMS Notification

SMS notification process is similar to the E-mail notification except for the notification

method. Here, you will be notified through SMS regarding an event. The SMS is sent to your

cell phone.

The information regarding the failure or success of Application Events, Infrastructure events

and Replication events is escalated to the respective users through Notifications.

SNMP Notification

SNMP notification provides the ability to receive notifications in the form of SNMP traps

through SNMP Trap forwarder.

Users with Administrator and Super Administrator privileges can use this type of notification.

Events of 'critical' and 'serious' types alone are notified through SNMP Trap Forwarder.

Note:

IBM Resiliency Orchestration supports SNMPV1 version for sending and receiving SNMP

traps. Ensure that third-party softwares installed on the client computers support SNMP

management.

The Management Information Base (MIB) file which is bundled along with IBM Resiliency

Orchestration software stores the details on how to read and interpret the Trap Forwarder

message. The notification list members can use this file for specific purposes like displaying

the events information in a particular format, etc. Contact IBM Resiliency Orchestration

support for loading the MIB file prior to using this feature.

Notification List

Configuring Notifications

This chapter describes how to setup and configure notifications.

In this section:

Adding Notification List

Modifying Notification List

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 122

Deleting Notification List

Adding Notification List

A notification list can be created to group users based on notifications to be sent. A user with

administrator privilege only can create notification lists. While adding Notification List, the

existing users are categorized to escalate events in the form of notifications.

Refer IBM Resiliency Orchestration Server User Role Management to see the privileges.

To add a notification list perform following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Notification Summary and click Go

to Notification. The Notifications page appears.

2. Click the Add Notification List link in the right pane.

3. Enter name for the notification list in the Notification List Name field.

4. Select the user name from the list. There are two boxes, one displaying all the users

of IBM Resiliency Orchestration (left side) and other (right side) displaying the selected

users for notification.

▪ Select a user of your choice from the available users list and click to add the user to

right side box. You can select more than one user by using the Ctrl key. The users

available in the right side box will be associated with the notification list being created.

The occurrences of event are escalated to the respective users belonging to notification

list.

▪ Deselect a user by selecting the user from the selected member list on the right side

list box (you can select more than one user by using the Ctrl key) and clicking . This

removes the user from being associated with the notification list.

Note:

The notification list name is mandatory and can accept alphanumeric characters,

spaces and underscores only. This field should start with an alphabet and accepts

only 30 characters. Select at least one user name from the list.

5. Click Save to save the changes and click OK in the pop-up message box to return to

the Notifications window.

OR

Click Cancel to quit the current window without saving changes.

Configuration

123

Modifying Notification List

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To modify the properties of a notification list, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Notification Summary and click Go

to Notification. The Notifications page appears.

2. Click icon corresponding to the notification list that you want to modify. The Edit

Notifications List section appears.

3. You can change the list of notification members. To do this:

▪ Select a user of your choice from the Users list and click >> to add the user to the right

side box. This associates the user with the notification list name.

OR

▪ Deselect users by highlighting a user from the selected member list on the right side

list box and clicking << button. This removes the user from being associated with the

notification list name

4. Click Save to save the changes and click OK in the pop-up message box to return to

the Notifications window.

OR

Click Cancel to quit the current window without saving changes.

Note:

The notification list name should have at least one user associated with it.

You can modify the Notification List in the Group Setup page also.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 124

Deleting Notification List

Refer IBM Resiliency Orchestration Server User Role Management to see the privileges.

To delete a notification list perform following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Notification Summary and click Go

to Notification. The Notifications page appears.

2. Click corresponding to the notification list that you want to delete. A message box

is displayed confirming the deletion.

3. Click OK in the message box.

Configuring SNMP Trap Forwarder

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To configure SNMP Trap Forwarder console to IBM Resiliency Orchestration server to receive

the notification in the form of a SNMP Trap, perform the following:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears.

2. Scroll down to the Notification Summary and click Go to Notification. The

Notifications page appears.

3. Click the Add SNMP TRAP Forwarder link in the right pane. The SNMP Trap

Forwarder page appears.

Provide the necessary information in the following fields:

Field Description

SNMP Trap Name Enter a name for the SNMP Trap.

This field is mandatory.

SNMP Trap Destination IP

Enter the IP address of the trap destination.

This field is mandatory.

Configuration

125

Field Description

UDP Port Enter the UDP (User Datagram Protocol) port number of the trap destination.

The default is port 162.

This field is mandatory.

SNMP Version This is a non-editable field.

IBM Resiliency Orchestration supports SNMPV1 version for sending and receiving SNMP traps.

Community String

Enter the community string.

It is a password that allows access to a network device. It defines which category of people can access the SNMP information on the device.

The person responsible for the network device typically sets the community strings.

Enable SNMP Trap Select this check box to enable the SNMP Console to receive the notification.

Select Groups Select the groups for which you want to send the notification from the list box.

You can select more than one group by using the Ctrl key.

4. Click Save to save the changes and click OK in the pop-up message box to return to

the Notifications window.

OR

5. Click Cancel to quit the current window without saving changes.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 126

Configuring Email Server

This allows to configure the E-mail server. The email server configuration handles all the

email communication to the users of the notification list.

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Notification Summary and click Go

to Notification. The Notifications page appears.

2. Click Configure Email Server in the right pane to modify the required information.

The Notifications- Email Server page appears.

Field Description

SMTP Server Name This field identifies the name of the mail server.

This field is mandatory.

Note

The server name can refer to the name of server

machine (For example, smtp.abc.com) or its IP address. If the server name is referred by IP address, then this field can accept only numbers and should fall with in the following range and format: i.e. 0.0.0.0 to 255.255.255.255

If the server is referred by its name, then the field can accept only alphabet and period marks.

Sender E-mail address

This displays a valid sender E-mail address.

This field is mandatory.

Reply To

This displays the valid E-mail address to which the user should reply.

This field is mandatory.

3. Click the Send Test Mail link. The Send Test Mail section appears.

Configuration

127

4. Enter the email address to which you want to send the notification in the To field and

the subject of notification in the Subject field.

5. Click Send Test Mail. If it is a valid email address, the message "Test mail has been

sent successfully" is displayed. Otherwise the corresponding error message is displayed.

6. Click Save to save the changes and click OK in the pop-up message box to return to

the Notifications window.

OR

Click Cancel to quit the current window without saving changes.

Configuring Email Templates

This feature enables Resiliency Orchestration to customize outgoing email.

(This feature is optional, to disable templates, just remove the respective email from the

email.properties file located under $EAMSROOT/installconfig)

Follow the below steps to enable email templates on Resiliency Orchestration :

1. Add the email ID and template name to the email.properties file at

$EAMSROOT/installconfig as described in the below

[email protected]=sample.tmpl

NOTE:

Template name can be anything with any extension.

2. Create the template which is mentioned in the above step at

$EAMSROOT/installconfig/sample.tmpl as described in the below example.

Schema: HPD:IncidentInterface_Create

Server: REMEDYUAT.KBank.KotakGroup.com

Login: Vivek

Password: password

Action: Submit

Format: Short

!z1D_Action!: CREATE

Last Name* !1000000018!: Vivek

First Name* !1000000019!: Ganesh

Service Type !1000000099!: User Service Request

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 128

Status ! 7!: New

Reported Source !1000000215!: Email

Service Categorization Tier 1 !1000000063!: Functionality

Product Categorization Tier 1 ! 200000003!: Applications

Product Categorization Tier 2 ! 200000004!: $occured on$

Impact* !1000000163!: 1-Extensive/Widespread

Urgency* !1000000162!: 1-Critical

Description !1000000000!: $description$

Details !1000000151!: $event$ - $event id$ - $time occurred$

NOTE:

The values specified within $ will be replaced with the actual values send by

Resiliency Orchestration . Text within $ should be in lower case (case sensitive), but

make sure the names are as it is from the original IBM Resiliency Orchestration

notification email.

3. Create Resiliency Orchestration user with the respective email used for templates and add to

the notification list. Make sure to have a separate notification list for these users and

attach the same to the group.

Business Process Integration

Some business processes that may or may not related to your DR environment need to co-

exist along with the processes monitored and managed by IBM Resiliency Orchestration.

Business Process Integration (BPI) allows you to incorporate such processes into IBM

Resiliency Orchestration workflow and therefore into DR environment.

Examples of such processes are daily back-ups of your database servers and the end of the

day operations that may impact BCOs.

Once configured, one or more such BPIs can run on Production or on the DR at the same

time. They can be configured to run only once or on periodic basis. These BPIs are associated

with the Functional Groups.

Configuration

129

BPIs are configured and incorporated into IBM Resiliency Orchestration using workflows

defined in XML files. These XML files are then imported to include a BPI. XML files are

validated before letting them integrated in IBM Resiliency Orchestration environment. Once

validated and imported, IBM Resiliency Orchestration system saves the timestamp of import,

name of the XML file, and the version. They can be exported for archiving or editing.

Exported workflow is also saved in XML format.

Listing Business Process Schedules

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To list the schedules of all the business processes configured for a Recovery Group, perform

the steps given below:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click the Recovery Groups tab, the respective Group Listing page appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click the Group Configuration tab.

5. Click the Business Processes tab to list the business processes of the Group.

This lists all the configured business processes, if any, for the Group with the following

details.

Field Description

Business Process Name Displays the name of the business process.

Business Process Description Displays the description for the business process.

Frequency Displays the frequency of business process schedule that is already configured.

Schedule Displays information about the schedule, if already configured. Otherwise the column displays as Not configured.

Status Displays the status of the business process.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 130

Field Description

The possible status are Enabled and N/A.

Adding Business Process

Refer IBM Resiliency Orchestration Server User Role Management to see the privileges.

You can add a business process to a Recovery Group or an Application Group.

To add a Business Process, follow the steps given below:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column for which you want to add

business process. The Group Details page appears.

4. Click the Group Configuration tab.

5. Click the Business Processes tab.

6. Under the Business Process Integration section, click the Add new Business

Process link. The Create Business Process dialog box appears.

Configure the following field elements:

Field Description

Group Name Displays the group name for which you want to add the business process.

Business Process Name Enter a unique name for the business process.

This field is mandatory.

Configuration

131

Field Description

Business Process Description Enter a description for the business process.

This field is mandatory.

7. Click Add.

or

Click Cancel to cancel the current operation.

Configuring Business Process

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To configure the new business process:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing page

appears.

3. Click the required group from the GROUP NAME column for which you want to configure

the business process. The Group Details Page appears.

4. Click the Group Configuration tab.

5. Click the Business Processes tab.

6. Click corresponding to the business process of interest. The Workflow Details page

appears, where you can configure and schedule the business process.

Custom Event

Custom events are those events that are not already available in IBM Resiliency

Orchestration; but they are required in your DR related business processes. You can

configure to raise customized events in IBM Resiliency Orchestration. This is done using a

shell script that can be imported into IBM Resiliency Orchestration at command line. You

need to write this script to suit to your needs.

The script takes values such as event name, description, severity, and impact, policy window

name, policy workflow details, and Group name. This script sends configured events to the

IBM Resiliency Orchestration server. However, such scripts need to be validated before

importing or exporting for any possible errors.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 132

The imported customized events, if raised, can be seen by clicking Events in the navigation

bar. To view the custom events and their policies listed navigate as mentioned in the

following section.

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow. The

Group Details Page appears.

4. Click Group Details > Group Configuration > Events tab.

Note:

Do not import the same event with the same name into the IBM Resiliency Orchestration.

This overwrites the earlier instance of that event. If you need to import the same event, use

different name.

You can associate a policy workflow along with an event. This policy can be a customized or

an already available policy in IBM Resiliency Orchestration. Event script is imported or

exported at command line using the shell scripts installed along with IBM Resiliency

Orchestration.

Importing custom event

1 Open command prompt.

2 Go to the directory where you want to import the custom event script.

3 Run following command at the command line:

import-event.sh importEvent <groupname> <custom event-xml-filename>

Exporting custom event script

1 Open command prompt.

2 Go to the directory where the custom event XML file you want to export resides.

3 Run following command at the command line:

export-event.sh exportEvent <groupname> <eventName> <custom event-xml-

filename>

Importing / Exporting custom event policy workflow

Once a custom event is imported into Enterprise DR Manager, use Workflow Manager

interface to import or export related policy workflow.

Examples

▪ Custom event without workflow

<?xml version="1.0" encoding="UTF-8"?>

<wf:custom-event xmlns:wf="/panaces/workflow/" >

<name>MyCustomEvent</name>

Configuration

133

<description>description</description>

<severity>WARNING</severity>

<impact>impact</impact>

</wf:custom-event>

▪ Custom event with workflow

<?xml version="1.0" encoding="UTF-8"?>

<wf:custom-event xmlns:wf="/panaces/workflow/" >

<name>MyCustomEvent</name>

<description>description</description>

<severity>WARNING</severity>

<impact>impact</impact>

<policy>

<execMode>auto</execMode>

<wf:workflow>

<name>some workflow name</name>

<description>some workflow description</description>

<action-list firstActionId="c1">

<action id="c1">

<registeredName>Custom</registeredName>

<name>custom action 1</name>

<description>Description</description>

<privateProperties>

<wf:scriptAction type="cmd" etcComputationType="userDefined"

componentType="dynamic" >

<serverName>Production Server</serverName>

<command>Some command</command>

<etcValue>10</etcValue>

</wf:scriptAction>

</privateProperties>

</action>

</action-list>

</wf:workflow>

</policy>

</wf:custom-event>

Scheduling

You can schedule a business process workflow for one of the following schedules:

▪ Schedule to run once on a particular day and time.

▪ Schedule to run daily at a particular time or at a recurring interval.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 134

▪ Schedule to run weekly on a particular day and time.

▪ Schedule to run monthly on a particular day and time.

To view the procedure involved in Scheduling a Business Process Workflow, refer Scheduling

Business Process Workflow.

Managing Business Process

Refer IBM Resiliency Orchestration Server User Role Management to see the privileges.

Business Processes can be managed by navigating to Business Processes tab of the group

as follows:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow. The

Group Details Page appears.

4. Click the Group Configuration tab and then click the Business Processes tab.

This page lists all the Business Processes of the group. It contains the following columns:

Field Description

Business Process Name Displays the name of the business process.

Configuration

135

Field Description

Status Displays the current status of the business process. It can be one of the following:

▪ Never Executed -The status indicates that the Business Process is not executed.

▪ Executing - The status indicates that the

workflow is executing.

▪ Awaiting Input - The status indicates that the workflow requires user input to proceed.

▪ Success - The status indicates that the workflow is completed successfully.

▪ Failed - The status indicates that the workflow execution has failed.

▪ Aborted - The status indicates that the workflow has been aborted.

▪ Crashed - The status indicates that the IBM Resiliency Orchestration has shutdown during execution.

Last Execution Time Time when the business process was executed last time.

Action Actions can be one of the following:

▪ Start - To start the business process

▪ Stop - To stop the business process. This

option is available only when business process is in progress.

▪ Resume - To resume the business process. This option is available only when business process has crashed earlier.

Deleting Business Process

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

A business process can be deleted from the Group Details page of a Recovery Group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 136

To delete a business process, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing

page appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click the Group Configuration tab.

5. Click the Business Processes tab to list the business processes of the Group.

6. In the business processes list, click corresponding to the process that you want to

delete.

Continuity Workflows

To view the business process workflows:

1. Click Monitor > AG/ RG > Application Group / Recovery Group Name.

2. The AG Details / RG Details page is displayed.

3. Click View All Workflows if it is a RG. All the BCO and BP workflows are displayed for

the RG.

• Click the BCO tab, all BCO workflows are displayed for the RG

• Click the BP tab, all BP workflows are displayed for the RG.

The following details are displayed:

Field Description

Workflow Name Displays the name of the workflow.

Displays the group name for which you want to add the business process.

Version status Displays the group name for which you want to add the business process.

Execution status Displays information if the execution was success, crashed aborted or is awaiting input.

Dry Run Status Displays information if the workflow was a success,

Configuration

137

Field Description

crashed, not executed or failed

▪ Click to preview the workflow.

Note

The user can perform the following manage tasks in addition to viewing, when the navigation

is from the Manage page.

▪ Click to edit the workflow.

▪ Click to delete the workflow.

▪ Click to execute the workflow.

▪ Click to DryRun the workflow

▪ Click to schedule the workflow execution.

▪ Click Create New to create a new workflow

Note

▪ If the group is in switchover or switchback, then the current DR state of the group

does not permit any continuity operations.

▪ To change the state of the group, go to Discover > groups page.

To view the execution history and the version history, click on the workflow name.

The Execution History displays the following information:

Field Description

Date Displays the date of execution

Time Taken Displays the time taken in seconds for execution

status Workflow execution status

Version Displays the version number

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 138

The Version History displays the following information:

Field Description

Version Displays the version number

Created On Displays the workflow created time

Created By Displays the User name

Workflow Manager

Workflow is a sequence of steps/tasks performed to complete a business process. The

business process could be a Business Continuity Operation or DR Drill or EOD operation.

Actions and workflows are a set of procedures that are configured to act against an event in

the DR environment. You cannot add or delete an Action from a Workflow when it is being

executed.

Workflow manager enables you to design the workflow logic, execute and view the execution

status.

Configuring the workflow involves:

▪ Design the workflow logic.

- Insert/delete actions to be performed

- Provide/alter inputs to the actions

▪ Flow control

- Conditions to quit/abort workflow

- Handle failure conditions

- Recursion (execute an action periodically)

▪ Scheduling the workflow

Executing the workflow involves:

▪ Execute (start/stop) workflow

▪ Schedule workflow

Execution Status:

▪ Show execution status

Configuration

139

Working with Actions

Adding Actions/ Action Groups/ Fork and Join

A user can add actions, or an action group to customize or build a workflow. The pre-built

actions are available in Recovery Automation Library (RAL) to insert in the workflow.

Note:

You cannot add an action/action group during workflow execution. If you attempt to do so,

an alert message "Could not insert Action/Action Group. Reason:<workflowname> workflow

is executing" will be displayed.

To insert an action:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it. The Workflow Editor page appears.

7. Click the Add button. The Add window appears.

Field Description

Category Select a category from the drop-down list.

Note:

To add an action:

i. Select an action category under Action Category. A list of actions under the selected action category appears.

ii. Click icon to add an action. This icon appears against each action.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 140

Field Description

To add an Action Group:

i. Click on to add an action group. It will add the default action group.

To add Workflows:

i. Select from the Select Signature Solution from the drop-down list.

ii. Click Import Workflow.

To add fork and join:

i. Click on icon to add a fork node. It is used to execute actions in parallel.

ii. Click on icon to add a join node. It is used to wait for executed forked actions.

Inserted Action Destinations

Success Path Drag the green bubble to the next destination action.

Failure Path Drag the red bubble to the next destination action.

8. Click Save now to add an action.

Configuring Actions

Configuration

141

An action is configured only when properties are attached to it. Both generic and advanced

properties have to be configured for every action. Configuration of actions can be done one

at a time in the Action Properties section. The generic properties are the same for all actions,

but you can configure them depending on the action. The advanced properties vary

depending on the action.

Note:

You cannot configure an action in a workflow when the workflow execution is in progress.

To open the Action Properties section:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing page

appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it. The Workflow Editor page appears.

Note:

You can change the existing properties by clicking on any Action or Action group in the Action

graph.

To edit generic properties of Action or Action group:

1. Click the icon or double click on an action.

The following table describes the run time properties of the actions:

Field Description

Name Specifies the name of the action.

You can modify if required.

Description Displays the description for the action.

You can modify if required.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 142

Field Description

Execution Mode This property indicates your intervention preference in action execution. It is either Manual or Auto. Default setting for each action is Auto.

▪ Manual specifies that there is some user intervention to execute the action. To enable the action to raise an Input Required event, set it to Manual execution mode.

▪ Auto specifies that no user intervention is required to execute the action.

In case the Retry on Failure checkbox is selected and the

Execution Mode is set as Manual, then action is executed without manual intervention.

Inform Upon This property indicates whether to notify after the Action execution completes. Notification is done based on the value of this property. The available options are:

▪ No Inform

▪ Inform on Success

▪ Inform on Failure

▪ Inform All

If the property is set to Inform on Success, notification is done

only after successful execution of the action.

If Inform Upon is set to Inform All or Inform on Failure and

Retry on Failure is also configured:

▪ Notification is done only once after the execution of the action

▪ In case, the action fails during first execution instance, then Retry on Failure will try to execute the action

again without notification.

▪ If the action fails on all attempts, the user is notified and has the control to continue/quit/retry etc.

Configuration

143

Field Description

Skip this Action Select the checkbox to skip a particular action in the workflow. The skip action property can be configured even when the workflow is being executed.

If any action is skipped in the workflow, the skipping action

takes the success path for that action.

Any skipped action will have the status displayed as ‘Skipped’ for

that action.

Field Description

Sync Name Provide the name of the Sync point.

A name that can be used to have the consistency across

the RGs of an AG. You can achieve the consistency of an

AG by providing the sync points to an action in a

Business Process of the respective RGs.

For example:

Split

Mount

Apply

Unmount

Establish

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 144

Field Description

Retrying Actions

Retry On Failure Select the checkbox to automatically retry the action on failure.

Retry Count Enter the retry count. It is the maximum number of attempts to execute the action after the failure.

Minimum value for this field is 1.

This field is displayed only when you select the Retry On Failure checkbox.

Retry Wait Time Enter the time in seconds to wait before retrying after the failure.

Minimum value for this field is 1.

This field is displayed only when you select the Retry On Failure checkbox.

Is Retryable This property can be used to set the action for retrying. It can be set to Yes or No. If set to Yes , the Retry button is enabled when the action fails. If you set it to No, the button appears disabled.

Note:

▪ In case the Retry on Failure checkbox is selected and the Execution Mode is

set as Manual, then action is re-executed without asking the user again.

▪ If the Retry on Failure checkbox is selected and Inform Upon is set to

Inform All or Inform on Failure:

▪ Notification is done only once after the execution of the action.

▪ If the action fails during first execution instance, then Retry on Failure will try

to execute the action again without notification.

▪ If the action fails on all attempts, the user is notified and has the option to

continue or quit or retry.

▪ If the Retry on Failure checkbox is selected and Abort Upon is set to Abort

All or Abort on Failure:

▪ If the action fails during first execution instance, then Retry on Failure will try

to execute the action again without aborting.

▪ If the action fails on all attempts, the action is aborted

▪ When the Retry on Failure checkbox is selected, is Retryable will be set to

Yes.

Configuration

145

Field Description

Abort Upon Execution of a Workflow can be aborted upon a particular action's success or failure condition. This property can be enabled with four options. They are:

▪ Abort All

▪ No Abort

▪ Abort on Success

▪ Abort on Failure

If Abort on Success is enabled for an action in Workflow and if the execution of that action was successful then the Workflow execution is aborted. Otherwise, the Workflow execution continues.

If the Retry on Failure checkbox is selected and Abort Upon is set to Abort All or Abort on Failure :

▪ In case, the action fails during first execution instance, then Retry on Failure will try to execute the action again without aborting.

▪ If the action fails on all attempts, the action is

aborted.

Recurrence

Interval

The value specified here executes the action in a loop with the specified sleep interval. Within a Workflow, if an action is set with this property then the next action execution is controlled by Time To Execute.

Time to wait before executing this Action

Represents the current action execution to be kicked-off after x seconds, just after the previous action has been started to execute. So if x=0 for an action in a Workflow, then that action will be executed after 0 seconds just after the previous action has been started to execute. That means the current

action execution and the previous action execution are in parallel. Since this property is dependent on previous action, it is not applicable for an independent action and also for the

first action within a top level Workflow.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 146

Field Description

Severity for User Input Event Provides the options to set the severity of events requiring your inputs. It can be set to:

▪ WARNING

▪ SERIOUS

▪ CRITICAL

▪ INFO

Severity for Action Failure Event

Provides the options to set the severity of Action failure events. It can be set to:

▪ WARNING

▪ SERIOUS

▪ CRITICAL

▪ INFO

Configuration

147

Field Description

Action Operation Type This field displays the category to which the action belongs.

Some of the Available action categories are:

▪ Replication

▪ IBM

▪ Oracle

▪ PFR

▪ File

▪ SQL Server

▪ Process

This is a non- editable property for all actions except for the Custom Action.

For Custom action, Action Operation Type should be set by the user based on the operation that the custom action is configured to perform. In addition to the above RAL action

category, the following Action Operation Types are also available for the user to select.

▪ Network

▪ Application

▪ Business Process

▪ Other

Note:

Changing the type of the Custom action will not change the type in the status/analysis for the already executed instances of the workflow.

Raise event when User Input on Failure is not configured

Select the check box to raise an event when User Input on Failure is not configured.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 148

Field Description

Override ETC Select this check box to override the expected time to complete.

ETC Enter the expected time to complete the task. By default, it is 10 seconds. You can give any value greater than zero.

2. The generic configuration is common for all actions.

3. Click Save now, to save the configured generic properties, if modifications are done after

actions are configured.

To edit advanced properties of an action:

1. Click the Action Properties tab.

2. Enter the appropriate values in the relevant fields. The advanced properties vary

depending on the action. To view the Advanced Properties configuration for RAL Actions,

click here.

3. Click Save now to save the changes. This displays a message saying "Workflow saved

successfully."

Configuring Action Groups

An action Group is considered as configured only when its properties and its actions are

configured. Only generic properties have to be configured for action group. Configuration of

action group can be done one at a time in the Action Properties section.

Note:

You cannot configure an action group in a workflow when the workflow execution is in

progress.

For Action Groups, only "recurrence" property can be set and rest of the properties are not

applicable.

To open the Action Properties section:

1. Click DISCOVERY > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing page

appears.

Configuration

149

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it . The Workflow Editor page appears.

Note:

You can change the existing properties by clicking on any Action group in the Action graph.

To edit generic properties of Action group:

1. Click the icon or double click on an action group.

2. To edit the run time settings, refer to Configuring Action.

3. Enter the appropriate values in the relevant fields. The generic configuration is common

for all action group.

4. Click on icon to edit the action group.

5. Make the required changes in the relevant field.

6. Click Save now , to save the configured properties, if modifications are done after actions

are configured.

Configuring Fork and Join

A fork is considered as configured only when its properties and its actions are configured.

Only generic properties have to be configured for a fork node. Configuration of a fork node

can be done one at a time in the Action Properties section.

Note:

You cannot configure a fork and join in a workflow when the workflow execution is in

progress.

To open the Action Properties section:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing

page appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click Group Configuration tab.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 150

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it. The Workflow Editor page appears.

7. Click icon to add a fork, then add an action in between a fork and join.

Note

▪ Start of an action is connected to a fork and the end of an action is connected to a

join.

▪ You can change the existing properties by clicking on any Fork node in the workflow.

To edit generic properties of a fork node:

1. Click the icon or double click on a fork node.

2. To edit the run time settings, refer to Configuring Action.

3. Enter the appropriate values in the relevant fields. The generic configuration is common

for all action group.

4. Click on icon to edit the fork node.

5. Make the required changes in the relevant field.

6. Click Save now, to save the configured properties, if modifications are done after actions

are configured.

Deleting Actions/ Action Groups/Fork and Join

You can delete one or more actions, action groups and fork and a join from a workflow.

Some of the actions in a workflow are pre-defined. Such actions cannot be deleted and the

delete button will be disabled for them.

Note:

You cannot delete an action during a workflow execution. If you attempt to do so, a pop up

with message "PAN-SACM-4302: Could not configure Workflow as Workflow execution is in

progress" is displayed.

For a workflow, if you delete the last action in an Action Group, the Action Group also gets

deleted. However, the last action in a workflow cannot be deleted. If you want to delete the

last action, add a new action to the workflow and then delete the action.

To delete an action:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing page

appears.

Configuration

151

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. click on Edit icon against the workflow to edit it . The Workflow Editor page appears.

7. Click the Action/Action Group/Fork and join in the workflow editor that you want to

delete and click icon. A message box is displayed.

8. Click OK on the message box to delete the selected action/ action group/ fork and join.

Copy Workflow/ Copy Action

Copy Workflow

This a new feature added in Workflow manager to copy a workflow from any other group

with similar signature. This process is executed in series and will has a Wizard based

execution.

To copy a an existing workflow, perform the following steps:

1. Click Drills > Workflow list > Select Create New Workflow.

2. Select a group from the Group listing page.

Field Description

Name Provide the workflow name

Category Select one of the following category from the drop-down

list:

▪ Drills

▪ Business Process

3. Click Create new.

4. Click on Add to add the workflows.

5. Select the Workflow tab from the Add Window

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 152

Field Description

Solution Signature Select one of the solution signature from the drop-down list.

Group Select a group from the list.

6. Select the workflow to be copied and click on icon from the list.

A message box is displayed confirming the copy action."Copying the workflow on canvas will

replace all the existing items on the canvas. Do you wish to continue?"

7. Click OK in the message box to replace the workflow with a new workflow.

Copy Action

This a new feature added in Workflow manager, which is used to copy an action from

Workflow.

1. Click Drills > Workflow list > Select Create New Workflow.

2. Select a group from the Group listing page.

Field Description

Name Provide the workflow name

Category Select one of the following category from the

drop-down list:

▪ Drills

▪ Business Process

3. Click Create new.

4. In Workflow Editor page, select an action.

5. Click on icon to copy the selected action.

Configuration

153

Zoom in and Zoom Out Workflow

To zoom in and out of the workflow, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow. The

Group Details Page appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it. The Workflow Editor page appears.

To Zoom in:

i. Click icon to Zoom in to the workflow.

To Zoom out:

i. Click icon to Zoom out of the workflow.

Creating new workflow

To create a workflow in a group, perform the following steps:

1. Click Drills>Summary tab.

2. Select a group from the Drills page.

3. Click on Create new button or Click Create new workflow. The user is directed to the

Select Workflow tab.

Field Description

Workflow Name Provide the workflow name

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 154

Category Select category from the drop-down list- Drill or Business Process

4. Click Create New.

OR

▪ Click Manage> RG Listing > Group Name

▪ Click View All Workflows in Continuity Workflows

▪ Click BP Workflows > Create New Workflows.

▪ The user is directed to the Select Workflow tab

To create a new Business Process workflow:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group Listing

page appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click Group Configuration > Business Process.

Field Description

Name Provide the workflow name

Category Select Business Process category from the

drop-down list

Deleting Workflow

To delete an action, perform the following steps:

1. In the navigation bar, click Drills > Summary tab

2. Select the group.

3. Click the workflow name > click Delete Button icon. A message box is displayed.

4. Click OK on the message box to delete the workflow.

Configuration

155

Importing or Exporting a Workflow

You can import or export a workflow in the XML file format. This is possible only for the

workflows which are generic and are not pre-defined in IBM Resiliency Orchestration. The

XML files of the workflows contain complete configuration of all the actions in the workflow.

As a result, once the XML file is imported, parameter settings for all actions are automatically

populated. On the other hand, by exporting, you can take backup of a workflow in XML

format.

You may like to export a workflow of an existing Group and import it for a newly created

Group. However, while doing this, caution must be taken to change the Production and DR

components specified in the XML file before importing it for the new Group.

Import/ Export functionality can be accessed in the Workflow Details page.

To access Import/ Export functionality...

1 Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2 Click Recovery Group or Application Group tab, the respective Group Listing page

appears.

3 Click the required group from the GROUP NAME column. The Group Details Page

appears.

4 Click the Group Configuration tab.

5 Click Business Processes or Tests or Continuity or Events tab depending upon the

workflow which you want to import/export.

6 Click the link for the desired operation. The Workflow editor page appears.

To Import Workflow

1 Click on Add button.

2 Click on the workflow tab.

3 Click the Import Workflow button and import the file.

To Export Workflow

1 Click on the Export button at the footer.

To import a XML file for a workflow...

Importing a workflow will overwrite the existing workflow. Make sure that you have specified

the right components in the XML file for the desired Group.

For the import to be successful, the workflow must not be running.

1 Open the Workflow Editor page.

2 Click on Add button.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 156

3 Click on the workflow tab.

4 Click the Import Workflow button and import the file.

5 Click Browse to open the Choose file dialog box.

6 Select the desired XML file and click Open in the Choose file dialog box.

To export workflow for a Group...

1 Open the Workflow Editor page.

2 Click the Export button.

3 A pop up message is displayed as "Will export the last published workflow?"

4 Click Yes to open File Download dialog box.

5 Click Save to open the Save as dialog box to save the XML file at the desired location.

Note:

▪ While exporting a workflow with Skip property 'Disabled', the XML file will not contain

any tags with respect to skip for that action. However, when the workflow is exported

with Skip property 'Enabled', the XML file will have skip tag for that action. The case is

similar for 'Single step'.

▪ When importing a workflow from a file, the version number of the imported workflow

goes through a validation check of supported RAL versions. If the version of the

imported workflow is not supported, the following message is displayed.

"Import Failed!

The Current Recovery Automation Library (RAL) Version is <ral_version>

The version of the workflow that you are trying to import is <version>

This is not compatible with the current RAL Version.

The versions of the following actions are not compatible with current RAL Version.

Action Name = <action_name>, Version = <action_version>

Action Name = <action_name>, Version = <action_version>

Action Name = <action_name>, Version = <action_version>

Action Name = <action_name>, Version = <action_version>

Action Name = <action_name>, Version = <action_version>

Please consult the IBM Resiliency Orchestration Workflow Version Compatibility

Matrix/User Manual before importing the Workflow"

Configuration

157

▪ While exporting a workflow, you have two options. One is to open it in the browser

directly without saving it and the other is to save it onto a local disk. The Open option

does not work. Use only Save button to save a workflow onto the disk and open later

with an editor of your choice.

Scheduling Business Process Workflow / Drills

You can schedule a business process workflow for one of the following:

▪ Schedule to run just once.

▪ Schedule to run daily at a particular time or at recurring intervals.

▪ Schedule to run weekly on a particular day and time.

▪ Schedule to run monthly on a particular day and time.

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow.

The Group Details Page appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills tab depending upon the workflow type you want to

configure.

6. Click on Edit icon against the workflow to edit it . The Workflow Editor page appears.

7. Click Publish.

8. Again click Publish Workflow.

The Workflow Listing page appears.

9. Click the Scheduler icon for the published Workflow accordingly.The Schedule

Workflow pop-up appears with the Group name and Workflow name.

10. Click on the Enable schedule checkbox to schedule the Workflow.

Field Description

Recurrence Frequency

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 158

Field Description

Just Once Select this option to run the workflow once on a particular date and time.

Click and select the date from the displayed calendar.

Daily Select this option to run the workflow daily at a particular time or at recurring intervals.

In the For Duration drop-down list:

▪ Select Forever to run the workflow daily

forever (or)

▪ Select Custom Range to run the workflow

daily for the desired duration. Click and select the dates between which you want to

run the workflow.

The scheduled dates should not be less than the current date.

Set the hourly frequency of the execution and the end time from the drop-down lists under Start Executing this Process at option.

Weekly Select this option to run the workflow weekly on a particular day and time.

Select the checkboxes corresponding to the days on which you want to run the workflow.

In the For Duration drop-down list:

▪ Select Forever to run the workflow weekly

at the specified day and time forever (or)

▪ Select Custom Range to run the workflow weekly at the specified day and time for the

desired duration. Click and select the dates between which you want to run the

Configuration

159

Field Description

workflow.

The scheduled dates should not be less than the current date.

Monthly Select this option to run the workflow monthly on a particular day and time.

Select Day of every month option to run the workflow on a particular date of every month.

Select Every option to run the workflow on every nth week and particular day of every month.

In the For Duration drop-down list:

▪ Select Forever to run the workflow monthly at the specified day and time forever (or)

▪ Select Custom Range to run the workflow monthly at the specified day and time for the

desired duration. Click and select the dates between which you want to run the

workflow.

The scheduled dates should not be less than the current date.

Start Executing this Process at Set the start time to execute the workflow from the drop-down list.

The time format is HH:MM:AM/PM.

11. Enter the appropriate values in the relevant fields and click Done.

Note:

You can also view the Workflow listing page, by clicking Drills >Drills list view in

the navigation bar. Select the group, the Workflow Listing page appears.

You can view all the scheduled workflows by clicking on the Workflow calender in the

right hand side of Workflow listing page.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 160

For Drills : Only lists all the scheduled workflows, as drills won’t be executed.

For Business Processes: Lists all the workflow scheduled after the current minute.

▪ Just Once: Once the workflow is executed, it will not be listed in the Workflow

calendar list.

▪ Daily, Weekly, Monthly: Once executed, the list will be updated with the date

and time as per schedule.

Automatic Retry on Failure

IBM Resiliency Orchestration allows automatic retry of an action if it fails. Action is executed

until it succeeds or for a specific number of times, whichever comes first.

To configure Automatic Retry on Failure through UI

1. Open the Workflow editor page.

Click DISCOVER > Groups on the navigation bar. The Groups page appears.

Click Recovery Group or Application Group tab, the respective Group listing page appears.

Click the required group from the GROUP NAME column for which you want to configure the

workflow. The Group Details page appears.

Click Group Configuration tab.

Click Business Processes or Tests or Continuity or Events tab depending upon the

operation you want to configure.

Click the link for the desired operation to which you want to configure actions. The Workflow

Editor page appears.

2. Click the Properties tab for the action you want to configure.

3. Set the following fields.

Field Description

Retry On Failure Select this check box to automatically retry the action on failure.

Retry Count Enter the retry count.

It is the maximum number of attempts to re-execute the action if and only if it fails.

This field can have integer values greater than zero.

Retry Wait Time Enter the time in seconds to wait before a retry after

Configuration

161

Field Description

failure.

This field can have integer values greater than zero.

Note:

▪ In case the Retry on Failure checkbox is selected and the Execution Mode is set as

Manual, then action is re-executed without asking the user again.

▪ If the Retry on Failure checkbox is selected and Inform Upon is set to Inform All or Inform

on Failure:

▪ Notification is done only once after the execution of the action.

▪ If the action fails during first execution instance, then Retry on Failure will try to

execute the action again without notification.

▪ If the action fails on all attempts, the user is notified and has the option to

continue or quit or retry.

▪ If the Retry on Failure checkbox is selected and Abort Upon is set to Abort All or Abort

on Failure:

▪ If the action fails during first execution instance, then Retry on Failure will try to

execute the action again without aborting.

▪ If the action fails on all attempts, the action is aborted.

▪ When the Retry on Failure checkbox is selected, is Retryable will be set to "Yes".

Single Stepping Actions in Workflows

Enabling single step will wait for user confirmation while executing each action in the

workflow. Single step specifies that there is some user intervention to execute the action.

Use Enable Single Step to raise an Input Required event.

To enable this feature, perform the following:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 162

3. Click the required group from the GROUP NAME column to configure the workflow. The

Group Details Page appears.

4. Click the Group Configuration tab.

5. Click the Business Processes or Drills or Continuity or Events tab depending upon the

operation you want to configure.

6. Click the link for the desired workflow. The Workflow Editor page appears.

7. Click Publish.

8. Click the Enable Single Step button to enabling single stepping.

To disable single stepping, follow the steps from 1 to 6 and click the Disable Single Step

button.

Note:

▪ In case the Skip checkbox is selected and the Single Step is Enabled, then action is

skipped without manual intervention.

▪ In case the Execution Mode is set as Auto and the Single Step is Enabled, the

workflow will wait for user confirmation to execute.

▪ In case the Execution Mode is set as Manual and the Single Step is Enabled, the

workflow will wait for user confirmation only once to execute.

Synchronizing Workflow with RPO/RTO

It is possible that the Workflow being executed is also being considered for RPO/RTO

calculation. To avoid this conflict, you can synchronize the Workflow with RPO/RTO

calculation mechanism.

To do the synchronization, perform the following steps:

1. Identify the Action/Action Group that can probably conflict with RPO/RTO mechanism.

2. Insert Group Lock action at the start and end of the Action/Action Group. Refer Adding

Actions/ Action Groups for procedural details.

3. In the Action graph, click the Group Lock action at the start of the Action/Action

Group.

4. Click the Advanced tab in the Action Properties section.

5. Select the Acquire Lock option to associate lock acquisition action to the Group Lock

action.

6. Click Finish.

7. In the Action graph, click the Group Lock action at the end of the Action/Action Group.

Configuration

163

8. Click the Advanced tab in the Action Properties section.

9. Select the Release Lock radio button to associate lock removal action to the Group

Lock action.

10. Click Finish.

This synchronization is performed on first-come-first-serve basis. Only after release of the

Group Lock, the conflicting action can resume.

Publish/ Save as a Draft

Publish

This feature is added in Workflow manager to publish completely configured workflow. To

start the execution, the workflow should be published.

To publish a workflow, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow. The

Group Details Page appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it . The Workflow Editor page appears.

7. Click Next.

8. Click Publish button to publish the workflow.

Save as a Draft

This feature is added in Workflow manager to provide the user with an option to save the

workflow created as a draft. To start the execution, the workflow should be published.

To save the workflow in draft state, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column to configure the workflow.

4. Click Group Configuration tab.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 164

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it. The Workflow Editor page appears.

7. Click Next.

8. Click Save as a draft in the Publish Workflow page.

Previewing Workflow

To preview a workflow, perform the following steps:

1. Click Drills > View Workflow Dashboard > Select Create New Workflow.

2. Select a group from the Group listing page.

3. Click the icon corresponding to the workflow that you want to preview.

Workflow Version History/ Rollback

▪ Workflow Version History is a new features added in Workflow Manager, the goal is to

track the workflow level changes such as adding/deleting actions, updating workflow

properties, also to track the action level changes within a workflow. Action level

changes like action basic/advanced properties configuration, property values. Also to

track any changes to the custom script by using the checksum compare feature

between workflow versions.

▪ Every time a workflow is published, the workflow version is saved.

▪ Rollback is a new feature added to the Workflow Manager, is used to rollback the

previous workflow configured.

To view the published workflow versions, perform the following procedure:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click Group Configuration tab.

5. Click Business Processes or Drills or Continuity or Events tab depending upon the

workflow type you want to configure.

6. Click on Edit icon against the workflow to edit it . The Workflow Editor page appears.

7. Click on the Version button at the footer.

Configuration

165

Field Description

Version Displays the version number of the corresponding published workflow.

Created on Displays the timestamp of the corresponding published workflow.

By Displays the user's name for the corresponding published workflow.

Rollback This button is used to rollback a particular version.

Workflow Key Value List

Key-Value Pair

A Key-Value Pair (KVP) is a set of two linked data items: a key and its associated value.

A key-Value box (KVB) is a lookup table containing KV pairs. This can be configured through

workflow configuration UI or through import of workflow XML.

KV pair can be used to provide inputs to RAL actions. Each RAL action publish their keys.

During execution, if action finds its published key, then the action uses the associated value.

For example, File Delete Operation Action defines PANFO_DELETE_FILE as the key to identify

the file to be deleted. So during execution, the file identified by the key will be deleted.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 166

Adding Key Value Pair

To add a key value pair to the Key Value List:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing page

appears.

3. Click the required group from the GROUP NAME column. The Group Details page

appears.

4. In the Group Details page, click Group Configuration tab. It further displays a list of

tabs. The Business Process, Drills, Continuity and Events tabs allows to add a key

value pair.

5. Click the desired tab and select any name (BCO Name, Drill Name, Event ID,

BUSINESS PROCESS NAME column) in the group.

6. In the Workflow Editor page that opens, click the Key Value Pairs link. The Workflow

Key Value List window opens.

OR

5. Click Publish, Publish workflow page appears. The Workflow Key Value List window

opens.

Field Description

Key A key is a string that uniquely identifies a specific property of an object/entity.

This field can contain only string datatype.

Keys must begin with an alphabet, and must not contain whitespace.

Value A Value is the data/property that is identified by its Key.

This field can contain only string datatype.

Click Add to enter the key and value to the Key Value List.

Key Value List A Key Value List is a set of two linked data items: a Key, and its Value.

Configuration

167

6. Enter the appropriate information in the relevant fields.

7. Click Add key value button to save the changes.

Group level Key Value configuration

Group level KV are the global key value at group level which will be available to all the

Workflows in Test Exercise, Business Process and BCOs.

CLI to Add/Update/Delete group key value are available under

$EAMSROOT/IBMUtil/AG/AGTestClient.sh

steps to add global kv (Add - operation)

1. Execute AGTestClient.sh script and type “groupkv”.

2. It prompt you to enter operation 'Enter Add, Update, Delete operation of global KV’, enter

Add.

3. Enter the Enter Group Name under which you want to create global KV

4. Enter Key Name, e.g. MountPointList_DR_Redo and then Enter Values Name, e.g.

/findb_redo1, /findb_redo2, /findb_redo3, click enter.

5. Your global KV will be saved.

Following are the steps to update global key value (Update - operation)

1. Execute AGTestClient.sh script and type “groupkv”.

2. It prompt you to enter operation 'Enter Add, Update, Delete operation of global KV’,enter

Update

3. Enter the Enter Group Name under which you want to update global KV

4. Enter Key Name, e.g. MountPointList_DR_Redo and then Enter Values Name to be update,

e.g. /findb_redo1, /findb_redo4, /findb_redo8, click enter.

5. Your global KV will be updated.

Following are the Steps to delete global key value (Delete - operation)

1. Execute AGTestClient.sh script and type “groupkv”.

2. It prompt you to enter operation 'Enter Add, Update, Delete operation of global KV’,enter

Delete

3. Enter the Enter Group Name under which you want to delete global KV

4. Enter Key Name, e.g. MountPointList_DR_Redo and then for Enter Values Name,enter

nothing , click enter.

5. Your global KV will be deleted.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 168

Modifying Key Value Pair

To modify a key value pair:

1. Open the Workflow Key Value List window. For more information, refer to Adding Key

Value Pair.

2. Select the key value pair you want to edit from the Key Value List field and click Edit.

3. Modify the key name in the Key field.

4. Modify the value for the key in the Value field.

5. Click Add to add the modified key value pair to the Key Value List.

6. Click Add key value to save the changes.

Removing Key Value Pair

To remove a key value pair from the Key Value List:

1. Open the Workflow Key Value List window. For more information, refer to Adding Key

Value Pair.

2. Select the key value pair you want to delete from the Key Value List field.

3. Click icon to delete the key value pair from the Key Value List.

4. Click on Save now to save the changes

Note:

Currently, removing all the key-value pairs associated with a workflow using the above

procedure submits and empties the key-value list to the back-end, which will overwrite the

existing values associated with a workflow.

Applying the Key Value

You can apply the user defined or pre-defined keys through UI or XML file.

Through UI:

1. Open the Workflow details page.

2. Click the Action properties tab of the relevant RAL action.

3. Use the pre-defined or user defined key.

4. Save the action.

Configuration

169

Through XML:

1. Export the current workflow. The exported workflow is saved in XML format.

2. Open the XML file in text editor.

3. Write the XML tags using pre-defined or user defined keys.

4. Save the XML file.

5. Import the saved XML file.

Workflow Configuration Limitations

Following are the invalid/unsupported workflow configurations:

▪ A recurring action should not be configured with "Time to wait before executing this

Action". The behavior is unpredictable if configured.

▪ An action within a recurring action group should not be configured with "recurrence

interval". The behavior is unpredictable if configured.

▪ In a workflow, an action group can contain only RAL actions, not another Action

Group.

▪ Workflow should not be created where the success path and failure path of

Actions/Action Groups forms loop/cycle. The behavior is unpredictable if configured

and user should not try to delete action/actiongroup using UI.

For example, assume a workflow is being created with three actions (say A1, A2, A3).

If A1's next action is A2 and A2's next action is A3 and A3's next action is either A1 or

A2 then it forms a cycle/loop among the actions. Such configuration results in

unpredictable behaviour like high CPU utilization resulting in software/system crash. If

any workflow has cycle/loop then the only workaround is to import a new workflow

without cycles/loops.

Configuring Approver List

To view the Workflow Details, go to Adding Key Value List.

The following steps can be performed to configure the Approver list.

1. In the Workflow Editor page, Click Next.

2. In Publish worklow page, select the checkbox to select the approvers for execution.

3. Click on Publish Workflow.

Note:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 170

▪ A user having privilege to create/modify a workflow can configure the list of 0 or more

approvers. Only one of the approvers from the approver list can approve the

workflow.

▪ Approvers selected will be user accounts who are associated with the concerned

group.

▪ Any change made to the approver list of a workflow will be audit logged, mentioning

the list of users who are approvers also.

Recovery Automation Library (RAL)

The IBM Resiliency Orchestration RAL provides actions insertable into any workflow. The

library is packaged with the product. The actions implement specific automatic tasks, with

defined input and output parameters.

The actions are classified into the following categories:

1. AWS

2. DB2

3. EMC BCV

4. EMC Clone

5. EMC SRDF

6. File

7. Hitachi Shadow Image

8. Hitachi TrueCopy

9. Hitachi Universal Replicator

10. HP XP BusinessCopy

11. HP XP Continuous Access

12. HP XP Continuous Access Journal

13. MS Exchange Dataset

14. MySQL Dataset

15. MSSQL Mirroring dataset

16. NetApp SnapMirror

17. Oracle

18. Panaces File Replicator (PFR)

19. PostgreSQL Dataset

20. Process

21. Repeatable

22. Replication

Configuration

171

23. SQL Server

24. VMware vCenter

25. Workflow

26. Zerto

Note:

▪ Hitachi Replicator is classified into three categories:

▪ Hitachi TrueCopy

▪ Hitachi Universal Replicator

▪ Hitachi Shadow Image

▪ EMC SRDF Replication is classified into two categories:

▪ EMC SRDF

▪ EMC BCV

▪ All IBM workflows use these RAL actions to implement their business continuity

operations.

▪ RAL provides complete use of RAL actions to end-users and support personal to

introduce new workflows or modify the extended existing workflows (BCO's, BPI's,

policies and DR drills).

▪ RAL actions can be exported/ imported to/ from XML files.

▪ Workflow execution will capture the output of the action, including any output

parameters returned by the actions.

▪ If there are multiple primary or DR servers in a group, then the user should select the

exact component server where the script/ command will be executed.

AWS

Create Route Table

Description

This action will add routing entry to a route table.

Inputs

Input Name Input Type Input Key Name Optional/

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 172

Input Name Input Type Input Key Name Optional/

Mandatory

Management

Service Name

Choose from List

of Management

Service Name

AWS_MANAGEMENT_SERVI

CE

Mandatory

Region Choose the AWS

Region

AWS_REGION Mandatory

VPC Choose the VPC

available on the

selected region

N/A Optional

Route Table Id Choose Route

Table Identifier

AWS_ROUTE_TABLE_ID Mandatory

Destination CIDR Destination CIDR AWS_DESTINATION_CIDR Mandatory

Gateway Provide Gateway

name/id

AWS_GATEWAY_ID Mandatory

Notes:

▪ IBM Resiliency Orchestration supports only EC2-VPC type of instance.

▪ If this RAL if configured in UI, then only add one route can be added at a time . If we

need to add more than one route information to a route table, then the RAL needs to

be exposed with additional KV named AWS_ROUTE_LIST and the value will be in

following format 10.0.1.0/24,igw|10.0.2.0,igw12.

Attach Amazon Volume

Description

This action attaches an AWS volume.

Inputs

Input Name Input

Type Input Key Name Optional/

Mandatory Description

aws management

service

String AWS_MANAGEMENT_

SERVICE

Mandatory Select the

management

service from

Configuration

173

Input Name Input

Type

Input Key Name Optional/

Mandatory

Description

the drop-

down list.

AWS Region String AWS_REGION Mandatory Choose the

AWS Region

aws volume id String AWS_VOLUME_ID Mandatory Select the

volume id

from the

drop-down

list.

aws instance id String AWS_INSTANCE_ID Mandatory Provide the

aws instance

id.

aws instance

name

String AWS_INSTANCE_NAM

E

Optional Provide the

aws instance

name.

aws device String AWS_DEVICE Mandatory Provide the

aws device.

Note:

Select the checkbox to list all the instance names/ids.

Select any list item, then instance name and instance id is auto populated.

▪ To auto populate the instance name and instance id, select the checkbox to list all the

instance names/ids.

▪ To attach multiple volumes, the user has to configure the following keys with comma

separated values: AWS_VOLUME_ID and AWS_DEVICE.

▪ Valid value for key AWS_AUTO_SCAN_DEVICE_NAME is yes.

AmazonS3BucketCleanup

Description

This action cleans file or folder from specified S3 bucket.

Inputs

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 174

Input Name Input

Type

Input Key Name Optional/

Mandatory

Description

Management Service

Name

Integer AWS_MANAGEMENT

_SERVICE

Mandatory Select the

Management

service from

the drop

down list.

Bucket Name String AWS_BUCKET_NAM

E

Mandatory Select the

Bucket name

from the drop

down list.

File/Folder Path String AWS_S3_PATH Mandatory Provide the

file or folder

path.

Note

File/Folder path should not contain bucket name. Eg: x/y.txt where x is folder name and y is

file name.

Attach Security Group

Description

This action will attach the security group to an AWS EC2 instance.

Inputs

Input

Name

Input Type Input Key Name Optional/

Mandatory

Management

Service

Name

Choose from

List of

Management

Service Name

AWS_MANAGEMENT_SERVICE Mandatory

Region Choose the

AWS Region

AWS_REGION Mandatory

Configuration

175

Input

Name

Input Type Input Key Name Optional/

Mandatory

VPC

Choose the

VPC available

on the

selected

region

AWS_VPC_ID Mandatory

Instance

Choose the

Instance

which

depends on

VPC

AWS_INSTANCE_ID Mandatory

Security

Groups

Choose

Multiple

Security

Groups

available for

the selected

VPC

AWS_SECURITY_GROUP_ID Mandatory

Note:

IBM Resiliency Orchestration supports only EC2-VPC type of instance.

Attach Elastic IP

Description

This action will attach the Elastic IP to an AWS instance.

Inputs

Input

Name Input Type Input Key Name Optional/

Mandatory

Management

Service

Name

Choose from List of

Management

Service Name

AWS_MANAGEMENT_SERVICE Mandatory

Region Choose the AWS

Region

AWS_REGION Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 176

Input

Name

Input Type Input Key Name Optional/

Mandatory

VPC Choose the VPC

available on the

selected region

AWS_VPC_ID Mandatory

Elastic IP Choose Elastic IP AWS_ELASTIC_IP Mandatory

Instance Choose the Instance

depends on VPC

AWS_INSTANCE_ID Mandatory

Re-associat

address

Select Checkbox

(Allow an Elastic IP

address that's

already associated

to be re-associated)

AWS_CIDR_BLOCK Optional

Outputs

Output Name Output Key Name Description

AWS Association

Id

AWS_ASSOCIATION_ID Association Id of elastic IP

Notes:

IBM Resiliency Orchestration supports only EC2-VPC type of instance.

AWS Instance Status Checks RAL

Input:

Management Service Name Region Name and Instance ID for which Instance status checks

can be monitored.

DryRUN: Check if the management Service and Instance exists or not.

Result: Monitoring until the Instance status checks (System reach-ability and Instance

reach-ability) are verified successfully.

NOTE:

▪ kv AWS_MANAGEMENT_SERVICE as Management Service Name.

▪ kv AWS_REGION as Region Name

Configuration

177

▪ kv AWS_INSTANCE_ID as Instance ID.

AWS Instance Terminate RAL

Input:

Management Service Name Region Name and Instance ID which can be terminated.

DryRun: Check if the management Service and Instance exists or not.

Result: Terminate the Instance.

NOTE:

▪ kv AWS_MANAGEMENT_SERVICE as Management Service Name.

▪ kv AWS_REGION as Region Name.

▪ kv AWS_INSTANCE_ID as Instance ID.

Create Amazon Instance

Description

This action creates an instance in the AWS.

Inputs

Input Name Input

Type

Input Key

Name

Optional/

Mandatory

Description

aws image id String AWS_IMAGE_I

D

Mandatory Provide the

aws image id.

aws instance name String AWS_INSTAN

CE_NAME

Optional Provide the

aws instance

name.

aws ip address String AWS_IMAGE_I

P

Optional Provide the ip

address.

aws management

service

String AWS_MANAGE

MENT_SERVIC

E

Mandatory Select the

management

service from

the drop-

down list.

aws security group id String AWS_SECURI

TY_GROUP_ID

Mandatory Select the

security

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 178

Input Name Input

Type

Input Key

Name

Optional/

Mandatory

Description

group id from

the drop-

down list.

aws subnet id String AWS_SUBNET

_ID

Mandatory Select the

subnet id

from the

drop-down

list.

aws key name String AWS_KEY_NA

ME

Mandatory Select the

key name

from the

drop-down

list.

aws instance type String AWS_INSTAN

CE_TYPE

Mandatory Select the

instance type

from the

drop-down

list.

region String AWS_REGION

Mandatory Choose the

AWS Region

Note:

▪ Select Show Saved Images check box for listing the saved aws images in IBM

Resiliency Orchestration.

▪ If Show Saved Images is selected, the instance name,image id ad IP address

fields are automatically populated.

Outputs

Output Name Output Key Name Description

aws instance id AWS_INSTANCE_ID AWS Instance Id

Note:

If this actions fails, the output key does not have any value.

Configuration

179

Pre-checks

▪ All input keys and values are checked.

▪ Credential check.

Create Amazon Volume

Description

This action creates a volume in the AWS .

Inputs

Input Name Input

Type

Input Key Name Optional/

Mandatory

Description

aws management

service

String AWS_MANAGEMENT_SERV

ICE

Mandatory Select the

management

service from

the drop-

down list.

Region String AWS_REGION Mandatory

Choose the

AWS Region

aws availability

zone

String

AWS_AVAILIBILITY_ZONE Mandatory Provide the

aws

availability

zone.

aws volume size Integ

er AWS_VOLUME_SIZE Optional(If

snapshot id is

configured

then it will be

optional,

otherwise

mandatory)

Provide the

aws volume

size.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 180

Input Name Input

Type

Input Key Name Optional/

Mandatory

Description

aws volume type String AWS_VOLUME_TYPE Mandatory Select the

dataset from

the drop-

down list.

aws provisioned

volume iops

Integ

er

AWS_PROVISIONED_VOLU

ME_IOPS

Mandatory Provide the

aws

provisioned

volume iops.

aws snapshot id String AWS_SNAPSHOT_ID Optional (if

the volume

size is

configured)

Select the

snapshot id

from the

drop-down

list.

Encryption String AWS_ENCRYPT_VOLUME Optional Select

checkbox

Note:

Select the check box to disable snapshot, if you want to create volume with the given size.

▪ To create multiple volumes, the user needs to configure either the Snapshot id or

volume size with comma separated values.

▪ keys : AWS_VOLUME_SIZE and AWS_VOLUME_TYPE (valid volume types are

io1,standard and gp2).

▪ User should specify the value to 0(for volume type other than io1) for key

AWS_PROVISIONED_VOLUME_IOPS.

▪ Valid values for key AWS_ENCRYPT_VOLUME are yes/no.

Outputs

Output Name Output Key Name Description

aws volume id AWS_VOLUME_ID AWS Volume Id

Note:

If this actions fails, the output key does not have any value.

Configuration

181

If you are creating volume from a snapshot and not specify a volume size, the default is the

snapshot size.

Pre-checks

▪ All input keys and values are checked.

▪ Credential check.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 182

Create Amazon Snapshot

Description

This action creates a Snapshot in the AWS.

Inputs

Input

Name

Input Type Input Key Name Optional/

Mandatory

Snapshot

Name

Enter

snapshot

name

AWS_SNAPSHOT_NAME Optional

Management

service

Name

Choose from

List of

Management

Service

Name

AWS_MANAGEMENT_SERVICE Mandatory

Region Choose the

AWS Region

AWS_REGION Mandatory

aws volume

id

Select the

Volume id

from the

drop-down

list

AWS_VOLUME_ID Mandatory

Outputs

Output Name Output Key Name Description

aws snapshot id AWS_SNAPSHOT_ID AWS Snapshot id

Note:

If this actions fails, the output key does not have any value.

Pre-checks

▪ All input keys and values are checked.

▪ Credential check.

Configuration

183

Create Internet Gateway

Description

This action will create a Internet Gateway and attach the same to VPC.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Management

Service

Name

String AWS_MANAGEMENT_SERVICE Mandatory Choose from

List of

Management

Service

Name

Region String AWS_REGION Mandatory Choose the

AWS Region

VPC String AWS_VPC_ID Mandatory Choose the

VPC

available on

the selected

region

Name String AWS_INTERNET_GATEWAY_NAME Mandatory Internet

Gateway

Name

Output: AWS_GATEWAY_ID

Create Image RAL

This RAL creates image for the existing instance id.

Input:

Management Service Name, Region name, Instance ID, Image name.

DryRUN: Check the management Service and instance exists or not.

Result: Creates image for the existing instance id.

NOTE:

Input KV

▪ kv AWS_MANAGEMENT_SERVICE as Management Service Name

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 184

▪ kv AWS_REGION as Region Name

▪ kv AWS_INSTANCE_ID as Instance ID

▪ kv AWS_IMAGE_NAME as Instance ID

Output KV

▪ AWS_IMAGE_ID

Create Route Table

Description

This action will create a route table and associate the same to one or more subnet.

Inputs

Input

Name

Input Type Input Key Name Optional/

Mandatory

Management

Service

Name

Choose from List of

Management

Service Name

AWS_MANAGEMENT_SERVICE Mandatory

Region Choose the AWS

Region

AWS_REGION Mandatory

VPC Choose the VPC

available on the

selected region

AWS_VPC_ID Mandatory

Subnet Choose Multiple

Subnet Id

AWS_SUBNET_ID Mandatory

Outputs

Output Name Output Key Name Description

AWS Route Table

Id

AWS_ROUTE_TABLE_ID

Notes:

Resiliency Orchestration supports only EC2-VPC type of instance.

Configuration

185

Create Subnet RAL

Description

This action will create a Subnet in AWS.

Inputs

Input

Name

Input Type Input Key Name Optional/

Mandatory

Management

Service

Name

Choose from

List of

Management

Service Name

AWS_MANAGEMENT_SERVICE Mandatory

Subnet

Name

AWS Subnet

name

AWS_SUBNET_NAME Mandatory

Region Choose the AWS

Region

AWS_REGION Mandatory

VPC ID Choose the VPC

availbe on the

selected region

(As we support

Non EC2-Classic

instance)

AWS_VPC_ID Mandatory

Availability

Zone

The Availability

Zone for the

subnet. Default:

Amazon EC2

selects one for

you

(recommended).

AWS_AVAILABILITY_ZONE Optional

CIDR Block The network

range for the

subnet, in CIDR

notation. For

example,

10.0.0.0/24.

AWS_CIDR_BLOCK Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 186

Input

Name

Input Type Input Key Name Optional/

Mandatory

Map Public

Ip On

Launch

Select checkbox

(Specify true to

indicate that

instances

launched into

the specified

subnet should

be assigned

public IP

address)

AWS_MAP_PUBLIC_IP_ON_LAUNCH Optional

Outputs

Output Name Output Key Name Description

AWS Subnet Id AWS_SUBNET_ID The ID of the subnet

created

Create Security Group

Description

This action will create security group in AWS.

Inputs

Input

Name

Input Type Input Key Name Optional/ Mandatory

Managem

ent

Service

Name

Choose from

List of

Management

Service Name

AWS_MANAGEMENT_SERV

ICE

Mandatory

Region Choose the

AWS Region

AWS_REGION Mandatory

VPC ID Choose the

VPS availbe on

the selected

region (As we

support Non

AWS_VPC_ID Mandatory

Configuration

187

Input

Name

Input Type Input Key Name Optional/ Mandatory

EC2-Classic

instance)

Security

Group

Name

Provide the

Security Group

name

AWS_SECURITY_GROUP_

NAME

Mandatory

Ingress

Rules

Provide the

Ingress Rules

(protocol:startP

ort:endPort:IPC

ider,

protocol:startP

ort:endPort:IPC

ider)

AWS_SECURITY_GROUP_I

NGRESS_RULES

Optional

Egress

Rules

Provide the

Egress Rules

(protocol:startP

ort:endPort:IPC

ider,

protocol:startP

ort:endPort:IPC

ider)

AWS_SECURITY_GROUP_E

GRESS_RULES

Optional

Descriptio

n

Provide the

description of

security group

AWS_SECURITY_GROUP_

DESC

Mandatory

Outputs

Output Name Output Key Name Description

aws security

group id

AWS_SECURITY_GROUP_ID The ID of the Security

Group created

aws security

group name

AWS_SECURITY_GROUP_NAME The Name of the Security

Group created

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 188

Create Amazon S3 Bucket

Description

This action will creates S3 Bucket in Specified Region.

Inputs

Input Name Input Type Input Key Name Optional/

Mandatory

Management

Service Name

Choose from

List of

Management

Service Name

AWS_MANAGEMENT_SERVICE Mandatory

Bucket Name Bucket Name AWS_BUCKET_NAME Mandatory

Region Choose from

List of Regions

AWS_REGION Mandatory

Outputs

Output Name Output Key Name Description

aws bucket name AWS_BUCKET_NAME Bucket Name

Delete Amazon Volume

Description

This action deletes the volume in AWS.

Inputs

Input Name Input

Type

Input Key Name Optional/

Mandatory

Description

aws volume id String AWS_VOLUME_ID Mandatory Select the

volume id

from the

drop-down

list.

aws management String AWS_MANAGEMENT_SERVICE Mandatory Select the

management

Configuration

189

Input Name Input

Type

Input Key Name Optional/

Mandatory

Description

service service from

the drop-

down list.

region String AWS_REGION Mandatory Choose the

AWS Region

Pre-checks

▪ All input keys and values are checked.

▪ Credential check.

Detach Amazon Volume

Description

This action detaches an AWS volume.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

aws

management

service

String AWS_MANAGEMENT_SERVICE Mandatory Select the

management

service from

the drop-down

list.

aws volume

id

String AWS_VOLUME_ID Mandatory Select the

volume id

from the drop-

down list.

Pre-checks

▪ All input keys and values are checked.

▪ Credential check.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 190

Delete Amazon Snapshot

Description

This action deletes the Snapshot in the AWS .

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

aws

management

service

String AWS_MANAGEMENT_SERVICE Mandatory Select the

management

service from

the drop-

down list.

aws

snapshot id

String AWS_SNAPSHOT_ID Mandatory Select the

snapshot id

from the

drop-down

list.

Pre-checks

▪ All input keys and values are checked.

▪ Credential check.

Import EC2 RAL

Description

This action will import the instance to the AWS instances.

Inputs

Input Name Input Type Input Key Name Optional/

Mandatory

Management Service

Name

Choose from

List of

Management

Service Name

AWS_MANAGEMENT_SE

RVICE Mandatory

Configuration

191

Input Name Input Type Input Key Name Optional/

Mandatory

Region Choose the AWS

Region

AWS_REGION Mandatory

Availability Zone Choose the AWS

Availability Zone

AWS_AVAILABILITY_ZO

NE

Mandatory

Instance Type Choose the

available

instance type

AWS_INSTANCE_TYPE Mandatory

Instance Name Provide instance

name

AWS_INSTANCE_NAME Optional

Architecture Choose the

available

architecture

AWS_INSTANCE_ARCHIT

ECTURE

Mandatory

Platform Choose the

available

platform

AWS_PLATFORM Optional

Subnet Id Choose the

available subnet

or create new

AWS_SUBNET_ID Mandatory

Private IP Provide Private

IP Address

within subnet

AWS_PRIVATE_IP_ADDR

ESS

Optional

Replication appliance Choose the

replication

appliances

where the CBT is

running. Only

OVA replication

appliances can

be listed

AWS_REPLICATION_APP

LIANCE

Mandatory

File format Choose the file

format. As of

now only RAW is

supported

AWS_FILE_FORMAT Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 192

Input Name Input Type Input Key Name Optional/

Mandatory

RAW File Path Provide Absolute

RAW filepath

location

AWS_RAWFILE_PATH Mandatory

Bucket Name Choose Amazon

S3 Bucket Name

AWS_BUCKET_NAME Mandatory

Outputs

Output Name Output Key Name Description

aws instance Id AWS_INSTANCE_ID Created instance id

aws S3 path AWS_S3_PATH Uploaded RAW file to S3

bucket path

Note:

AWS EC2 CLI has to be installed and configured in the Resiliency Orchestration Appliance (Do

not set access key and secret key as static).

Import EBS Volume RAL

Description

This action will import the volume to the AWS instances.

Inputs

Input Name Input Type Input Key Name Optional/

Mandatory

Management Service

Name

Choose from List

of Management

Service Name

AWS_MANAGEMENT_SE

RVICE

Mandatory

Region Choose the AWS AWS_REGION Mandatory

Configuration

193

Input Name Input Type Input Key Name Optional/

Mandatory

Region

Availability Zone Choose the AWS

availability zone

AWS_AVAILABILITY_ZO

NE

Replication appliance Choose the

replication

appliances where

the CBT is

running. Only OVA

replication

appliances can be

listed

AWS_REPLICATION_APP

LIANCE

Mandatory

RAW File Path Provide Absolute

RAW filepath

location

RAW_FILE_PATH Mandatory

File format Choose the file

format. As of now

only RAW is

supported

AWS_FILE_FORMAT Mandatory

Bucket Name Choose Amazon

S3 Bucket Name

AWS_BUCKET_NAME Mandatory

Volume Size Provide the size of

the volume to be

crated (In GBs)

AWS_VOLUME_SIZE Mandatory

Description Provide the

description of

volume

AWS_VOLUME_DESC Optional

Outputs

Output Name Output Key Name Description

EBS Volume Id EBS_VOLUME_ID The ID of the EBS

volume created

Note:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 194

AWS EC2 CLI has to be installed and configured in the Resiliency Orchestration Appliance

(Do not set access key and secret key as static).

Start AWS Instance

Description

This action starts the instances in AWS.

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Management

Service

Name

String AWS_MANAGEMENT_SERVICE Mandatory Choose from

List of

Management

Service

Name.

Region String AWS_REGION Mandatory Choose the

AWS

Region.

Instance String AWS_INSTANCE_ID Mandatory Choose the

instance

available on

the selected

region.

Stop Amazon Instance

Description

This action stops the instance in AWS.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Management

Service

Name

String AWS_MANAGEMENT_SERVICE Mandatory Choose from

List of

Management

Service

Configuration

195

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Name.

Region String AWS_REGION Mandatory Choose the

AWS

Region.

Instance String AWS_INSTANCE_ID Mandatory Choose the

instance

available on

the selected

region.

S3 Bucket CleanUp

Description

This action will cleans file/folder from Amazon S3 Bucket.

Inputs

Input Name Input Type Input Key Name Optional/

Mandatory

Management

Service Name

Choose from List

of Management

Service Name

AWS_MANAGEMENT_SERVICE Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 196

Not

es:

▪ File/Folder path should not contain bucket name.

▪ Example: x/y.txt where x is folder name and y is file name.

Bucket Name Choose from List

of Bucket Name

AWS_BUCKET_NAME Mandatory

File/Folder Path File/Folder path in

S3 Bucket

AWS_S3_PATH Mandatory

Configuration

197

VMware VCenter

VMware vCenter

These RALs runs on VMware vCenter and executed actions on VMware entities like Virtual

Machines, Data stores, HBAs etc.

Pre-requisites for VMware VCenter RALs

1. Configure Windows Server where VCenter Service is running as Component.

2. Configure VCenter Server as Dataset with above as Component giving Credentials

required to Login into VSphere client with Admin privileges.

3. To execute these RALs, one group should have been created using above step as

component.

4. Make sure VMware vCenter Agent is up and running on Admin page.

Add VMDK to Virtual Machine

Description

This action adds disk to Virtual Machine.

Inputs

Input Name Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

VMDK File

Path

String Mandatory Input the path of VDMK file with

data store.

Mode

(Persistent,

Independent-

persistent,

Independent-

nonpersistent)

String Mandatory Input the mode of the VM.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 198

Input Name Input Type Optional/

Mandatory

Description

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Create Snapshot of Virtual Machine

Description

This action creates a snapshot of Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

Snapshot

Name

String Mandatory Input the Snapshot name.

Description String Optional Input the description for Snapshot.

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Create Clone of Virtual Machine

Description

Configuration

199

This action creates a clone of Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware

VC Dataset

String Mandatory Select the dataset from the dropdown

list.

Datacenter

Name

String Mandatory Input the name of datacenter.

Source VM

Path

String Mandatory Inventory Path of VM in the form of

Datacenter_Name\VMFolder\VM_Name.

Clone

Name

String Mandatory Input the name of the clone.

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Delete Snapshot of Virtual Machine

Description

This action deletes a snapshot of Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 200

Input

Name

Input Type Optional/

Mandatory

Description

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

Snapshot

Name

String Mandatory Input the Snapshot name.

Wait Till

Completion Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Note

This deletes the complete chain/hierarchy of snapshots.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Mount Datastore on Host

Description

This action mounts the data store on the host.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

Datastore

Name

String Mandatory Input the data store name to be

mounted on Host.

Configuration

201

Outputs

Action is always successful even if actual action on VCenter fails.

Power on Virtual Machine

Description

This action initiates power on of a Virtual Machine.

Inputs

Input Name Input Type Optional/

Mandatory

Description

VMware VC Dataset String Mandatory Select the dataset from

the dropdown list.

Virtual Machine(VM)

Name

String Mandatory Input the VM name to be

powered on.

Wait Till Completion Checkbox Mandatory Control waits at Vcenter

till the operation

completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Power off Virtual Machine

Description

This action initiates power off of a Virtual Machine.

Inputs

Input

Name

Input Type Optional/ Mandatory Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 202

Input

Name

Input Type Optional/ Mandatory Description

VMware VC

Dataset

String Mandatory Select the dataset from

the dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name to be

powered off.

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter

till the operation

completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Reboot Virtual Machine

Description

This action reboots a Virtual Machine.

Inputs

Input

Name

Input Type Optional/ Mandatory Description

VMware VC

Dataset

String Mandatory Select the dataset from

the dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name to be

rebooted.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Configuration

203

Reset Virtual Machine

Description

This action resets a Virtual Machine.

Inputs

Input

Name Input Type Optional/ Mandatory Description

VMware VC

Dataset

String Mandatory Select the dataset from

the dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name to be

reset.

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter

till the operation

completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Re-configure CPU Allocation of Virtual Machine

Description

This action re-configures the CPU allocation of Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 204

Virtual

Machine(VM)

Name

String Mandatory Input the VM name for which the

CPU allocation should be re-

configured.

Limit

(Maximum)

Number Mandatory Input the Integer number. Unit is in

MHz.

Reservation

(Maximum

Guaranteed)

Number Mandatory Input the Integer number. Unit is in

MHz.

Note:

Reservation can not be greater

than Limit.

Wait Till

Completion Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Re-configure Memory Allocation of Virtual Machine

Description

This action re-configures the memory allocation of Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name for which the

memory allocation should be re-

configured.

Limit

(Maximum)

Number Mandatory Input the Integer number. Unit is in

MB.

Configuration

205

Input

Name

Input Type Optional/

Mandatory

Description

Reservation

(Maximum

Guaranteed)

Number Mandatory Input the Integer number. Unit is in

MB.

Note:

Reservation can not be greater

than Limit.

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Remove VMDK from Virtual Machine

Description

This action removes VDMK file from Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

Hard Disk

Name

String Mandatory Input the name of the hard disk.

(For Example: Hard disk 1)

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 206

Restore Snapshot of Virtual Machine

Description

This action restores a snapshot of Virtual Machine.

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

Snapshot

Name

String Mandatory Input the Snapshot name.

Wait Till

Completion

Checkbox Mandatory Control waits at Vcenter till the

operation completes, if checked.

Outputs

Action fails if agent is not able to connect or execution fails at vCenter.

Rescan HBA

Description

This action rescans HBA on the host.

Inputs

Input

Name Input Type Optional/

Mandatory Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Configuration

207

Input

Name

Input Type Optional/

Mandatory

Description

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

HBA Name String Mandatory Input the HBA name to be

rescaned.

Outputs

Action is always successful even if at VCenter actual action fails.

Shutdown Virtual Machine

Description

This action shuts down a Virtual Machine.

Inputs

Input

Name

Input Type Optional/ Mandatory Description

VMware VC

Dataset

String Mandatory Select the dataset from

the dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name to be

shutdown.

Outputs

Action is always successful even if at vcenter actual execution fails.

Unmount Datastore from Host

Description

This action unmounts the data store from the host.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 208

Inputs

Input

Name

Input Type Optional/

Mandatory

Description

VMware VC

Dataset

String Mandatory Select the dataset from the

dropdown list.

Virtual

Machine(VM)

Name

String Mandatory Input the VM name.

Datastore

Name

String Mandatory Input the data store name to be

unmounted from the host.

Outputs

Action is always successful even if actual action on VCenter fails.

Add Virtual Machine to Inventory

Description

This action adds Virtual Machine (VM) to the inventory.

Inputs

The following is a list of inputs that are required to perform this action.

Input

Name

Input

Type

Key Name Optional/

Mandatory

Description

VCenter

Management

Service

String PANVC_MGMT_SVC_NAME Mandatory Select the

VCenter

Management

service.

Datacenter

Name

String PANVC_DC_NAME Mandatory Select the

Datacenter

name.

ESX Host

Name

String PANVC_VM_HOST_NAME Mandatory Select the

ESX host IP.

Resource String PANVC_RESOURCE_POOL_NAME Optional Select the

Configuration

209

Pool Name Resource

Pool name

where the

new VM is to

be added.

Datastore

Name

String PANVC_DATASTORE Mandatory Select the

Datastore

name.

VMX File

Path

String PANVC_VMX_PATH Mandatory Select the

VMX path.

New VM

Name

String

PANVC_VMX_NAME

Mandatory The new VM

name is the

default

name. Input

any text to

provide a

name for

the new VM,

if required.

Wait Till

Completion Checkbox PANVC_WAIT_TILL_COMPLETION Optional Select the

Wait Till

Completion

check box if

the control

needs to

wait at

VCenter till

the

operation

completes.

Outputs

The following are the outputs for Add Virtual Machine (VM) to Inventory action:

▪ This action succeeds in adding VM to the inventory if all inputs are valid and inputs

are in required state.

▪ This action fails in case of any of the following events:

o Agent is unable to connect.

o Execution fails at VCenter.

o The inputs are inappropriate.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 210

Vmware Host Mount Datastore

Description

This action mounts existing datastore under Esx Host.

Inputs

The following is a list of inputs that are required to perform this action.

Input

Name

Input

Type

Key Name Optional/

Mandatory

Description

VCenter

Management

Service

String PANVC_MGMT_SVC_NAME Mandatory Select the

VCenter

Management

service.

Datacenter

Name

String PANVC_DC_NAME Mandatory Select the

Datacenter

name.

ESX Host

Name

String PANVC_VM_HOST_NAME Mandatory Select the

ESX host IP.

Datastore

Name

String

PANVC_DATASTORE Mandatory Select the

Datastore

name that is

required to

be mounted.

Wait Till

Completion

Checkbox PANVC_WAIT_TILL_COMPLETION Optional Select the

Wait Till

Completion

check box if

the control

needs to

wait at

VCenter till

the

operation

completes.

Outputs

The following are the outputs for Vmware Host Unmount Datastore action:

Configuration

211

▪ This action succeeds in unmounting the datastore if the datastore is valid and in mounted

state.

▪ This action fails in case of any of the following events:

o Agent is unable to connect,

o Execution fails at VCenter.

o Datastore is invalid.

o Datastore is in unmounted state.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 212

Vmware Host Unmount Datastore

Description

This action unmounts existing datastore under Esx host.

Inputs

The following is a list of inputs that are required to perform this action.

Input

Name

Input

Type

Key Name Optional/

Mandatory

Description

VCenter

Management

Service

String PANVC_MGMT_SVC_NAME Mandatory Select the

VCenter

Management

Service.

Datacenter

Name String PANVC_DC_NAME Mandatory Select the

Datacenter

name.

ESX Host

Name String PANVC_VM_HOST_NAME Mandatory Select the

ESX host IP.

Datastore

Name

String PANVC_DATASTORE Mandatory Select the

Datastore

name.

Wait Till

Completion

Checkbox PANVC_WAIT_TILL_COMPLETION Optional Select the

Wait Till

Completion

check box if

the control

needs to

wait at

VCenter till

the

operation

completes.

Outputs

The following are the outputs for the Vmware Host Unmount Datastore action:

▪ This action succeeds in unmounting the datastore if the datastore is valid and in mounted

state.

Configuration

213

▪ This action fails in case of any of the following events:

o Agent is unable to connect

o Execution fails at VCenter

o Datastore is invalid

o Datastore is in unmounted state

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 214

Add Disk to VM

Description

This action adds the VM disk to Virtual Machine (VM).

Inputs

The following is a list of inputs that are required to perform this action.

Input

Name

Input

Type

Key Name Optional/

Mandatory

Description

VCenter

Management

Service

String PANVC_MGMT_SVC_NAME Mandatory Select the

VCenter

Management

service.

Datacenter

Name

String PANVC_DC_NAME Mandatory Select the

Datacenter

name.

ESX Host

Name

String PANVC_VM_HOST_NAME Mandatory Select the

ESX host IP.

Datastore

Name

String PANVC_DATASTORE Mandatory Select the

Datastore

name.

Vmdk File

Path

String PANVC_VMDK_PATH Mandatory Select the

Vmdk path.

VM Name String PANVC_VM_NAME Mandatory Select the

VM name to

which the

selected

Vmdk is to

be added.

Wait Till

Completion

Checkbox PANVC_WAIT_TILL_COMPLETION Optional Select the

Wait Till

Completion

check box if

the control

needs to

wait at

VCenter till

the

Configuration

215

operation

completes.

Outputs

The following are the outputs for the Add Disk to VM action:

▪ This action succeeds adding Vmdk to VM if all inputs are valid and inputs are in

required state.

▪ This action fails in case of any of the following events:

2. Agent is unable to connect

3. Execution fails at VCenter

4. The inputs are inappropriate

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 216

Remove Disk from VM

Description

This action removes the VM disk from Virtual Machine (VM).

Inputs

The following is a list of inputs that are required to perform this action.

Input

Name

Input

Type

Key Name Optional/

Mandatory

Description

VCenter

Management

Service

String PANVC_MGMT_SVC_NAME Mandatory Select the

VCenter

Management

service.

Datacenter

Name

String PANVC_DC_NAME Mandatory Select the

Datacenter

name.

ESX Host

Name

String PANVC_VM_HOST_NAME Mandatory Select the

ESX host IP.

VM Name String PANVC_VM_NAME Mandatory Select the

VM Name

from which

the Vmdk is

to be

removed.

Vmdk File

Path

String PANVC_VMDK_PATH Mandatory Select the

Vmdk path.

Wait Till

Completion

Checkbox PANVC_WAIT_TILL_COMPLETION Optional Select the

Wait Till

Completion

check box if

the control

needs to

wait at

VCenter till

the

operation

completes.

Configuration

217

Outputs

The following are the outputs for Remove Disk from VM action:

▪ This action succeeds removing Vmdk from VM if all inputs are valid and inputs are in

required state.

▪ This action fails in case of any of the following events:

o Agent is unable to connect.

o Execution fails at VCenter.

o The inputs are inappropriate.

Database Level

DB2

Activate Database

Description:

This action activates the database.

Inputs:

UI Input Input Key Name Description

Dataset Name PANDB2_DATASET_NAME Select the dataset from the drop-

down list.

Outputs

None

Pre-checks

▪ Credential and role.

▪ Permission to create file in tmp.

▪ Memory availability in tmp.

▪ Status of selected dataset is on Inactive.

▪ Agent is active.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 218

Deactivate Database

Description:

This action deactivates the database.

Inputs:

UI Input Input Key Name Description

Dataset Name PANDB2_DATASET_NAME Select the dataset from the drop-

down list.

Outputs:

None

Pre-checks

▪ Credential and role.

▪ Permission to create file in tmp.

▪ Memory availability in tmp.

▪ Status of selected dataset is on Active.

▪ Agent is active.

Execute SQL with Connection

Description:

This action executes the SQL by connecting to the database. This is mainly used for primary

database using a database connection.

Inputs:

UI Input Input Key Name Description

Dataset Name PANDB2_DATASET_NAME Select the dataset

from the drop-down

Configuration

219

list.

SQL to be

executed

PANDB2_CONN_SQL Enter the SQL

command to execute.

Outputs:

The action fails, if the database is not in the said state.

Output Name Output Key Name Description

Output of the

SQL

PANDB2_CONN_SQL_RESULT Output of the SQL

that is being

executed.

Pre-checks

▪ Credential and role.

▪ Permission to create file in tmp.

▪ Memory availability in tmp.

▪ Agent is active.

Execute SQL Without Connection

Description:

This action executes the SQL without connecting to the database. This is mainly used for

ADMIN SQL for standby database.

Inputs:

UI Input Input Key Name Description

Dataset Name PANDB2_DATASET_NAME

Select the dataset

from the drop-down

list.

SQL to be

executed

PANDB2_NOCONN_SQL Enter the SQL

command to

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 220

execute.

Outputs:

Output

Name

Output Key Name Description

Output of

the SQL

PANDB2_NOCONN_SQL_RESULT Output of the

SQL that is

being executed.

Pre-checks

▪ Credential and role.

▪ Permission to create file in tmp.

▪ Memory availability in tmp.

▪ Agent is active.

Takeover

Description:

Switches the role of database.

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANDB2_DATASET_NAME Select the dataset from

the drop-down list.

By force PANDB2_FORCE Force the takeover.

Outputs:

None

Pre-checks

▪ Credential and role.

▪ Permission to create file in tmp.

Configuration

221

▪ Memory availability in tmp.

▪ Status of selected dataset is on Standby.

▪ Agent is active.

Verify Database State

Description:

This action verifies whether the database is ACTIVE, INACTIVE or UNKNOWN.

Inputs:

UI Input Input Key Name Description

Dataset Name PANDB2_DATASET_NAME Select the dataset from

the drop-down list.

Expected State PANDB2_DATASET_STATE The Expected states of

database can be

ACTIVE, INACTIVE or

UNKNOWN.

Outputs:

The action fails, if the database is not in the said state.

Output

Name

Output Key Name Description

Dataset

State

PANDB2_CURRENT_DATASET_STATE The current states of database

(ACTIVE/INACTIVE/UNKNOWN)

Pre-checks

▪ Credential and role.

▪ Permission to create file in tmp.

▪ Memory availability in tmp.

▪ Agent is active.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 222

DB2VerifyInstanceState

Description:

Verifies the state of the DB2 instance.

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANDB2_DATASET_NAME Select the dataset from

the drop-down list.

Outputs:

The provides the DB2 instance state.

Pre-checks

▪ Credential and role.

▪ Agent is active.

DB2InstanceStateOperation

Description:

Performs the Start/ Stop/ Restart and Forcestop on the DB2 instance.

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANDB2_DATASET_NAME Select the

dataset from

the drop-down

list.

Select

DB2

Instance

Operation

PANDB2_DATASET_INSTANCE_STATE Select Start/

Stop/ Restart

and Forcestop

from the drop-

down list.

Configuration

223

Outputs:

The DB2 instance state will be changed.

Pre-checks

▪ Credential and role.

▪ Agent is active.

▪ Database is Active.

▪ Must have sufficient privileges.

Oracle

Alter Database

Description:

This action alters the state of the database. This assumes that the database is already in a

state wherein it is valid to move it to a new state.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable Select the

dataset from the

drop-down list.

Select Database

State

PANORA_ALTER_DB_MODE Select the state

to which you

want to change

the current

database state,

from the drop-

down list.

The options are:

standby,

mount read

only, read

write,

switchover to

primary, and

switchover to

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 224

UI Input Input Key Name Description

standby.

This field is

mandatory.

Outputs:

Alter Database action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on

agent.

PAN-DORA-0081 ▪ Oracle version not

supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password

is(are) null.

▪ OS is not supported.

▪ Unknown type specified to

execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

Configuration

225

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ If database is in standby state, then it should be in read/write mode.

▪ If database is in read/write, then it should be in mounted read.

▪ If database is in switchover to primary state, then Production should be in read/write

mode and DR on mounted mode.

▪ If database is in switchover to standby state, then Production should be in mounted

mode and DR on read/write mode.

Apply Logs

Description:

This action recovers/applies the available archived logs which are not applied on the

database. This assumes that the archive logs are already copied/available in the right

location.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the

drop-down list.

Apply Log Delay PANORA_APPLY_LOG_DELAY Enter the log delay time in

minutes.

Default value for this field

is zero.

This field is mandatory.

Outputs:

Output Name Output Key Name Description

Applied

Sequence

PANORA_APPLY_LOG_SEQ_NUM Sequence number of

the last log which got

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 226

Number applied.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is in standby state.

▪ Locate archive folder.

Append PFILE

Description

This action appends the DG Configuration entries to PFILE files.

Inputs:

Configuration

227

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the

drop-down list.

Outputs:

Successfully appended entries to the PFILE files.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-0010 Oracle instance is not available.

Append TNSFILE

Description

This action appends the DG Configuration entries to TNSFILE files.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable Select the dataset from the

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 228

drop-down list.

Outputs:

Successfully appended entries to the TNSFILE files.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-0010 Oracle instance is not available.

Configuration

229

Backup Control File

Description:

This action backs up the control file of the database to a trace file. This trace file can be used

to recreate the control file.

Inputs:

UI Input Input Key Name Description

Dataset

Name

Not Applicable

Select the dataset from the

drop-down list.

Trace File

Name

PANORA_BACKUP_CTL_FILE Enter the trace file name.

This field is mandatory.

Reset Log PANORA_BACKUP_CTL_RESET_OPTION Select this check box if you

want to reset the log.

This field is mandatory.

Outputs:

Backup Control File action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 230

Error Code Description

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ For Production, database is in read/write mode.

▪ For DR, database is in mounted mode.

Cancel Managed Recovery

Description:

This action cancels the already active managed recovery. If no managed recovery is in

active, the action is failed.

Inputs:

UI Input Input Key

Name

Description

Dataset Name Not Applicable Select the dataset from the

drop-down list.

Outputs:

Cancel Managed Recovery action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

Configuration

231

Error Code Description

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is in active managed recovery mode.

Check Archive Gap

Check Archive Gap - Gets the first archive gap information from the DR database.

Description:

This action gets the first archive gap information from the DR database. It checks the archive

gap and fetches Low or High sequence numbers. A value of -1 indicates no archive gap

found. Any value greater than -1 indicates the missing sequence number.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable Select the dataset from

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 232

the drop-down list.

Outputs:

Output

Name

Output Key Name Description

Low Sequence

Number

PANORA_ARCHIVE_GAP_LOW_SEQ Low Sequence

number of missing

archive in range.

High

Sequence

Number

PANORA_ARCHIVE_GAP_HIGH_SEQ High Sequence

number of missing

archive in range.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

Configuration

233

▪ Privileges before executing any command.

▪ Database is in standby state.

▪ Locate archive folder.

Create Control File

Description:

This action creates a control trace file of the database or a standby control file.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from

the drop-down list.

Create Control

File

PANORA_CREATE_CTL_OPTION Select the Create

Control File, from the

drop-down list.

The options are: As

Standby Control File,

and From Trace File.

This field is mandatory.

Create Control

File/Trace File

Name

Not Applicable If you select the option

As Standby Control

File, then Control File

Name appears.

If you select the option

From Trace File, then

Trace File Name

appears.

Outputs:

Create Control File action does not return any value.

Error Codes:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 234

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ If create control file option is from standby control file, then database should be on

Production

▪ If create control file option is from trace file, then database should be on DR.

▪ Locate folder.

Execute SQL

Description:

This action is used for executing any SQL command.

Inputs:

UI Input Input Key Name Description

Configuration

235

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the

drop-down list.

Check the Show All check

box to see all the Oracle

datasets that are discovered

on the “Server

Components” attached to

the group.

SQL to Execute PANORA_EXEC_SQL Enter the SQL command to

execute.

This field is mandatory.

Expected Output PANORA_PASS_CRITERIA Enter the expected output.

This field is optional.

Role PANORA_ROLE Enter the expected role.

This field is mandatory.

Note:

▪ If username is sys,

then the role is

sysdba. It is not

mandatory to enter

the role.

▪ If no role specified

then query will be

executed by sysdba

role.

Outputs:

Execute SQL action does not return any value.

Error Codes:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 236

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password

is(are) null.

▪ OS is not supported.

▪ Unknown type specified to

execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

Execute SQL File

Execute SQL File - Executes any file which contains SQL command.

Description:

This action is used for executing any file which contains SQL command. The SQL command

can also contain a PL/SQL procedure or a set of individual SQL commands etc.

Inputs:

UI Input Input Key Name Description

Configuration

237

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset

from the drop-down

list.

SQL File to

Execute

PANORA_EXEC_SQLFILE Enter the path of the

file which contains SQL

command.

This field is

mandatory.

Pass criteria PANORA_EXECFILE_PASS_CRITERIA Enter the expected

output when the

execution is

successful.

This field is optional.

Role PANORA_EXECFILE_ROLE Enter the expected

role.

This field is

mandatory.

Note:

▪ If username is

sys, then the

role is sysdba.

It is not

mandatory to

enter the role.

▪ If no role

specified then

query will be

executed by

sysdba role.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 238

Outputs:

Execute SQL File action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Locate SQL file.

Get Applied Log Files

Configuration

239

Get Applied Log Files - Gets the list of archive log files which were already applied on the

database and is older than a specified time.

Description:

This action gets the list of archive log files which were already applied on the database and is

older than a specified time. This can be used to identify the older archive log files which are

no longer needed and so can be deleted/moved to free up space in the disk.

Inputs:

UI Input Input Key Name Description

Dataset

Name

Not Applicable

Select the dataset

from the drop-down

list.

Files Older

than

PANORA_APPLIED_LOGFILES_OLDER_THEN Enter the time in hours

to list the files older

than the specified

time.

Default value for this

field is zero.

This field is

mandatory.

Outputs:

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

Output

Name

Output Key Name Description

Old

Applied

Filenames

PANORA_APPLIED_FILENAMES List of old applied file

names separated by

comma.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 240

Error Code Description

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is in standby state.

▪ Locate archive folder and view its permissions.

Get Current Sequence Number

Get Current Sequence Number - Gets the current archive log sequence number.

Description:

This action gets the current archive log sequence number. This number would be the

sequence number of the last archived file if it is a production database and will be the

sequence number of the last applied file if it is a standby database.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the drop-down

list.

Configuration

241

Outputs:

Output

Name

Output Key Name Description

Sequence

Number PANORA_GET_CURR_SEQ_NUM Current Sequence

number of the log

which got

archived/applied.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are)

null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 242

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

Listener Control

Listener Control - Starts/stops and checks the status of the listener specified by listener

name parameter.

Description:

This action starts/stops and checks the status of the listener specified by listener name

parameter. If no listener name is specified, operation is executed on default listener.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the drop-down

list.

Listener

Control is

PANORA_LISTENER_CTL Select the listener control from the

drop-down list.

The options are: Running, Start, and

Stop.

This field is mandatory.

Listener

Name

PANORA_LISTENER_NAME Enter the listener name.

This field is optional.

Outputs:

Execute SQL File action does not return any value.

Error Codes:

Error Code Description

Configuration

243

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is (are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

PAN-DORA-0088 Operation not supported.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Listener is static or dynamic.

▪ If operation is start, then listener should be stopped

▪ If operation is stop, then listener should be running

Oracle Audit

Description

This RAL will give the transaction details during drill. We need to provide SQL queries to get

transaction details.

Below is the sample query that we need to provide in RAL input.

Oracle Command:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 244

Example 1:

select NEXT_TIME from v$archived_log where NEXT_TIME>'{0}' and NEXT_TIME<'{1}';

▪ {0}- Allies of Start Date (Switchover end time)

▪ {1}- Allies end date (Switchback start time)

Example 2:

select NEXT_TIME from v$archived_log where NEXT_TIME>'10-Aug-2016’;

Inputs:

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String

PANORA_DATASET_NAME Mandatory Select the

dataset name

from the drop-

down list.

SQL

Query

String PANORA_ORACLE_AUDIT Mandatory Provide the query

with

startdate/enddate

alies.

Outputs:

1. Switchover and switchback need to complete to execute this RAL Otherwise it

will give NullPointerException.

2. Success Output:

Prechecks

▪ Dataset – configured with input Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

Recover Database

Recover Database - Recovers the database.

Description:

Configuration

245

This action recovers the database. The behavior of this action is same as "recover database"

oracle command.

For example, database should be in mounted state for this action to be successful and fails if

no recovery required which is the also the behavior of "recover database" oracle command.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the drop-down

list.

Outputs:

Recover Database action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 246

▪ Database is mounted.

Shutdown Database

Shutdown Database - Shuts down the database.

Description:

This action shuts down the database. This assumes that the database is already started and

is running when this action is executed. It will fail if the database is already shutdown.

Inputs:

UI Input Input Key Name Description

Dataset

Name

Not Applicable

Select the dataset from the drop-

down list.

Shutdown

Mode

PANORA_SHUTDOWN_DB_MODE Select the shutdown mode from

the drop-down list.

The options are: normal,

immediate, transactional, and

abort.

This field is mandatory.

Outputs:

Shutdown Database action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

Configuration

247

Error Code Description

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

PAN-DORA-0009 Invalid shutdown mode.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is in operating state.

▪ Listener is static or dynamic.

Start Managed Recovery

Description:

This action starts the managed recovery process and log apply services in the database.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the drop-

down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 248

UI Input Input Key Name Description

Recovery Delay PANORA_START_MR_DELAY Enter the recovery delay time in

minutes.

It is the time interval log apply

services will wait before applying

the individual archived redo logs.

Default value for this field is zero.

This field is mandatory.

Note:

Oracle 12C version onwards,

Delay option is not applicable.

Outputs:

Start Managed Recovery action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

Configuration

249

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Apply should not be running.

Startup Database

Startup Database - Starts the database.

Description:

This action starts the database. This assumes that the database is not running when this

action is executed and will fail if the database is already running. In case of error, this would

leave the database in the shutdown state.

For example, if the database is in 'startup open' mode and it failed while opening the

database (succeeded in starting and mounting), it would not leave it in mounted state, but

leaves the database in shutdown state.

This operation requires a static entry in the listener.ora file so that IBM agent can connect to

the idle instance if the oracle database is shutdown.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the

drop-down list.

Initialization

Type

PANORA_START_DB_INIT_TYPE Select the initialization type

from the drop-down list.

The options are: pfile, spfile,

and default.

This field is mandatory.

Database

Mode

PANORA_START_DB_MODE Select the database mode from

the drop-down list.

The options are: open, mount,

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 250

UI Input Input Key Name Description

and nomount.

This field is mandatory.

Outputs:

Startup Database action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-0010 Oracle instance is not available.

PAN-DORA-0076 Unable to start database with PFILE.

PAN-DORA-0002 DB Version not supported.

PAN-DORA-0080 Unknown database mode.

Configuration

251

PAN-DORA-0115 Unable to start database with SPFILE.

PAN-DORA-0072 Unable to start DB.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is in shutdown state.

▪ Locate pfile or spfile, depending on the initialisation file. .

▪ Listener is static or dynamic.

Switch Log File

Switch Log File - Switches the current redo log causing it to be archived/dumped.

Description:

This action switches the current redo log causing it to be archived/dumped. This assumes

that archive logging is enabled so that the switched log will be archived. If archive logging is

not enabled, switching of the logs will still succeed but it will not be archived.

Inputs:

UI Input Input Key

Name

Description

Dataset Name Not Applicable Select the dataset from the drop-

down list.

Outputs:

Output Name Output Key Name Description

Archived

Sequence

PANORA_SWITCH_LOG_SEQ_NUM Sequence number of

the log which got

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 252

Number archived.

Archived File

Name

PANORA_SWITCH_LOG_FILE_NAME File name of the log

which got archived.

Error Codes:

Error Code Description

PAN-DORA-

0000

Internal Error.

PAN-DORA-

0153

Agent not connected.

PAN-DORA-

0127

Unable to execute method on agent.

PAN-DORA-

0081

▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute

query.

PAN-DORA-

0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is on Production.

▪ Locate archive folder.

Configuration

253

Verify Applied Sequence Number

Verify Applied Sequence Number - Checks whether the archived log with the given sequence

number is applied in the database or not.

Description:

This action checks whether the archived log with the given sequence number is applied in the

database or not. It will also optionally wait for the archive log to be applied and will come out

only after it is applied.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset

from the drop-down

list.

Sequence

Number to

Verify

PANORA_VERIFY_CURR_SEQ_NUM Enter the sequence

number of the

archived log to

verify.

This field is

mandatory.

Wait For Sync PANORA_WAIT_FOR_SYNC Select the check-

box to wait for the

archive log to be

applied.

This field is

mandatory.

Outputs:

Verify Applied Sequence Number action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 254

Error Code Description

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0183 Sequence not yet applied.

PAN-DORA-0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

Verify Database State

Description:

This action checks whether the database is in the given state or not.

Inputs:

UI Input Input Key Name Description

Dataset

Name

Not Applicable

Select the dataset from the

drop-down list.

Database

State

PANORA_VERIFY_DB_STATE Select the database state

from the drop-down list.

Configuration

255

UI Input Input Key Name Description

The options are: Open Read

Write(Production), Read

Only, Mounted, No Mount,

Primary, Standby, Instance

Not Running, and Archive

Log Mode.

This field is mandatory.

Note:

If user selects the Read only

option, it handles both Read

only and Read only with apply

open modes from Oracle 11G

onwards.

Outputs:

Verify Database State action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-0000 Internal Error.

PAN-DORA-0153 Agent not connected.

PAN-DORA-0127 Unable to execute method on agent.

PAN-DORA-0081 ▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-0010 Oracle instance is not available.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 256

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

Verify Switchover State

Verify Switchover State - Checks the switchover state of the database.

Description:

This action checks the switchover state of the database. This can be used before switchover

to check if switchover is allowed or not.

TO PRIMARY - This is a standby database and is allowed to switch over to a primary

database.

TO STANDBY - This is a primary database and is allowed to switch over to a standby

database.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset

from the drop-down

list.

Switchover State

to Verify

PANORA_VERIFY_SO_STATE Select the database

state from the drop-

down list.

The options are:

Primary and

Standby.

This field is

mandatory.

Outputs:

Configuration

257

Verify Switchover State action does not return any value.

Error Codes:

Error Code Description

PAN-DORA-

0000

Internal Error.

PAN-DORA-

0153

Agent not connected.

PAN-DORA-

0127

Unable to execute method on agent.

PAN-DORA-

0081

▪ Oracle version not supported.

▪ Wrong arguments passed.

▪ SID/UserName/Password is(are) null.

▪ OS is not supported.

▪ Unknown type specified to execute query.

PAN-DORA-

0010 Oracle instance is not available.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the Operating System and Database.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Dry Run Command.

PostgreSQL

Execute SQL

Description

This action executes the SQL by connecting to the database.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 258

Inputs

UI

Input

Input

type

Input Key Name Input

Optional/

Mandatory

Description

Dataset

Name

String PANPG_DATASET_NAME Mandatory Select the

dataset from

the drop-

down list

SQL String PANPG_SQL Mandatory Enter the

SQL that

needs to be

executed

Outputs

If the agent is unable to connect and execute the query on the database, then this action

fails.

Output Name Output Key Name Description

Output of the

SQL

PANPGS_SQL_RESULT Output of the

SQL

Pre-checks

▪ Dataset – configured with input Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

Get Current Transaction Location

Description

This action get the current transaction location position of the database.

Configuration

259

Inputs

UI

Input

Input

Type

Input Key Name Input

Optional/

Mandatory

Description

Dataset

Name

String PANPG_DATASET_NAME Mandatory Select the

dataset

from the

drop-down

list.

Outputs

If the agent is unable to connect and execute the query on the database, then this action

fails.

Output Name Output Key Name Description

Transaction Log

Position

PANPG_CURR_LOG_POSITION Current Transaction Log

Position

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

▪ Database is on Production.

Start Server

Description

This action starts the PostgreSQL server. It uses the pg_ctl command to start the server on

the PGDATA of the dataset which is configured in the action.

Inputs

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 260

UI

Input

Input

Type

Input Key Name Input

Optional/

Mandatory

Description

Dataset

Name

String PANPG_DATASET_NAME Mandatory Select the

dataset from

the drop-

down list.

Outputs

If the agent is unable to start the server, then this action fails.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Dataset credentials should be for Postgres.

▪ Locate PGDATA folder.

Stop Server

Description

This action stops the PostgreSQL server. It uses the pg_ctl command to stop the server on

the PGDATA of the dataset which is configured in the action.

Inputs

UI

Input

Input

Type

Input Key Name

Input

Optional/

Mandatory

Description

Dataset

Name

String PANPG_DATASET_NAME Mandatory Select the

dataset from

the drop-

down list

Configuration

261

Stop

Mode

String PANPG_SRVR_STOP_MODE Mandatory Select the

stop mode

from the

drop-down

list. The

options are:

smart, fast

and

immediate

Outputs

if the agent is unable to connect or stop the server, then this action fails.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Dataset credentials should be for Postgres.

▪ Locate PGDATA folder.

Trigger Failover

Description

This action makes the current standby PostgreSQL as the primary server and opens the

database in read/write mode.

This is achieved by creating the trigger file mentioned in recovery configuration. The agent

process should have create/write permission for the trigger file location.

Inputs

UI

Input

Input

type

Input Key Name Input

Optional/

Mandatory

Description

Dataset String PANPG_DATASET_NAME Mandatory Select the

dataset from

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 262

Name the drop-down

list.

Outputs

If the was not able to bring up the database in primary mode, then this action fails.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database is in standby state.

▪ Permission to create file in the location during a failover.

▪ Locate PGDATA folder.

Verify Database Mode

Description

This action checks whether the database is in the required mode or not. The verification is

done by connecting to the database and checking various parameters of the database.

Inputs

UI

Input

Input

Type

Input Key Name Input

Optional/

Mandatory

Description

Dataset

Name

String PANPG_DATASET_NAME Mandatory Select the

dataset from

the drop-down

list.

Database String PANPG_DB_MODE Mandatory Select the

Configuration

263

Mode option from the

drop-down list.

The options are

Production and

Recovery

Outputs

If the agent is unable to connect or execute a query on the database, then this action fails.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Locate PGDATA folder.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 264

Verify Transaction Received Location

Description

This action checks whether the database has received the given transaction log location or

not. Optionally it will wait for the database to receive the log until the given location.

Inputs

UI

Input

Input

Type

Input Key Name Input

Optional/

Mandatory

Description

Dataset

Name

String PANPG_DATASET_NAME Mandatory Select the

dataset

from the

drop-down

list

Log

Location

String PANPG_VERIFY_LOG_POSITION Mandatory Location of

the log that

needs to be

verified

Wait for

Sync

Check

box

PANPG_WAIT_FOR_SYNC Mandatory Wait for the

log to be

recevied

The possible value for PANPG_WAIT_FOR_SYNC key is either 1 or 0

Outputs

If the agent is unable to connect or execute a query on the database, then this action fails.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

Configuration

265

▪ Database connectivity.

▪ Database is in standby state.

MySQL

Change Master

Description

This action changes the master information on DR database.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the

dataset

from the

drop-down

list

Master

Host String PANMYSQL_CHANGE_MASTER_HOST Mandatory Master host

IP address

Master

Port

Integer PANMYSQL_CHANGE_MASTER_PORT Mandatory Master Port

Master

User

String PANMYSQL_CHANGE_MASTER_USER Mandatory Master User

Name

Master

Password

String PANMYSQL_CHANGE_MASTER_PASSWORD Mandatory Master

Password

Master

Log File

String PANMYSQL_CHANGE_MASTER_LOG_FILE Mandatory Master Log

File

Master

Log

Position

String PANMYSQL_CHANGE_MASTER_LOG_POS Mandatory Master Log

Position

Outputs

Action fails, if unable to change master details on DR database.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 266

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

▪ Database is in standby state.

▪ Slave is in operation or not.

Execute SQL

Description

This action executes the SQL query by connecting to the database.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the dataset

from the drop-down

list.

SQL String PANMYSQL_SQL Mandatory Enter the SQL query

that needs to be

executed.

Outputs

Output Name Output Key Name Description

Output of the

SQL

PANMYSQL_SQL_RESULT Output of the SQL

Configuration

267

Action fails, if the agent is unable to connect or execute a query on the database.

Pre-checks

▪ Dataset – configured with input Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

Get Master Status

Description

This action gets the master status.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the

dataset from

the drop-

down list.

Outputs

Action fails if the agent is unable to connect and execute the query on the database.

Output Name Output Key Name Description

Master Log File PANMYSQL_MASTER_LOG_FILE Master Log File

Master Log

Position

PANMYSQL_MASTER_LOG_POS Master Log Position

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 268

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

▪ Database is on Production.

Start Slave

Description

This action starts the slave.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the

dataset

from the

drop-down

list.

Thread

type

String PANMYSQL_SLAVE_THREAD Mandatory Select the

thread type

from the

drop-down

list.

Outputs

Action fails, if the agent is unable to start the slave.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

Configuration

269

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

▪ Database is in standby state.

▪ Slave is in operation or not.

Stop Slave

Description

This action stops the slave.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the

dataset

from the

drop-down

list.

Thread

type

String PANMYSQL_SLAVE_THREAD Mandatory Select the

thread type

from the

drop-down

list.

Outputs

Action fails, if the agent is unable to connect or stop the slave.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 270

▪ Privileges before executing any command.

▪ Database connectivity.

▪ Database is in standby state.

▪ Slave is in operation or not.

Verify Database Mode

Description

This action checks whether the database is in the required mode or not. The verification is

done by connecting to the database and checking various parameters of the database.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the dataset

from the drop-down

list.

Database

Mode

String PANMYSQL_DB_MODE Mandatory Select the option

from the drop-down

list. The options are

Master and Slave.

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

Configuration

271

Verify Received Log

Description

This action checks whether the database has received the given transaction log location or

not. Optionally it will wait for the database to receive the log until the given location.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMYSQL_DATASET_NAME Mandatory Select the dataset

from the drop-

down list.

Log File String PANMYSQL_VERIFY_LOG_FILE Mandatory Log file name that

needs to be

verified .

Log

Location

String PANMYSQL_VERIFY_LOG_POS Mandatory Location of the log

that needs to be

verified.

Wait for

Sync

Checkbox PANMYSQL_WAIT_FOR_SYNC Mandatory Wait for the log to

be received.

The possible values for PANMYSQL_WAIT_FOR_SYNC key is either 1 or 0.

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Privileges before executing any command.

▪ Database connectivity.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 272

▪ Database is in standby state.

SQL Server

Attach MSSQL Instance

This action attaches the database to msdb.

Description:

If RAL execution is successful then attaches the database to msdb. This RAL reads the mdf

and ldf file location/path from discovery dataset object and attach the database.

Below is the query that gets executed in back-end on RAL execution.

SQL Command: CREATE DATABASE database_name ON (FILENAME = 'mdf filename and

path'), (FILENAME = 'ldf filename and path') FOR ATTACH ;

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME

Select the dataset from the

drop-down list.

Outputs

Action fails, if the agent is unable to attach the database.

Success Output: SUCCESS on component <component_name> (IP_Address)

UI Input Input Key Name Description

Dataset

Name

Not Applicable

Select the dataset from the

drop-down list.

Specify

the full

directory

path

where the

log file

needs to

be

PANSQL_BACKUP_LOGS_PATH Enter the full directory path

where you want to back up

the log file.

This field is optional.

Configuration

273

UI Input Input Key Name Description

backedup

Specify

the log file

name

PANSQL_BACKUPLOGS_LOGFILENAME Enter the log file name

relative to directory path.

This field is optional.

Specify

the

Database

log backup

rate

PANSQL_BACKUPLOGS_BACKUPRATE_MBPS Enter the database log

backup rate in MBps.

This property is used to

compute action status, but

not required for execution.

Default value is 100.

This field is optional.

Convert

Database

to

Standby

Not Applicable Select this check-box to

convert the database to

stand-by.

Specify

the undo

Log File

Name with

full path

PANSQL_BACKUPLOGS_UNDO_LOGDIR Enter the undo log file name

with full path.

Backup Logs

Backup Logs - Dumps a transactional log of the MSSQL database with respect to the dataset

specified.

Description:

This action dumps a transactional log of the MSSQL database with respect to the dataset

specified. This action is used in Normal Copy/Switch Over/Switch Back/Fail Over.

Inputs:

Input

Name

Input Key Name Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 274

Input

Name

Input Key Name Description

Dataset

Name

Not Applicable

Select the dataset from the drop-

down list.

Specify the

full

directory

path where

the log file

needs to be

backedup

PANSQL_BACKUP_LOGS_PATH Enter the full directory path where

you want to back up the log file.

This field is optional.

Specify the

log file

name

PANSQL_BACKUPLOGS_LOGFILE

NAME

Enter the log file name relative to

directory path.

This field is optional.

Specify the

Database

log backup

rate

PANSQL_BACKUPLOGS_BACKUP

RATE_MBPS

Enter the database log backup rate

in MBps.

This property is used to compute

action status, but not required for

execution.

Default value is 100.

This field is optional.

Convert

Database to

Standby

Not Applicable

Select this check-box to convert the

database to stand-by.

Specify the

undo Log

File Name

with full

path

PANSQL_BACKUPLOGS_UNDO_L

OGDIR

Enter the undo log file name with

full path.

Outputs:

Configuration

275

Output

Name

Output Key Name

Description

Return value(s) upon successful dump:

Log file

path

PANSQL_BACKUP_LOGS_PATH_OUTPUT Path where the log file is

dumped.

Log file

name

PANSQL_BACKUPLOGS_LOGFILENAME_OUTPUT Name of the log file relative

to

PANSQL_BACKUPLOGS_PATH.

Timestamp PANSQL_BACKUPLOGS_LOGFILE_TIMESTAMP Timestamp of the log file.

Checksum PANSQL_BACKUPLOGS_LOGFILE_CHECKSUM Checksum of the log file.

Last

transaction

ID

PANSQL_BACKUPLOGS_LASTTRANS_ID Last transaction ID.

Last

transaction

timestamp

PANSQL_BACKUPLOGS_LASTTRANS_TIMESTAMP Last transaction timestamp.

Return value(s) upon failure:

Error

message

PANSQL_BACKUPLOGS_ERROR Error message specifying the

nature of failure.

Error Codes:

Error Code Description

PAN-DSQL-0047 Common exception if any error occurs during action

execution on database.

PAN-DSQL-0080 Undo Log directory path is not set.

PAN-DSQL-0076 Backup log directory path is not set.

PAN-DSQL-0057 Unable to create log backup on database.

Notes:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 276

▪ If the action is configured with a property, the same will be used during execution

irrespective of the whether the corresponding input parameter is specified or not.

▪ The transactional logs that are backed up will be taken without any compression.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

o PANSQL_BACKUPLOGS_BACKUPRATE_MBPS (backup rate) is configured with

input of Key Values or Advance Properties.

o PANSQL_BACKUPLOGS_UNDO_LOGDIR (undo log directory) is configured with

input of Key Values or Advance Properties.

o PANSQL_BACKUP_LOGS_PATH (backup log directory) is configured with input of

Key Values or Advance Properties.

o PANSQL_BACKUPLOGS_LOGFILENAME (backup log file name) is configured with

input of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator or db_owner on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Locate directory for backup logs.

▪ Locate directory for undo logs.

▪ Database mode.

(Pre-check fails if database mode is simple or bulk logs).

▪ Configured dataset is the current Production dataset.

MSSQL Always ON Choose DR Availability Replica

Description:

This action replicates SQL Server Datasets from PR to DR.

Inputs:

UI Input Input Key Name Description

DR_COMPONENT_NAME DR_COMPONENT_NAME Select the

DR

component

Configuration

277

UI Input Input Key Name Description

name from

the drop-

down list.

PRIMARY_COMPONENT_NAME PRIMARY_COMPONENT_NAME Select the

PR

component

name from

the drop-

down list.

PRIMARY_DATASET_NAME PRIMARY_DATASET_NAME Select the

PR database

name from

the drop-

down list.

DR_COMPONENT_IP DR_COMPONENT_IP Select the

DR

component

IP address

from the

drop-down

list.

DR_DATASET_COUNT DR_DATASET_COUNT Provide the

number of

DR

databases in

the text

box.

PRIMARY_COMPONENT_IP PRIMARY_COMPONENT_IP Select the

PR

component

IP address

from the

drop-down

list.

PRIMARY_DATASET_COUNT PRIMARY_DATASET_COUNT Provide the

number of

PR

databases in

the text

box.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 278

UI Input Input Key Name Description

DR_DATASET_NAME DR_DATASET_NAME Select the

DR database

name from

the drop-

down list.

Change DB Mode

Change DB Mode - Changes the database mode.

Description:

This action changes the database mode. You can change the database mode to online mode

or single user mode.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable Select the dataset from the drop-

down list.

Specify the new

mode

PANSQL_CHANGE_DB_MODE Select the mode to which you want

to change the current database

mode, from the drop-down list.

The options are: Recover DB, Change

to Single User, OFFLINE and ONLINE.

This field is mandatory.

Configuration

279

Outputs:

Output

Name

Output Key Name Description

Error

message

PANSQL_CHANGE_DB_MODE_ERROR Error message

specifying the nature

of failure while

changing DB mode.

Error Codes:

Error Code Description

PAN-DSQL-0047 Common exception if any error occurs

during action execution on database.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

o PANSQL_CHANGE_DB_MODE (changeDBModeKey) is configured with input of

Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

Choose DR Availability Replica

Choose DR Availability Replica - Chooses MSSQL AlwaysON available DR replica to operate

for further actions.

Description

This action is used to get a list of DR Replica of AlwaysON for the configured group. User can

choose one of the DR Replica for further actions. This action gives a flexibility during test

exercise or failover to choose DR Replica that is more recent or consistent.

Pre-requisites:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 280

This action is applicable only for MSSQL AlwaysON solution's group.

Inputs:

None

Outputs:

Output

Name

Output Key Name

Description

Dataset

Name

DR_DATASET_NAME Dataset name of the

chosen DR Replica.

Total number

of DR

Dataset.

DR_DATASET_COUNT Total number of DR

Dataset.

Component

Name

CUSTOM_ACTION_COMPONENT_NAME Component Name of

chosen DR Replica

Detach MSSQL Instance

This action detaches the database from msdb.

Description:

If RAL execution is successful then detaches the database from msdb.

Below is the query that gets executed in back-end on RAL execution.

SQL Command: use master; exec sp_detach_db database_name;

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME Select the dataset from the

drop-down list.

Action fails, if the agent is unable to detach the database.

Success Output: SUCCESS on component <component_name> (IP_Address)

Configuration

281

Execute SQL

Description:

This action is used for executing any SQL command.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from the drop-

down list.

Specify the SQL

to Execute

PANSQL_EXEC_SQL Enter the SQL command to

execute.

Outputs:

Execute SQL action does not return any value.

Error Codes:

Error Code Description

PAN-DSQL-0047 Common exception if any error occurs during

action execution on database.

Execute SQL File

Description:

This action is used for executing .sql file have multiple sql command/queries command.

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME

Select the dataset from the

drop-down list.

Specify

the SQL

to

PANMSSQL_EXECSQL_FILE_NAME SQL file has to be kept in PR

and DR server similar to

oracle solution’s execute sql

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 282

Execute file RAL.

Note:

The file can have multiple

commands, separated by a

comma and saved with .sql

extension.

Outputs:

Displays the sql execution log of the sql file.

Error Codes:

Error Code Description

PAN_DSQL_0077 Common exception if any error occurs during

action execution on database.

Note:

Execute SQL File RAL fails, if the path has space in between the folder name.

Get DB Mode

Description:

This action is used to get the current mode of the database.

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME

Select the dataset from the

drop-down list.

Outputs:

Output Name Output Key Name Description

Configuration

283

Message PANSQL_DB_MODE_STR Gives information on the

current database mode.

Code PANSQL_DB_MODE_CODE Code corresponding to the

message.

Error Codes:

Error Code Description

PAN-DSQL-

0047

Common exception if any error

occurs during action execution on

database.

Load Logs

Load Logs - Loads/applies a transactional log of the MSSQL database with respect to the

dataset specified.

Description:

This action loads/applies a transactional log of the MSSQL database with respect to the

dataset specified. This action is used in Normal Copy/Switch Over/Switch Back/Fail Over.

Inputs:

UI Input Input Key Name Description

Dataset Name Not Applicable

Select the dataset from

the drop-down list.

Specify the full

directory path

where the log file

needs to be loaded

PANSQL_LOADLOGS_PATH Enter the full directory

path where you want

to load/apply the log

file.

This field is optional.

Specify the list of

log file names to

restore

PANSQL_LOADLOGS_LOGFI

LES

Enter the log file name

and click Add.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 284

UI Input Input Key Name Description

Select the log file

name and click

Remove if you want to

remove added log file

from the list.

This field is optional.

Specify the

Database log

restore rate

PANSQL_LOADLOGS_LOAD

RATE_MBPS

Enter the database log

restore rate in MBps.

Default value is 100.

This field is optional.

Undo Log Directory PANSQL_LOADLOGS_UNDO

_LOGDIR

Enter the full path for

undo log file.

This field is optional.

Primary

Component Name

PANSQL_BACKUPLOGS_CO

MPONENT

Enter the name of the

component containing

the backup Log.

This information is

used to compute

checksum.

This field is optional.

Backup Path on

Primary

PANSQL_BACKUP_LOGS_PA

TH

Enter the path where

the log file are

dumped.

This is the path from

where SQL server gets

transaction logs to

apply.

Configuration

285

UI Input Input Key Name Description

This field is optional.

Outputs:

Output

Name

Output Key Name

Description

Return value(s) upon successful dump:

Log file

path PANSQL_LOADLOGS_PATH_OUTPUT Path where the log file is

dumped.

Log file

names

PANSQL_LOADLOGS_LOGFILES_OUTPUT Comma separated log file

names relative to

PANSQL_LOADLOGS_PATH

loaded/applied.

Timestamp PANSQL_LOADLOGS_LOGFILE_TIMESTAMP Timestamp of the log file.

Last

transaction

timestamp

PANSQL_LOADLOGS_LASTTRANS_TIMESTAMP Last Transaction

timestamp

Return value(s) upon failure:

Error

message

PANSQL_LOADLOGS_ERROR Error message specifying

the nature of failure.

Error Codes:

Error Code Description

PAN-DSQL-0047 Common exception if any error occurs during action

execution on database.

PAN-DSQL-0080 Undo Log directory path is not set.

PAN-DSQL-0079 Restore log directory path is not set.

PAN-DSQL-0057 Unable to create log backup on database.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 286

Note:

If the action is configured with a property, the same will be used during execution

irrespective of the whether the corresponding input parameter is specified or not.

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ PANSQL_LOADLOGS_PATH (load logs path) is configured with input of Key Values

or Advance Properties.

▪ PANSQL_LOADLOGS_LOGFILES (log file name) is configured with input of Key

Values or Advance Properties.

▪ PANSQL_LOADLOGS_LOADRATE_MBPS (logs load rate) is configured with input of

Key Values or Advance Properties.

▪ PANSQL_LOADLOGS_UNDO_LOGDIR (undo directory path) is configured with

input of Key Values or Advance Properties.

▪ PANSQL_BACKUP_LOGS_PATH (backup path on primary) is configured with input

of Key Values or Advance Properties.

▪ Authentication.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Locate directory for load logs.

▪ Checksum for files on backup of primary.

▪ Configured dataset is the current DR dataset.

Start MSSQL Instance

This action starts mssql instance server.

Description:

If RAL execution is successful then starts mssql instance server.

Below is the query that gets executed in back-end on RAL execution.

SQL Command: exec net start /y mssqlserver;

Configuration

287

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME

Select the dataset from the

drop-down list.

Outputs:

Action fails, if the agent is unable to start mssql instance server.

Success Output: The SQL Server Agent (MSSQLSERVER) service was started successfully. on

component (IP_Address)

Stop MSSQL Instance

This action stops mssql instance.

Description:

If RAL execution is successful then stop mssql instance.

Below is the query that gets executed in back-end on RAL execution.

SQL Command: exec net stop /y mssqlserver;

Inputs:

UI Input Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME Select the dataset from the

drop-down list.

Outputs:

Action fails, if the agent is unable to stop mssql instance.

Success Output: The SQL Server (MSSQLSERVER) service was stopped successfully. on

component (IP_Address) Additional info: {} <component_name> (IP_Address).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 288

Verify DB Mode

Description:

This action is used to verify, whether the database is in the required status or not.

Inputs:

UI

Input

Input Key Name Description

Dataset

Name

PANMSSQL_DATASET_NAME

Select the dataset from

the drop-down list.

Specify

the

database

mode to

be

verified

PANMSSQL_VERIFY_DATABASE_MODE Select the database

mode to be verified from

the drop-down list

Outputs:

Success Output: DB Mode Successfully Verified as NORMAL for database <database_name>

on component <component_name> (IP_Address).

Configuration

289

File

Check Disk Free Space

Description:

This action checks whether there is enough free space in a given Volume/Drive.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable Select a component name

from the drop-down list.

This field is mandatory

Vol/Drive Name PANFO_IS_DISKFREE_VOL Enter the volume or drive

name.

This field is mandatory.

Required Free

Space (MB)

PANFO_IS_DISKFREE_SIZE Enter the value for the

required free space in MB.

This field is mandatory.

Outputs:

Check Disk Free Space action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 290

Pre-checks

▪ Login credentials.

▪ Availability of free disk space in the server.

▪ Locate Volume/Drive.

Check File Existence

Description:

This action checks whether a given file or directory exists or not.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component name

from the drop-down list.

This field is mandatory

File/Directory

Name

PANFO_IS_FILEPATH_EXIST Enter the file or directory

name.

This field is mandatory.

Outputs:

Check File Existence action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Pre-checks

▪ Login credentials.

▪ Locate folder and file.

Configuration

291

Check File Permission

Description:

This action checks whether a given file or directory has permissions for a particular user. On

windows platform, permissions are not checked against 'username'. In this case, permissions

are checked against the user with which IBM Resiliency Orchestration Windows Agent is

running.

Inputs:

UI Input Input Key Name Description

Component Name Not Applicable

Select a component

name from the drop-

down list.

This field is mandatory

Permission to check PANFO_FILEPATH_PERMISSION Select the type of

permission from the

drop-down list.

The options are:

READ, WRITE, and

DELETE.

This field is

mandatory.

Username PANFO_CHECK_PERMISSION_USER Enter the user name

for which you want to

check the file

permission.

This field is

mandatory.

File/Directory Name PANFO_CHECK_PERMISSION_FILEPATH Enter the file or

directory name.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 292

UI Input Input Key Name Description

This field is

mandatory.

Outputs:

Check File Permission action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Limitations:

Not supported when target server is Windows and managed remotely [Agentless model].

Pre-checks

▪ Login credentials.

▪ User permission.

▪ Locate folder and file.

Copy File

Description:

This action copies the file(s) from one path to another path.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component name from

the drop-down list.

This field is mandatory

Source File PANFO_COPYFILE_SRC Enter the file name and path

from where you want to copy

Configuration

293

UI Input Input Key Name Description

Name with Path the file.

This field is mandatory.

Destination File

Name with Path

PANFO_COPYFILE_DEST Enter the file name and path to

where you want to copy the

file.

This field is mandatory.

Outputs:

Copy File action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Pre-checks

▪ Login credentials.

▪ Source path.

▪ Destination path.

▪ File or folder permission for copy.

▪ Availability of disk space in the destination folder.

Delete Directory

Description:

This action deletes the given directory. This assumes that the user has the privilege to delete

the given directory and the directory is empty if recursive is not set.

Inputs:

UI Input Input Key Name Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 294

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component

name from the drop-

down list.

This field is mandatory

Directory

Name to

delete

PANFO_DELETE_DIR Enter the directory

name that you want to

delete.

This field is mandatory.

Recursive PANFO_DELETE_DIR_RECURSIVE Select this check box, if

you want to delete all

the files within the

directory and its sub-

folders.

This KV is deprecated

and can be configured

only using GUI mode.

Outputs:

Delete Directory action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Pre-checks

▪ Login credentials.

▪ User permission to delete the directory and recursive or not.

▪ Permission for root user to delete the directory.

Configuration

295

Delete File

Delete File - Deletes the specified file.

Description:

This action deletes the given file. This assumes that the user has the privilege to delete the

given file. File delete action deletes a file if underlying system allows it to delete for the user

(Generally Administrator user), and the OS agent is running. On windows, some of the

advanced permission settings like 'delete deny', are effected only when user tries to delete

from explorer. However it is allowed to delete from cmd.exe. In such case, File delete action

will delete the file.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component name from

the drop-down list.

This field is mandatory

File Name to

delete

PANFO_DELETE_FILE Enter the file name that you want

to delete.

This field is mandatory.

Outputs:

Delete File action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Note:

This action deletes files in the sub-directory also.

Pre-checks

▪ Login credentials.

▪ Locate file.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 296

▪ User permission to delete file in directory or sub-directory.

Delete File List

Description:

This action deletes the list of files specified as comma separated.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component name

from the drop-down list.

This field is mandatory

File Name to

delete

PANFO_DELETE_FILELIST Enter the file name that you

want to delete. Click Add.

To remove the file(s) from the

list, select the file and click

Remove.

This field is mandatory

Outputs:

Delete File List action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Note:

This action deletes files in the sub-directory also.

Pre-checks

Configuration

297

▪ Login credentials.

▪ Locate file.

▪ User permission to delete file in directory or sub-directory.

Delete Files

Description:

This action deletes files whose name matches the given pattern. This assumes that the user

has the privilege to delete the files in the directory.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component

name from the drop-

down list.

This field is mandatory

Directory Name PANFO_DELETEFILES_DIR Enter the directory

name from where you

want to delete the files.

This field is mandatory.

File Name

Pattern

PANFO_DELETEFILES_PATTERN Enter the file name

pattern to match with

the files to be deleted.

You can use wild card

like * and ?.

This field is mandatory.

Outputs:

Delete Files action does not return any value.

Error Codes:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 298

Error Code Description

PAN-CGEN-0002 Invalid component name.

Note:

This action deletes files in the sub-directory also.

Pre-checks

▪ Login credentials.

▪ Locate files.

▪ User permission to delete files in directory or sub-directory.

Delete Large Files

Description:

This action deletes files that are larger than a specified size in the given directory. This

assumes that the user has the privilege to delete the files in the directory.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a

component name

from the drop-

down list.

This field is

mandatory

Directory

Name

PANFO_DELETEFILE_LARGER_DIR Enter the directory

name from where

you want to delete

the larger files.

This field is

mandatory.

File Size

(MB) PANFO_DELETEFILE_LARGER_SIZE Enter the file size

in MB.

Configuration

299

This field is

mandatory.

Note:

This action deletes files in the sub-directory also.

Outputs:

Delete Larger Files action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Note:

This action deletes files in the sub-directory also.

Pre-checks

▪ Login credentials.

▪ Locate file.

▪ User permission to delete large files in directory or sub-directory.

Delete Old Files

Delete Old Files - Deletes files that are older than the specified period.

Description:

This action deletes files that are older than the specified period in the given directory. This

assumes that the user has the privilege to delete the files in the directory.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable Select a component

name from the drop-

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 300

UI Input Input Key Name Description

down list.

This field is

mandatory

Directory

Name

PANFO_DELETE_FILE_OLDER_DIR Enter the directory

name from where you

want to delete the

files older than the

specified period.

This field is

mandatory.

Files Older

Than

PANFO_DELETE_FILE_OLDER_TIME Enter the time in

hours.

This field is

mandatory.

Outputs:

Delete Old Files action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Note:

This action deletes files in the sub-directory also.

Pre-checks

▪ Login credentials.

▪ Locate the old files.

▪ User permission to delete old files in directory or sub-directory.

Configuration

301

Get File Checksum

Description:

This action gets the CRC32 checksum. The file name should be regular file.

Inputs:

UI Input Input Key Name Description

Component

Name Not Applicable

Select a component

name from the drop-

down list.

This field is mandatory

File Name

PANFO_CHECKSUM_FILENAME

Enter the file name for

which you want to get

the file checksum.

This field is mandatory.

Outputs:

Output Name Output Key Name

Description

Checksum of the

specified

filename

PANFO_FILENAME_CHECKSUM

Check the specified

file name.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Limitations:

Not supported when server is managed remotely [Agentless model].

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 302

Pre-checks

▪ Login credentials.

▪ Locate folder and file.

Get File Size

Description:

This action gets the file size in bytes. The file name should be regular file.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component name

from the drop-down list.

This field is mandatory

File Name PANFO_FILESIZE_FILENAME Enter the file name for

which you want to get the

file size.

This field is mandatory.

Outputs:

Output Name Output Key Name Description

Size of file PANFO_FILE_SIZE Checks size of the

specified file name.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Pre-checks

Configuration

303

▪ Login credentials.

▪ Locate file within the prescribed folder on a selected machine.

Get File Time

Description:

This action gets the timestamp of the file. The file name should be regular file.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable

Select a component

name from the drop-

down list.

This field is

mandatory

File Name PANFO_TIMESTAMP_FILENAME Enter the file name

for which you want to

get the timestamp.

This field is

mandatory.

Outputs:

Output Name Output Key Name Description

Timestamp of file PANFO_FILE_TIMESTAMP Gets the timestamp of

the file.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Pre-checks

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 304

▪ Login credentials.

▪ Locate file within the prescribed folder on a selected machine.

Replace in a File

Description:

This action checks whether a specified pattern exists in the given file and if found replaces

with the replace text.

Inputs:

UI Input Input Key Name Description

Component Name Not Applicable Select a

component

name from the

drop-down list.

This field is

mandatory

File name PANFO_REPLACE_FILE_TEXT_DIR Enter the file

name and path

for which you

want to replace

the text.

This field is

mandatory.

Pattern to search PANFO_REPLACE_FILE_TEXT_PATTERN Enter the text

that you want to

search in the

specified file.

This field is

mandatory.

Replacement Text PANFO_REPLACE_FILE_TEXT Enter the text

that you to

replace with the

Configuration

305

UI Input Input Key Name Description

existing

specified text.

This field is

mandatory.

Outputs:

Replace in a File action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Limitations:

Not supported when server is managed remotely [Agentless model].

Pre-checks

▪ Login credentials.

▪ User permission to access the folder and edit the file.

▪ Locate file in the directory or sub-directory.

Search in a File

Description:

This action checks whether a specified pattern exists in the given file or not.

Inputs:

UI Input Input Key Name Description

Component Not Applicable Select a component

name from the

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 306

UI Input Input Key Name Description

Name drop-down list.

This field is

mandatory

File name PANFO_IS_FILE_CONTAIN_PATTERN_FILENAME Enter the file name

that you want to

search.

This field is

mandatory.

Pattern to

search

PANFO_IS_FILE_CONTAIN_PATTERN Enter the pattern

that you want to

search in the

specified

component.

This field is

mandatory

Outputs:

Search in a File action does not return any value.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Limitations:

Not supported when server is managed remotely [Agentless model].

Pre-checks

▪ Login credentials.

▪ Locate file in the directory or sub-directory.

Process

Configuration

307

Check Port in Use

Check Port in Use - Checks whether a particular communication port is in use.

Description:

This action checks whether a particular communication port is in use. This can be used to

check whether an application has successfully started or not.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable Select the component name

from the drop-down list.

Port Number PANOS_CHECK_PORT Enter the port number.

This field is mandatory.

Outputs:

Output

Name Output Key Name Description

Process

Found

PANOS_CHECK_PORT_RESULT The output of this

action will be a boolean

value - 'true' if the port

is in use, else 'false'.

Note:

▪ The OS agent needs to run with root/Administrator privileges for the proper output for

ports requiring privileged access.

▪ In MS-Windows platform, OS agent running as "Local System Account" will inherit the

security policy of the "Default User"(not the "Current User") and by default provides

no-barred access to all the ports and the result provided by this method may be

wrong. It is advised to run the OS agent as service under a user-defined

account.(Refer http://technet.microsoft.com/en-us/magazine/cc162523.aspx for more

details).

Error Codes:

Error Code Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 308

PAN-CGEN-

0002

Invalid component name.

Limitations:

Not supported when server is managed remotely [Agentless model].

Pre-checks

▪ Login credentials.

▪ Validity of port number.

Start Process

Start Process - Starts application using a command or script.

Description:

This action is used to start an application using a command or script. This can be used to

start an application where the application does not stop/end immediately and keep running

causing the command/script not to complete. This action can be configured such that it will

come out after a specified time interval so that it will not wait forever.

Inputs:

UI Input Input Key Name Description

Component

Name

Not Applicable Select the component name

from the drop-down list.

Command/Script

Name

PANOS_EXEC_FILE_PATH Enter the command/script

name.

This field is mandatory.

Success Pattern Not Applicable Can provide the predictable

multiple success patterns

from Command script/path.

Configuration

309

UI Input Input Key Name Description

This field is optional.

Failure Pattern Not Applicable Can provide the predictable

multiple failure patterns

from Command script/path.

This field is optional.

Execution Wait

Time

PANOS_EXEC_WAIT_MODE Enter the execution wait

time in seconds.

The value '0' in this field

defines indefinite wait.

This field is mandatory.

Outputs:

Output

Name

Output Key Name Description

Exit Code PANOS_EXEC_EXIT_CODE Exit code of the

command/script.

Exit code of the process is

available only when the

PANOS_EXEC_WAIT_MODE

is '0'.

Standard

Out

Message

PANOS_EXEC_STDOUT_MESSAGE The output message of the

command/script.

Standard

Error

Message

PANOS_EXEC_STDERR_MESSAGE The error message of the

command/script.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 310

Note:

▪ Microsoft Windows OS requires you to pass the command as 'Command.com /C real-

command' or 'Cmd.exe /C real-command' based on the version

▪ Start Process supports special characters which are executable in the console( Linux-

eg. "|" and ";" . You can execute multiple commands using ';'

ps -ef|grep java , ./LinuxOSAgent.stop;./LinuxOSAgent.stop

▪ JVM does not open a terminal for executing process. Some commands may open

windows on the native platform, when the application is not run on the terminal.

▪ Exit code of the process is available only when the PANOS_EXEC_WAIT_MODE is '0'

(zero)

▪ Paths in the Microsoft Windows OS requires the path separator to be escaped (i.e

C:\windows\tmp.exe maps to C:\\windows\\tmp.exe)

▪ Always specify the 8.3 format on Microsoft Windows OS

▪ Exit code of the process is available only when the PANOS_EXEC_WAIT_MODE is '0'

(zero)

▪ Success and Failure Pattern work on the following combinations:

Sl no Success

Pattern

Failure

Pattern

Result Should be

1 Not

Provided

Not Provided Based on exit code

2 Not

Provided

Provided If any failure match is found then the

command is fail.

If none of the failure pattern found in

command output, then it should display as

success.

3 Provided Not Provided If any success match is found then the

command is success.

If none of the success pattern found in

output, it should fail with an error

message"Did not find success pattern in

the output".

Configuration

311

4 Provided Provided Firstly, the failure patterns is matched; if

match is found, then command is fail.

If none of the failure pattern is found then

success pattern is matched; if match is

found, then command is success.

If none of the patterns are found in the

output:

An error message "Did not find success

pattern in the output" is displayed.

Note:

If multiple Success or Multiple Failure patterns are configured, then the output is dependent

on EITHER the first Failure/Success pattern OR second Failure/Success pattern OR third

Failure/Success pattern etc.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component

name.

Pre-checks

▪ Login credentials.

▪ Command or script is available on the machines.

▪ Command for Windows and the configured script path is the correct format for IBM

Resiliency Orchestration.

▪ User permission to start the process.

Find Process

Find Process - Checks whether a particular application/process is running by checking it's

name against the names of the active application/process.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 312

Description:

This action checks whether a particular application/process is running by checking it's name

against the names of the active application/process.

Inputs:

UI Input Input Key Name Description

Component Name Not Applicable Select the component

name from the drop-down

list.

Application/Process

Name

PANOS_SEARCH_PROCESS Enter the name of the

application/process you

want to check.

Note:

To find multiple process,

enter process separated

by comma.

This field is mandatory.

Outputs:

Output

Name

Output Key Name Description

Port in Use PANOS_SEARCH_PROCESS_RESULT The output of this

action will be a

boolean value - 'true'

if the process is

found, else 'false'.

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component name.

Pre-checks

Configuration

313

▪ Login credentials.

▪ Process is running on the machines.

Repeatable

Repeatable

Repeatable Actions/Add new Action to RAL catalogue

1. Add provision in CLI to create new action

2. Provide name and category ( with in Custom RAL’s)

3. Provide the command/script and its dependencies

It will be added to the custom RAL library

4. Add it to the workflow, the configured values are prefilled.

Execution will be similar to custom action.

Scripts should be copied to

{EAMSROOT}/scripts/repeatable/{category Name}/{Action Name}/{scripts and its

depended files}

Ex:

/opt/panaces/scripts/repeatable/checkStatus/checkStatus/ping.sh

/opt/panaces/scripts/repeatable/checkStatus/checkStatus /pingdep.sh

This has to be repeated for all the agents using this RAL and server.

To Edit Repeatable RAL:

Limitation:

1. On Adding RAL the first time we need to open the Action property before publishing.

2. Refresh is not allowed after adding RAL. (Script in Action property will go off).

In UI

1. Go to workflow Editor >Add >Action

2. Select Action Category >Add Action in Workflow and Execute

Replication Level

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 314

EMC BCV

establishBCV

This action re-establishes BCV devices to its RDF devices. If this is done successfully, all the

changes done on the RDF devices starts getting updated on the BCV devices.

Once the resync request is initiated,this action gets completed without waiting for completion

of resynchronization. 'getBCVStatus' or 'verifyBCVStatus' action should be used to check if

the pair has arrived to a particular state. This action provides an option to select 'full

establish'. If the user has selected "Full" mode, then full establish will be performed.

This operation can also be forced by selecting 'forceful'. When the 'force' option is used,

SYMCLI attempts to force the operation even though one or more devices in the device group

may not be in the normal, expected BCV state or mode for the operation.

When this action is executed as a part of workflow, the SYMCLI 'symmir establish' command

is invoked on the pair represented by the selected protection scheme, along the appropriate

options selected by the user.

Inputs:

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

EMC_ESTABLISH_BCV_OPER_ON - Mandatory

Configuration

315

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Mode Select the

mode of

operation.

EMC_ESTABLISH_BCV_MODE FULL Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symmir -g <devGrpName> establish <-full> bcv ld <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

splitBCV

This action stops the replication for the BCV devices. When successful, the updates of the

RDF devices does not go to the BCV devices. This does not delete the pair, hence, it can be

resynced later. The action returns as success, when the splitting of BCV is successful.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 316

When the action is executed as a part of workflow, the command SYMCLI 'symmir split' is

invoked on the pair represented by the selected protection scheme.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

EMC_SPLIT_BCV_OPER_ON - Mandatory

Outputs:

There are no output keys for this action.

Execution Log:

Configuration

317

SYMCLI Command: symmir -g <devGrpName> split bcv ld -consistent <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

getBCVStatus

This action reports the BCV device(s) status (EMC specific device status that indicates the

current state of replication).

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

EMC_STATUS_BCV_OPER_ON - Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 318

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Outputs:

EMC_STATUS_BCV_DEV_STATE indicates BCV status. Possible values are status values are

▪ Sync In Progress

▪ Synchronized

▪ Split

▪ Never Established

▪ Restore In Progress

▪ Restored

▪ Split In Progress

▪ Split No Increment

▪ Split Before Sync

▪ Split Before Restore

Execution Log:

▪ getBCVStatus will have the following output format:

▪ If BCV contains no devices then the output format will be:

No BCV devices found for device group <dgName>

▪ The outkey EMC_STATUS_BCV_DEV_STATE will be empty

▪ If BCV contains atleast one device then the output format will be:

Pair states of BCV devices of device group <dgName>:

Configuration

319

▪ The outkey EMC_STATUS_BCV_DEV_STATE will have pairstate of each logical

device in the following format:

▪ <LogicalDevName1> - <PairState>

▪ <LogicalDevName2> - <PairState>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

verifyBCVStatus

This action is used to verify the status of BCV devices. When this action is executed it checks

for the current status of the each BCV device and this action is considered success if all

device states match what user has asked for.

Inputs:

UI

Input

Descripti

on

Input Key Name

Key Values Input

Optional/

Mandatory

Protecti

on

Scheme

Name

Select the

protection

scheme

name

configure

d for the

group

from the

drop-

down list.

Note:

If the

group is

attached

with more

than one

pair of

protection

subsyste

EMC_VERIFY_STATUS

_BCV_OPER_ON

- Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 320

UI

Input

Descripti

on

Input Key Name

Key Values Input

Optional/

Mandatory

m then do

not select

"Current

Productio

n Service"

or

"Current

DR

Service".

Instead,

select the

actual

protection

subsyste

m to

configure

the

operation.

BCV

State

Select the

BCV

Status of

the

operation

EMC_VERIFY_STATUS

_BCV_DEV_STATE

One of the following

should be

provided/selected.

• Sync In

Progress

• Synchronize

d

• Split

• Never

Established

• Restore In

Progress

• Restored

• Split In

Progress

• Split No

Increment

• Split Before

Mandatory

Configuration

321

UI

Input

Descripti

on

Input Key Name

Key Values Input

Optional/

Mandatory

Sync

• Split Before

Restore

Outputs:

There are no output keys for this action.

Execution Log

verifyBCVStatus will have the following output format.

▪ If BCV contains no devices then the output format will be:

No BCV devices found for device group <dgName>

▪ If all the devices are in same pairstate then the output format will be:

All BCV devices of device group <dgName> are in <configuredPairState> pair state

▪ If all the devices are not in same pairstate then the output format will be:

▪ The following BCV devices of device group <dgName> are not in

<configuredPairState> pair state:

▪ <LogicalDevName1> - <PairState>

▪ <LogicalDevName1> - <PairState>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

isBCV

This action checks whether the protection service name represented is a BCV protection

service. This action considered success if a match occurs with what user has asked for. This

action considered failed fail if it is of different type.

Inputs:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 322

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

EMC_IS_BCV_OPER_ON - Mandatory

Outputs:

There are no output keys for this action.

Execution Log

<Protection scheme> is <R1/R2/BCV>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

Configuration

323

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

syncWaitBCV

This action will Wait until all the BCV devices are in Synchronized state.

The action provides an option to specify the timeout value. It is specified in minutes. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value, or status to become Synchronized, whichever happens earlier.

When the action is executed as a part of the workflow, 'symmir verify' command is invoked

on the device group represented by the selected protection scheme, along with the options

chosen by the user. The action is considered success if all BCV device status becomes

Synchronized, failed otherwise.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

EMC_SYNCWAIT_BCV_OPER_ON - Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 324

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

select the

actual

protection

subsystem

to configure

the

operation.

BCV

State

Zero will

verify once,

any other

positive

integer will

verify every

30 seconds

EMC_SYNCWAIT_BCV_TIMEOUT 0 or

more (

by

default

it is 0).

Optional

Outputs:

There are no output keys for this action.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

EMC Clone

Recreate Clone

Description:

This action creates an internal copy session with the devices in the device group and one or

more target devices associated with the group. While the operation is in progress, the state

of the device pair is 'CreateInProgress'. When the operation completes, the state of the

device pair changes to 'Created'.

Inputs:

Configuration

325

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Operation

on

Choose

from the

list of

protection

schemes

configured

for the

group

EMC_RECREATE_CLONE_OPER_ON (

Production Protection Scheme or DR

Protection Scheme or service name),

EMC_RECREATE_CLONE_OPER_ON_TYPE

(DYNAMIC or STATIC)

Mandatory

rdf option Performs

the action

on the

remote

Symmetrix

array

EMC_RECREATE_CLONE_RDF Optional

tgt option Uses TGT

devices as

clone

targets.

When

used with

the -rdf

option, the

operation

will use

RTGT

devices

EMC_RECREATE_CLONE_TGT Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symclone -g <devGrpName> recreate –precopy <-force> <-tgt> <-

rdf> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 326

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Activate Clone

Description:

Activates an internal copy session with the devices in the device or composite group and one

or more target devices associated with the group.

While the operation is in progress, the state of the device pair is either CopyInProgress or

CopyOnAccess. When the operation completes, the state changes to Copied.

Inputs:

Input

Name

Input

Type

Input Key Name Optional/Mandatory

Operation

on

Choose

from the

list of

protection

scheme

configured

for the

group

EMC_RECREATE_CLONE_

OPER_ON

( Production Protection Scheme

or DR Protection Scheme

or service name),

EMC_RECREATE_CLONE_OPER_

ON_TYPE(DYNAMIC or STATIC)

Mandatory

rdf option Performs

the action

on the

remote

Symmetrix

array.

EMC_RECREATE_CLONE_RDF Optional

tgt option Uses TGT

devices as

clone

targets.

When used

with the -

rdf option,

the

operation

will use

RTGT

EMC_RECREATE_CLONE_TGT Optional

Configuration

327

Input

Name

Input

Type

Input Key Name Optional/Mandatory

devices.

consistent

option

Consistently

activates

the source

and target

pairs.

EMC_ACTIVATE_CLONE_

CONSISTENT

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symclone -g <devGrpName> activate <-force> <-consistent> <-tgt>

<-rdf> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

SyncWait Clone

Description:

Verifies whether clone device pairs in a group are in the Copied state.

Inputs:

Input

Name

Input

Type

Input Key Name Optional/Mandatory

Operation

on

Choose

from the

list of

EMC_RECREATE_CLONE_OPER_ON

( Production Protection Scheme or

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 328

protection

scheme

configured

for the

group

DR Protection Scheme or service name),

EMC_RECREATE_CLONE_OPER_ON_TYPE

(DYNAMIC or STATIC)

Operation

timeout

(in

minutes)

zero will

be

verified

once, any

other

positive

integer

will be

verified in

every 30

seconds.

EMC_SYNCWAIT_CLONE_TIMEOUT (0 or

more. Default is 0)

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symclone -g <devGrpName> -i <interval> -c <count> -verify -copied

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

EMC SRDF

establishRDF

Configuration

329

This action re-establishes a split RDF and then restarts the 'update copy operations' to the

R2 volume. If this is done successfully, all the changes done on the Primary starts getting

updated on the Secondary volume. Once the resync request is initiated,this action gets

completed without waiting for completion of resynchronization. 'getRDFStatus' or

'verifyRDFStatus' action should be used to check if the pair has arrived to a particular state.

This action provides an option to select 'full establish'. If the user has selected "Full" mode,

then full establish will be performed.

This operation can also be forced by selecting 'forceful'. When the 'force' option is used,

SYMCLI attempts to force the operation even though one or more devices in the device group

may not be in the normal, expected RDF state or mode for the operation.

When this action is executed as a part of workflow, the SYMCLI 'symrdf establish' command

is invoked on the pair represented by the selected protection scheme, along the appropriate

options selected by the user.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

EMC_ESTABLISH_RDF_OPER_ON

EMC_ESTABLISH_RDF_OPER_ON_TYPE

Protection

Scheme

or DR

Scheme

or service

name

DYNAMIC

or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 330

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Mode Select the

mode of

operation.

EMC_ESTABLISH_RDF_MODE FULL Optional

Forceful Click the

checkbox if

the

operation

has to be

forced.

EMC_ESTABLISH_RDF_FORCE True or

False.

(It is

False by

default).

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> establish <-full> <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Configuration

331

suspendRDF

This action suspends the replication of a replicating pair. When the action is successful, the

updates of the Primary volume does not go to the Secondary volume. This action does not

delete the pair, hence, it can be resynced later. When the pair is suspended successfully, the

action returns as 'success'.

This action provides an option 'suspend immediate'. If the user has selected "Immediate"

mode, the action causes split to drop the RDF/A session immediately.

Note:

This option is used for RDF/A-capable devices only.

The operation can also be forced by selecting the "forceful". When force option is used,

SYMCLI attempts to force the operation even though one or more devices in the device group

may not be in the normal, expected RDF state or mode for the operation.

When the action is executed as a part of workflow, SYMCLI 'symrdf suspend' command is

invoked on the pair represented by the selected protection scheme, along the appropriate

options chosen by the user.

Inputs:

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

EMC_SUSPEND_RDF_OPER_ON

EMC_SUSPEND_RDF_OPER_ON_TYPE

Production

Protection

Scheme or

DR

Protection

Scheme or

service

name.

DYNAMIC

or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 332

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Mode Select the

mode of

operation.

EMC_SUSPEND_RDF_MODE IMMEDIATE Optional

Forceful Click the

checkbox if

the

operation

has to be

forced.

EMC_SUSPEND_RDF_FORCE True or

False.

(It is False

by default).

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> suspend <-immediate> <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

Configuration

333

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

resumeRDF

This action resumes a suspended RDF and then restarts the update copy operations to the R2

volume. If successful, all the changes done on the Primary starts getting updated on the

Secondary volume. The action completes after initiating the resync request and does not wait

for the resynchronization to complete. 'getRDFStatus' or 'verifyRDFStatus' action should be

used to check if the pair has arrived to a particular state.

When the action is executed as a part of workflow, SYMCLI 'symrdf resume' command is

invoked on the pair represented by the selected protection scheme, along the appropriate

options if any chosen by the user.

Inputs:

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

EMC_RESUME_RDF_OPER_ON

EMC_RESUME_RDF_OPER_ON_TYPE

Production

Protection

Scheme

or DR

Protection

Scheme

or service

name.

DYNAMIC

or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 334

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Forceful Click the

checkbox if

the

operation

has to be

forced.

EMC_RESUME_RDF_FORCE True or

False.

(It is

False by

default).

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> resume <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

splitRDF

Configuration

335

This action stops the replication of a replicating pair. When successful, the updates of the

Primary volume does not go to the Secondary volume. This does not delete the pair, hence,

it can be resynced later. The action returns as success, when the splitting of pair is

successful.

The action provides an option to choose split immediate. If the user has selected

"Immediate" mode, causes split to drop the RDF/A session immediately.

Note:

This option is used for RDF/A-capable devices only.

The operation can also be forced by selecting the "forceful". When force option is used,

SYMCLI attempts to force the operation even though one or more devices in the device group

may not be in the normal, expected RDF state or mode for the operation.

When the action is executed as a part of workflow, SYMCLI 'symrdf split' command is invoked

on the pair represented by the selected protection scheme, along the appropriate options

selected by the user.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

EMC_SPLIT_RDF_OPER_ON

EMC_SPLIT_RDF_OPER_ON_TYPE

Production

Protection

Scheme or

DR

Protection

Scheme or

service

name

DYNAMIC

or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 336

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Mode Select the

mode of

operation.

EMC_SPLIT_RDF_MODE Immediate Optional

Forceful Click the

checkbox if

the

operation

has to be

forced.

EMC_SPLIT_RDF_FORCE True or

False.

(It is False

by

default).

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI

Command:

symrdf -g <devGrpName> split <-

immediate> <-force> -noprompt

Result: Execution <success/failed>

SYMCLI

Output:

<CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

Configuration

337

▪ Agent connectivity.

▪ Authentication (Password check for Agentless).

getRDFStatus

This action reports the RDF pair status (EMC specific pair status that indicates the current

state of replication).

When the action is executed as a part of the workflow, 'symdg show' command is invoked on

the device group represented by the selected protection scheme. Success or failure of the

action is determined by the ouput of the command.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

EMC_STATUS_RDF_OPER_ON

EMC_STATUS_RDF_OPER_ON_TYPE

Production

Protection

Scheme or

DR

Protection

Scheme or

service

name

DYNAMIC

or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 338

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

subsystem

to configure

the

operation.

Outputs:

EMC_DETAILS_RDF_PAIR_STATE indicates pair status. possible values are status values are

▪ Sync In Progress

▪ Synchronized

▪ Consistent

▪ Split

▪ Failed Over

▪ R1 Updated

▪ R1 Update In Progress

▪ Suspended

▪ Partitioned

▪ Mixed

▪ Invalid

▪ TransIdle

Execution Log:

SYMCLI Command: symrdg show <devGrpName>

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Note:

Since the CLI output can be huge, only required information will be captured.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

Configuration

339

▪ Authentication (Password check for agentless).

verifyRDFStatus

This action is used to verify the status of RDF pair. When this action is executed it checks for

the current status of the pair and if a match occurs with what user has asked for then, this

action is considered as success.

When the action is executed as a part of the workflow, The command 'symdg show' is

invoked on the device group represented by the selected protection scheme. Success or

failure of the action is determined by the ouput of the command.

Inputs:

UI Input Description Input Key Name

Key Values Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

EMC_VERIFY_STATUS_

RDF_OPER_ON

EMC_VERIFY_STATUS_

RDF_OPER_ON_TYPE

Production Protection

Scheme or DR

Protection Scheme or

service name.

DYNAMIC or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 340

UI Input Description Input Key Name

Key Values Input

Optional/

Mandatory

the

operation.

Status Select the

status of

RDF

replication

pair to

verify

EMC_VERIFY_STATUS_

RDF_PAIR_STATE

One of the following

should be

provided/selected

• Sync In Progress

• Synchronized

• Consistent

• Split

• Failed Over

• R1 Updated

• R1 Update In

Progress

• Suspended

• Partitioned

• Mixed

• Invalid

• TransIdle

Mandatory

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdg show <devGrpName>

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Note:

Configuration

341

Since the CLI output can be huge, only required information will be captured.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

isRDF

This action checks whether the protection service name R1 or R2. If a match occurs with

what user has asked for then, this action is considered as success else it is considered as

failed if there is a mismatch.

Inputs:

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

EMC_IS_RDF_OPER_ON

EMC_IS_RDF_OPER_ON_TYPE

Production

Protection

Scheme

or DR

Protection

Scheme

or service

name

DYNAMIC

or STATIC

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 342

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

select the

actual

protection

subsystem

to configure

the

operation.

RDF Type Select the

mode of

operation.

EMC_IS_RDF_SRDF_TYPE R1 or R2 Mandatory

Description:

This action can be used to check if the protection scheme is RDF.

Outputs:

There are no output keys for this action.

Execution Log:

<Protection scheme> is <R1/R2>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

failoverRDF

This action executes the EMC 'symrdf' command which switches data processing from the

source (R1) to the target (R2) side.

When the action is executed as a part of the workflow, the command 'symrdf failover' is

invoked on the device group represented by the selected protection scheme along with the

appropriate options if any chosen by the user. Success or failure of the action is determined

by the ouput of the command.

Configuration

343

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

EMC_FAILOVER_RDF_OPER_ON

EMC_FAILOVER_RDF_OPER_ON_TYPE

Production

Protection

Scheme or

DR

Protection

Scheme or

service

name

DYNAMIC

or STATIC

Mandatory

Mode Select the

mode of

operation.

EMC_FAILOVER_RDF_MODE IMMEDIATE Mandatory

Forceful Click the

checkbox if

the

operation

has to be

EMC_FAILOVER_RDF_FORCE True or

False.

(It is False

by default).

Optional

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 344

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

forced.

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> failover <-immediate> <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

failBackRDF

This action executes the EMC 'symrdf' command which switches data processing back to the

source (R1) side.

When this action is executed as a part of the workflow,the command 'symrdf failback' is

invoked on the device group represented by the selected protection scheme along with the

appropriate options if any chosen by the user. Success or failure of the action is determined

by the ouput of the command.

Inputs:

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

EMC_FAILBACK_RDF_OPER_ON Production

Protection

Scheme

or DR

Protection

Mandatory

Configuration

345

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Scheme

or service

name.

Forceful Click the

checkbox if

the

operation

has to be

forced.

EMC_FAILBACK_RDF_FORCE True or

False.

(It is

False by

default.)

Optional

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> failback <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 346

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

swapRDF

This action Swaps the RDF personality of the designated RDF devices. Source R1 device(s)

become target R2 device(s), and target R2 device(s) become source R1 device(s).

The Primary volume becomes the Secondary volume and vice versa. If it is successful, all the

changes done on the Secondary starts getting updated on the Primary volume after re-

establishing. The action completes after reversing the role. It does re-establish or wait for

resynchronization to complete. The 'establishRDF' action should be used to re-establish the

pair after swap.

When this action is executed as a part of the workflow, The cimmand 'symrdf swap' is

invoked on the device group represented by the selected protection scheme, along with the

options chosen by the user. Success or failure of the action is determined by the success or

failure of command.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

EMC_SWAP_RDF_OPER_ON

EMC_SWAP_RDF_OPER_ON_TYPE

Production

Protection

Scheme

or DR

Protection

Scheme

or service

name

DYNAMIC

or STATIC

Mandatory

Configuration

347

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

Forceful Click the

checkbox if

the

operation

has to be

forced.

EMC_SWAP_RDF_FORCE True or

False.

(It is

False by

default).

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> swap <-force> -noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 348

R1update

This action starts to update of the source (R1) side after a failover, and while the target (R2)

side may still be operational to its local host(s). The action completes after invalid tracks

count has reached the configured value by the user. If user has configured zero then this

action will complete after all invalid tracks on R2 are updated to R1.

When the action is executed as a part of the workflow, the commmand 'symrdf update' is

invoked on the device group represented by the selected protection scheme, along with the

options chosen by the user. Success or failure of the action is determined by the success or

failure of command.

Inputs:

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the group

from the

drop-down

list.

Note:

If the group

is attached

with more

than one pair

of protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem to

configure the

operation.

EMC_R1UPDATE_RDF_OPER_ON Production

Protection

Scheme

or DR

Protection

Scheme

or service

name

Mandatory

Configuration

349

UI Input Description Input Key Name

Key

Values

Input

Optional/

Mandatory

Forceful Click the

checkbox if

the operation

has to be

forced.

EMC_R1UPDATE_RDF_FORCE True or

False.

(It is

False by

default).

Optional

Update

Until

Update until

invalid tracks

are less than

or equal to

the

configured

value

EMC_R1UPDATE_UNTIL_INVALIDTRACKS

_RDF

0 OR

MORE (By

default it

is 0)

Optional

Outputs:

There are no output keys for this action.

Execution Log:

SYMCLI Command: symrdf -g <devGrpName> update <invalidTracksCnt> <-force> -

noprompt

Result: Execution <success/failed>

SYMCLI Output: <CLI Output>

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

syncWaitRDF

This action will Wait until the target (R2) is Synchronized/Consistent with source (R1).

The action provides an option to specify the timeout value. It is specified in minutes. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value, or status to become synchronized/consistent, whichever happens

earlier.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 350

When the action is executed as a part of the workflow, the command 'symrdf verify' is

invoked on the device group represented by the selected protection scheme, along with the

options chosen by the user. The action is considered success if status becomes

Synchronized/Consistent, failed otherwise.

Inputs:

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

Protection

Scheme

Name

Select the

protection

scheme

name

configured

for the

group from

the drop-

down list.

Note:

If the group

is attached

with more

than one

pair of

protection

subsystem

then do not

select

"Current

Production

Service" or

"Current DR

Service".

Instead,

select the

actual

protection

subsystem

to configure

the

operation.

EMC_SYNCWAIT_RDF_OPER_ON

EMC_SYNCWAIT_RDF_OPER_ON_TYPE

Production

Protection

Scheme

or DR

Protection

Scheme

or service

name

DYNAMIC

or STATIC

Mandatory

Operation

timeout

(in

minutes)

zero will

verify once,

any other

positive

integer will

EMC_SYNCWAIT_RDF_TIMEOUT 0 or more

(It is 0 by

default).

Optional

Configuration

351

UI Input Description Input Key Name Key

Values

Input

Optional/

Mandatory

verify every

30 seconds.

Outputs:

There are no output keys for this action.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Hitachi TrueCopy

Resync TrueCopy

Description:

This action re-establishes a split pair and then restarts the update copy operations to the

Secondary volume. If successful, all the changes done on the Primary starts getting updated

on the Secondary volume. The action completes after initiating the resync request and does

not wait for the resynchronization to complete. 'Check Status' or 'Verify Status' action should

be used to check if the pair has arrived to a particular state.

When the action is run as a part of workflow, CCI 'pairresync' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. If all the pairs of groups are successfully resynced, the action returns as success. In all

other cases, it returns as failure. Success or failure of the action depends on success or

failure of the 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme

RESYNC_TC_OPER_ON,

RESYNC_TC_OPER_ON_TYPE

Select the protection scheme

name configured for the group

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 352

UI Input Input Key Name Description

Name from the drop-down list.

Note:

If the group is attached with

more than one pair of protection

subsystem then do not select

"Current Production Service" or

"Current DR Service". Instead,

select the actual protection

subsystem to configure the

operation.

Outputs and Errors:

The RESYNC_TC_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESYNC_TC_RC

value

Description

0 This value indicates that all the pairs

in the group are successfully

resynced.

non zero This value indicates some failure in

resync of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair

status

Configuration

353

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Split TrueCopy

Description:

This action stops the replication of a replicating pair. When successful, the updates of the

Primary volume does not go to the Secondary volume. This does not delete the pair, hence,

it can be resynced later. The action returns as success, when the splitting of pair is

successful.

The action provides an option to choose SVOL access: READ or READWRITE. If the user has

selected READWRITE, then the Secondary volume will be in READWRITE mode after the

successful split.

When the action is run as a part of workflow, CCI 'pairsplit' command is invoked on the pair

represented by the selected protection scheme, along with the options chosen by the user.

Success or failure of the action is determined by the success or failure of 'pairsplit' command.

Refer to Outputs and Errors table below for details.

CCI command:

▪ If the user has selected default value for SVOL Access: pairsplit -g <name>.

▪ If read: pairsplit -g <name> -r.

▪ If user has selected readwrite: pairsplit -g <name> -rw.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

SPLIT_TC_OPER_ON,

SPLIT_TC_OPER_ON_TYPE

Select the protection scheme

name configured for the group

from the drop-down list.

Note:

If the group is attached with

more than one pair of

protection subsystem then do

not select "Current Production

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 354

UI Input Input Key Name Description

Service" or "Current DR

Service". Instead, select the

actual protection subsystem to

configure the operation.

SVOL

Access

SPLIT_TC_SVOL_ACCESS

Select an appropriate option

from the drop-down list. The

options are:

▪ READ

▪ READWRITE

Outputs and Errors:

The SPLIT_TC_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

SPLIT_TC_RC value Description

0 This value indicates that all the pairs in

the group are successfully suspended.

non zero This value indicates some failure in

splitting of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent status

in group.

222 This value indicates an invalid volume

status.

235 This value indicates a Pair Volume

combination error.

228 This value indicates an invalid pair status

234 This value indicates a Pair suspended at

Configuration

355

SPLIT_TC_RC value Description

WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Get Status

Description:

This action reports the volume status (whether paired or not, and if paired, whether it is SVol

or PVol) and pair status (Hitachi specific pair status that indicates the current state of

replication).

When the action is run as a part of the workflow, CCI 'pairvolchk' command is invoked on the

volume represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairvolchk'

command. Refer to Outputs and Errors table below for details.

CCI command: pairvolchk -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

GET_TC_STATUS_OPER_ON,

GET_TC_STATUS_OPER_ON_TYPE

Select the protection scheme

name configured for the

group from the drop-down

list.

Note:

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 356

configure the operation.

Outputs and Errors:

The GET_TC_STATUS_RC key is set with an exit status of 'pairvolchk' command.

Following are possible values:

▪ GET_TC_STATUS_VOL_STATUS indicates volume status.The possible values are

PVOL/SVOL/SMPL.

▪ GET_TC_STATUS_PAIR_STATUS indicates the pair status. The possible values are

status value for pair, such as, like PAIR/COPY/PSUS etc.

▪ The return code 0-127 indicates success of action. All other values indicate failure.

GET_TC_STATUS_RC

value

Description

0-127 These values indicates specific exit codes that

represents the state of volume and pair. (e.g. 22:

PVOL_COPY).

Refer to Hitachi CCI documentation for details.

236 This value indicates an unmatched volume status

within the group.

235 This value indicates a Pair Volume combination

error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not. (This pre-check also supports that the agent is

running and the access credentials are correct).

Verify Status

Description:

Configuration

357

This action is used to verify the status of a pair. When run it checks for the current status of

a pair and returns a success if a match occurs with what user has asked for.

The action provides an option to specify the timeout value. It is specified in Seconds. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value or status to become expected value, whichever happens earlier. The

action provides an option to choose one of the possible states.

When the action is run as a part of the workflow, CCI 'pairevwait' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsevwait'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ (if timeout option is not specified) pairevtwait -g <name> -s <state> -nowait.

▪ (if timeout option is specified) pairevtwait -g <name> -s <state> -t <timeout value>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

VERIFY_TC_STATUS_OPER_ON,

VERIFY_TC_STATUS_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the drop-

down list.

Note:

If the group is attached

with more than one

pair of protection

subsystem then do not

select "Current

Production Service" or

"Current DR Service".

Instead, select the

actual protection

subsystem to configure

the operation.

Timeout (in

Seconds)

Range:0-

1999999

VERIFY_TC_STATUS_TO Enter a numeric value

in seconds.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 358

Replication

Group

State

VERIFY_TC_STATUS_STATE Select the replication

group state from the

list of various states.

Outputs and Errors:

The VERIFY_TC_STATUS_RC key is set with an exit status of 'pairevwait' command.

Following are the possible values:

▪ A return code '0' indicates that the action is successful.

▪ All other values indicates failure.

VERIFY_TC_STATUS_RC

value

Description

0 This value indicates that the current status of

pair matches with the user specified status.

Other than 0-127 This value indicates a failure to get the

current status or current status does not

match with the user specified value.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume

combination error.

234 This value indicates a Pair suspended at

WAIT state.

233 This value indicates a timeout waiting for

specified status.

232 This value indicates a timeout waiting for

Configuration

359

VERIFY_TC_STATUS_RC

value

Description

specified status on the local host.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Takeover

Description:

This action executes the Hitachi 'horctakeover' command. The horctakeover is a scripted

command for executing several Hitachi TrueCopy operations. The takeover command checks

the specified volumes or groups attributes (paircurchk), decides the takeover function based

on the attributes, executes the chosen takeover function, and returns the result. The four

Hitachi TrueCopy takeover functions designed for HA software operation are takeover-switch,

swap-takeover, PVOL-takeover, and SVOL-takeover.

The action provides an option to choose: "SVOL Takeover" : If Selected, it executes SVOL-

takeover. The target volume of the local host must be an S-VOL.

A group can be specified as the target of the TrueCopy takeover command. If SVOL-takeover

is specified for a group, the data consistency check is executed for all volumes in the group,

and all the inconsistent volumes are found in the execution log file and displayed (same as

paircurchk command). The takeover command allows swapping of the Primary and

Secondary volumes, so that if the Primary or the Secondary volume is switched due to a

server error or package transfer, duplex operations can be continued using the reversed

volumes. When control is handed over to the current node, swapping the volumes again

eliminates the need to copy them. The takeover command also allows the Secondary volume

to be separated for disaster recovery operations.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 360

The takeover command, when activated by a control script, checks for the combination of

attributes of the local and remote volumes and determines the proper takeover action.

Various takeover functions that can be executed are Nop-takeover, Swap-takeover, SVOL-

takeover, PVOL-SMPL-takeover, PVOL-PSUE-takeover and SVOL-SSUS-takeover. If the

command fails, the error message and the error code is returned. If the command succeeds,

the return code and the message tells which takeover sub function is executed. To get the

details about the horctakeover sub functions and what state cause which function to initiate,

please refer to applicable Command Control Reference guide.

Note:

Hitachi horctakeover command many times returns currency error even if the volumes are

consistent. In such cases, takeover action returns failure. User is expected to verify the

volumes before proceeding to next action. For more details, please refer to CCI guide

(paircuchk).

CCI command:

▪ If SVOL takeover option is not selected: horctakeover -g <name>.

▪ If SVOL takeover option is selected: horctakeover -g <name> -S.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

TAKEOVER_TC_OPER_ON,

TAKEOVER_TC_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

the operation.

Configuration

361

UI Input Input Key Name Description

Volume

Option

TAKEOVER_TC_VOL_OPTIONS

Select SVOL takover

from the drop-down list.

Timeout (in

Seconds)

TAKEOVER_TC_TO Enter a value in the

numeric field. This is

applicable for sync

replication type.

Outputs and Errors:

The TAKEOVER_TC_RC key is set with an exit status of 'horctakeover' command.

Following are the possible values:

▪ Values 0-5 indicates success of action.

▪ All other values indicates failure of action.

TAKEOVER_TC_RC

value

Description

0 This value indicates a Nop-takeover (no

operation).

1 This value indicates that a Swap-

takeover was successfully executed.

2 This value indicates that a SVOL-

takeover was successfully executed.

3 This value indicates that a PVOL-SMPL-

takeover was successfully executed.

4 This value indicates the following:

▪ PVOL-PSUE-takeover was

successfully executed.

▪ SVOL-SSUS-takeover was

successfully executed. (This value

depends on the microcode level.)

5 This value indicates that a SVOL-SSUS-

takeover was successfully executed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 362

TAKEOVER_TC_RC

value

Description

(This value depends on the microcode

level.)

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

235 This value indicates a Pair Volume

combination error.

225 This value indicates a S-Vol currency

error.

224 This value indicates a Local Volume

currency error.

223 This value indicates a Local and Remote

Volume currency error.

233 This value indicates a timeout waiting

for specified status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Delete TrueCopy

Description:

This action deletes the replication relationship between the Primary volume and the

Secondary volume. The user cannot resync the delta changes between the Primary and the

Secondary volume, once it is deleted.

Configuration

363

The action provides an option to choose "Force" : If selected, it brings the Secondary volume

into the simplex mode forcibly. It is issued by the secondary host, if the host possessing the

Primary volume is down or has failed.

When the action is run as a part of the workflow, CCI 'pairsplit -S' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ if force option is not selected: pairsplit -g <name> -S.

▪ if force option is selected: pairsplit -g <name> -S –R.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

DELETE_TC_OPER_ON,

DELETE_TC_OPER_ON_TYPE

Select the protection scheme

name configured for the

group from the drop-down

list.

Note:

If the group is attached with

more than one pair of

protection subsystem then do

not select "Current Production

Service" or "Current DR

Service". Instead, select the

actual protection subsystem

to configure the operation.

Force DELETE_TC_FORCE

Select True or False from the

drop-down list.

Outputs and Errors:

The DELETE_TC_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 364

DELETE_TC_RC

value

Description

0 This value indicates that the replication

group is successfully deleted.

non zero This value indicates some failure in splitting

of group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume

status.

235 This value indicates a Pair Volume

combination error.

228 This value indicates an invalid pair status

234 This value indicates a Pair suspended at

WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Create TrueCopy

Description:

Configuration

365

This action creates the replication relationship between the Primary volume and the

Secondary volume. The action returns after the initial copy is initiated between the Primary

and the Secondary Volumes. The user should verify the Replica status to check the desired

status. The replication properties, such as, type of replication (sync/async) or fence level

(Data/status etc) would be the same as per the setting present while discovering protection

scheme or default values.

The action provides an option to choose the direction of replication: forward (Selected

protection scheme as Primary) or reverse (selected protection scheme as Secondary).

The action provides an option to choose fence level: possible values can be status, data and

never. Please refer to Hitachi TrueCopy user guide for details on fence level.

When the action is run as a part of workflow, CCI 'paircreate' command is invoked on the

pair represented by the selected protection scheme, along with the options present while

discovery of object. Success or failure of the action is determined by the success or failure of

'paircreate' command. Refer to Outputs and Errors table below for details.

CCI Command: paircreate -g <name> -f <fence> -vl (if user has selected FORWARD option)

or -vr (if user has selected REVERSE option).

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

CREATE_TC_OPER_ON,

CREATE_TC_OPER_ON_TYPE

Select the protection scheme

name configured for the

group from the drop-down

list.

Note:

If the group is attached with

more than one pair of

protection subsystem then do

not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Replication

Direction

CREATE_TC_REPL_DIRECTION Select Forward or Reverse

from the drop-down list.

Fence Level CREATE_TC_FENCE Select the appropriate fence

level from the following:

▪ Data

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 366

UI Input Input Key Name Description

▪ Status

▪ Never

Outputs and Errors:

The CREATE_TC_RC key is set with an exit status of 'paircreate' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

CREATE_TC_RC value Description

0 This value indicates that the

replication group is successfully

created.

non zero This value indicates some failure in

creation of replication group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an

inconsistent status in group.

222 This value indicates an invalid

volume status.

228 This value indicates an invalid pair

status

212 This value indicates a Pair

suspended at WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

Configuration

367

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Role Switch

Description:

This action re-establishes a split pair in the reverse direction. The Primary volume becomes

the Secondary volume and vice versa. If it is successful, all the changes done on the

Secondary starts getting updated on the Primary volume. The action completes after

reversing the role and initiating the reverse resync request. It does not wait for

resynchronization to complete. The 'Check Status' or 'Verify Status' action should be used to

check if the pair has arrived to a particular state.

When the action is run as a part of the workflow, CCI 'pairresync -swapp or -swaps'

command is invoked on the pair represented by the selected protection scheme, along with

the options chosen by the user. Success or failure of the action is determined by the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI Command: pairvolchk -g <name> and pairresync -g <name> -swapp.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

ROLE_SWITCH_TC_OPER_ON,

ROLE_SWITCH_TC_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the drop-

down list.

Note:

If the group is

attached with more

than one pair of

protection subsystem

then do not select

"Current Production

Service" or "Current

DR Service". Instead,

select the actual

protection subsystem

to configure the

operation.

Outputs and Errors:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 368

The ROLE_SWITCH_TC_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

ROLE_SWITCH_TC_RC

value

Description

0 This value indicates that the role for all the

pair in the group are successfully reversed.

non zero This value indicates some failure in resync of

group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

228 This value indicates an invalid pair status

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Check Consistency

Description:

Configuration

369

This action checks for the consistency of the Secondary volume.The action call Hitachi CCI

'paircurchk' command, which checks for the currency of the Hitachi TrueCopy Secondary

volume(s), by evaluating the data consistency based on pair status and fence level. The

action fails if the Secondary volume is not consistent. Please refer to Hitachi CCI reference

manual to know about the data consistency for each possible states of a Hitachi TrueCopy

volume.

When the action is run as a part of the workflow, CCI 'paircurchk' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. The action returns success if the data volumes are consistent. In all other cases, it fails.

Refer to Outputs and Errors table below to for details.

Note

Hitachi paircurchk command many times returns currency error even if the volumes are

consistent. In such cases, consistency check action returns failure. For more details, please

refer to CCI guide (paircuchk).

CCI Command: paircurchk -g <name>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

CHECK_CONSISTENCY_TC_OPER_ON,

CHECK_CONSISTENCY_TC_OPER_ON_TYPE

Select the

protection

scheme name

configured for

the group from

the drop-down

list.

Note:

If the group is

attached with

more than one

pair of protection

subsystem then

do not select

"Current

Production

Service" or

"Current DR

Service".

Instead, select

the actual

protection

subsystem to

configure the

operation.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 370

Outputs and Errors:

The CHECK_CONSISTENCY_TC_RC key is set with an exit status of 'paircurchk' command.

Following are possible values:

▪ A return code '0' indicate Secondary volumes are consistent.

▪ All other value indicates failure or warnings.

CHECK_CONSISTENCY_TC_RC value Description

0 This value indicates

that the data is

consistent.

225 This value indicates a

S-Vol currency error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Is TrueCopy

Description:

This action checks whether the protection service name represented is a TrueCopy protection

service. The action fails if it is of different type.

Action will have following Private configuration.

▪ User gets a drop-down list with names of all the protection schemes attached to the

group. User need to select one of the protection scheme.

Inputs:

UI Input Input Key Name Description

Configuration

371

UI Input Input Key Name Description

Protection

Scheme

Name

IS_TC_OPER_ON ,

IS_TC_OPER_ON_TYPE (

DYNAMIC or STATIC )

It should always be

configured as static and

then the production scheme

name has to be given.

Note:

Does not support the

Dynamic operation.

Outputs and Errors:

None

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

▪ HORCM services are running or not.

(This pre-check also supports that the agent is running and the access credentials are

correct).

Hitachi Universal Replicator

Resync UR

Description:

This action re-establishes a split pair and then restarts the update copy operations to the

Secondary volume. If it is successful, all the changes done on the Primary starts getting

updated on the Secondary volume. The action completes after initiating the resync request

and does not wait for the resynchronization to complete. The 'Check Status' or 'Verify Status'

action should be used to check if the pair has arrived to a particular state.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 372

When the action is run as a part of the workflow, CCI 'pairresync' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. If all the pairs of groups are successfully resynced, the action returns as a success. In

all other cases, it returns as a failure. Success or failure of the action depends on the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

RESYNC_UR_OPER_ON,

RESYNC_UR_OPER_ON_TYPE

Select the protection scheme

name configured for the

group from the drop-down

list.

Note:

If the group is attached with

more than one pair of

protection subsystem then do

not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Outputs and Errors:

The RESYNC_UR_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESYNC_UR_RC value Description

0 This value indicates that all the pairs in

the group are successfully resynced.

non zero This value indicates some failure in

resync of group.

236 This value indicates an unmatched

volume status within the group.

Configuration

373

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair

status

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Split UR

Description:

This action stops the replication of a replicating pair. When successful, the updates of the

Primary volume do not go to the Secondary volume. This does not delete the pair, hence, it

can be resynced later. The action returns a success when splitting of pair is successful.

The action provides an option to choose SVOL access: READ or READWRITE. If the user has

selected READWRITE, then the Secondary volume will be in READWRITE mode after the

successful split.

When the action is run as a part of the workflow, CCI 'pairsplit' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI command:

▪ If the user has selected default value for SVOL Access: pairsplit -g <name>.

▪ If read: pairsplit -g <name> -r.

▪ If user has selected readwrite: pairsplit -g <name> -rw.

Inputs:

UI Input Input Key Name Description

Protection SPLIT_UR_OPER_ON, Select the protection scheme

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 374

UI Input Input Key Name Description

Scheme

Name

SPLIT_UR_OPER_ON_TYPE name configured for the group

from the drop-down list.

Note:

If the group is attached with more

than one pair of protection

subsystem then do not select

"Current Production Service" or

"Current DR Service". Instead,

select the actual protection

subsystem to configure the

operation.

SVOL

Access

SPLIT_UR_SVOL_ACCESS Select an appropriate option from

the drop-down list. The options

are:

▪ READ

▪ READWRITE

Outputs and Errors:

The SPLIT_UR_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

SPLIT_UR_RC value Description

0 This value indicates that all the

pairs in the group are successfully

suspended.

non zero This value indicates some failure in

splitting of group.

236 This value indicates an unmatched

volume status within the group.

Configuration

375

SPLIT_UR_RC value Description

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid

volume status.

235 This value indicates a Pair Volume

combination error.

228 This value indicates an invalid pair

status

234 This value indicates a Pair

suspended at WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Get Status

Description:

This action reports the volume status (whether paired or not paired, and if paired, whether it

is SVol or PVol) and pair status (HP XP specific pair status that indicates the current state of

replication).

When the action is run as a part of the workflow, CCI 'pairvolchk' command is invoked on the

volume represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairvolchk'

command. Refer to Outputs and Errors table below for details.

CCI command: pairvolchk -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

GET_UR_STATUS_OPER_ON,

GET_UR_STATUS_OPER_ON_TYPE

Select the protection

scheme name

configured for the group

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 376

from the drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

the operation.

Outputs and Errors:

The GET_UR_STATUS_RC key is set with an exit status of 'pairvolchk' command.

Following are possible values:

▪ GET_UR_STATUS_VOL_STATUS indicates volume status. Possible values are

PVOL/SVOL/SMPL.

▪ GET_UR_STATUS_PAIR_STATUS indicates pair status. possible values are status value

for pair like PAIR/COPY/PSUS etc.

▪ Return code 0-127 indicate success of action. All other value indicates failure.

GET_UR_STATUS_RC

value

Description

0-127 These values indicates specific exit

codes that represents the state of

volume and pair. (e.g. 22:

PVOL_COPY).

Refer to HP XP CCI documentation

for details.

236 This value indicates an unmatched

volume status within the group.

235 This value indicates a Pair Volume

combination error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

Configuration

377

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Verify Status

Description:

This action is used to verify the status of a pair. When run it checks the current status of a

pair and returns a success, if it matches with what user has asked for. If the user has

specified an optional timeout value, then the action periodically checks the status till either

the status of the pair becomes the expected value or the timeout expires. The action is

successful if the status of pair is what the user has asked for. In all other cases, the action

fails.

The action provides an option to specify the timeout value. It is specified in Seconds. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value or status to become expected value, whichever happens earlier. The

action provides an option to choose one of the possible states.

When the action is run as a part of workflow, CCI 'pairevwait' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairrevwait'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ (if timeout option is not specified) pairevtwait -g <name> -s <state> -nowait.

▪ (if timeout option is specified) pairevtwait -g <name> -s <state> -t <timeout value>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

VERIFY_UR_STATUS_OPER_ON,

VERIFY_UR_STATUS_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the drop-

down list.

Note:

If the group is

attached with more

than one pair of

protection

subsystem then do

not select "Current

Production Service"

or "Current DR

Service". Instead,

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 378

UI Input Input Key Name Description

select the actual

protection

subsystem to

configure the

operation.

Timeout (in

Seconds)Range:0-

1999999

VERIFY_UR_STATUS_TO Enter a numeric

value in seconds.

Replication Group

State

VERIFY_UR_STATUS_STATE Select the replication

group state from the

list of various states.

Outputs and Errors:

The VERIFY_UR_STATUS_RC key is set with an exit status of 'pairevwait' command.

Following are the possible values:

▪ A return code '0' indicates that the action is successful.

▪ All other values indicates failure.

VERIFY_UR_STATUS_RC

value

Description

0 This value indicates that the

current status of pair matches with

the user specified status.

Other than 0-127 This value indicates a failure to get

the current status or current status

does not match with the user

specified value.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid

volume status.

Configuration

379

VERIFY_UR_STATUS_RC

value

Description

235 This value indicates a Pair Volume

combination error.

234 This value indicates a Pair

suspended at WAIT state.

233 This value indicates a timeout

waiting for specified status.

232 This value indicates a timeout

waiting for specified status on the

local host.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Takeover

Description:

This action executes the Hitachi 'horctakeover' command. The horctakeover is a scripted

command for executing several Hitachi TrueCopy operations. The takeover command checks

the specified volumes or groups attributes (paircurchk), decides the takeover function based

on the attributes, executes the chosen takeover function, and returns the result. The four

Hitachi TrueCopy takeover functions designed for HA software operation are takeover-switch,

swap-takeover, PVOL-takeover, and SVOL-takeover.

The action provides an option to choose: "SVOL Takeover" : If Selected, it executes SVOL-

takeover. The target volume of the local host must be an S-VOL.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 380

A group can be specified as the target of the TrueCopy takeover command. If SVOL-takeover

is specified for a group, the data consistency check is executed for all volumes in the group,

and all the inconsistent volumes are found in the execution log file and displayed (same as

paircurchk command). The takeover command allows swapping of the Primary and

Secondary volumes, so that if the Primary or the Secondary volume is switched due to a

server error or package transfer, duplex operations can be continued using the reversed

volumes. When control is handed over to the current node, swapping the volumes again

eliminates the need to copy them. The takeover command also allows the Secondary volume

to be separated for disaster recovery operations.

The takeover command, when activated by a control script, checks the combination of

attributes of the local and remote volumes and determines the proper takeover action.

Various takeover functions that can be executed are Nop-takeover, Swap-takeover, SVOL-

takeover, PVOL-SMPL-takeover, PVOL-PSUE-takeover and SVOL-SSUS-takeover. If the

command fails, the error message and the error code is returned. If the command succeeds,

the return code and the message tells which takeover sub function is executed. To get details

about the horctakeover sub functions and what state cause which function to initiate, please

refer to applicable Command Control Reference guide.

Note

Hitachi horctakeover command many times returns currency error even if the volumes are

consistent. In such cases, takeover action returns failure.User is expected to verify the

volumes before proceeding to next action. For more details, please refer to CCI guide

(paircuchk).

CCI command:

▪ If SVOL takeover option is not selected: horctakeover -g <name> -t timeout.

▪ If SVOL takeover option is selected: horctakeover -g <name> -t timeout -S.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

TAKEOVER_UR_OPER_ON,

TAKEOVER_UR_OPER_ON_TYPE

Select the protection scheme

name configured for the group

from the drop-down list.

Note:

If the group is attached with

more than one pair of protection

subsystem then do not select

"Current Production Service" or

"Current DR Service". Instead,

select the actual protection

subsystem to configure the

operation.

Volume TAKEOVER_UR_VOL_OPTIONS Select SVOL takover from the

Configuration

381

UI Input Input Key Name Description

Option drop-down list.

Timeout (in

Seconds)

TAKEOVER_UR_TO Enter a value in the numeric

field.

Outputs and Errors:

The REPL_TAKEOVER_RC key is set with an exit status of 'horctakeover' command.

Following are the possible values:

▪ Values 0-5 indicates success of action.

▪ All other values indicates failure of action.

REPL_TAKEOVER_RC

value

Description

0 This value indicates a Nop-takeover (no

operation).

1 This value indicates that a Swap-takeover

was successfully executed.

2 This value indicates that a SVOL-takeover

was successfully executed.

3 This value indicates that a PVOL-SMPL-

takeover was successfully executed.

4 This value indicates the following:

▪ PVOL-PSUE-takeover was

successfully executed.

▪ SVOL-SSUS-takeover was

successfully executed. (This value

depends on the microcode level.)

5 This value indicates that a SVOL-SSUS-

takeover was successfully executed. (This

value depends on the microcode level.)

236 This value indicates an unmatched volume

status within the group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 382

REPL_TAKEOVER_RC

value

Description

229 This value indicates an inconsistent status in

group.

235 This value indicates a Pair Volume

combination error.

225 This value indicates a S-Vol currency error.

224 This value indicates a Local Volume

currency error.

223 This value indicates a Local and Remote

Volume currency error.

233 This value indicates a timeout waiting for

specified status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Role Switch

Description:

This action re-establishes a split pair in the reverse direction. The Primary volume becomes

the Secondary volume and vice versa. If it is successful, all the changes done on the

Secondary starts getting updated on the Primary volume. The action completes after

reversing the role and initiating the reverse resync request. It does not wait for

resynchronization to complete. The 'Check Status' or 'Verify Status' action should be used to

check if the pair has arrived to a particular state.

When the action is run as a part of the workflow, CCI 'pairresync -swapp or -swaps'

command is invoked on the pair represented by the selected protection scheme, along with

the options chosen by the user. Success or failure of the action is determined by the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI Command: pairvolchk -g <name> and pairresync -g <name> -swapp.

Input:

Configuration

383

UI Input Input Key Name Description

Protection

Scheme

Name

ROLE_SWITCH_UR_OPER_ON,

ROLE_SWITCH_UR_OPER_ON_TYPE

Select the protection

scheme name

configured for the group

from the drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

the operation.

Outputs and Errors:

The ROLE_SWITCH_UR_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

ROLE_SWITCH_UR_RC

value

Description

0 This value indicates that the role for all

the pairs in the group are successfully

reversed.

non zero This value indicates some failure in

resync of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 384

status.

228 This value indicates an invalid pair status

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Sync Wait

Description:

This action is used to make sure that all the changes on the Primary are updated on the

Secondary volume. The action takes a timeout parameter, that indicates the duration for

which action waits for completion on synchronization. It should be issued after the

application completes its write function and is shutdown or quiesced.

The action provides an option to specify the timeout value for which the action waits for all

the pending transfer to complete. Unit is 100 ms.

When the action is run as a part of the workflow, CCI 'pairsyncwait' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. The action is successful if synchronization is complete for the device group. For all

other cases, it fails. Refer to Outputs and Errors table below for details.

CCI Command: pairsyncwait -g <name> -t <timeout>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

SYNC_WAIT_UR_OPER_ON,

SYNC_WAIT_UR_OPER_ON_TYPE

Select the protection scheme

name configured for the

group from the drop-down

list.

Note:

If the group is attached with

more than one pair of

protection subsystem then do

not select "Current Production

Service" or "Current DR

Service". Instead, select the

Configuration

385

UI Input Input Key Name Description

actual protection subsystem

to configure the operation.

Timeout (in

100ms)

SYNC_WAIT_UR_TO

Enter an appropriate numeral

value.

Outputs and Errors:

The SYNC_WAIT_RC key is set with an exit status of 'pairsyncwait' command.

Following are the possible values:

▪ A return code '0' indicates synchronization is done.

▪ All other values indicates failure.

SYNC_WAIT_UR_RC

value

Description

0 This value indicates that the synchronization is

complete.

1 This value indicates the status as timeout.

2 This value indicates that the Status is broken

(Synchronization process is rejected.)

3 This value indicates that the status is CHANGED

(Q-marker is invalid due to resynchronize).

222 This value indicates an invalid volume status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Check Consistency

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 386

Description:

This action checks the consistency of the Secondary volume. The action calls Hitachi CCI

'paircurchk' command which checks the currency of the Hitachi TrueCopy Secondary

volume(s) by evaluating the data consistency based on pair status and fence level. The

action fails if the Secondary volume is not consistent. Please refer to Hitachi CCI reference

manual to know about the data consistency for each possible states of a Hitachi TrueCopy

volume.

When the action is run as a part of the workflow, CCI 'paircurchk' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. The action returns success if the data volumes are consistent. In all other cases, it fails.

Refer to Outputs and Errors table below for details.

Note

Hitachi paircurchk command many times returns currency error even if the volumes are

consistent. In such cases, consistency check action returns failure. For more details, please

refer to CCI guide (paircuchk).

CCI Command: paircurchk -g <name>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

CHECK_CONSISTENCY_UR_OPER_ON,

CHECK_CONSISTENCY_UR_OPER_ON_TYPE

Select the

protection

scheme name

configured for

the group from

the drop-down

list.

Note:

If the group is

attached with

more than one

pair of

protection

subsystem then

do not select

"Current

Production

Service" or

"Current DR

Service".

Instead, select

the actual

protection

subsystem to

configure the

Configuration

387

UI Input Input Key Name Description

operation.

Outputs and Errors:

The CHECK_CONSISTENCY_UR_RC key is set with an exit status of paircurchk command.

Following are possible values:

▪ A return code '0' indicate Secondary volumes are consistent.

▪ All other value indicates failure or warnings.

CHECK_CONSISTENCY_UR_RC value Description

0 This value indicates that the

data is consistent.

225 This value indicates a S-Vol

currency error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Is Universal Replicator

Description:

This action checks whether the protection service name represented is a UR protection

service. The action fails if it is of different type.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

IS_UR_OPER_ON ,

IS_UR_OPER_ON_TYPE

( DYNAMIC or STATIC )

It should always be configured as

static and then the production

scheme name has to be given.

Note:

Does not support the Dynamic

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 388

UI Input Input Key Name Description

operation.

Outputs and Errors:

None

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Hitachi Shadow Image

Resync ShadowImage

Description:

This action re-establishes a split pair and then restarts the update copy operations to the

Secondary volume. If it is successful, all the changes done on the Primary starts getting

updated on the Secondary volume. The action completes after initiating the resync request

and does not wait for resynchronization to complete. The 'Check Status' or 'Verify Status'

action should be used to check if the pair has arrived to a particular state.

The action provides an option to choose: "resync mode" - quick or normal. If mode is

normal, pairresync will be performed as Non quick mode, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). if

mode = quick, pairresync will be performed as Quick Resync, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). If this

option will not be specified, then performing pairresync is dependent on $HORCC_RSYNC

environment variable and or the mode setting through the SVP (Remote console) whether

the operation of BC is executed by Quick or not. This option is ignored for older version of cci

where -fq option is not supported.

When the action is run as a part of the workflow, CCI 'pairresync' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. If all the pairs of groups are successfully resynced, the action returns as a success. In

all other cases, it returns as a failure. Success or failure of the action depends on the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name> -fq <normal or quick>.

Configuration

389

Note:

-fq option is ignored for older version of cci where it is not supported.

Inputs:

UI Input Input Key Name Description

Shadow

Image

Name

RESYNC_SI_OPER_ON,

RESYNC_SI_OPER_ON_TYPE

Select the shadow

image name from the

drop-down list.

Resync

Mode

RESYNC_SI_MODE Select an appropriate

option from the drop-

down list. The options

are:

▪ NORMAL

▪ QUICK

Outputs and Errors:

The RESYNC_SI_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESYNC_SI_RC

value

Description

0 This value indicates that all the

pairs in the group are

successfully resynced.

non zero This value indicates some

failure in resync of group.

236 This value indicates an

unmatched volume status

within the group.

229 This value indicates an

inconsistent status in group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 390

222 This value indicates an invalid

volume status.

228 This value indicates an invalid

pair status

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Split ShadowImage

Description:

This action stops the replication of a replicating pair. When successful, the updates of the

Primary volume does not go to the Secondary volume. This does not delete the pair, hence,

it can be resynced later. The action returns a success when splitting of pair is successful.

When the action is run as a part of the workflow, CCI 'pairsplit' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name> -fq <normal or quick>.

Note:

-fq option is ignored for older version of cci where it is not supported.

Inputs:

UI Input Input Key Name Description

Shadow

Image

Name

SPLIT_SI_OPER_ON,

SPLIT_SI_OPER_ON_TYPE

Select the shadow

image name from the

drop-down list.

Split Mode SPLIT_SI_MODE Select an appropriate

option from the drop-

Configuration

391

UI Input Input Key Name Description

down list. The options

are:

▪ NORMAL

▪ QUICK

Outputs and Errors:

The SPLIT_SI_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

SPLIT_SI_RC

value

Description

0 This value indicates that all the pairs in the

group are successfully suspended.

non zero This value indicates some failure in splitting of

group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume combination

error.

228 This value indicates an invalid pair status

234 This value indicates a Pair suspended at WAIT

state.

Pre-checks

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 392

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Get Status

Description:

This action reports the volume status (whether paired or not paired, and if paired, whether it

is SVol or PVol) and pair status (Hitachi specific pair status that indicates the current state of

replication).

When the action is run as a part of workflow, CCI 'pairvolchk' command is invoked on the

volume represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairvolchk'

command. Refer to Outputs and Errors table below for details.

CCI command: pairvolchk -g <name>.

Input:

UI Input Input Key Name Description

Shadow

Image

Name

GET_SI_STATUS_OPER_ON,

GET_SI_STATUS_OPER_ON_TYPE

Select the shadow

image name from the

drop-down list.

Outputs and Errors:

The GET_SI_STATUS_RC key is set with an exit status of 'pairvolchk' command.

Following are possible values:

▪ GET_SI_STATUS_VOL_STATUS indicates volume status. Possible values are

PVOL/SVOL/SMPL.

▪ GET_SI_STATUS_PAIR_STATUS indicates pair status. Possible values are status value

for pair like PAIR/COPY/PSUS etc.

▪ Return code 0-127 indicate success of action. All other value indicates failure.

GET_SI_STATUS_RC

value

Description

0-127 These values indicates specific exit codes that represents

the state of volume and pair. (e.g. 22: PVOL_COPY).

Configuration

393

Refer to Hitachi CCI documentation for details.

236 This value indicates an unmatched volume status within

the group.

235 This value indicates a Pair Volume combination error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Verify Status

Description:

This action is used to verify the status of a pair. When run it checks the current status of a

pair and returns a success, if it matches with what user has asked for. If the user has

specified an optional timeout value, then the action periodically checks the status till either

the status of pair becomes the expected value or timeout expires. The action is successful if

the status of pair is what user has asked for. In all other cases, the action fails.

The action provides an option to specify the timeout value. It is specified in Seconds. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value or status to become expected value, whichever happens earlier. The

action provides an option to choose one of the possible states.

When the action is run as a part of the workflow, CCI 'pairevwait' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairevwait'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ (if timeout option is not specified) pairevtwait -g <name> -s <state> -nowait.

▪ (if timeout option is specified) pairevtwait -g <name> -s <state> -t <timeout value>.

Inputs:

UI Input Input Key Name Description

Shadow

Image

VERIFY_SI_STATUS_OPER_ON,

VERIFY_SI_STATUS_OPER_ON_TYPE

Select the shadow image

name from the drop-down

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 394

UI Input Input Key Name Description

Name list.

Timeout (in

Seconds)

Range:0-

1999999

VERIFY_SI_STATUS_TO Enter a numeric value in

seconds.

Replication

Group

State

VERIFY_SI_STATUS_STATE Select the replication group

state from the list of

various states.

Outputs and Errors:

The VERIFY_SI_STATUS_RC key is set with an exit status of 'pairevwait' command.

Following are the possible values:

▪ A return code '0' indicates that the action is successful.

▪ All other values indicates failure.

VERIFY_SI_STATUS_RC

value

Description

0 This value indicates that the current status

of pair matches with the user specified

status.

Other than 0-127 This value indicates a failure to get the

current status or current status does not

match with the user specified value.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status

in group.

222 This value indicates an invalid volume

status.

235 This value indicates a Pair Volume

Configuration

395

VERIFY_SI_STATUS_RC

value

Description

combination error.

234 This value indicates a Pair suspended at

WAIT state.

233 This value indicates a timeout waiting for

specified status.

232 This value indicates a timeout waiting for

specified status on the local host.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Delete ShadowImage

Description:

This action deletes the replication relationship between the Primary volume and the

Secondary volume. The user cannot resync the delta changes between the Primary and the

Secondary volume once it is deleted.

When the action is run as a part of the workflow, CCI 'pairsplit -S' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI Command: pairsplit -g <name> -S.

Inputs:

UI Input Input Key Name Description

Shadow

Image

Name

DELETE_SI_OPER_ON,

DELETE_SI_OPER_ON_TYPE

Select the shadow image

name from the drop-down

list.

Outputs and Errors:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 396

The DELETE_SI_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

DELETE_SI_RC value Description

0 This value indicates that the

replication group is successfully

deleted.

non zero This value indicates some failure in

splitting of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

status.

235 This value indicates a Pair Volume

combination error.

228 This value indicates an invalid pair

status

234 This value indicates a Pair suspended

at WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Configuration

397

Create ShadowImage

Description:

This action creates the replication relationship between the Primary volume and the

Secondary volume. The action returns after the initial copy is initiated between the Primary

and the Secondary Volumes. The user should verify the Replica status to check the desired

status. The replication properties, such as, type of replication (sync/async) or fence level

(Data/status etc) would be the same as per the setting present while discovering protection

scheme or default values.

The action provides an option to choose the direction of replication: It can be forward

(Selected protection scheme as Primary) or reverse (selected protection scheme as

Secondary).

When the action is run as a part of the workflow, CCI 'paircreate' command is invoked on the

pair represented by the selected protection scheme, along with the options present while

discovery of object. Success or failure of the action is determined by the success or failure of

'paircreate' command. Refer to Outputs and Errors table below for details.

CCI Command: paircreate -g <name> -vl (if user has selected FORWARD option) or -vr (if

user has selected REVERSE option).

Inputs:

UI Input Input Key Name Description

Shadow

Image

Name

CREATE_SI_OPER_ON,

CREATE_SI_OPER_ON_TYPE

Select the shadow image

name from the drop-down

list.

Replication

Direction

CREATE_SI_REPL_DIRECTION Select Forward or Reverse

from the drop-down list.

Outputs and Errors:

The CREATE_SI_RC key is set with an exit status of 'paircreate' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

CREATE_SI_RC

value

Description

0 This value indicates that the replication

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 398

CREATE_SI_RC

value

Description

group is successfully created.

non zero This value indicates some failure in

creation of replication group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair

status

212 This value indicates a Pair suspended at

WAIT state.

217 This value indicates that there are not

enough CT groups in the RAID.

215 This value indicates that no CT groups

are left for OPEN Vol use.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Restore ShadowImage

Description:

This action does the reverse resync function. It synchronizes the Primary volume with data

from the Secondary volume. It is applicable for Hitachi ShadowImage only. The action

completes after initiating the resync request and does not wait for resynchronization to

complete. The 'Check Status' or 'Verify Status' action should be used to check if the pair has

arrived to a particular state.

Configuration

399

The action provides an option to choose: "resync mode" - quick or normal. If mode is

normal, pairresync will be performed as Non quick mode, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). if

mode = quick, pairresync will be performed as Quick Resync, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). If this

option will not be specified, then performing pairresync is dependent on $HORCC_RSYNC

environment variable and or the mode setting through the SVP (Remote console) whether

the operation of BC is executed by Quick or not.

When the action is run as a part of the workflow, CCI 'pairresync -restore' command is

invoked on the pair represented by the selected protection scheme, along with the options

chosen by the user. Success or failure of the action is determined by the success or failure of

'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name> -restore -fq <normal or quick>.

Note:

-fq option is ignored for older version of cci where it is not supported.

Inputs:

UI Input Input Key Name Description

Shadow

Image

Name

RESTORE_SI_OPER_ON,

RESTORE_SI_OPER_ON_TYPE

Select the shadow image

name from the drop-down

list.

Resync

Mode

RESTORE_SI_MODE Select an appropriate option

from the drop-down list.

The options are:

▪ NORMAL

▪ QUICK

Outputs and Errors:

The RESTORE_SI_RC key is set with exit status of 'pairresync -restore' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESTORE_SI_RC value Description

0 This value indicates that all the pairs

in the group are successfully reverse

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 400

RESTORE_SI_RC value Description

resynced.

non zero This value indicates some failure in

resync of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair

status

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Is Shadow Image

Description:

This action checks whether the protection service name represented is a Shadow Image

protection service. The action fails if it is of different type.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

IS_SI_OPER_ON ,

IS_SI_OPER_ON_TYPE (

DYNAMIC or STATIC )

It should always be configured as

static and then the production scheme

name has to be given.

Note:

Does not support the Dynamic

Configuration

401

UI Input Input Key Name Description

operation.

Outputs and Errors:

None

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

HP XP BusinessCopy

Resync XP BusinessCopy

Description:

This action re-establishes a split pair and then restarts the update copy operations to the

Secondary volume. If it is successful, all the changes done on the Primary starts getting

updated on the Secondary volume. The action completes after initiating the resync request

and does not wait for resynchronization to complete. The 'Check Status' or 'Verify Status'

action should be used to check if the pair has arrived to a particular state.

The action provides an option to choose: "resync mode" - quick or normal. If mode is

normal, pairresync will be performed as Non quick mode, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). if

mode = quick, pairresync will be performed as Quick Resync, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). If this

option will not be specified, then performing pairresync is dependent on $HORCC_RSYNC

environment variable and or the mode setting through the SVP (Remote console) whether

the operation of BC is executed by Quick or not. This option is ignored for older version of cci

where -fq option is not supported.

When the action is run as a part of the workflow, CCI 'pairresync' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. If all the pairs of groups are successfully resynced, the action returns as a success. In

all other cases, it returns as a failure. Success or failure of the action depends on the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name> -fq <normal or quick>.

Note:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 402

-fq option is ignored for older version of cci where it is not supported.

Inputs:

UI Input Input Key Name Description

XP

BusinessCopy

Name

RESYNC_SI_OPER_ON,

RESYNC_SI_OPER_ON_TYPE

Select the shadow

image name from the

drop-down list.

Resync Mode RESYNC_SI_MODE Select an appropriate

option from the drop-

down list. The options

are:

▪ NORMAL

▪ QUICK

Outputs and Errors:

The RESYNC_SI_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESYNC_SI_RC

value

Description

0 This value indicates that all the pairs in the

group are successfully resynced.

non zero This value indicates some failure in resync of

group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

Configuration

403

RESYNC_SI_RC

value

Description

228 This value indicates an invalid pair status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Split XP BusinessCopy

Description:

This action stops the replication of a replicating pair. When successful, the updates of the

Primary volume does not go to the Secondary volume. This does not delete the pair, hence,

it can be resynced later. The action returns a success when splitting of pair is successful.

When the action is run as a part of the workflow, CCI 'pairsplit' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name> -fq <normal or quick>.

Note:

-fq option is ignored for older version of cci where it is not supported.

Inputs:

UI Input Input Key Name Description

XP

BusinessCopy

Name

SPLIT_SI_OPER_ON,

SPLIT_SI_OPER_ON_TYPE

Select the shadow

image name from the

drop-down list.

Split Mode SPLIT_SI_MODE Select an appropriate

option from the drop-

down list. The options

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 404

UI Input Input Key Name Description

are:

▪ NORMAL

▪ QUICK

Outputs and Errors:

The SPLIT_SI_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

SPLIT_SI_RC value Description

0 This value indicates that all the pairs in the

group are successfully suspended.

non zero This value indicates some failure in splitting of

group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume combination

error.

228 This value indicates an invalid pair status.

234 This value indicates a Pair suspended at WAIT

state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

Configuration

405

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Get Status

Description:

This action reports the volume status (whether paired or not paired, and if paired, whether it

is SVol or PVol) and pair status (HP XP specific pair status that indicates the current state of

replication).

When the action is run as a part of workflow, CCI 'pairvolchk' command is invoked on the

volume represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairvolchk'

command. Refer to Outputs and Errors table below for details.

CCI command: pairvolchk -g <name>.

Input:

UI Input Input Key Name Description

XP

BusinessCopy

Name

GET_SI_STATUS_OPER_ON,

GET_SI_STATUS_OPER_ON_TYPE

Select the shadow

image name from the

drop-down list.

Outputs and Errors:

The GET_SI_STATUS_RC key is set with an exit status of 'pairvolchk' command.

Following are possible values:

▪ GET_SI_STATUS_VOL_STATUS indicates volume status. Possible values are

PVOL/SVOL/SMPL.

▪ GET_SI_STATUS_PAIR_STATUS indicates pair status. possible values are status value

for pair like PAIR/COPY/PSUS etc.

▪ Return code 0-127 indicate success of action. All other value indicates failure.

GET_SI_STATUS_RC

value Description

0-127 These values indicates specific exit codes

that represents the state of volume and

pair (e.g. 22: PVOL_COPY).

Refer to HP XP CCI documentation for

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 406

GET_SI_STATUS_RC

value

Description

details.

236 This value indicates an unmatched volume

status within the group.

235 This value indicates a Pair Volume

combination error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Verify Status

Description:

This action is used to verify the status of a pair. When run it checks the current status of a

pair and returns a success, if it matches with what user has asked for. If the user has

specified an optional timeout value, then the action periodically checks the status till either

the status of pair becomes the expected value or timeout expires. The action is successful if

the status of pair is what user has asked for. In all other cases, the action fails.

The action provides an option to specify the timeout value. It is specified in Seconds. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value or status to become expected value, whichever happens earlier. The

action provides an option to choose one of the possible states.

When the action is run as a part of the workflow, CCI 'pairevwait' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairevwait'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ (if timeout option is not specified) pairevtwait -g <name> -s <state> -nowait.

▪ (if timeout option is specified) pairevtwait -g <name> -s <state> -t <timeout value>.

Inputs:

Configuration

407

UI Input Input Key Name Description

XP

BusinessCopy

Name

VERIFY_SI_STATUS_OPER_ON,

VERIFY_SI_STATUS_OPER_ON_TYPE

Select the shadow

image name from

the drop-down list.

Timeout (in

Seconds)

Range:0-

1999999

VERIFY_SI_STATUS_TO Enter a numeric

value in seconds.

Replication

Group State

VERIFY_SI_STATUS_STATE Select the

replication group

state from the list of

various states.

Outputs and Errors:

The VERIFY_SI_STATUS_RC key is set with an exit status of 'pairevwait' command.

Following are the possible values:

▪ A return code '0' indicates that the action is successful.

▪ All other values indicates failure.

VERIFY_SI_STATUS_RC

value Description

0 This value indicates that the current

status of pair matches with the user

specified status.

Other than 0-127 This value indicates a failure to get the

current status or current status does not

match with the user specified value.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 408

VERIFY_SI_STATUS_RC

value

Description

status.

235 This value indicates a Pair Volume

combination error.

234 This value indicates a Pair suspended at

WAIT state.

233 This value indicates a timeout waiting for

specified status.

232 This value indicates a timeout waiting for

specified status on the local host.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Delete XP BusinessCopy

Description:

This action deletes the replication relationship between the Primary volume and the

Secondary volume. The user cannot resync the delta changes between the Primary and the

Secondary volume once it is deleted.

When the action is run as a part of the workflow, CCI 'pairsplit -S' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI Command: pairsplit -g <name> -S.

Inputs:

UI Input Input Key Name Description

XP

BusinessCopy

DELETE_SI_OPER_ON,

DELETE_SI_OPER_ON_TYPE

Select the shadow image

name from the drop-

Configuration

409

UI Input Input Key Name Description

Name down list.

Outputs and Errors:

The DELETE_SI_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

DELETE_SI_RC

value

Description

0 This value indicates that the replication group is successfully

deleted.

non zero This value indicates some failure in splitting of group.

236 This value indicates an unmatched volume status within the

group.

229 This value indicates an inconsistent status in group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume combination error.

228 This value indicates an invalid pair status.

234 This value indicates a Pair suspended at WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Create XP BusinessCopy

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 410

Description:

This action creates the replication relationship between the Primary volume and the

Secondary volume. The action returns after the initial copy is initiated between the Primary

and the Secondary Volumes. The user should verify the Replica status to check the desired

status. The replication properties, such as, type of replication (sync/async) or fence level

(Data/status etc) would be the same as per the setting present while discovering protection

scheme or default values.

The action provides an option to choose the direction of replication: It can be forward

(Selected protection scheme as Primary) or reverse (selected protection scheme as

Secondary).

When the action is run as a part of the workflow, CCI 'paircreate' command is invoked on the

pair represented by the selected protection scheme, along with the options present while

discovery of object. Success or failure of the action is determined by the success or failure of

'paircreate' command. Refer to Outputs and Errors table below for details.

CCI Command: paircreate -g <name> -vl (if user has selected FORWARD option) or -vr (if

user has selected REVERSE option).

Inputs:

UI Input Input Key Name Description

XP

BusinessCopy

Name

CREATE_SI_OPER_ON,

CREATE_SI_OPER_ON_TYPE

Select the shadow image

name from the drop-down

list.

Replication

Direction

CREATE_SI_REPL_DIRECTION Select Forward or Reverse

from the drop-down list.

Outputs and Errors:

The CREATE_SI_RC key is set with an exit status of 'paircreate' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

CREATE_SI_RC

value

Description

0 This value indicates that the replication

group is successfully created.

non zero This value indicates some failure in creation

Configuration

411

CREATE_SI_RC

value

Description

of replication group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status

in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair status.

212 This value indicates a Pair suspended at

WAIT state.

217 This value indicates that there are not

enough CT groups in the RAID.

215 This value indicates that no CT groups are

left for OPEN Vol use.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Restore XP BusinessCopy

Description:

This action does the reverse resync function. It synchronizes the Primary volume with data

from the Secondary volume. It is applicable for HP XP BusinessCopy only. The action

completes after initiating the resync request and does not wait for resynchronization to

complete. The 'Check Status' or 'Verify Status' action should be used to check if the pair has

arrived to a particular state.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 412

The action provides an option to choose: "resync mode" - quick or normal. If mode is

normal, pairresync will be performed as Non quick mode, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). if

mode = quick, pairresync will be performed as Quick Resync, regardless of setting of

$HORCC_RSYN environment variable and/or the mode (87) via SVP (Remote console). If this

option will not be specified, then performing pairresync is dependent on $HORCC_RSYNC

environment variable and or the mode setting through the SVP (Remote console) whether

the operation of BC is executed by Quick or not.

When the action is run as a part of the workflow, CCI 'pairresync -restore' command is

invoked on the pair represented by the selected protection scheme, along with the options

chosen by the user. Success or failure of the action is determined by the success or failure of

'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name> -restore -fq <normal or quick>.

Note:

-fq option is ignored for older version of cci where it is not supported.

Inputs:

UI Input Input Key Name Description

XP

BusinessCopy

Name

RESTORE_SI_OPER_ON,

RESTORE_SI_OPER_ON_TYPE

Select the XP

BusinessCopy name from

the drop-down list.

Resync Mode RESTORE_SI_MODE Select an appropriate

option from the drop-

down list. The options

are:

▪ NORMAL

▪ QUICK

Outputs and Errors:

The RESTORE_SI_RC key is set with exit status of 'pairresync -restore' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESTORE_SI_RC

value

Description

Configuration

413

RESTORE_SI_RC

value

Description

0 This value indicates that all the pairs in the

group are successfully reverse resynced.

non zero This value indicates some failure in resync

of group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status

in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

is XP BusinessCopy

Description:

This action checks whether the protection service name represented is a XP BusinessCopy

protection service. The action fails if it is of different type.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

IS_SI_OPER_ON ,

IS_SI_OPER_ON_TYPE (

DYNAMIC or STATIC )

It should always be

configured as static

and then the

production scheme

name has to be

given.

Note:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 414

UI Input Input Key Name Description

Does not support the

Dynamic operation.

Outputs and Errors:

None

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

HP XP Continuous Access

Resync XP Continuous Access

Description:

This action re-establishes a split pair and then restarts the update copy operations to the

Secondary volume. If successful, all the changes done on the Primary starts getting updated

on the Secondary volume. The action completes after initiating the resync request and does

not wait for the resynchronization to complete. 'Check Status' or 'Verify Status' action should

be used to check if the pair has arrived to a particular state.

When the action is run as a part of workflow, CCI 'pairresync' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. If all the pairs of groups are successfully resynced, the action returns as success. In all

other cases, it returns as failure. Success or failure of the action depends on success or

failure of the 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

RESYNC_TC_OPER_ON,

RESYNC_TC_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the

Configuration

415

UI Input Input Key Name Description

drop-down list.

Note:

If the group is

attached with more

than one pair of

protection

subsystem then do

not select "Current

Production Service"

or "Current DR

Service". Instead,

select the actual

protection

subsystem to

configure the

operation.

Outputs and Errors:

The RESYNC_TC_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESYNC_TC_RC

value

Description

0 This value indicates that all the pairs

in the group are successfully

resynced.

non zero This value indicates some failure in

resync of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 416

RESYNC_TC_RC

value

Description

222 This value indicates an invalid

volume status.

228 This value indicates an invalid pair

status

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Split XP Continuous Access

Description:

This action stops the replication of a replicating pair. When successful, the updates of the the

Primary volume does not go to the Secondary volume. This does not delete the pair, hence,

it can be resynced later. The action returns as success, when the splitting of pair is

successful.

The action provides an option to choose SVOL access: READ or READWRITE. If the user has

selected READWRITE, then the Secondary volume will be in READWRITE mode after the

successful split.

When the action is run as a part of workflow, CCI 'pairsplit' command is invoked on the pair

represented by the selected protection scheme, along with the options chosen by the user.

Success or failure of the action is determined by the success or failure of 'pairsplit' command.

Refer to Outputs and Errors table below for details.

CCI command:

▪ If the user has selected default value for SVOL Access: pairsplit -g <name>.

▪ If read: pairsplit -g <name> -r.

▪ If user has selected readwrite: pairsplit -g <name> -rw.

Configuration

417

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

SPLIT_TC_OPER_ON,

SPLIT_TC_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

SVOL

Access

SPLIT_TC_SVOL_ACCESS

Select an appropriate

option from the drop-down

list. The options are:

▪ READ

▪ READWRITE

Outputs and Errors:

The SPLIT_TC_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

SPLIT_TC_RC

value Description

0 This value indicates that all the pairs in the group are

successfully suspended.

non zero This value indicates some failure in splitting of group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 418

SPLIT_TC_RC

value

Description

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume combination error.

228 This value indicates an invalid pair status

234 This value indicates a Pair suspended at WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Get Status

Description:

This action reports the volume status (whether paired or not, and if paired, whether it is SVol

or PVol) and pair status (HP XP specific pair status that indicates the current state of

replication).

When the action is run as a part of the workflow, CCI 'pairvolchk' command is invoked on the

volume represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairvolchk'

command. Refer to Outputs and Errors table below for details.

CCI command: pairvolchk -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

GET_TC_STATUS_OPER_ON,

GET_TC_STATUS_OPER_ON_TYPE

Select the protection scheme

name configured for the

group from the drop-down

list.

Configuration

419

UI Input Input Key Name Description

Note:

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Outputs and Errors:

The GET_TC_STATUS_RC key is set with an exit status of 'pairvolchk' command.

Following are possible values:

▪ GET_TC_STATUS_VOL_STATUS indicates volume status.The possible values are

PVOL/SVOL/SMPL.

▪ GET_TC_STATUS_PAIR_STATUS indicates the pair status. The possible values are

status value for pair, such as, like PAIR/COPY/PSUS etc.

▪ The return code 0-127 indicates success of action. All other values indicates failure.

GET_TC_STATUS_RC

value

Description

0-127 These values indicates specific exit codes that represents

the state of volume and pair. (e.g. 22: PVOL_COPY).

Refer to HP XP CCI documentation for details.

236 This value indicates an unmatched volume status within the

group.

235 This value indicates a Pair Volume combination error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 420

Verify Status

Description:

This action is used to verify the status of a pair. When run it checks for the current status of

a pair and returns a success if a match occurs with what user has asked for.

The action provides an option to specify the timeout value. It is specified in Seconds. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value or status to become expected value, whichever happens earlier. The

action provides an option to choose one of the possible states.

When the action is run as a part of the workflow, CCI 'pairevwait' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsevwait'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ (if timeout option is not specified) pairevtwait -g <name> -s <state> -nowait.

▪ (if timeout option is specified) pairevtwait -g <name> -s <state> -t <timeout value>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

VERIFY_TC_STATUS_OPER_ON,

VERIFY_TC_STATUS_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the drop-

down list.

Note:

If the group is

attached with more

than one pair of

protection

subsystem then do

not select "Current

Production Service"

or "Current DR

Service". Instead,

select the actual

protection

subsystem to

configure the

operation.

Configuration

421

UI Input Input Key Name Description

Timeout (in

Seconds)

Range:0-

1999999

VERIFY_TC_STATUS_TO Enter a numeric

value in seconds.

Replication

Group State

VERIFY_TC_STATUS_STATE Select the replication

group state from the

list of various states.

Outputs and Errors:

The VERIFY_TC_STATUS_RC key is set with an exit status of 'pairevwait' command.

Following are the possible values:

▪ A return code '0' indicates that the action is successful.

▪ All other values indicates failure.

VERIFY_TC_STATUS_RC

value

Description

0 This value indicates that the current status of

pair matches with the user specified status.

Other than 0-127 This value indicates a failure to get the current

status or current status does not match with the

user specified value.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume combination

error.

234 This value indicates a Pair suspended at WAIT

state.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 422

VERIFY_TC_STATUS_RC

value

Description

233 This value indicates a timeout waiting for

specified status.

232 This value indicates a timeout waiting for

specified status on the local host.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Takeover

Description:

This action executes the HP XP 'horctakeover' command. The horctakeover is a scripted

command for executing several HP XP Continuous Access operations. The takeover command

checks the specified volumes or groups attributes (paircurchk), decides the takeover function

based on the attributes, executes the chosen takeover function, and returns the result. The

four HP XP Continuous Access takeover functions designed for HA software operation are

takeover-switch, swap-takeover, PVOL-takeover, and SVOL-takeover.

The action provides an option to choose: "SVOL Takeover" : If Selected, it executes SVOL-

takeover. The target volume of the local host must be an S-VOL.

A group can be specified as the target of the XP Continuous Access takeover command. If

SVOL-takeover is specified for a group, the data consistency check is executed for all

volumes in the group, and all the inconsistent volumes are found in the execution log file and

displayed (same as paircurchk command). The takeover command allows swapping of the

Primary and Secondary volumes, so that if the Primary or the Secondary volume is switched

due to a server error or package transfer, duplex operations can be continued using the

reversed volumes. When control is handed over to the current node, swapping the volumes

again eliminates the need to copy them. The takeover command also allows the Secondary

volume to be separated for disaster recovery operations.

Configuration

423

The takeover command, when activated by a control script, checks for the combination of

attributes of the local and remote volumes and determines the proper takeover action.

Various takeover functions that can be executed are Nop-takeover, Swap-takeover, SVOL-

takeover, PVOL-SMPL-takeover, PVOL-PSUE-takeover and SVOL-SSUS-takeover. If the

command fails, the error message and the error code is returned. If the command succeeds,

the return code and the message tells which takeover sub function is executed. To get the

details about the horctakeover sub functions and what state cause which function to initiate,

please refer to applicable Command Control Reference guide.

Note:

HP XP horctakeover command many times returns currency error even if the volumes are

consistent. In such cases, takeover action returns failure.User is expected to verify the

volumes before proceeding to next action. For more details, please refer to CCI guide

(paircuchk).

CCI command:

▪ If SVOL takeover option is not selected: horctakeover -g <name>.

▪ If SVOL takeover option is selected: horctakeover -g <name> -S.

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

TAKEOVER_TC_OPER_ON,

TAKEOVER_TC_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

the operation.

Volume Option TAKEOVER_TC_VOL_OPTIONS

Select SVOL takover from

the drop-down list.

Timeout (in

Seconds)

TAKEOVER_TC_TO Enter a value in the

numeric field. This is

applicable for sync

replication type.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 424

Outputs and Errors:

The TAKEOVER_TC_RC key is set with an exit status of 'horctakeover' command.

Following are the possible values:

▪ Values 0-5 indicates success of action.

▪ All other values indicates failure of action.

TAKEOVER_TC_RC

value

Description

0 This value indicates a Nop-takeover (no operation).

1 This value indicates that a Swap-takeover was

successfully executed.

2 This value indicates that a SVOL-takeover was

successfully executed.

3 This value indicates that a PVOL-SMPL-takeover was

successfully executed.

4 This value indicates the following:

▪ PVOL-PSUE-takeover was successfully

executed.

▪ SVOL-SSUS-takeover was successfully

executed. (This value depends on the

microcode level.)

5 This value indicates that a SVOL-SSUS-takeover was

successfully executed. (This value depends on the

microcode level.)

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in group.

235 This value indicates a Pair Volume combination error.

225 This value indicates a S-Vol currency error.

224 This value indicates a Local Volume currency error.

Configuration

425

TAKEOVER_TC_RC

value

Description

223 This value indicates a Local and Remote Volume

currency error.

233 This value indicates a timeout waiting for specified

status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Delete XP Continuous Access

Description:

This action deletes the replication relationship between the Primary volume and the

Secondary volume. The user cannot resync the delta changes between the Primary and the

Secondary volume, once it is deleted.

The action provides an option to choose "Force" : If selected, it brings the Secondary volume

into the simplex mode forcibly. It is issued by the secondary host, if the host possessing the

Primary volume is down or has failed.

When the action is run as a part of the workflow, CCI 'pairsplit -S' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ if force option is not selected: pairsplit -g <name> -S.

▪ if force option is selected: pairsplit -g <name> -S –R.

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

DELETE_TC_OPER_ON,

DELETE_TC_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 426

UI Input Input Key Name Description

Note:

If the group is attached

with more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Force DELETE_TC_FORCE Select True or False from

the drop-down list.

Outputs and Errors:

The DELETE_TC_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

DELETE_TC_RC

value

Description

0 This value indicates that the replication group is

successfully deleted.

non zero This value indicates some failure in splitting of

group.

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume combination

error.

Configuration

427

DELETE_TC_RC

value

Description

228 This value indicates an invalid pair status.

234 This value indicates a Pair suspended at WAIT

state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Create XP Continuous Access

Description:

This action creates the replication relationship between the Primary volume and the

Secondary volume. The action returns after the initial copy is initiated between the Primary

and the Secondary Volumes. The user should verify the Replica status to check the desired

status. The replication properties, such as, type of replication (sync/async) or fence level

(Data/status etc) would be the same as per the setting present while discovering protection

scheme or default values.

The action provides an option to choose the direction of replication: forward (Selected

protection scheme as Primary) or reverse (selected protection scheme as Secondary).

The action provides an option to choose fence level: possible values can be status, data and

never. Please refer to HP XP Continuous Access user guide for details on fence level.

When the action is run as a part of workflow, CCI 'paircreate' command is invoked on the

pair represented by the selected protection scheme, along with the options present while

discovery of object. Success or failure of the action is determined by the success or failure of

'paircreate' command. Refer to Outputs and Errors table below for details.

CCI Command: paircreate -g <name> -f <fence> -vl (if user has selected FORWARD option)

or -vr (if user has selected REVERSE option).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 428

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

CREATE_TC_OPER_ON,

CREATE_TC_OPER_ON_TYPE

Select the protection

scheme name configured for

the group from the drop-

down list.

Note:

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Replication

Direction

CREATE_TC_REPL_DIRECTION Select Forward or Reverse

from the drop-down list.

Fence Level CREATE_TC_FENCE Select the appropriate fence

level from the following:

▪ Data

▪ Status

▪ Never

Outputs and Errors:

The CREATE_TC_RC key is set with an exit status of 'paircreate' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

CREATE_TC_RC value Description

0 This value indicates that the replication group

is successfully created.

Configuration

429

CREATE_TC_RC value Description

non zero This value indicates some failure in creation

of replication group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

228 This value indicates an invalid pair status.

212 This value indicates a Pair suspended at

WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Role Switch

Description:

This action re-establishes a split pair in the reverse direction. The Primary volume becomes

the Secondary volume and vice versa. If it is successful, all the changes done on the

Secondary starts getting updated on the Primary volume. The action completes after

reversing the role and initiating the reverse resync request. It does not wait for

resynchronization to complete. The 'Check Status' or 'Verify Status' action should be used to

check if the pair has arrived to a particular state.

When the action is run as a part of the workflow, CCI 'pairresync -swapp or -swaps'

command is invoked on the pair represented by the selected protection scheme, along with

the options chosen by the user. Success or failure of the action is determined by the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI Command: pairvolchk -g <name> and pairresync -g <name> -swapp.

Input:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 430

UI Input Input Key Name Description

Protection

Scheme

Name

ROLE_SWITCH_TC_OPER_ON,

ROLE_SWITCH_TC_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Outputs and Errors:

The ROLE_SWITCH_TC_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

ROLE_SWITCH_TC_RC

value

Description

0 This value indicates that the role for all the pairs

in the group are successfully reversed.

non zero This value indicates some failure in resync of

group.

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

Configuration

431

ROLE_SWITCH_TC_RC

value

Description

228 This value indicates an invalid pair status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Check Consistency

Description:

This action checks for the consistency of the Secondary volume.The action call HP XP CCI

'paircurchk' command, which checks for the currency of the HP XP Continuous Access

Secondary volume(s), by evaluating the data consistency based on pair status and fence

level. The action fails if the Secondary volume is not consistent. Please refer to HP XP CCI

reference manual to know about the data consistency for each possible states of a HP XP

Continuous Access volume.

When the action is run as a part of the workflow, CCI 'paircurchk' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. The action returns success if the data volumes are consistent. In all other cases, it fails.

Refer to Outputs and Errors table below to for details.

Note

HP XP paircurchk command many times returns currency error even if the volumes are

consistent. In such cases, consistency check action returns failure. For more details, please

refer to CCI guide (paircuchk).

CCI Command: paircurchk -g <name>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

CHECK_CONSISTENCY_TC_OPER_ON,

CHECK_CONSISTENCY_TC_OPER_ON_TYPE

Select the

protection scheme

name configured

for the group from

the drop-down list.

Note:

If the group is

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 432

UI Input Input Key Name Description

attached with more

than one pair of

protection

subsystem then do

not select "Current

Production Service"

or "Current DR

Service". Instead,

select the actual

protection

subsystem to

configure the

operation.

Outputs and Errors:

The CHECK_CONSISTENCY_TC_RC key is set with an exit status of 'paircurchk' command.

Following are possible values:

▪ A return code '0' indicate Secondary volumes are consistent.

▪ All other value indicates failure or warnings.

CHECK_CONSISTENCY_TC_RC value Description

0 This value indicates that the data

is consistent.

225 This value indicates a S-Vol

currency error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

is XP Continuous Access

Description:

Configuration

433

This action checks whether the protection service name represented is a XP Continuous

Access protection service. The action fails if it is of different type.

Action will have following Private configuration.

▪ User gets a drop down list with names of all the protection schemes attached to the

group. User need to select one of the protection scheme

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

IS_SI_OPER_ON ,

IS_SI_OPER_ON_TYPE (

DYNAMIC or STATIC )

It should always be

configured as static and

then the protection

scheme name has to be

given.

Note:

Does not support the

Dynamic operation.

Outputs and Errors:

None

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

HP XP Continuous Access Journal

Resync XP Continuous Access Journal

Description:

This action re-establishes a split pair and then restarts the update copy operations to the

Secondary volume. If it is successful, all the changes done on the Primary starts getting

updated on the Secondary volume. The action completes after initiating the resync request

and does not wait for the resynchronization to complete. The 'Check Status' or 'Verify Status'

action should be used to check if the pair has arrived to a particular state.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 434

When the action is run as a part of the workflow, CCI 'pairresync' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. If all the pairs of groups are successfully resynced, the action returns as a success. In

all other cases, it returns as a failure. Success or failure of the action depends on the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI command: pairresync -g <name>.

Input:

UI Input Input Key Name Description

Protection

Scheme Name

RESYNC_UR_OPER_ON,

RESYNC_UR_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the drop-

down list.

Note:

If the group is

attached with more

than one pair of

protection subsystem

then do not select

"Current Production

Service" or "Current

DR Service". Instead,

select the actual

protection subsystem

to configure the

operation.

Outputs and Errors:

The RESYNC_UR_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

RESYNC_UR_RC

value

Description

0 This value indicates that all the pairs in the group

are successfully resynced.

Configuration

435

RESYNC_UR_RC

value

Description

non zero This value indicates some failure in resync of

group.

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

228 This value indicates an invalid pair status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Split XP Continuous Access Journal

Description:

This action stops the replication of a replicating pair. When successful, the updates of the

Primary volume do not go to the Secondary volume. This does not delete the pair, hence, it

can be resynced later. The action returns a success when splitting of pair is successful.

The action provides an option to choose SVOL access: READ or READWRITE. If the user has

selected READWRITE, then the Secondary volume will be in READWRITE mode after the

successful split.

When the action is run as a part of the workflow, CCI 'pairsplit' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsplit'

command. Refer to Outputs and Errors table below for details.

CCI command:

▪ If the user has selected default value for SVOL Access: pairsplit -g <name>.

▪ If read: pairsplit -g <name> -r.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 436

▪ If user has selected readwrite: pairsplit -g <name> -rw.

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

SPLIT_UR_OPER_ON,

SPLIT_UR_OPER_ON_TYPE

Select the protection scheme name

configured for the group from the

drop-down list.

Note:

If the group is attached with more than

one pair of protection subsystem then

do not select "Current Production

Service" or "Current DR Service".

Instead, select the actual protection

subsystem to configure the operation.

SVOL Access SPLIT_UR_SVOL_ACCESS Select an appropriate option from the

drop-down list. The options are:

▪ READ

▪ READWRITE

Outputs and Errors:

The SPLIT_UR_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

SPLIT_UR_RC value Description

0 This value indicates that all the

pairs in the group are

successfully suspended.

non zero This value indicates some failure

in splitting of group.

236 This value indicates an

unmatched volume status within

Configuration

437

SPLIT_UR_RC value Description

the group.

229 This value indicates an

inconsistent status in group.

222 This value indicates an invalid

volume status.

235 This value indicates a Pair

Volume combination error.

228 This value indicates an invalid

pair status.

234 This value indicates a Pair

suspended at WAIT state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Get Status

Description:

This action reports the volume status (whether paired or not paired, and if paired, whether it

is SVol or PVol) and pair status (HP XP specific pair status that indicates the current state of

replication).

When the action is run as a part of the workflow, CCI 'pairvolchk' command is invoked on the

volume represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairvolchk'

command. Refer to Outputs and Errors table below for details.

CCI command: pairvolchk -g <name>.

Input:

UI Input Input Key Name Description

Protection GET_UR_STATUS_OPER_ON, Select the protection

scheme name

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 438

UI Input Input Key Name Description

Scheme Name GET_UR_STATUS_OPER_ON_TYPE configured for the

group from the

drop-down list.

Note:

If the group is

attached with more

than one pair of

protection

subsystem then do

not select "Current

Production Service"

or "Current DR

Service". Instead,

select the actual

protection

subsystem to

configure the

operation.

Outputs and Errors:

The GET_UR_STATUS_RC key is set with an exit status of 'pairvolchk' command.

Following are possible values:

▪ GET_UR_STATUS_VOL_STATUS indicates volume status. Possible values are

PVOL/SVOL/SMPL.

▪ GET_UR_STATUS_PAIR_STATUS indicates pair status. possible values are status value

for pair like PAIR/COPY/PSUS etc.

▪ Return code 0-127 indicate success of action. All other value indicates failure.

GET_UR_STATUS_RC value Description

0-127 These values indicates specific exit codes

that represents the state of volume and

pair. (e.g. 22: PVOL_COPY).

Refer to HP XP CCI documentation for

details.

236 This value indicates an unmatched

volume status within the group.

Configuration

439

GET_UR_STATUS_RC value Description

235 This value indicates a Pair Volume

combination error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Verify Status

Description:

This action is used to verify the status of a pair. When run it checks the current status of a

pair and returns a success, if it matches with what user has asked for. If the user has

specified an optional timeout value, then the action periodically checks the status till either

the status of the pair becomes the expected value or the timeout expires. The action is

successful if the status of pair is what the user has asked for. In all other cases, the action

fails.

The action provides an option to specify the timeout value. It is specified in Seconds. If no

timeout value is specified, then the action completes immediately. Otherwise, the action

waits till timeout value or status to become expected value, whichever happens earlier. The

action provides an option to choose one of the possible states.

When the action is run as a part of workflow, CCI 'pairevwait' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of 'pairsevwait'

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ (if timeout option is not specified) pairevtwait -g <name> -s <state> -nowait.

▪ (if timeout option is specified) pairevtwait -g <name> -s <state> -t <timeout value>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

VERIFY_UR_STATUS_OPER_ON,

VERIFY_UR_STATUS_OPER_ON_TYPE

Select the

protection

scheme name

configured for

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 440

UI Input Input Key Name Description

the group from

the drop-down

list.

Note:

If the group is

attached with

more than one

pair of protection

subsystem then

do not select

"Current

Production

Service" or

"Current DR

Service".

Instead, select

the actual

protection

subsystem to

configure the

operation.

Timeout (in

Seconds)

Range:0-

1999999

VERIFY_UR_STATUS_TO Enter a numeric

value in seconds.

Replication

Group State

VERIFY_UR_STATUS_STATE Select the

replication group

state from the

list of various

states.

Outputs and Errors:

The VERIFY_UR_STATUS_RC key is set with an exit status of 'pairevwait' command.

Following are the possible values:

▪ A return code '0' indicates that the action is successful.

▪ All other values indicates failure.

VERIFY_UR_STATUS_RC

value

Description

Configuration

441

VERIFY_UR_STATUS_RC

value

Description

0 This value indicates that the current

status of pair matches with the user

specified status.

Other than 0-127 This value indicates a failure to get

the current status or current status

does not match with the user

specified value.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid

volume status.

235 This value indicates a Pair Volume

combination error.

234 This value indicates a Pair suspended

at WAIT state.

233 This value indicates a timeout waiting

for specified status.

232 This value indicates a timeout waiting

for specified status on the local host.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Takeover

Description:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 442

This action executes the HP XP 'horctakeover' command. The horctakeover is a scripted

command for executing several HP XP Continuous Access operations. The takeover command

checks the specified volumes or groups attributes (paircurchk), decides the takeover function

based on the attributes, executes the chosen takeover function, and returns the result. The

four HP XP Continuous Access takeover functions designed for HA software operation are

takeover-switch, swap-takeover, PVOL-takeover, and SVOL-takeover.

The action provides an option to choose: "SVOL Takeover" : If Selected, it executes SVOL-

takeover. The target volume of the local host must be an S-VOL.

A group can be specified as the target of the XP Continuous Access takeover journal

command. If SVOL-takeover is specified for a group, the data consistency check is executed

for all volumes in the group, and all the inconsistent volumes are found in the execution log

file and displayed (same as paircurchk command). The takeover command allows swapping

of the Primary and Secondary volumes, so that if the Primary or the Secondary volume is

switched due to a server error or package transfer, duplex operations can be continued using

the reversed volumes. When control is handed over to the current node, swapping the

volumes again eliminates the need to copy them. The takeover command also allows the

Secondary volume to be separated for disaster recovery operations.

The takeover command, when activated by a control script, checks the combination of

attributes of the local and remote volumes and determines the proper takeover action.

Various takeover functions that can be executed are Nop-takeover, Swap-takeover, SVOL-

takeover, PVOL-SMPL-takeover, PVOL-PSUE-takeover and SVOL-SSUS-takeover. If the

command fails, the error message and the error code is returned. If the command succeeds,

the return code and the message tells which takeover sub function is executed. To get details

about the horctakeover sub functions and what state cause which function to initiate, please

refer to applicable Command Control Reference guide.

Note:

HP XP horctakeover command many times returns currency error even if the volumes are

consistent. In such cases, takeover action returns failure. User is expected to verify the

volumes before proceeding to next action. For more details, please refer to CCI guide

(paircuchk).

CCI command:

▪ If SVOL takeover option is not selected: horctakeover -g <name> -t timeout.

▪ If SVOL takeover option is selected: horctakeover -g <name> -t timeout -S.

Inputs:

UI Input Input Key Name Description

Protection Scheme

Name

TAKEOVER_UR_OPER_ON,

TAKEOVER_UR_OPER_ON_TYPE

Select the

protection scheme

name configured

for the group from

Configuration

443

UI Input Input Key Name Description

the drop-down list.

Note:

If the group is

attached with

more than one pair

of protection

subsystem then do

not select "Current

Production

Service" or

"Current DR

Service". Instead,

select the actual

protection

subsystem to

configure the

operation.

Volume Option TAKEOVER_UR_VOL_OPTIONS Select SVOL

takover from the

drop-down list.

Timeout (in Seconds) TAKEOVER_UR_TO Enter a value in

the numeric field.

Outputs and Errors:

The REPL_TAKEOVER_RC key is set with an exit status of 'horctakeover' command.

Following are the possible values:

▪ Values 0-5 indicates success of action.

▪ All other values indicates failure of action.

REPL_TAKEOVER_RC

value

Description

0 This value indicates a Nop-takeover (no

operation).

1 This value indicates that a Swap-takeover was

successfully executed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 444

REPL_TAKEOVER_RC

value

Description

2 This value indicates that a SVOL-takeover was

successfully executed.

3 This value indicates that a PVOL-SMPL-takeover

was successfully executed.

4 This value indicates the following:

▪ PVOL-PSUE-takeover was successfully

executed.

▪ SVOL-SSUS-takeover was successfully

executed. (This value depends on the

microcode level.)

5 This value indicates that a SVOL-SSUS-takeover

was successfully executed. (This value depends

on the microcode level.)

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in

group.

235 This value indicates a Pair Volume combination

error.

225 This value indicates a S-Vol currency error.

224 This value indicates a Local Volume currency

error.

223 This value indicates a Local and Remote Volume

currency error.

233 This value indicates a timeout waiting for

specified status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

Configuration

445

▪ Authentication (Password check for agentless).

Delete XP Continuous Access Journal

Description:

This action deletes the replication relationship between the Primary volume and the

Secondary volume. The user cannot resync delta changes between the Primary and the

Secondary volume once it is deleted.

The action provides an option to choose "Force" : If selected, it brings the Secondary volume

into the simplex mode forcibly. It is issued by the secondary host, if the host possessing the

Primary volume is down or has failed.

When the action is run as a part of the workflow, CCI 'pairsplit -S' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. Success or failure of the action is determined by the success or failure of pairsplit

command. Refer to Outputs and Errors table below for details.

CCI Command:

▪ if force option is not selected: pairsplit -g <name> -S.

▪ if force option is selected: pairsplit -g <name> -S –R.

Inputs:

UI Input Input Key Name Description

Protection Scheme

Name

DELETE_UR_OPER_ON,

DELETE_UR_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

the operation.

Force DELETE_UR_FORCE Select True or False from

the drop-down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 446

Outputs and Errors:

The DELETE_UR_RC key is set with an exit status of 'pairsplit' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

DELETE_UR_RC

value

Description

0 This value indicates that the replication group

is successfully deleted.

non zero This value indicates some failure in splitting of

group.

236 This value indicates an unmatched volume

status within the group.

229 This value indicates an inconsistent status in

group.

222 This value indicates an invalid volume status.

235 This value indicates a Pair Volume

combination error.

228 This value indicates an invalid pair status.

234 This value indicates a Pair suspended at WAIT

state.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Create XP Continuous Access Journal

Description:

Configuration

447

This action creates the replication relationship between the Primary volume and the

Secondary volume. The action returns after the initial copy is initiated between the Primary

and the Secondary Volumes. The user should verify the Replica status to check the desired

status. The replication properties, such as, type of replication (sync/async) or fence level

(Data/status etc) would be the same as per the setting present while discovering protection

scheme or default values.

The action provides an option to choose the direction of replication: forward (Selected

protection scheme as Primary) or reverse (selected protection scheme as Secondary).

The action provides an option to choose Journal ID for Primary volume and Secondary

volume. This ID refers to the journal group which will be used for asynchronous data transfer

for data volumes.

The action provides an option to specify the consistency group number: The concept of XP

Continuous Access Journal consistency group number equals to Continuous Access

Asynchronous consistency group numbers. Therefore, we can create a XP Continuous Access

Journal pair with the consistency group numbers from CCI as is the case with XP Continuous

Access synchronous. In XP Continuous Access Journal operations, the consistency group

numbers that are specified from CCI are assigned to the journal group numbers.

When the action is run as a part of the workflow, CCI 'paircreate' command is

invoked on the pair represented by the selected protection scheme, along with the

options present while discovery of object. Success or failure of the action is

determined by the success or failure of 'paircreate' command. Refer to Outputs and

Errors table below for details.

CCI Command: paircreate -g <name> -f <fence> -vl (if user has selected FORWARD

option) or -vr (if user has selected REVERSE option).

Inputs:

UI Input Input Key Name Description

Protection

Scheme Name

CREATE_UR_OPER_ON,

CREATE_UR_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 448

UI Input Input Key Name Description

the operation.

Replication

Direction

CREATE_UR_REPL_DIRECTION Select Forward or

Reverse from the drop-

down list.

Primary Volume

Journal ID

(Range: 1 - 15)

CREATE_UR_PVOL_JNL_ID Enter a value between 1

and 15.

Secondary

Volume Journal

ID

(Range: 1 - 15)

CREATE_UR_SVOL_JNL_ID Enter a value between 1

and 15.

Consistency

Volume Group

(Range: 0 -

127)

CREATE_UR_CTG_NUM Enter a value between 0

and 127.

Outputs and Errors:

The CREATE_UR_RC key is set with an exit status of 'paircreate' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

CREATE_UR_RC value Description

0 This value indicates that the replication group is

successfully created.

non zero This value indicates some failure in creation of

replication group.

236 This value indicates an unmatched volume status

within the group.

229 This value indicates an inconsistent status in group.

Configuration

449

CREATE_UR_RC value Description

222 This value indicates an invalid volume status.

228 This value indicates an invalid pair status.

212 This value indicates a Pair suspended at WAIT state.

217 This value indicates that there are not enough CT

groups in the RAID.

215 This value indicates that no CT groups are left for

OPEN Vol use.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Role Switch

Description:

This action re-establishes a split pair in the reverse direction. The Primary volume becomes

the Secondary volume and vice versa. If it is successful, all the changes done on the

Secondary starts getting updated on the Primary volume. The action completes after

reversing the role and initiating the reverse resync request. It does not wait for

resynchronization to complete. The 'Check Status' or 'Verify Status' action should be used to

check if the pair has arrived to a particular state.

When the action is run as a part of the workflow, CCI 'pairresync -swapp or -swaps'

command is invoked on the pair represented by the selected protection scheme, along with

the options chosen by the user. Success or failure of the action is determined by the success

or failure of 'pairresync' command. Refer to Outputs and Errors table below for details.

CCI Command: pairvolchk -g <name> and pairresync -g <name> -swapp.

Input:

UI Input Input Key Name Description

Protection

Scheme

Name

ROLE_SWITCH_UR_OPER_ON,

ROLE_SWITCH_UR_OPER_ON_TYPE

Select the protection

scheme name

configured for the group

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 450

UI Input Input Key Name Description

from the drop-down list.

Note:

If the group is attached

with more than one pair

of protection subsystem

then do not select

"Current Production

Service" or "Current DR

Service". Instead, select

the actual protection

subsystem to configure

the operation.

Outputs and Errors:

The ROLE_SWITCH_UR_RC key is set with an exit status of 'pairresync' command.

Following are the possible values:

▪ A return code '0' indicates success.

▪ All other values indicates failure.

ROLE_SWITCH_UR_RC

value Description

0 This value indicates that the role for all

the pairs in the group are successfully

reversed.

non zero This value indicates some failure in

resync of group.

236 This value indicates an unmatched

volume status within the group.

229 This value indicates an inconsistent

status in group.

222 This value indicates an invalid volume

status.

228 This value indicates an invalid pair

status.

Configuration

451

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Sync Wait

Description:

This action is used to make sure that all the changes on the Primary are updated on the

Secondary volume. The action takes a timeout parameter, that indicates the duration for

which action waits for completion on synchronization. It should be issued after the

application completes its write function and is shutdown or quiesced.

The action provides an option to specify the timeout value for which the action waits for all

the pending transfer to complete. Unit is 100 ms.

When the action is run as a part of the workflow, CCI 'pairsyncwait' command is invoked on

the pair represented by the selected protection scheme, along with the options chosen by the

user. The action is successful if synchronization is complete for the device group. For all

other cases, it fails. Refer to Outputs and Errors table below for details.

CCI Command: pairsyncwait -g <name> -t <timeout>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

SYNC_WAIT_UR_OPER_ON,

SYNC_WAIT_UR_OPER_ON_TYPE

Select the protection

scheme name configured

for the group from the

drop-down list.

Note:

If the group is attached

with more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 452

UI Input Input Key Name Description

Timeout (in

100ms)

SYNC_WAIT_UR_TO Enter an appropriate

numeral value.

Outputs and Errors:

The SYNC_WAIT_RC key is set with an exit status of 'pairsyncwait' command.

Following are the possible values:

▪ A return code '0' indicates synchronization is done.

▪ All other values indicates failure.

SYNC_WAIT_UR_RC

value

Description

0 This value indicates that the

synchronization is complete.

1 This value indicates the status as

timeout.

2 This value indicates that the Status is

broken (Synchronization process is

rejected.)

3 This value indicates that the status is

CHANGED (Q-marker is invalid due to

resynchronize).

222 This value indicates an invalid volume

status.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Check Consistency

Configuration

453

Description:

This action checks the consistency of the Secondary volume. The action calls HP XP CCI

'paircurchk' command which checks the currency of the HP XP Continuous Access Secondary

volume(s) by evaluating the data consistency based on pair status and fence level. The

action fails if the Secondary volume is not consistent. Please refer to HP XP CCI reference

manual to know about the data consistency for each possible states of a HP XP Continuous

Access volume.

When the action is run as a part of the workflow, CCI 'paircurchk' command is invoked on the

pair represented by the selected protection scheme, along with the options chosen by the

user. The action returns success if the data volumes are consistent. In all other cases, it fails.

Refer to Outputs and Errors table below for details.

Note

HP XP paircurchk command many times returns currency error even if the volumes are

consistent. In such cases, consistency check action returns failure. For more details, please

refer to CCI guide (paircuchk).

CCI Command: paircurchk -g <name>.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

CHECK_CONSISTENCY_UR_OPER_ON,

CHECK_CONSISTENCY_UR_OPER_ON_TYPE

Select the protection

scheme name

configured for the

group from the drop-

down list.

Note:

If the group is

attached with more

than one pair of

protection subsystem

then do not select

"Current Production

Service" or "Current

DR Service". Instead,

select the actual

protection subsystem

to configure the

operation.

Outputs and Errors:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 454

The CHECK_CONSISTENCY_UR_RC key is set with an exit status of paircurchk command.

Following are possible values:

▪ A return code '0' indicate Secondary volumes are consistent.

▪ All other value indicates failure or warnings.

CHECK_CONSISTENCY_UR_RC value Description

0 This value indicates that the

data is consistent.

225 This value indicates a S-Vol

currency error.

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

Is XP Continuous Access Journal

Description:

This action checks whether the protection service name represented is a XP Continuous

Access Journal protection service. The action fails if it is of different type.

Inputs:

UI Input Input Key Name Description

Protection

Scheme

Name

IS_UR_OPER_ON ,

IS_UR_OPER_ON_TYPE (

DYNAMIC or STATIC )

It should always be

configured as static and then

the production scheme name

has to be given.

Note:

Does not support the

Dynamic operation.

Outputs and Errors:

None

Configuration

455

Pre-checks

▪ Configuration – Action is configured with input of Key Values or Advance Properties.

▪ Agent connectivity.

▪ Authentication (Password check for agentless).

MSSQL Mirroring

Failover

Description

This action performs failover on DR.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Outputs

Action fails, if the agent is unable to connect or execution of the failover query on the DR

database fails.

Action fails, if RAL is executed on Production Dataset.

Success Output: FAILOVER COMPLETED for database_name

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin on DR). Reduced priviliges are the minimum privileges

required to execute the action.

▪ Configured dataset is the current DR dataset.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 456

Get Database Mode

Description

This action gets the database mode.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset name

from the drop-

down list.

Outputs

Action fails if the agent is unable to connect and execute the query on the database.

Output

Name

Output Key Name Description

RAL

Execution

Result

PANMSSQL_GET_DBMODE RAL Execution Result

Success Output: The Database is ONLINE

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Dry Run command:

sql command for precheck: :select state_desc from sys.databases where name =

'database_name';

Get Mirror Safety Level

Configuration

457

Description

This RAL action gets the current mirror safety level.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Outputs

Output

Name

Output Key Name Description

RAL

Execution

Result

PANMSSQL_GET_MIRROR_SAFETY_LEVEL RAL Execution

Result

Action fails, if the agent is unable to connect or execute a query on the database.

Success Output: Mirroring Safety Level: FULL for database: <database_name> on

component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Dry Run command:

sql command for precheck: :select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 458

Get Mirroring Status

Description

This RAL action provides the current mirroring status.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Outputs

Output

Name

Output Key Name Description

RAL

Execution

Result

PANMSSQL_GET_MIRRORSTATUS RAL Execution Result

Action fails, if the agent is unable to connect or execute a query on the database.

Success Output: Mirroring Status for database <database_name> is SYNCHRONIZED on

component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Dry Run command:

Configuration

459

sql command for precheck: :select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

Role Switch

Description

This action switches the roles.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Outputs

Action fails if the agent is unable to connect and execute the query on the database.

Success Output: The roles are changed for database <database_name> on component

<component_name> (IP_Address).

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator or db_owner fixed role user on PR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Configured dataset is current production dataset.

▪ Mirroring is setup correctly.

▪ Replication (mirroring of data) is working.

▪ Dry Run command:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 460

sql command for precheck: : select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

Start Mirroring

Description

This action Starts Mirroring on both PR and DR. If RAL execution is successful, then Mirror

state is changed from SUSPENDED to SYNCHRONIZED.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Outputs

Action fails, if the agent is unable to start mirroring.

Success Output: Successfully Resumed Mirroring for database <database_name> on

component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator or db_owner fixed role user on PR; sysadmin

on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Mirroring is setup correctly.

▪ Replication (mirroring of data) is working.

▪ Dry Run command:

Configuration

461

sql command for precheck: :select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

Stop Mirroring

Description

This action Stops Mirroring on both PR and DR. If RAL execution is successful, then PR/DR

Mirror state is changed from SYNCHRONIZED to SUSPENDED.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Outputs

Action fails, if the agent is unable to connect or stop the mirroring.

Success Output, Suspended Mirroring for database <database_name> on component

<component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator or db_owner fixed role user on PR; sysadmin

on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Mirroring is setup correctly.

▪ Replication (mirroring of data) is working.

▪ Dry Run command:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 462

sql command for precheck: : select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

Verify Database Mode

Description

This action verifies whether the database is in the required mode or not.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the dataset

name from the drop-

down list.

Dataset

Mode

String PANMSSQL_VERIFY_DB_MODE Mandatory Select the option db

mode from the drop-

down list.

Valid Keys - OFFLINE,

ONLINE, SUSPEND,

RECOVERING,

RECOVERY_PENDING,

EMERGENCY,

RESTORING

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

Action fails, if the database mode input from drop down or KV does not match with the

database mode of Production Dataset or DR Dataset.

Success Output: DB Mode Successfully Verified as ONLINE for database <database_name>

on component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Database Mode – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

Configuration

463

▪ Dry Run command:

sql command for precheck: :select state_desc from sys.databases where name =

'database_name';

Verify Mirror Safety Level

Description

This action verifies the Mirror Safety Level of the database.For this database is selected and

respective mirroring safety level is provided by the user.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Mirroring

Status

String PANMSSQL_VERIFY_MIRROR_SAFETY_LEVEL Mandatory Select the

mirror

status from

the drop-

down list.

Valid Keys -

FULL, OFF

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

Action fails, if the Mirror Safety Level input from drop down or KV does not match with the

Mirror Safety Level of database.

Success Output: Mirror Safety Level Successfully Verified as FULL for database

<database_name> on component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Mirror Safety Level – configured with input Key Values or Advance Properties.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 464

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Dry Run command:

sql command for precheck: :select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

Set Mirror Safety Level

Description

This action Sets the Mirror Safety Level of the database.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Safety

Level

String PANMSSQL_SET_MIRROR_SAFETY_LEVEL Mandatory Select the

safety level

from the

drop-down

list.

Valid Keys -

FULL,OFF

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

Success Output: Safety Level Updated Successfully for database:<database_name> on

component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

Configuration

465

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (sysadmin/dbcreator or db_owner fixed role user on PR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Configured dataset is the current Production dataset.

▪ MSSQL Enterprise Edition.

▪ This RAL Action can only be executed for SQL Server 2005 Enterprise Edition Service

Pack 1 (SP1) and later versions"

Verify Mirroring Status

Description

This action verifies whether the database is in the required status or not. For this database is

selected and respective mirroring state is provided by the user. The current mirroring status

is matched with user input for verification.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the dataset

name from the

drop-down list.

Mirroring

Status

String PANMSSQL_VERIFY_MIRROR_STATUS Mandatory Select the mirror

status from the

drop-down list.

Valid Keys -

SYNCHRONIZED,

SYNCHRONIZING,

UNSYNCHRONIZED,

SUSPENDED,

DISCONNECTED,

PENDING_FAILOVER

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 466

Action fails, if the Mirroring State input from drop-down or KV does not match with the Mirror

State of Production Dataset.

Success Output: Mirror State Successfully Verified as SYNCHRONIZED for database

:<database_name> on component <component_name> (IP_Address).

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Mirror Status – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Dry Run command:

sql command for precheck: :select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

Verify Mirror Role

Description

This RAL action verifies the current mirroring role from PR to be PRINCIPAL.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String PANMSSQL_DATASET_NAME Mandatory Select the

dataset

name from

the drop-

down list.

Mirror

Role

String PANMSSQL_VERIFY_MIRROR_ROLE Mandatory Select the

mirror role

from the

drop-down

Configuration

467

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

list.

Valid Keys -

PRINCIPAL,

MIRROR

Outputs

Action fails, if the agent is unable to connect or execute a query on the database.

Success Output: Mirror Role Successfully Verified as PRINCIPAL for database

<database_name> on component <component_name> (IP_Address)

Pre-checks

▪ Dataset – Configured with input of Key Values or Advance Properties.

▪ Mirror Role – Configured with input of Key Values or Advance Properties.

▪ Authentication for the database.

▪ Selected dataset is active.

▪ Reduced Privileges (PUBLIC role user on PR; sysadmin on DR).

Reduced priviliges are the minimum privileges required to execute the action.

▪ Dry Run command:

sql command for precheck: :select top 1

mirroring_role_desc,mirroring_state_desc,mirroring_safety_level_desc from

sys.database_mirroring,sys.databases where

sys.databases.database_id=sys.database_mirroring.database_id and name =

'database_name';

MS Exchange

Verify Database State

Description

This action get the current Status of the database.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 468

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String NA Mandatory Select the

dataset

from the

drop-down

list.

Expected

State

String NA Mandatory Select the

state from

the drop-

down list.

Outputs

Action fails if the agent is unable to connect and execute the script.

Activate Database

Description

Mounts active copy of the database on host and replicate to other instances of the database.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String NA Mandatory Select the

dataset from

the drop-

down list.

Outputs

Action fails, if the agent is unable to connect to the server or in case of any script error.

Resume Database Copy

Description

Resumes the Database replication.

Configuration

469

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String NA Mandatory Select the

dataset from

the drop-

down list.

Outputs

Action fails, if the agent is unable to start the server.

Suspend Database Copy

Description

This action suspends the Database replication.

Inputs

Input

Name

Input

Type

Input Key Name Optional/

Mandatory

Description

Dataset

Name

String NA Mandatory Select the

dataset from

the drop-

down list.

Outputs

Action fails, if the agent is unable to start the server.

NetApp SnapMirror

LunMap

Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 470

This action makes LUN accessible to initiators in the specified group. On the netapp filer, map

the LUN to an igroup. All required values are taken from the protection object passed as

argument.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

lun map $LunPath$IGroup $LunId

Outputs

There are no output keys for this action.

LunUnmap

Description

This action removes a previously configured mapping. On the netapp filer, unmapall the LUNs

of an igroup. All required values are taken from the protection object passed as argument.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

lununmap$LunPath$IGroup

Outputs

Configuration

471

There are no output keys for this action.

Create Clone

Description

This action creates a new flexible volume that is a clone of parent_flexvol or

parent_snapshot. The clone name has to be provided by the RAL user or set in key value

CLONE_NAME.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the group

from the drop-down list.

Production or

DR Protection

Scheme

Mandatory

Volume

Name

If the volume is different from the

one in the above protection

object, provide it here in

Advanced Properties or in key

value VOLUME_NAME.

VOLUME_NAME Optional

Clone

Name

The clone name has to be

provided by the RAL user in

Advanced Properties or set in key

value CLONE_NAME

CLONE_NAME Mandatory

LUN Path If the clone’s parent volume does

not belong to the protection object

and the clone was chosen during

workflow execution by the

“Choose Clone” RAL action then

the user should provide the full

LUN path or he can provide key

MOUNT_PATH. If clone parent

volume belongs to the protection

object then the action will build

the LUN path from the volume

name.

MOUNT_PATH Optional

NetApp Command

vol clone create $CloneName -s volume -b $VolumeName

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 472

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key Name Description

Clone Name CLONE_NAME The name of the newly

created clone.

Clone Mount Path CLONE_MOUNT_PATH The mount path for the

created clone.The mount path

is constructed from the “Clone

Name” parameter using the

format “/vol/<Clone Name>”.

Storage IP STORAGE_IP The IP address of the

protection object’s

component.

Cifs Share CIFS_SHARE_NAME Cifs Share Name

Destroy Clone

Description

This action removes the clone volume from the filer. The clone name has to be provided by

the RAL user or set in key value CLONE_NAME.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the group

from the drop-down list.

Production or

DR Protection

Scheme

Mandatory

Volume

Name

Name of the netapp Volume VOLUME_NAME Mandatory

Clone

Name

Name of the clone volume CLONE_NAME Mandatory

Configuration

473

NetApp Command

vol destroy $CloneName

Outputs

There are no output keys for this action.

Choose Clone

Description

This action allows the user to choose a clone from the list of existing clones of the volume or

create a new clone.

OR

If user wants to create a new clone, it is created from the latest available snapshot. This

action only works on the DR protection object.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

If we select volume Clone option, need to execute below command in case creating new

volume clone:

vol clone create $CloneName -s volume -b $VolumeName

If we select LUN Clone option, need to execute below command in case creating new LUN

clone:

volume file clone create -volume volumeName -source-path /myfile -destination-

path /myfile_copy

Outputs

Output Name Output Key Name Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 474

Output Name Output Key Name Description

Clone Name CLONE_NAME The name of the newly

created clone.

Clone Mount Path CLONE_MOUNT_PATH The mount path for the

created clone.The mount path

is constructed from the “Clone

Name” parameter using the

format “/vol/<Clone Name>”.

Storage IP STORAGE_IP The IP address of the

protection object’s

component.

Cifs Share CIFS_SHARE_NAME Cifs Share Name

Volume Online

Description

This action takes the volume in protection object passed as argument online.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

vol online $filerName:$qtreeName

Outputs

There are no output keys for this action.

Volume Offline

Description

This action takes the volume in protection object passed as argument offline.

Configuration

475

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

vol offline$filerName:$qtreeName

Outputs

There are no output keys for this action.

Lun Online

Description

This action enables access to the LUNs in protection object, on the netapp filer.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

lunonline$LunPath

Outputs

There are no output keys for this action.

Lun Offline

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 476

Description

This action disables access to the LUNs in protection object, on the netapp filer.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

lunoffline$LunPath

Outputs

There are no output keys for this action.

Clone Online

Description

This action makes the clone online, on the netapp filer. The clone name has to be provided

by the RAL user or set in key value CLONE_NAME.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

vol online $CloneName

Configuration

477

Outputs

There are no output keys for this action.

Clone Online

Description

This action makes the clone offline, on the netapp filer. The clone name has to be provided

by the RAL user or set in key value CLONE_NAME..

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

vol offline $CloneName

Outputs

There are no output keys for this action.

Clone Map

Description

This action maps a clone LUN to the Initiator Group.

Inputs

Input Name Description Input Key Name Optional/

Mandatory

Protection

Scheme

Select the protection scheme name configured for the group from the

Production or DR

Protection Scheme

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 478

Input Name Description Input Key Name Optional/

Mandatory

Name drop-down list.

Clone LUN

Path

If clone already existed and its parent volume does not belong to the

protection object and the clone was chosen during workflow execution by the “Choose Clone” RAL action then the user should provide the full clone LUN path or he can provide key CLONE_MOUNT_PATH. If clone parent

volume belongs to the protection

object then the action will build the clone LUN path from protection object.

CLONE_MOUNT_PATH Optional

Clone

Initiator

Group

If clone already existed and its parent volume does not belong to the protection object and the clone was

chosen during workflow execution by the “Choose Clone” RAL action then the user should provide the clone IGroup or he can provide key CLONE_I_GROUP. If clone parent volume belongs to the protection object then the action will use the

IGroup from protection object.

CLONE_I_GROUP Optional

Clone LUN Id If clone already existed and its parent volume does not belong to the protection object and the clone was chosen during workflow execution by

the “Choose Clone” RAL action then the user should provide the clone LUN id or he can provide key CLONE_LUN_ID. If clone parent volume belongs to the protection object then the action will use the lun id from protection object.

CLONE_LUN_ID Optional

Force Checkbox to enable forceful onlineso that LUN mapping conflict checks are

not done on the cluster partner.

Optional

NetApp Command

lun map $LunPath $IGroup $LunId

Outputs

Configuration

479

There are no output keys for this action.

Clone Unmap

Description

This action unmaps a clone LUN from the Initiator Group.

Inputs

Input Name Description Input Key Name Optional/

Mandatory

Protection

Scheme

Name

Select the protection

scheme name

configured for the

group from the drop-

down list.

Production or DR

Protection Scheme

Mandatory

Clone LUN

Path

If clone already

existed and its parent

volume does not

belong to the

protection object and

the clone was chosen

during workflow

execution by the

“Choose Clone” RAL

action then the user

should provide the full

clone LUN path or he

can provide key

CLONE_MOUNT_PATH.

If clone parent volume

belongs to the

protection object then

the action will build the

clone LUN path from

protection object.

CLONE_MOUNT_PATH Optional

Clone Initiator

Group

If clone already

existed and its parent

volume does not

belong to the

protection object and

the clone was chosen

during workflow

CLONE_I_GROUP Optional

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 480

Input Name Description Input Key Name Optional/

Mandatory

execution by the

“Choose Clone” RAL

action then the user

should provide the

clone IGroup or he can

provide key

CLONE_I_GROUP. If

clone parent volume

belongs to the

protection object then

the action will use the

IGroup from protection

object.

NetApp Command

lununmap $LunPath $IGroup

Outputs

There are no output keys for this action.

Clone Lun Online

Description

This action enables access to clone LUN, on the netapp filer.

Inputs

Input Name Description Input Key Name Optional/ Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the group

from the drop-down list.

Production or DR

Protection Scheme

Mandatory

Clone LUN

Path

If clone already existed and its

parent volume does not belong

to the protection object and

the clone was chosen during

workflow execution by the

“Choose Clone” RAL action

CLONE_MOUNT_PATH Optional

Configuration

481

Input Name Description Input Key Name Optional/ Mandatory

then the user should provide

the full clone LUN path or he

can provide key

CLONE_MOUNT_PATH. If clone

parent volume belongs to the

protection object then the

action will build the clone LUN

path from protection object.

Force Checkbox to enable forceful

onlineso that LUN mapping

conflict checks are not done on

the cluster partner.

Optional

NetApp Command

lunonline[-f] $CloneLunPath

Outputs

There are no output keys for this action.

Clone Lun Offline

Description

This action disables access to clone LUN, on the netapp filer.

Inputs

Input Name Description Input Key Name Optional/ Mandatory

Protection Scheme Name

Select the protection scheme name configured

for the group from the drop-down list.

Production or DR Protection Scheme

Mandatory

Clone LUN Path

If clone already existed and its parent volume does not belong to the protection object and the

clone was chosen during workflow execution by the “Choose Clone” RAL action

CLONE_MOUNT_PATH Optional

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 482

Input Name Description Input Key Name Optional/ Mandatory

then the user should

provide the full clone LUN path or he can provide key CLONE_MOUNT_PATH. If clone parent volume belongs to the protection object then the action will

build the clone LUN path from protection object.

NetApp Command

lunoffline$CloneLunPath

Outputs

There are no output keys for this action.

Update Replication

Description

This action gets the current snapshot sequence number on protection object passed as

argument. Then update replication so that next snapshot is created. It gets the latest

snapshot sequence number and ensure it is greater than previous. The loop waits till

snapmirror is in ‘Idle’ state.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

snap list –o $filerName:$qtreeName

snapmirrorupdate $filerName:$qtreeName

snap list –o $filerName:$qtreeName

Outputs

Configuration

483

There are no output keys for this action.

Quiesce Replication

Description

This action quiesces replication on protection object passed as argument.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

snapmirrorquiesce $filerName:$qtreeName

Outputs

There are no output keys for this action.

Break Replication

Description

This action breaks replication on protection object passed as argument. The object’s volumes

become read write.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 484

snapmirrorbreak $filerName:$qtreeName

Outputs

There are no output keys for this action.

Resync Replication

Description

This action resynchronizes replication to protection object passed as argument.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

snapmirrorresync -f $filerName:$qtreeName

Outputs

There are no output keys for this action.

Resume Replication

Description

This action resumes replication to protection object passed as argument.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Select the protection scheme name

configured for the group from the

Production

or DR

Mandatory

Configuration

485

Input

Name

Description Input Key

Name

Optional/

Mandatory

Name drop-down list. Protection

Scheme

NetApp Command

snapmirror resume $filerName:$qtreeName

Outputs

There are no output keys for this action.

Release SnapMirror

Description

This action releases replication on protection object passed as argument. No further

snapshots will be created and existing ones will be deleted.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme name

configured for the group from the

drop-down list.

Production

or DR

Protection

Scheme

Mandatory

NetApp Command

snapmirrorrelease $filerName:$qtreeName

Outputs

There are no output keys for this action.

Get Mount Path

Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 486

This action retrieves mount information from the NetApp protection object passed as

argument so that later OS level actions can use it without requiring access to the protection

object.

Input

Name

Description Input Key Name Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the

group from the drop-down

list.

Production or DR

Protection Scheme

Mandatory

Volume

Name

If the volume is different from

the one in the above

protection object, provide it

here in Advanced Properties

or in key value

VOLUME_NAME.

VOLUME_NAME Optional

Mount Path The mount path is taken from

the volume name or LUN path

in the protection object or

user can provide key

MOUNT_PATH.

MOUNT_PATH Optional

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key Name Description

Clone Name CLONE_NAME The name of the newly

created clone.

Clone Mount Path CLONE_MOUNT_PATH The mount pathas set in

parameters in the protection

object.

1. If the “LUN/QTree Path” is

not empty, it is used as mount

path. If it does not contain a

“/”, the mount path is taken

to be /vol/<Volume

Name>/<LUN/QTree Path>

2. If the “LUN/QTree Path” is

Configuration

487

Output Name Output Key Name Description

empty, the format

/vol/<Volume Name> is used

as mount path.

Storage IP STORAGE_IP The IP address of the

protection object’s

component.

Cifs Share CIFS_SHARE_NAME Cifs Share Name

Get Clone Mount Path

Description

Retrieves clone mount information from the NetApp protection object passed as argumentso

that later O.S. level actions can use it without requiring access to the protection object.

Input Name Description Input Key Name Optional/

Mandatory

Protection

Scheme Name

Select the protection

scheme name configured

for the group from the

drop-down list.

Production or DR

Protection Scheme

Mandatory

Volume Name If the volume is different

from the one in the above

protection object, provide it

here in Advanced

Properties or in key value

VOLUME_NAME.

VOLUME_NAME Optional

Clone Name The clone name has to be

provided by the RAL user

or set in key value

CLONE_NAME. It can also

be set by the Choose Clone

RAL action.

CLONE_NAME Optional

Clone Mount

Path

If mounting a clone volume

not belonging to the

protection object then the

user should provide the

CLONE_MOUNT_PATH Optional

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 488

Input Name Description Input Key Name Optional/

Mandatory

mount path with IP address

in Advanced Properties or

in key

CLONE_MOUNT_PATH.

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key Name Description

Storage IP STORAGE_IP The IP address of the

protection object’s

component.

Clone Mount Path CLONE_MOUNT_PATH The clone mount path as set

in parameters in the

protection object.

1. If the “LUN/QTree Path” is

not empty, it is used as clone

mount path. If it does not

contain a “/”, the clone mount

path is taken to be

/vol/<Clone

Name>/<LUN/QTree Path>

2. If the “LUN/QTree Path” is

empty, the format

/vol/<Clone Name> is used as

clone mount path.

Cifs Share CIFS_SHARE_NAME Cifs Share Name

CIFS Share Create

Description

This action creates a CIFS share on the netapp filer.

Configuration

489

Inputs

Input

Name

Description Input Key Name Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the

group from the drop-down

list.

Production or DR

Protection Scheme

Mandatory

Mount

Path

If mounting a volume not

belonging to the protection

object then the user should

provide the mount path with

IP address in Advanced

Properties or in key

MOUNT_PATH. If volume to

mount belongs to the

protection object, leave this

parameter blank and the

“LUN/Qtree Path” parameter

of the protection object is

used. If this parameter is also

not set, the mount path is

constructed from the “Volume

Name” parameter using the

format “/vol/<Volume

Name>”.

MOUNT_PATH Optional

Share

Name

CIFS share name CIFS_SHARE_NAME Optional

NetApp Command

cifs shares –add $ShareName $Path

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key Name Description

Cifs Share CIFS_SHARE_NAME Cifs Share Name

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 490

CIFS Share Delete

Description

This action deletes a CIFS share on the netapp filer.

Inputs

Input

Name

Description Input Key Name Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the

group from the drop-down

list.

Production or DR

Protection Scheme Mandatory

Share

Name

CIFS share name CIFS_SHARE_NAME Optional

NetApp Command

cifs shares –delete $ShareName

Outputs

There are no output keys for this action.

Clone CIFS Share Create

Description

This action creates a CIFS share on the netapp filer based on clone.

Inputs

Input

Name Description Input Key Name Optional/

Mandatory

Protection

Scheme

Name

Select the protection

scheme name configured

for the group from the

drop-down list.

Production or DR

Protection Scheme

Mandatory

Clone

Mount

If mounting a volume not

belonging to the protection

object then the user should

CLONE_MOUNT_PATH Optional

Configuration

491

Input

Name

Description Input Key Name Optional/

Mandatory

Path provide the mount path

with IP address or he can

provide the same in key

MOUNT_PATH. If volume to

mount belongs to the

protection object, leave this

parameter blank and the

“LUN/Qtree Path”

parameter of the protection

object is used. If this

parameter is also not set,

the mount path is

constructed from the

“Volume Name” parameter

using the format

“/vol/<Volume Name>”.

Share

Name

CIFS share name CIFS_SHARE_NAME Optional

NetApp Command

cifs shares –add $ShareName $Path

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key Name Description

Cifs Share CIFS_SHARE_NAME Cifs Share Name

Clone CIFS Share Delete

Description

This action deletes a CIFS share on the netapp filer based on clone.

Inputs

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 492

Input

Name

Description Input Key Name Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the

group from the drop-down

list.

Production or DR

Protection Scheme

Mandatory

Share

Name

CIFS share name CIFS_SHARE_NAME Optional

NetApp Command

cifs shares –delete $ShareName

Outputs

There are no output keys for this action.

Mount Junction Path

Description

This is used to mount volume on another volume with a junction-path.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the group

from the drop-down list.

Production or

DR Protection

Scheme

Mandatory

Volume

Name

If the volume is different from

the one in the above protection

object, provide it here in

Advanced Properties or in key

value VOLUME_NAME.

VOLUME_NAME Optional

Junction

Path

This specifies the junction path

of the mounted volume. The

junction path name is case

JUNCTION_PATH Mandatory

Configuration

493

Input

Name

Description Input Key

Name

Optional/

Mandatory

insensitive and must be unique

within a Vserver's namespace.

NetApp Command

volume mount -vserver vs0 -volume user_tsmith -junction-path /user/tsmith

Outputs

There are no output keys for this action.

Unmount Junction Path

Description

This is used to unmount the junction path volume.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Protection

Scheme

Name

Select the protection scheme

name configured for the group

from the drop-down list.

Production or

DR Protection

Scheme

Mandatory

Volume

Name

If the volume is different from the

one in the above protection

object, provide it here in

Advanced Properties or in key

value VOLUME_NAME.

VOLUME_NAME Optional

NetApp Command

volume unmount -vserver vs0 -volume vol2

Outputs

There are no output keys for this action.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 494

Create LUN Clone

Description

This action creates a new LUN Clone that is a clone of LUN. The LUN clone name has to be

provided by the RAL user or set in key value CLONE_NAME.

Inputs

Input Name Description Input Key Name Optional/

Mandatory

Protection

Scheme Name

Select the protection

scheme name

configured for the

group from the drop-

down list.

Production or DR

Protection Scheme

Mandatory

Volume Name If the volume is

different from the one

in the above

protection object,

provide it here in

Advanced Properties

or in key value

VOLUME_NAME.

VOL_NAME Optional

Lun path(s) If the clone’s parent

volume does not

belong to the

protection object and

the clone was chosen

during workflow

execution by the

“Choose Clone” RAL

action then the user

should provide the full

LUN path or he can

provide key

MOUNT_PATH. If clone

parent volume belongs

to the protection

object then the action

will build the LUN path

from the volume

name.

MOUNT_PATH Optional

Configuration

495

Input Name Description Input Key Name Optional/

Mandatory

Clone Name(s) The clone name has to

be provided by the

RAL user or set in key

value CLONE_NAME. It

can also be set by the

Choose Clone RAL

action.

CLONE_NAME Optional

NetApp Command

volume file clone create -volume $volumeName -source-path /myfile -destination-

path /myfile_copy

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key Name Description

Clone Name CLONE_NAME The name of the newly

created clone.

Clone Mount Path CLONE_MOUNT_PATH The mount path for the

created clone.The mount path

is constructed from the “Clone

Name” parameter using the

format “/vol/<Clone Name>”.

Delete LUN Clone

Description

This action deletes a LUN Clone that is a clone of LUN.

Inputs

Input

Name

Description Input Key Name Optional/

Mandator

y

Protection

Scheme

Name

Select the protection

scheme name configured

for the group from the

Production or DR

Protection Scheme

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 496

Input

Name

Description Input Key Name Optional/

Mandator

y

drop-down list.

Clone

LUN Path

If clone already existed

and its parent volume

does not belong to the

protection object and the

clone was chosen during

workflow execution by

the “Choose Clone” RAL

action then the user

should provide the full

clone LUN path or he can

provide key

CLONE_MOUNT_PATH. If

clone parent volume

belongs to the protection

object then the action

will build the clone LUN

path from protection

object.

CLONE_MOUNT_P

ATH

Optional

NetApp Command

volume file clone autodelete /vol/volume1/lun_clone -enable true -vserver vs1

Outputs

There are no output keys for this action.

PFR

PFR Operation

The PFR insertible action, displayed as PFR Operation in IBM Resiliency Orchestration,

provides flexibility to add customized PFR actions in the workflows. This action is applicable

only for generic (non-concrete) solution templates.

To configure the PFR Operation action, first add it in the workflow using Insert tab and

configure it using Properties tab. Perform the following steps in the Advanced tab in the

Action Properties section.

1. Select PFR Operation action in the workflow.

2. Click the Advanced tab.

3. From the Operation Type drop-down list, select the desired operation type.

Configuration

497

4. Based on one of the following options, you select different fields displayed to fill the

information.

▪ CREATE FILESET

CREATE FILESET - Creates the fileset for replication.

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select CREATE FILESET,

from the drop-down list.

Operation On Not Applicable Select the appropriate server

or service on which you want

to run this action.

Note:

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Enable Replication Not Applicable Select this check box to

enable the replication.

Source Host Not Applicable Select the appropriate host

from which you want to

replicate the fileset, from the

drop-down list.

Most of the time, this field is

dynamically filled by IBM

Resiliency Orchestration

based on the settings you

have specified at the time of

Group creation.

These dynamic options are

Current Production

Component and Current DR

Component.

Target Host Not Applicable Select the appropriate host

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 498

UI Input Input Key Name Description

to which you want to

replicate the fileset, from the

drop-down list.

Most of the time, this field is

dynamically filled by IBM

Resiliency Orchestration

based on the settings you

have specified at the time of

Group creation.

These dynamic options are

Current Production

Component and Current DR

Component.

Replication State Not Applicable Select the replication state

from the drop-down list.

The Options are ENABLED,

and DISABLED.

Replication Interval Not Applicable Enter the desired value in

seconds.

Source Dir/File Not Applicable

Enter the directory or file

from which you want to

replicate.

Target Dir/File Not Applicable

Enter the directory or file to

which you want to replicate

the data.

▪ Click Add.

▪ Click Remove, if you want to discard the Source and Target Directory/ File path

you have mapped and configure it afresh.

▪ Click Advanced Configuration to filter the replication configuration.

Note:

The Advanced Configuration is applicable for only CREATE FILESET, MODIFY FILESET, and

TRANSFER FILESET.

The Advanced Configuration is NOT applicable for DELETE FILESET, STOP FILESET, START

FILESET, and REPLICATE FILESET

Configuration

499

Advanced Configuration:

UI Input Input

Key

Name

Description

Symbolic link

option

Not

Applicable

Select the appropriate symbolic option.

The options are:

▪ Do not

replicate symbolic link: If the file

is a symbolic link then skip it

during replication.

▪ Replicate

symbolic link only: Replicate only

this symbolic link file but not the

actual file it is pointing to. This is

the default behavior.

▪ Replicate

symbolic link and files: Replicate

this symbolic link file and the actual

file it is pointing to.

Symbolic links are specific to operating

system. For example, Windows does not

have symbolic links.

Filters

By default, all the files/folders from the source path will be replicated to

the targeted path. At times, not all the files/folders are required to be

replicated to the target path.

Filters are used to exclude/include specific file(s)/folders matching some

pattern or based on wild card.

Source Folder Not

Applicable

Enter the folder from which you want to

filter.

File/Folder

Name (or

wildcard):

Not

Applicable

Enter the file or folder name.

You can also enter the file or folder name

with wildcards using * or ?.

Filters Not

Applicable

Select any one of the following filter

option:

▪ Exclude -

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 500

UI Input Input

Key

Name

Description

This filter is used to exclude

specific files/folders from

replication.

▪ Include -

This filter is used to compulsorily

include specific files/folders to be

replicated.

Select Files, or Directories, or Both

option.

Select any or both the following wildcard

option:

▪ Case

Sensitive - It is used to specify

whether the wild card is case

sensitive or not. For example: If

the wild card is a*.log and case

sensitive is turned off then files

matching a*.LOG, A*.log, A*.LOG,

will also be filtered

▪ Recursive –

If it is not selected, then the filter

is applied only on files within the

source folder. If selected, the filter

is applied on all the files within the

source folder and its sub-folders.

Initial

Synchronization

Not

Applicable

Select any one of the following initial

synchronization type:

▪ Replicate

Files Created/Modified after

File<absolute filename & path>

- It is used to filter the files to be

replicated that are created or

modified after the specified file.

▪ Replicate

Files Created/Modified

afterTimestamp<date and

time> - It is used to filter the files

to be replicated that are created or

Configuration

501

UI Input Input

Key

Name

Description

modified after the specified date

and time.

▪ Avoid Full

Copy - It is used to replicate the

files that are created or modified

after the configuration of creating

fileset.

▪ None - No

initial synchronization, it replicate

all the files with the filtered

configuration.

This option is applicable only for CREATE

FILESET, and TRANSFER FILESET.

This option is not applicable for MODIFY

FILESET.

Sync delete

files

Automatically deletes files/folders on

target server when deleted on source

server. Note: The files/folders will be

deleted on target server only when it is

not part of exclusion list and fileset is

Enabled and PFR Service on target server

has sufficient privileges/permission for

deletion

Large File

Support

▪ Enable Large

File Support - Select this check box

to enable Large File Support for this

fileset.

▪ Size (MB) -

Enter the Large File Size value. The

default value is 1024 MB.

The Large File size cannot be less than the

bucket size. By default the Large File size

is set to 1024MB and bucket size to 100

MB.

If the user provides Large File size less

than bucket size, system will reset the

value to bucket size. For example, if Large

File size is set to say 5 MB, system will

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 502

UI Input Input

Key

Name

Description

reset to bucket size.

Click Add.

Description:

This action creates the Fileset for replication.

Outputs:

The fileset will be created on the configured service/host.

Error Codes:

None.

Pre-checks

▪ Source and Target IPs are valid and reachable. Recorded as Error if not valid or reachable.

▪ Read/Write/Modify/Delete permissions to directories/files. Permission to Read on source and

Write/Modify/Delete on target. Recorded as Error otherwise.

▪ Availability of free disk space on source and target . Recorded as Warning if target is less

than source. Recorded as Error if target is less than 80 percent of source.

▪ DELETE FILESET

DELETE FILESET - Deletes the fileset.

Inputs:

Description:

This action deletes the fileset you have created earlier.

Outputs:

Deletes the existing fileset.

Error Codes:

None.

Pre-checks

▪ Locate fileset. Recorded as Warning if fileset is unavailable.

▪ Files are not pending for replication. Recorded as Warning if files are pending.

▪ Fileset is in disabled state. Recorded as Warning if fileset is not in disabled state.

Configuration

503

▪ MODIFY FILESET

MODIFY FILESET - Modifies the fileset.

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select MODIFY FILESET, from the drop-

down list.

Operation On Not Applicable

Select the appropriate server or service on

which you want to run this action.

Note:

If the group is attached with more than one

pair of protection subsystem then do not

select "Current Production Service" or

"Current DR Service". Instead, select the

actual protection subsystem to configure

the operation.

Click Advanced Configuration to filter the replication configuration

UI Input Input

Key

Name

Description

Symbolic link

option

Not

Applicable

Select the appropriate symbolic option.

The options are:

▪ Do not

replicate symbolic link: If the file

is a symbolic link then skip it

during replication.

▪ Replicate

symbolic link only: Replicate only

this symbolic link file but not the

actual file it is pointing to. This is

the default behavior.

▪ Replicate

symbolic link and files: Replicate

this symbolic link file and the actual

file it is pointing to.

Symbolic links are specific to operating

system. For example, Windows does not

have symbolic links.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 504

UI Input Input

Key

Name

Description

Filters

By default, all the files/folders from the source path will be replicated to

the targeted path. At times, not all the files/folders are required to be

replicated to the target path.

Filters are used to exclude/include specific file(s)/folders matching some

pattern or based on wild card.

Source Folder Not

Applicable

Enter the folder from which you want to

filter.

File/Folder

Name (or

wildcard):

Not

Applicable

Enter the file or folder name.

You can also enter the file or folder name

with wildcards using * or ?.

Filters Not

Applicable

Select any one of the following filter

option:

▪ Exclude -

This filter is used to exclude

specific files/folders from

replication.

▪ Include -

This filter is used to compulsorily

include specific files/folders to be

replicated.

Select Files, or Directories, orBoth

option.

Select any or both the following wildcard

option:

▪ Case

Sensitive - It is used to specify

whether the wild card is case

sensitive or not. For example: If

the wild card is a*.log and case

sensitive is turned off then files

matching a*.LOG, A*.log, A*.LOG,

will also be filtered

▪ Recursive –

Configuration

505

UI Input Input

Key

Name

Description

If it is not selected, then the filter

is applied only on files within the

source folder. If selected, the filter

is applied on all the files within the

source folder and its sub-folders.

Initial

Synchronization

Not

Applicable

Select any one of the following initial

synchronization type:

▪ Replicate

Files Created/Modified after

File<absolute filename & path>

- It is used to filter the files to be

replicated that are created or

modified after the specified file.

▪ Replicate

Files Created/Modified

afterTimestamp<date and

time> - It is used to filter the files

to be replicated that are created or

modified after the specified date

and time.

▪ Avoid Full

Copy - It is used to replicate the

files that are created or modified

after the configuration of creating

fileset.

▪ None - No

initial synchronization, it replicate

all the files with the filtered

configuration.

This option is applicable only for CREATE

FILESET, and TRANSFER FILESET.

This option is not applicable for MODIFY

FILESET.

Sync delete

files

Automatically deletes files/folders on

target server when deleted on source

server. Note: The files/folders will be

deleted on target server only when it is

not part of exclusion list and fileset is

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 506

UI Input Input

Key

Name

Description

Enabled and PFR Service on target server

has sufficient privileges/permission for

deletion

Large File

Support

▪ Enable Large

File Support - Select this check

box to enable Large File Support for this

fileset.

▪ Size(MB) -

Enter the Large File Size value. The

default value is 1024 MB.

The Large File size cannot be less

than the bucket size. By default

the Large File size is set to

1024MB and bucket size to 100

MB.

If the user provides Large File size

less than bucket size, system will

reset the value to bucket size. For

example, if Large File size is set to

say 5 MB, system will reset to

bucket size.

Description:

This action modifies the fileset configuration details.

Outputs:

Modifies the existing fileset.

Error Codes:

None.

Pre-checks

▪ Locate fileset. Recorded as Error (Warning in some cases) if fileset is unavailable.

▪ Source and Target IPs are valid and reachable. Recorded as Error if not valid or reachable.

▪ Files are not pending for replication. Recorded as Warning if files are pending.

Configuration

507

▪ Read/Write/Modify/Delete permissions to directories/files. Permission to Read on source

and Write/Modify/Delete on target. Recorded as Error otherwise.

▪ Availability of free disk space on source and target. Recorded as Warning if target is

less than source. Recorded as Error if target is less than 80 percent of source.

▪ STOP FILESET

STOP FILESET - Stops the fileset.

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select STOP FILESET, from

the drop-down list.

Operation On Not Applicable Select the appropriate server

or service on which you want

to run this action.

Note:

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Description:

This action stops the ongoing replication of the specified fileset, if it is enabled.

Outputs:

Stops the replication of the fileset.

Error Codes:

None.

Pre-checks

▪ Fileset is valid. Recorded as Warning if fileset is not valid.

▪ Fileset is enabled. Recorded as Warning if fileset is not enabled.

▪ START FILESET

START FILESET - Starts the fileset.

Inputs:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 508

UI Input Input Key Name Description

Operation Type Not Applicable Select START FILESET,

from the drop-down list.

Operation On Not Applicable Select the appropriate server

or service on which you want

to run this action.

Note:

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Description:

This action starts the replication of the fileset.

Outputs:

Starts the replication of the fileset.

Error Codes:

None.

Pre-checks

▪ Locate fileset. Recorded as Error if fileset is unavailable.

▪ Fileset is disabled. Recorded as Warning if fileset is not disabled.

▪ REPLICATE FILESET

REPLICATE FILESET - Starts the replication of pending files

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select REPLICATE

FILESET, from the drop-

down list.

Operation On Not Applicable Select the appropriate server

or service on which you want

to run this action.

Note:

Configuration

509

UI Input Input Key Name Description

If the group is attached with

more than one pair of

protection subsystem then

do not select "Current

Production Service" or

"Current DR Service".

Instead, select the actual

protection subsystem to

configure the operation.

Description:

This action starts the replication of pending files immediately without waiting for the regular

replication interval to happen.

Note:

If the fileset is in disabled state, this action will enable it before synchronizing and disable it

after synchronization.

Outputs:

Starts the replication and synchronizes the fileset.

Error Codes:

None.

Pre-checks

▪ Locate fileset. Recorded as Error if fileset is unavailable.

▪ TRANSFER FILESET

TRANSFER FILESET - Transfers a fileset temporarily.

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select Transfer FILESET, from the

drop-down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 510

UI Input Input Key Name Description

Source Host

Not Applicable Select the appropriate host from

which you want to transfer the

fileset, from the

drop-down list.

Most of the time, this field is

dynamically filled by IBM Resiliency

Orchestration based

on the settings you have specified

at the time of Group creation.

These dynamic options are Current

Production Component and Current

DR Component.

Target Host Not Applicable Select the appropriate host to

which you want to transfer the

fileset, from the drop-down

list.

Most of the time, this field is

dynamically filled by IBM Resiliency

Orchestration based

on the settings you have specified

at the time of Group creation.

These dynamic options are Current

Production Component and Current

DR Component.

Source Dir/File

Not Applicable

Enter the directory or file from

which you want to transfer.

Target Dir/File Not Applicable

Enter the directory or file to which

you want to transfer the data.

Configuration

511

Click Advanced Configuration to filter the replication configuration

UI Input Input Key Name Description

Symbolic link option

Not Applicable

Select the appropriate symbolic

option.

The options are:

Do not replicate symbolic link: If

the file is a symbolic link then skip

it during replication.

Replicate symbolic link only:

Replicate only this symbolic link file

but not the actual file it is pointing

to. This is the default behavior.

Replicate symbolic link and files:

Replicate this symbolic link file and

the actual file it is pointing to.

Symbolic links are specific to

operating system. For example,

Windows does not have symbolic

links.

Filters

By default, all the files/folders from the source path will be replicated to the

targeted path. At times, not all the files/folders are required to be replicated

to the target path.

Filters are used to exclude/include specific file(s)/folders matching some pattern

or based on wild card.

Source Folder

Not Applicable

Enter the folder from which you

want to filter.

File/Folder Name (or

wildcard):

Not Applicable

Enter the file or folder name.

You can also enter the file or folder

name with wildcards using * or ?.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 512

UI Input Input Key Name Description

Filters

Not Applicable

Select any one of the following

filter option:

Exclude - This filter is used to

exclude specific files/folders from

replication.

Include - This filter is used to

compulsorily include specific

files/folders to be

replicated.

Select Files, or Directories, orBoth

option.

Select any or both the following

wildcard option:

Case Sensitive - It is used to

specify whether the wild card is

case sensitive or

not. For example: If the wild card

is a*.log and case sensitive is

turned off then

files matching a*.LOG, A*.log,

A*.LOG, will also be filtered

Recursive – If it is not selected,

then the filter is applied only on

files within

the source folder. If selected, the

filter is applied on all the files

within the

source folder and its sub-folders.

Initial Synchronization

Not Applicable

Select any one of the following

initial synchronization type:

Replicate Files Created/Modified

after File<absolute filename &

path> - It is used to filter the files

to be replicated that are created or

modified after the specified file.

Replicate Files Created/Modified

afterTimestamp<date and time> -

Configuration

513

UI Input Input Key Name Description

It is used to filter the files to be

replicated that are created or

modified after the specified date

and time.

Avoid Full Copy - It is used to

replicate the files that are created

or modified

after the configuration of creating

fileset.

None - No initial synchronization, it

replicate all the files with the

filtered configuration.

This option is applicable only for

CREATE FILESET, and TRANSFER

FILESET.

This option is not applicable for

MODIFY FILESET.

Sync delete files

Automatically deletes files/folders

on target server when deleted on

source server.

Note: The files/folders will be

deleted on target server only when

it is not part of exclusion list and

fileset is Enabled and PFR Service

on target server has sufficient

privileges/permission for deletion

Large File Support

Enable Large File Support - Select

this check box to enable Large File

Support for this fileset.

Size(MB) - Enter the Large File Size

value. The default value is 1024

MB.

The Large File size cannot be less

than the bucket size. By default the

Large File

size is set to 1024MB and bucket

size to 100 MB. If the user

provides Large File

size less than bucket size, system

will reset the value to bucket size.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 514

UI Input Input Key Name Description

For example,

if Large File size is set to say 5 MB,

system will reset to bucket size.

Click Add.

Click Remove, if you want to discard the Source and Target Directory/ File path you

have mapped and configure it afresh.

Description:

This action is used for replicating limited set of file(s) from one server to another

server. This action would not be of periodic nature as that of replication.

Outputs:

Replicate file(s) from source machine to target machine.

Error Codes:

If the replication fails due to network, permissions, IO etc., corresponding error

message is displayed.

Note

If the dummy protection schema (eg. PFRAgent-XXX) that is generated during a workflow,

remains after BPI completion due to network failure, you have to manually delete

them from Discover > Protection Schema and PFR GUI respectively.

Pre-checks

Locate fileset. Recorded as Error if fileset is unavailable

▪ REPLICATE FILESET ONCE

REPLICATE FILESET ONCE - Starts the replication cycle

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select REPLICATE FILESET ONCE,

from the drop-down list.

Configuration

515

UI Input Input Key Name Description

Operation On

Not Applicable

Select the appropriate server or

service on which you want to run

this action.

Note:

If the group is attached with more

than one pair of protection

subsystem then do not select

"Current Production Service" or

"Current DR Service". Instead,

select the actual protection

subsystem to configure the

operation.

Description:

This action starts the replication cycle and waits until the replication is finished.

Outputs:

Makes sure that one pass of replication is completed.

Error Codes:

None.

Pre-checks

Locate fileset. Recorded as Error if fileset is unavailable.

▪ ROLE SWITCH FILESET

ROLE SWITCH FILESET - This operation switches the roles of fileset.

Inputs:

UI Input Input Key Name Description

Operation Type Not Applicable Select ROLE SWITCH FILESET from

the drop-down list.

Operation On

Not Applicable

Select the appropriate server or

service on which you want to run

this action.

Description:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 516

This operation switches the roles of fileset. Before performing this operation, fileset should be

in the DISABLED state.

Outputs:

Switches the roles of fileset.

Pre-checks

Locate fileset. Recorded as Error if fileset is unavailable.

Fileset is valid. Record as Warning if fileset is not valid.

Fileset is disabled. Recorded as Warning if fileset is not disabled.

5. From the Operation On drop-down list, select the desired operation to be performed.

The Operation On drop-down list shows only the attached protection schemes by

default.

6. To view all the PFR protection schemes check Show All box. Clicking on Show All, all

the PFR protection schemes that are discovered on the “Server Components” that are

dependent on the dataset(s) of the group will be shown.

Note:

PFR Operation action does not take the directories from the datasets directly. You

need to specify the directories manually that you want protect. You must make sure

that you are specifying the right directories.

Unlike the concrete solution templates, generic solution based PFR Operation action

works on only one protection scheme at a time.

Replication

Choose Replication volume

Choose Replication Volume - Chooses Replication volume to operate on for further actions.

Description:

This action gets user a list of Replication Volume for the configured group. User can choose

one of the Replication Volume for further actions. This gives user flexibility during test

exercise or failover to choose Replication Volume that is more recent or consistent.

Configuration Options: Advanced properties provide following options.

▪ Choose at runtime

Configuration

517

When this is set at configuration time, action pops-up a user input window with a list of

Replication volume for user to choose one.

▪ Choose default RPO PIT Copy

Action will take the current RPO PIT Copy configured for the group.

▪ Choose default FO PIT Copy

Action will take the current FO PIT Copy configured for the group.

▪ List of discovered Replication volume that is included in the group

configuration

List shows all the available replication volume configured for the group. User can

choose one of it and it will be considered as chosen replication volume while action

executes.

Inputs:

UI Input Input Key Name Description

Option Type REPL_CHOOSE_RV_SVC_TYPE Select the replication

volume type from the drop-

down list.

The options are:

▪ ChooseAtRunTime

▪ DefaultRPOCopy

▪ DefaultFOCopy

▪ DiscoveredService

This field is mandatory.

RV Name REPL_CHOOSE_RV_OPER_ON Select the RV name from the

list.

If Option type is

‘DiscoveredService’, select

the name of Protection

service object.

This field is optional.

Outputs:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 518

Output

Name

Output Key Name Description

Protection

Service

name

PANREPL_CHOOSE_REPL_VOL_SERVICE_NAME Protection

Service

name of the

chosen

Replication

volume.

Replication

Volume

details

PANREPL_CHOOSE_REPL_VOL_DETAILS

Replication

Volume

details.

Volume

Group

Details

PANREPL_CHOOSE_VOL_DETAILS Volume

group

details like

mount point

information.

Error Codes:

None

IBM Internal (This is not for field use.)

Generate Raw Files

Not for field use.

Description

This action generates the RAW file from data file and offset file. It is used mainly in the

VMware solution.

Inputs

Input Key Name Input Type Optional/

Mandatory

COMPONENT_NAME Provide discovered component name Mandatory

COMPONENT_TYPE Provide component type Optional (By

default, STATIC)

DATA_PATH_LOCATION Absolute Data File directory location Mandatory

Configuration

519

Input Key Name Input Type Optional/

Mandatory

OFFSET_FILE_PATH Absolute Offset File location Mandatory

RAW_FILE_SIZE RAW file size in MB(vmware's VM

size)

Mandatory

RAW_FILE_PATH Absolute RAW filepath location Mandatory

Output

Output Name Output Key Name Description

raw file path RAW_FILE_PATH Created/Updated RAW

filepath location

Notes:

▪ Supports multiple RAW file generation. All inputs can be given comma separation.

▪ Data files should be present in DATA_FILE_LOCATION based on the offset's file.

▪ Only Linux local/remote agent is supported to execute RAL.

Generate Changed Data Files

Not for field use.

Description

This action generates the data files and offset files for the VM based on change ID.

Pre-requisite:

VM must have the Operating System in it and CBT must be enabled.

Inputs

Input Key Name Input Type Optional/

Mandatory

PANVC_MGMT_SVC_NAME Provide discovered vcenter

management service name in

IBM Resiliency Orchestration

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 520

Input Key Name Input Type Optional/

Mandatory

PANVC_DC_NAME Provide datacenter name Mandatory

PANVC_VM_NAME Provide Virtual Machine name Mandatory

PANVC_VMDK_PATH Provide VM's VMDK path.

Multiple paths can be comma

separated

Mandatory

PANVC_VM_SNAPSHOT_ID Provide snapshot ID Mandatory

PANVC_REPLICATION_APPLIANCE Provide the discovered Linux

component name as replication

appliances where the CBT is

running.

Mandatory

PANVC_DATA_PATH Provide data/offset directory.

Eg: /opt/CBT. Data and offset

file are generated under

/opt/CBT/VMName/VMDKName.

Generated Offset file name will

be offset.txt

Mandatory

Output

Output

Name

Output Key Name Description

PANVC_CHNAGED_DATA_INFO [vmdkpath]:[changeid]:[data

output path]

OracleAppendEntriesTopfile

Not for field use.

Input:

Dataset Name should be given as the input which has to be updated in the pfile with DG

config.

▪ pfile name should <sidname>.ora

Result: Based on PR/DR machines the following configuration will be appended to the pfile.

Configuration

521

For PR machine:

*.db_unique_name='<dbSID>PR'

*.log_archive_config='dg_config=(<dbSID>PR,<dbSID>DR)'

*.fal_client='<dbSID>PR'

*.fal_server='<dbSID>DR'

*.log_archive_dest_2='SERVICE=<dbSID>DR LGWR ASYNC

VALID_FOR=(ONLINE_LOGFILES,PRIMARY_ROLE)

DB_UNIQUE_NAME=<dbSID>DR'

For DR machine:

*.db_unique_name='<dbSID>DR'

*.log_archive_config='dg_config=(<dbSID>DR,<dbSID>PR)'

*.fal_client='<dbSID>DR'

*.fal_server='<dbSID>PR'

*.log_archive_dest_2='SERVICE=<dbSID>PR LGWR ASYNC

VALID_FOR=(ONLINE_LOGFILES,PRIMARY_ROLE) DB_UNIQUE_NAME=<dbSID>PR'

Before appending DG entries to Pfile it will take the backup of the pfile and spfile.

NOTE:

▪ Before appending it will create the backup file in the same folder with the name

<sidname>.ora_ <sidname>.ora_bkp for pfile and spfile backup will be created in

ORACLE_HOME/dbs folder as spfile<sidname>.ora_ <sidname>.ora_bkp

▪ KV PANORA_PROVISIONING_PR_DATASET as pr datasetname and RAL description

should have production.

▪ KV PANORA_PROVISIONING_DR_DATASET as dr datasetname and RAL description

should have secondary.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 522

▪ If you want to append PR entries to a Pfile in PR then Pfile path need to be specified

KV as PANORA_PR_PFILE_PATH else it will create in

$HOME/oradata/<dbname>/fulldump/<dbname> path and in DR default it creates in

/oradata/config/ folder

▪ only for PR we can specify path in KV to create PFILE

▪ If we want to execute the RAL at Primary then mention 'production' in WAAS Context

in the RAL description or select from advance properties in group context.

▪ If we want to execute the RAL at DR then mention 'secondary' in WAAS Context in

RAL description or select from advance properties in group context.

OracleAppendEntriesToTNSFile

Not for field use.

Input: Dataset Name should be give as input in which we want to update the tnsnames.ora

with DG config.

DryRun:

tnsnames.ora file should exist at the path $ORACLE_HOME/network/admin/ in PR and at path

/oradata/config on DR on Linux machines

NOTE:

▪ If the file exists in both the places then Ral will detect the file at this path

/oradata/config.

▪ If the file does not exist in above mentioned two paths then error will be

displayed in DryRun report.

Result:

<dbSID>PR =

(DESCRIPTION =

(ADDRESS = (PROTOCOL = TCP)(HOST = <PR_IP>)(PORT = <port>))

(CONNECT_DATA =

(SERVER = DEDICATED)

(SERVICE_NAME = <dbSID>)

)

)

<dbSID>DR =

(DESCRIPTION =

(ADDRESS = (PROTOCOL = TCP)(HOST = <DR_IP>)(PORT = <port>))

Configuration

523

(CONNECT_DATA =

(SERVER = DEDICATED)

(SERVICE_NAME = <dbSID>)

NOTE:

▪ If the file exists in both the places then Ral will detect the file at this path

/oradata/config.

▪ Before appending it will create the backup file in the same folder with the name

tnsnames.ora_bkp.

▪ KV PANORA_PROVISIONING_PR_DATASET as pr datasetname.

▪ KV PANORA_PROVISIONING_DR_DATASET as dr datasetname.

▪ If we want to execute the RAL at Primary then the RAL description should mention

'production' in WAAS Context or we can select from advance properties in group

context.

▪ If we want to execute the RAL at DR then the RAL description should mention

'secondary' in WAAS Context or we can select from advance properties in group

context.

▪ If the file doesnot exist in the above mentioned two paths, then an error will displayed

in dryRun report.

OracleDBPreconfigurationOnAWS

Not for field use.

Input:

Dataset Name should be given as input in which we want to create directory structure for

provisioning directory same as DR dataset.

DryRun:

Check for free space in the machine to create directories.

This RAL works in two modes. If the user selects DBProvisioning from Advance Properties,

then the RAL does the below provisioning steps.

Set the ORACLE_HOME, ORACLE_UNQNAME, ORACLE_SID and export path to oracle home in

the .bash_profile.

sudo su – oracle ( login with oracle )and set the below

ORACLE_HOME=/u01/app/oracle/product/11.2.0/db1

ORACLE_BASE=/u01/app/oracle

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 524

ORACLE_SID=

PATH=$PATH:$ORACLE_HOME/bin/

export ORACLE_HOME ORACLE_SID ORACLE_BASE PATH

Assign privatekey to oracle user:

Create .ssh dir in the oracle user home and copy the authorized keys file from the ec2-user

home to the created directory and change the permission and give permission to oracle for

that file.

Chown oracle:oinstall .ssh/authorizedkeys

chmod 777 ssh/authorizedkeys

Create the directory structure in the attched volume (which is mounted on /oradata) as

shown below:

1.For the Archive log path and for taking fulldump

mkdir -p /oradata/< dbName >/fulldump/< dbName>/ archive

2. For the redo logfiles ctl files and db files

mkdir -p /oradata/< dbName >/data/< dbName >

3.For the all configuartion files like pwd , spfile, listener and tnsname files

mkdir -p /oradata/config

4. For the adump dpdump and pfile

mkdir -p /oradata/< dbName >/admin/< db_name >/adump

mkdir -p /oradata/< dbName >/admin/< db_name >/dpdump

mkdir -p /oradata/< dbName >/admin/< db_name >/pfile

Format the volume by below command

mkfs.ext4 /dev/xvdf

Mount the volume - mount /dev/xvdf /oradata

Give Oracle permission to the directory on which volume is mounted.

chown oracle:oinstall /oradata

If User selects SymbolicLink from Advance Properties, then RAL does below provisioning

steps. create softlinks as below:

Note:

create sofltlinks according to PR directory structure

1. For the dbf, ctl, redolog file

Configuration

525

ln -s /oradata/< dbName >/data $ORACLE_BASE/oradata

2. For the adump dpdump pfile

ln -s /oradata/< dbName >/admin/ $ORACLE_BASE/admin

3. For the archive and full dump

ln -s /oradata/< dbName >/fulldump/< dbName>/ /app/<db_name>(As In the PR )

4. For the configuration files(pwd,spfile,listner& tnsname.ora file)

a. a) ln -s /oradata/config/<pwd file name> / $ORACLE_HOME/dbs/<pwd file

name>

b. b) ln -s /oradata/config/<spfile name> /$ORACLE_HOME/dbs/< spfile name>

c. c) ln -s /oradata/config/<listener.ora> / $ORACLE_HOME/network/admin/<

listener.ora>

d. d) ln -s /oradata/config/<tnsname.ora>

$ORACLE_HOME/network/admin/<tnsnames.ora>

5. Path in which we have taken backup ctl and datafiles at PR

a) sudo ln -s /oradata/<dbname>/fulldump/<dbname> to

/home/oracle/oradata/<dbname>/fulldump/<dbname>(if KV for bkp is

not given)

b) sudo ln -s /oradata/<dbname>/fulldump/<dbname> to bkppath(if KV

for bkppath is given in kv)

KV

▪ PANORA_PROVISIONING_DR_DATASET as DR static dataset name

▪ PANORA_PROVISIONING_PR_DATASET as PR dataset name, as RAL needs to read PR

dataset ORACLE_HOME

▪ PANORA_EC2_ADVANCE_PROVISIONING as DBProvisioning or SymbolicLink.

▪ AWS_DEVICE as /dev/xvdf

OracleDBConfigFilesCreation

Not for field use.

CreateListenerFile RAL

Input:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 526

Select Dataset Name in which we want to create Oracle Static Listener. File at location

/oradata/config with SID entries (DB to be provisioned).

Select Control File to create: Select the file needed to be created (to create listener file,

select listener.ora)

DryRun: Check the basic dryRun and check the folder $HOME/oradata/config exists or not.

Result: Creates oracle Static Listener File (listener.ora )at location /oradata/config with SID

entries (DB to be provisioned).

Content of the file

SID_LIST_LISTENER =

(SID_LIST =

(SID_DESC =

(GLOBAL_DBNAME = ltdg)

(ORACLE_HOME = /u01/app/oracle/product/11.1.0/db_1)

(SID_NAME = ltdg)

)

)

LISTENER =

(DESCRIPTION_LIST =

(DESCRIPTION =

(ADDRESS = (PROTOCOL = TCP)(HOST = 172.168.1.60)(PORT = 1521))

(ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC1521))

)

)

NOTE:

▪ KV PANORA_PROVISIONING_DR_DATASET as DR static dataset name (If you want to

create listener file in DR machine)

▪ KV PANORA_PROVISIONING_PR_DATASET as PR static dataset name (If you want to

create listener file in PR machine)

▪ KV PANORA_CONFIG_FILE = LISTENER

CreateTnsnamesFile RAL

Input:

Dataset Name: Select Dataset name in which we wanted to create a oracle Static

tnsnames.ora. File at location /oradata/config with SID entries (DB to be provisioned).

Configuration

527

Select Control File to create: Select the file needed to be created (for creating tnsnames.ora

file select tnsnames.ora). DB to be provisioned.

DryRun: Check the basic dryRun and check the folder /oradata/config exists or not.

Result: Creates oracle Static tnsnames.ora File at location /oradata/config with SID entries

(DB to be provisioned).

Content of the file

LTDG =

(DESCRIPTION =

(ADDRESS = (PROTOCOL = TCP)(HOST = 172.168.1.60)(PORT = 1522))

(CONNECT_DATA =

(SERVER = DEDICATED)

(SERVICE_NAME = ltdg)

)

)

NOTE:

▪ KV PANORA_CONFIG_FILE = TNSNAMES.

▪ KV PANORA_PROVISIONING_DR_DATASET as DR static dataset name (If you want to

create tnsnames file in DR machine).

▪ KV PANORA_PROVISIONING_PR_DATASET as PR static dataset name (If you want to

create tnsnames file in PR machine).

CreatePfileFile RAL

Input:

Dataset Name: Select Dataset Name in which you want to create a oracle Static PFile File at

location /oradata/config with SID entries (DB to be provisioned).

Select Control File to create: Select the file need to be created (for creating PFile file select

PFile) (DB to be provisioned).

DryRun: Check the basic DryRun and check the folder /oradata/config exists or not.

Result: Creates oracle Static PFile File at location /oradata/config with SID entries with

name <sid>Init_stdby.ora(DB to be provisioned).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 528

Content of the file

ltdg.__db_cache_size=436207616

ltdg.__java_pool_size=16777216

ltdg.__large_pool_size=16777216

ltdg.__oracle_base='/u01/app/oracle'#ORACLE_BASE set from environment

ltdg.__pga_aggregate_target=318767104

ltdg.__sga_target=973078528

ltdg.__shared_io_pool_size=0

ltdg.__shared_pool_size=486539264

ltdg.__streams_pool_size=0

*.audit_file_dest='/u01/app/oracle/admin/ltdg/adump'

*.audit_trail='db'

*.compatible='11.1.0.0.0'

*.control_files='/u01/app/oracle/oradata/ltdg/control01.ctl',

'/u01/app/oracle/oradata/ltdg/control02.ctl','/u01

/app/oracle/oradata/ltdg/control03.ctl'

*.db_block_size=8192

*.db_domain=

*.db_name='ltdg'

Configuration

529

*.db_recovery_file_dest='/u01/app/oracle/flash_recovery_area'

*.db_recovery_file_dest_size=2147483648

*.db_unique_name='ltdg_DR'

*.diagnostic_dest='/u01/app/oracle'

*.dispatchers='(PROTOCOL=TCP) (SERVICE=ltdgXDB)'

*.fal_client='ltdg_DR'

*.fal_server='ltdg_PR'

*.local_listener='LISTENER_LTDG'

*.log_archive_dest_1='LOCATION=/app/ltdg/archive'

*.log_archive_dest_2='SERVICE=ltdg_PR LGWR ASYNC

VALID_FOR=(ONLINE_LOGFILES,PRIMARY_ROLE) DB_UNIQUE_NAME=ltdg_PR'

*.log_archive_dest_state_2='ENABLE'

*.log_archive_format='%t_%s_%r.dbf'

*.memory_target=1287651328

*.open_cursors=300

*.processes=150

*.remote_login_passwordfile='EXCLUSIVE'

*.undo_tablespace='UNDOTBS1'

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 530

NOTE:

▪ KV PANORA_CONFIG_FILE = PFILE.

▪ KV PANORA_PROVISIONING_DR_DATASET as DR static dataset name (If you want to

create pfile file in DR machine).

▪ KV PANORA_PROVISIONING_PR_DATASET as PR static dataset name (If you want to

create pfile file in PR machine).

▪ If you want to create a Pfile in PR then Pfile path need to be specified KV as

PANORA_PR_PFILE_PATH else it will create in

$HOME/oradata/<dbname>/fulldump/<dbname> path (path should have including

the pfilename eg:$HOME/oradata/<dbname>/fulldump/<dbname>/<SID.ora>)

▪ In DR, by default it creates in /oradata/config

OracleBackupDatabaseFileForAWS RAL

Not for field use.

Databasebackupfile RAL

Input:

Dataset Name should be give as input in which we want to take a backup of the database

and the database name.

DryRun: Check the database is available or not.

Result: Creates the backup file i.e. Data file at location /app/<SID_NAME>/

OPERATION:

Login rman target sys/password@instancename nocatalog msgno

backup database format =

'$HOME/oradata/"+oaco.SID+"/fulldump/"+oaco.SID+"/"+oaco.SID+"%d_%s_%t.data'

include current controlfile for standby;

NOTE:

▪ If KV is not given it will create the directory $HOME/oradata/<SID>/fulldump/<oaco>

and it creates the backup data files.

▪ If KV is provided then the file will be created in that path only.

▪ KV PANORA_BACKUP_DATABASE_FILE_PATH as path in which standby data file needs

to be created.

Configuration

531

▪ KV PANORA_PROVISIONING_PR_DATASET as PR static dataset name.

OracleCopyDBDataControlFileForAWS

Not for field use.

Input:

From Dataset Name and to Dataset Name should be give as input. (Works with SCP

Command).

DryRUN: Check the space to copy files.

Result: Copies all the data files, control files, pfile and password file to machine

copies the following files from one machine to another.

▪ datafile to the same location as on primary backup

e.g. /home/oracle/oradata/pocdg/fulldump/pocdg/*data to

[email protected]:/oradata/pocdg/fulldump/pocdg/ OR from backup path on

production to [email protected]:/oradata/pocdg/fulldump/pocdg/

(scp -i /tmp/oracleDGPOC.pem -o StrictHostKeyChecking=no -r

$HOME/oradata/pocdg/fulldump/pocdg/*

[email protected]:/oradata/pocdg/fulldump/pocdg/)

▪ controlfile to controlfile location of standby equal to number of control files on

primary.

e.g. /home/oracle/oradata/pocdg/fulldump/pocdg/*ctl to

[email protected]:/oradata/pocdg/fulldump/pocdg/

▪ spfile to $ORACLE_HOME/dbs folder on Unix.

e.g. /u01/app/oracle/product/11.2.0/db_1/dbs/spfilepocdg.ora to

[email protected]:/oradata/config/

▪ passwordfile to /oradata/config/ folder on Unix.

e.g. /u01/app/oracle/product/11.2.0/db_1/dbs/orapwpocdg to

[email protected]:/oradata/config/

▪ pfile to $ORACLE_HOME/dbs folder on unix.

e.g. /home/oracle/oradata/pocdg/fulldump/pocdg/*ora to

[email protected]:/oradata/config/

KV

▪ PANORA_PROVISIONING_PR_DATASET as PR static dataset name.

▪ PANORA_PROVISIONING_DR_DATASET as DR dataset name, as files to be copied to

DR EC2.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 532

OracleRestoreDatabaseFileForAWS

Not for field use.

RestoreDatabase RAL

Input:

Dataset Name should be give as input in which we want to restore database.

DryRun: Check the control file exists or not in the path.

Result: Restore datase.

OPERATION:

rman target sys/password@instancename nocatalog msgno

RMAN>restore controlfile from '<KVPATH>/<SID>_standby.ctl'; - if KV of the path is given,

this command gets executed.

RMAN>restore controlfile from

'$HOME/oradata/<SID>/fulldump/<SID>/<SID>_standby.ctl'; - if kv of the path is not given

then the command gets executed from directory /oradata/<SID>/fulldump/<SID>/

sqlplus "sys/password@instancename as sysdba"

alter database mount standby database;-mount databse in standby.

rman target sys/password@instancename nocatalog msgno

RMAN> RESTORE DATABASE; -Restores Databse.

NOTE:

▪ KV PANORA_RESTORE_CTL_FILE_PATH as the path of the control file to restore.

▪ KV PANORA_PROVISIONING_DR_DATASET as DR static dataset name.

▪ This Ral restores both control file and database file.

OracleRollbackProvisioningConfiguration

Not for field use.

This RAL has to fired on Production Dataset and this RAL will Delete/Revert the below content

of the file.

Configuration

533

1. Rollback of PFile : mv

$HOME/oradata/<dbname>/fulldump/<dbname>/<dbname>.ora_<dbname>_bkp

$HOME/oradata/<dbname>/fulldump/<dbname>/<dbname>.ora)

If Pfile is in (some other path specified throgh

wizard)<path>/<dbname>.ora_<dbname>_bkp <path>/<dbname>.ora

2. Rollback of SPFILE : mv $ORACLE_HOME/spfile<dbname>.ora_<dbname>_bkp

$ORACLE_HOME/spfile<dbname>.ora

3. Rollback of Tns file: (e.g. mv

/u01/app/oracle/product/11.2.0/db1/network/admin/tnsnames.ora_<dbname>_bkp

/u01/app/oracle/product/11.2.0/db1/network/admin/tnsnames.ora)

4. Data file and control file:

rm -rf $HOME/oradata/pocdg/fulldump/pocdg/*.data / rm -rf

/oradata/pocdg/fulldump/pocdg/*.ctl)

If Backup od data and control is in (some other path specified throgh wizard) rm -rf

<path>/*.data / rm -rf <path>/*.ctl)

NOTE:

▪ kv PANORA_PROVISIONING_PR_DATASET as PR static dataset name

OracleDBConfigFilesCreation-CreateSPfileFile

Not for field use.

Input:

Dataset Name: Should select Dataset Name. In which we want to create a Oracle Static

SPFile File at location /oradata/config with SID entries (DB to be provisioned).

Select Control File to create: Select the file that needs to be created (for creating SPFile file

select SPFile) (DB to be provisioned).

DryRun: Check the basic DryRun and check the folder /oradata/config exists or not.

Result: Creates Oracle Static SPFile File at location /oradata/config with SID entries with

name <sid>Init_stdby.ora(DB to be provisioned).

NOTE:

▪ KV PANORA_CONFIG_FILE = SPFILE

▪ KV PANORA_PROVISIONING_DR_DATASET as DR static dataset name (If you want to

create pfile file in DR machine)and description of RAL should have secondary.

▪ KV PANORA_PROVISIONING_PR_DATASET as PR static dataset name (If you want to

create pfile file in PR machine) and description of RAL should have production.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 534

▪ If you want to create a SPfile in PR and you want to specify the Pfile path then specify

KV as PANORA_PR_PFILE_PATH else it will take the Pfile path as

$HOME/oradata/<dbname>/fulldump/<dbname> path (if you specify the kv then

path should have including the pfilename

eg:$HOME/oradata/<dbname>/fulldump/<dbname>/<SID.ora>).

▪ In DR default pfile path takes from /oradata/config

▪ It will create a SPfile in the path $ORACLE_HOME/dbs

Setup AWS Security Group

Not for field use.

Description

This action validates the Security group on AWS using the App stack ID.

Inputs

Input Key

Name

Input Type Optional/

Mandatory

APP_STACK_ID Provide App stack ID Mandatory

Get Disk Changed Data

Not for field use.

Description

This action generates the data files and offset files for the VM based on changeID.

Inputs

Input Key Name Input Type Optional/

Mandatory

PANVC_MGMT_SVC_NAME Provide discovered vcenter

management service name in

IBM Resiliency Orchestration

Mandatory

PANVC_DC_NAME Provide datacenter name Mandatory

Configuration

535

Input Key Name Input Type Optional/

Mandatory

PANVC_VM_NAME Provide Virtual Machine name Mandatory

PANVC_VMDK_PATH Provide VM's VMDK path.

Multiple paths can be given

comma separated

Mandatory

PANVC_VM_SNAPSHOT_ID Provide snapshot ID Mandatory

PANVC_REPLICATION_APPLIANCE Provide the discovered Linux

component name as replication

appliances where the CBT is

running.

Mandatory

PANVC_DATA_PATH Provide data/offset directory.

Eg: /opt/CBT. Data and offset

file will be generated under

/opt/CBT/VMName/VMDKName.

Generated Offset file name will

be offset.txt

Mandatory

Output

▪ PANVC_CHNAGED_DATA_INFO=[vmdkpath]:[changeid]:[data output path]

Eg: PANVC_CHNAGED_DATA_INFO=[datastore1] Test_Gaurav/Test_Gaurav_1.vmdk:52 ec

ba cf 56 03 13 6b-:/data/datastore1_Test_Gaurav/Test_Gaurav_1

Note:

VM must have Operating System in it and CBT must be enabled.

Compress Data Folder

Not for field use.

DeCompress Data Folder

Not for field use.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 536

SetupAWSNetwork

Not for field use.

Workflow

Assignment Operation

Assign - Assigns the value of one key to another key.

Description:

This action supports assigning multiple parameters. This action can be used to assign the

value of a user defined parameter/ system generated parameter to another parameter. This

will assign the value of the right operand to the left operand only once. Further change in the

value of the right operand is not reflected in the left operand.

Both the participants (left operand and right operand) of the assignments should be

parameters. Literals and constants are not permissible.

Any number of operands-pairs can be added to a list of Added Expressions.

Note:

On executing the Dry Run for this operation, the Assignment Operation action is also

executed.

Inputs:

UI Input Input Key Name Description

Parameter

Name of Left

Operand in

assignment

PANSVR_EXPR_LEFT_OPERAND Enter the key name of the left operand

in assignment.

This field is mandatory.

Parameter

Name of

Right

Operand in

assignment

PANSVR_EXPR_RIGHT_OPERAND Enter the key name of the right

operand in assignment.

This field is mandatory.

Parameter

Name of the

Added

Expressions

in assignment

PANSVR_EXPR_OPERAND Adds the assigned keys

PANSVR_EXPR_LEFT_OPERAND and

PANSVR_EXPR_RIGHT_OPERAND into

a list.

Configuration

537

Outputs:

Assignment Operation returns a String value that contains the old value and new value of all

the Left operands in the Added Expressions’ list.

Error Codes:

None

Pre-checks

▪ Left operand input is provided.

▪ Right operand input is provided.

▪ Left and Right operand inputs are provided using Key Values.

▪ Left and Right operand inputs have no space.

Compare Operation

Compare - Compares the value of one key with another key.

Description

This action can be used to compare user defined/system generated parameters. This

compares the value of the right operand with the left operand.

Both the participants (left operand and right operand) in comparison should be parameters.

Literals and constants are not permissible.

Left operand and right operand can contain a string, an integer, or a date. Default value is

'string'. They must have the same data type.

Logical operations of '==' (EQUALS), '!='(NOT EQUALS), '<' (LESS THAN), '<=' (LESS THAN

OR EQUALS), '>' (GREATER THAN) and '>=' (GREATER THAN OR EQUALS) are supported.

Inputs:

UI Input Input Key Name Description

Parameter

Name of Left

Operand in

comparison

PANSVR_EXPR_LEFT_OPERAND Enter the key name of

the left operand in

assignment.

This field is mandatory.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 538

UI Input Input Key Name Description

Parameter

Name of Right

Operand in

comparison

PANSVR_EXPR_RIGHT_OPERAND Enter the key name of

the right operand in

assignment.

This field is mandatory.

Operator PANSVR_EXPR_OPERAND Select the operator

from the drop-down

list.

Available operators

are: ==,!=,<,<=,>,>

.

This field is mandatory.

Datatype PANSVR_EXPR_DATATYPE Select the data type

from the drop-down

list.

Available data types

are: string, int and

date.

This field is optional.

Outputs:

Output Name Output Key Name Description

Parameter

Name of Left

Operand in

assignment

PANSVR_EXPR_LEFT_OPERAND The output of this action

will be a boolean value -

'true' or 'false' based.

Error Codes:

None

Note:

Configuration

539

▪ XML/HTML/URL uses '<' and '>' as part of specifications and it has to be mapped to

'&lt;' and '&gt;' respectively.

▪ Logical expression evaluating to 'FALSE' will set the action result as 'FAILURE'.

▪ The date should be in MM-dd-yyyy HH:mm:ss format.

Pre-checks

▪ Left operand input is provided.

▪ Right operand input is provided.

▪ Left and Right operand inputs are provided using Key Values.

▪ Operator is selected.

▪ Datatype is selected.

▪ Left and Right operand inputs have no space.

Custom Action

Custom - Executes the command or script on the specified server.

Description:

This action allows you configure a command or script (scripts like TCL/ Shell) to be executed

on a specified server. If you select TCL, IBM Resiliency Orchestration will internally take care

of the TCL environment to run the TCL script.

Inputs:

To enter the Inputs in the Customs page:

1 From Workflow Editor, double click the Custom Action. A Custom page appears.

2 Select the Action properties tab, and enter the contents as mentioned in the table below.

UI Input Input Key Name Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 540

UI Input Input Key Name Description

Server/ Machine Name

CUSTOM_ACTION_COMPONENT

_NAME

CUSTOM_ACTION_COMPONENT

_TYPE

Select server (or) machine from the drop-down list box.

OR

Add the following in the Key Value pairs.

▪ If CUSTOM_ACTION_COMPONENT_TYPE is DYNAMIC then CUSTOM_ACTION_COMPONENT_NAME should be either Production Server or DR Server

▪ If CUSTOM_ACTION_COMPONENT_TYPE is STATIC then CUSTOM_ACTION_COMPONENT_NAME should be any discovered component name.

Note:

You can execute command/ script on your configured Primary or Remote server. If you always need to execute command/ script on your current Production Server select Production Server. Select DR Server, if you need your command/ script to execute always on your current DR server.

Type of Custom Action

Not Applicable Select the type of custom action you want to configure.

▪ Command

▪ Script

▪ IBM Resiliency Orchestration Integration TCL script - If selected component/ server is remotely managed, this script runs on Agent node.

Configuration

541

UI Input Input Key Name Description

Enable Sudo

▪ Sudo Username

Not Applicable Enable the Sudo checkbox to give the provision to execute a command or script as another user.

Enter the Target Username.

Note:

▪ Sudo does not support the following:

▪ accessing a file with the Password protection.

▪ TCL script execution.

▪ Sudo supports only for UNIX environment.

▪ Sudo feature is not supported for internal commands like CD, MKDIR etc.

Execute the command from path

Not Applicable This field is optional.

Enter the folder path where the command is to be executed.

Note:

▪ This field is applicable only for Command type option.

▪ This feature is not supported on Windows Remote Agent.

▪ If field is not specified, default directory will be {EAMSROOT}.

▪ This field should be OS specific. Example: In UNIX OS: /root and in Windows OS: E:\

Command/Script to be executed with absolute path

Not Applicable Enter the command/ script to be executed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 542

UI Input Input Key Name Description

View Script Not Applicable

On selection of Script option in the Custom type field, this button is available. Click this button to view the contents of the scripts which is entered in Command/ Script to be executed with absolute path field.

Log file path for custom script

Not Applicable Enter the log file path.

The User can provide the absolute path of the log file generated from custom scripts, system logs or event logs. The same log file can be tailed using tail log link in Workflow Recent Execution page.

Note:

▪ To use Tail log functionality, TAIL library must be installed in Unix/ Windows OS.

▪ Tail log feature of custom RAL will work only if component is selected from Action properties and not through KV pair.

Server where Command/ script should be located

Not Applicable

The value is fetched by the system automatically, which shows the name of the server/ component where script is located.

Timeout (Sec) Not Applicable

Enter the execution wait time in seconds.

The value '0' in this field defines indefinite wait. This is true for both Dry run and Actual execution.

Enable Dry Run

▪ Dry run execution type

▪ Dry run command path

Not Applicable Select the Dry run option to pre-check the connectivity, privileges and absolute path before the actual execution.

Click on any one option: Script or IBM Resiliency Orchestration integration TCL

script

Enter the path to run the script.

Outputs:

Configuration

543

Custom action does not return any value.

Error Codes:

None.

Note:

▪ If path or file name or arguments consists space, then provide the same within the

double quote.

▪ Example for path and file name: "/opt/test folder/script file.sh"

▪ Example for path and file name with arguments: "/opt/test folder/script

file.sh" "arg 1" "arg 2"

▪ DR Server is not available after Failover. So the user is advised not to select DR

Server in the Server/ Machine Name field for any custom action executed after

Failover.

▪ In HPUX and AIX: For Script and the Dry run to work, append #!/bin/ksh or

#!/bin/sh as the first line of the script.

Sudo Pre-Requisite:

▪ Sudo utility should be installed on the server and the environment should be present

in bash profile file.

▪ Comment/ remove Defaults requiretty in /etc/sudoers for Linux.

▪ For performing the Sudo operations, do the following steps based on the requirement:

Command Examples

To execute the file:

ADD: /../../Filename.sh

SudoUser ALL = (Owner) NOPASSWD:

/home/ali/keepitup.sh ##

To view the file contents:

ADD: /bin/cat /../../Filename.sh

SudoUser ALL = (Owner) NOPASSWD: /bin/cat

/home/ali/keepitup.sh ##

To fetch the permissions (Dry

Run):

ADD: /bin/ls -ld

/../../Filename.sh

SudoUser ALL = (Owner) NOPASSWD: /usr/bin/ls -

ld /home/ali/keepitup.sh ##

The above example states that, the user should log into the IBM Resiliency

Orchestration Server as SudoUSer and try to access /home/ali/keepitup.sh

impersonating as Owner, however without the password being asked by adding

NOPASSWD while appending.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 544

Dry Run

Dry run is an independent script that enforces rules, custom made by the user against the

script that does Dry run in general. Currently, custom action runs three types of scripts – bat

files, sh files and IBM Resiliency Orchestration integration Tcl scripts. Dry run feature is

available for all three types of scripts.

For Resiliency Orchestration integration Tcl scripts, these scripts need to implement special

methods that allows the framework to know that these scripts have implemented the dry-run

feature and thus they can be invoked in dry run mode. To achieve this, there is a

requirement to develop template tcl scripts and guide, so that these scripts can be developed

in standard way.

For sh/bat files, pre-check script would be separate script. There should be some naming

convention for the separate script for pre-checks. For example: If script name is

getArchiveLog.bat, then pre-check script name should be getArchiveLog_Precheck.bat.

Presence of this script is considered as support of dry run feature for that action and it is

invoked when dry run is called or during workflow execution.

Custom action dry run also need to pre-check that the configured script exists.

Pre-checks for

Command ▪ Connection with the given machine.

▪ User privileges to run the command on the machine.

▪ Command to be executed with absolute path.

▪ The command is located on the chosen component.

Pre-checks for

Script ▪ Connection with the given machine.

▪ User privileges to run the script on the machine.

▪ Script to be executed with absolute path.

▪ The script is located on the chosen component.

Configuration

545

Pre-checks for

Resiliency

Orchestration

Integration TCL

Script

▪ User privileges to run the script on the machine.

▪ Script to be executed with absolute path.

▪ If the selected component is managed remotely, then

the IBM Resiliency Orchestration Integration Tcl script

should be located on Agent Node.

Note:

When the same TCL file is used to execute Dry run and the actual execution,

'EXECUTE_DRY_RUN_MODE’ key should be used in the TCL script. The block (code) that has

'EXECUTE_DRY_RUN_MODE’ = 'TRUE’ will be executed for Dry run and the rest

('EXECUTE_DRY_RUN_MODE’ = 'FALSE’ ) will be executed for the actual execution.

Test Exercise Operation

Test Exercise Operation - starts/ stops a test exercise workflow.

Description :

This action can be used to start/ stop a Test exercise from another workflow. The start

operation works in two modes- Blocking and Non-Blocking. In blocking mode, the action

returns after the specified Test exercise has completed its execution. In non-blocking mode,

the action returns immediately after the specified Test exercise is started. The stop operation

works in two modes - Graceful or Forceful mode. In graceful mode, the action stops the

specified Test exercise only after the currently executing actions of the Test exercise is

completed. In forceful mode, the specified Test exercise is aborted immediately.

Inputs:

UI Input Input Key Name Description

Group Name PANSVR_WORKFLOW_GROUP Select the group name from the

drop-down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 546

UI Input Input Key Name Description

This field is mandatory.

Test Name PANSVR_WORKFLOW_NAME Select the test exercise name

from the drop-down list.

This field is mandatory.

Operation this

action

performs

PANSVR_WORKFLOW_OPERATION Select an operation to perform.

The available options are:

▪ Start execution of the

selected Test and wait for

it to complete before

continuing execution of

this workflow.

▪ Start execution of the

selected Test and continue

to execute this workflow.

▪ Abort the selected Test.

▪ Stop the selected Test

only after the current

executing action in the

selected Business Process

completes.

Outputs:

None

Note:

▪ The test exercise should be existent at run-time.

▪ The test exercise should be running to stop the execution.

▪ The test exercise should not be running to start the execution.

▪ The output of the executed test exercise will be available under the triggered test

exercise.

Pre-checks

Configuration

547

▪ The test exercise is available at run-time.

▪ The test exercise is running to stop the execution.

▪ The test exercise is not running to start the execution.

BPI Operation

BPI Operation - starts/ stops a BPI workflow.

Description:

This action can be used to start/stop a BPI workflow from another

workflow. The start operation works in two modes - Blocking and Non-

Blocking. In blocking mode, the action returns after the specified BPI

workflow has completed its execution. In non-blocking mode, the action

returns immediately after the specified BPI is started. The stop operation

works in two modes - Graceful or Forceful mode. In graceful mode, the

action stops the specified BPI only after the currently executing actions of

the BPI is completed. In forceful mode, the specified BPI is aborted

immediately.

Inputs:

UI Input Input Key Name Description

Group Name PANSVR_WORKFLOW_

GROUP

Select the group name from the

drop-down list.

This field is mandatory.

Business Process

Name

PANSVR_WORKFLOW_

NAME

Select an business process name

from the drop-down list.

This field is mandatory.

Operation this

action performs

PANSVR_WORKFLOW_

OPERATION

Select an operation to perform.

The available options are:

▪ Start execution of the

selected Business Process

and wait for it to

complete before

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 548

UI Input Input Key Name Description

continuing execution of

this workflow.

▪ Start execution of the

selected Business Process

and continue to execute

this workflow.

▪ Abort the selected

Business Process.

▪ Stop the selected

Business Process only

after the current

executing action in the

selected Business Process

completes.

Outputs:

None

Note

▪ The BPI workflow should be existent at run-time.

▪ The workflow should be running to stop the execution.

▪ The workflow should not be running to start the execution.

▪ The output of the executed BPI will be available under the triggered BPI workflow.

Pre-checks

▪ A group should exist.

▪ BPI workflow is available for BPI operation.

▪ BPI workflow is running to perform stop operation.

▪ BPI workflow is not running to start the execution.

▪ File/Folders has sufficient permissions to execute the BPI.

Find Pattern

Configuration

549

Fine Pattern - Checks whether a particular pattern is available in the specified string.

Description:

This action checks whether a particular pattern is available in the specified string. This can be

used to parse the output of the execution of a command/script and verify whether the

command/script started the application successfully or not.

Inputs:

UI Input Input Key Name Description

Component

Name Not Applicable Select the

component from the

drop-down list.

Pattern to

search PANOS_SEARCH_PATTERN Enter the pattern to

search in the

content.

This field is

mandatory.

Content PANOS_SEARCH_CONTENT Enter the path to

content where you

want to search for

the pattern.

This field is

mandatory.

Outputs:

Output

Name

Output Key Name Description

Pattern

Found

PANOS_SEARCH_CONTENT_RESULT The output of

this action will

be a boolean

value - 'true'

or 'false'

based.

True if the

pattern is

found, else

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 550

Output

Name

Output Key Name Description

false

Error Codes:

Error Code Description

PAN-CGEN-0002 Invalid component

name.

Pre-checks

▪ Values are configured.

Group Lock

Group Lock - Creates lock on Group.

Description:

This action creates lock on Group. If one group wants to lock to perform certain actions, first

the group acquires a lock. After completing the actions, the group releases the lock.

Inputs:

UI Input Input Key Name Description

Dont use lock Not Applicable Select this option if you do not want

to use the lock.

This field is mandatory.

Acquire lock Not Applicable Select this option to acquire a lock.

This field is mandatory.

Release lock Not Applicable Select this option to release the lock.

This field is mandatory.

Configuration

551

Outputs:

Group Lock action does not return any value.

Error Codes:

None

Group Site Health Check RAL

This is added in Workflow category, this is used to show the status of the group (active,

inactive and degraded) based on Primary or Secondary site.

Listing Action

Listing - Lists the configured procedure in step by step and one at a time.

Description:

This action lists the configured procedure in step by step and one at a time. User can

provide the key whose value will be substituted during execution.

For example, ‘Server Boot up’ is procedure containing various ‘steps’ to be done sequentially.

During execution, each ‘step’ is shown on the window and waits for user input. Upon

successful completion of the step, the next step will be shown . This activity is carried out for

all the steps in the listing action.

Inputs:

UI Input Input Key

Name

Description

Procedure Name Not Applicable Enter the procedure name.

The procedure should be

configured before adding in the

listing.

Title Not Applicable Enter the title for every step.

For better understanding you

are advised to enter the Group

name while configuring the

action.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 552

UI Input Input Key

Name

Description

Description Not Applicable Enter more information for

every step.

Outputs:

Listing action does not return any value.

Error Codes:

None

Pre-checks

None

Rescan Disk

The Rescan RAL action is a Windows O.S. action that scans all attached disks for disk

configuration changes. Rescanning disks can take several minutes, depending on the number

of hardware devices installed.

Notification Action

Description:

This action notifies a group of users in the Notification list and/or Email list by sending

emails.

Inputs:

UI Input Input Key Name Description

Select

Notification List

Not Applicable User can select multiple

notification list for whom the

message has to be sent.

If no notification lists are

configured in the IBM Resiliency

Orchestration system then "No

Notification List available for

selection" will be shown. In such

case, the user has to configure

Configuration

553

UI Input Input Key Name Description

"Send Email to" to whom the

message has to be sent.

Send Email to PANSRV_NOTIFY_EMAIL_IDS Enter the email address of the

notification recipient.

Max. of 2048 chars are allowed.

The user cannot type beyond

2048 chars.

You can provide multiple email-ids

separated by comma. The email-

ids should be in the form of

[email protected].

To receive notifications as SMS,

specify Mobile Email Id in the

Email field. It is recommended to

keep the message short when

specifying Mobile Email Id.

Subject to be

sent

Not Applicable Enter the subject for the

notification.

The default subject is "IBM

Resiliency Orchestration

Notification".

The subject should be alpha-

numeric characters without single

quotes ('), double quotes ('') and

escape character sequence.

Max. of 255 chars are allowed.

The user cannot type beyond 255

chars.

This field is mandatory.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 554

UI Input Input Key Name Description

Message to be

sent

Not Applicable Enter the message for the

notification.

Max of 2048 chars are allowed.

The message should be alpha-

numeric characters without single

quotes ('), double quotes ('') and

escape character sequence.

This field is mandatory.

Outputs:

Notification action does not return any value.

Error Codes:

None

Note:

"Atleast Notification List or Email should be configured" message will be displayed to the user

if atleast one of them is not configured.

Pre-checks

▪ Email server is configured with proper values.

▪ Notification List is created and user(s) assigned to it.

▪ Valid email id is created.

▪ Email server connection.

Trigger BCO

Description:

This action triggers the Business Continuity Operation.

Configuration

555

Inputs:

UI Input Input Key Name Description

Group Name Not Applicable Select the Group Name

from the drop-down

list.

Select the trigger Not Applicable Select the trigger to be

performed on the

selected Group, from

the drop-down list.

Outputs:

Trigger BCO action does not return any value.

Error Codes:

Error Code Description

PAN-SBCM-3502 Operation is under execution or is already

executed.

Pre-checks for Initiate NormalFullCopy

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start the NormalFullCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/DR database modes.

▪ Group is in Manage mode.

Pre-checks for Stop NormalFullCopy

▪ Login credentials.

▪ Database credentials.

▪ User privileges to stop the NormalFullCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 556

▪ PR/ DR database modes.

▪ Group is in Manage mode.

▪ NormalFullCopy is running.

Pre-checks for Initiate NormalCopy

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start the NormalCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ NormalFullCopy is completed and continuity state is Normal Inactive.

Pre-checks for Stop NormalCopy

▪ Login credentials.

▪ Database credentials.

▪ User privileges to stop the NormalCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ NormalFullCopy is completed and continuity state is Normal Inactive.

▪ NormalCopy is running.

Pre-checks for Initiate Failover

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start Failover.

Configuration

557

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode and continuity state is Normal Inactive.

Pre-checks for Stop Failover

▪ Login credentials.

▪ Database credentials.

▪ User privileges to stop Failover.

▪ User permission to access the folder.

▪ Files and folders are created in PR/DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode and continuity state is Normal Inactive.

▪ Failover is running.

Pre-checks for Initiate Fallback

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start Fallback.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Failover operation is completed and continuity state is Failover Active.

Pre-checks for Stop Fallback

▪ Login credentials.

▪ Database credentials.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 558

▪ User privileges to stop Fallback.

▪ User permission to access the folder.

▪ Files and folders are created in PR/DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Failover operation is completed and continuity state is Failover Active.

▪ Fallback is running.

Pre-checks for Initiate FallbackResync

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start FallbackResync.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Fallback operation is completed and continuity state is Fallback Active.

Pre-checks for Stop FallbackResync

▪ Login credentials.

▪ Database credentials.

▪ User privileges to stop FallbackResync.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Fallback operation is completed and continuity state is Fallback Active.

Configuration

559

▪ FallbackResync is running.

Pre-checks for Change Continuity State

▪ Component, Dataset, Protection Scheme and Recovery Group are created.

▪ Group is in Manage mode.

Pre-checks for Resume Continuity Operation

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start/ stop NormalCopy and ReverseNormalCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Continuity state is Normal Inactive.

▪ NormalCopy/ ReverseNormalCopy is in suspended mode.

Pre-checks for Move to Maintenance Mode

▪ Component, Dataset, Protection Scheme and Functional Group are created.

▪ Group is in Manage mode.

Pre-checks for Move to Manage Mode

▪ Component, Dataset, Protection Scheme and Functional Group are created.

▪ Group is in Maintenance mode.

Pre-checks for Initiate ReverseNormalCopy

▪ Login credentials.

▪ Database credentials.

▪ User privileges to start ReverseNormalCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 560

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Switchover is completed and continuity state is Switchover Inactive.

Pre-checks for Stop ReverseNormalCopy

▪ Login credentials.

▪ Database credentials.

▪ User privileges to stop ReverseNormalCopy.

▪ User permission to access the folder.

▪ Files and folders are created in PR/ DR.

▪ PR/ DR database modes.

▪ Component, Dataset and Protection Scheme are created and all are in Active state.

▪ Group is in Manage mode.

▪ Switchover is completed and continuity state is Switchover Inactive.

▪ ReverseNormalCopy is running.

Expect RAL

Description:

Currently DR process/drills involve logging into router/switch and run commands to change

configuration which is generally menu driven and/or interactive. Interactive operations can

be automated with this RAL where inputs are required to continue step by step.

Inputs:

UI Input Description

Server/Machine

Name

Select the server to spawn from the list of host Servers

discovered. User can choose "Production Server" or "DR

Server" for dynamic selection of the host.

Configuration

561

UI Input Description

Spawn Either ssh or command can be selected. These options are

explained below.

1. SSH : Select this option to ssh to a device (like router or

switch or another server). Upon selection the following inputs

will be provided.

▪ Timeout

▪ Device/ Server

▪ UserName

▪ Password

2. Script/ Command : Select this option to execute a

command/ script (like ftp etc). Upon selection the following

inputs will be provided.

▪ Timeout

▪ Command

Note:

The Timeout field is Mandatory and the Port field is

mandatory if type is ssh.

Expect/Send If expect/ send options are already configured then the user

can

▪ add/ insert by clicking on icon.

▪ delete by clicking on icon.

The following options will be shown during add/insert of

expect/ send steps.

a. Expect: When expect radio button is chosen, the user

will be able to provide the text to expect.

b. Send: When send radio button is chosen, the user will

be able to provide the text to send. If the text needs to be

encrypted, then select "encrypt send" checkbox.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 562

Note:

▪ The Server/Machine being selected should be a Unix machine and not Windows

machine.

▪ Certain commands (eg. ftp) do not work when configured for command/ script

execution.

Pre-checks for SSH

▪ Login/ command details are not mandatory.

▪ Port 22 is assigned for ssh on target.

▪ Login credentials for SSH.

▪ For the last step, exit command is added or not.

Pre-checks for Script/ Command

▪ Command passed is available on the selected Agent_Node or host (Example: Telnet

client is not installed in RHEL 6, by default).

▪ Port 23 is assigned for command on target.

▪ Login/ command details are not mandatory.

▪ Verify Login Credentials given from the added input from expect/send to see whether

we are able to login or not.

▪ For the last step, exit command is added or not.

Mount Volume

Description

This action mounts the volume given in mount path at the mount point.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Component

Name

Select the component name from

the drop-down list.

Production or

DR Server

Mandatory

Mount Path If mounting a volume not belonging

to the protection object then the

user should provide the mount path

with IP address or he can provide

the same in key MOUNT_PATH. If

MOUNT_PATH Optional

Configuration

563

Input

Name

Description Input Key

Name

Optional/

Mandatory

volume to mount belongs to the

protection object, leave this

parameter blank and the

“LUN/Qtree Path” parameter of the

protection object is used. If this

parameter is also not set, the

mount path is constructed from the

“Volume Name” parameter using

the format “/vol/<Volume Name>”.

Mount

Point

The server directory where the

mount path Lun has to be

mounted.

MOUNT_POINT Mandatory

Outputs

This action returns key values that can be used by later actions.

Output Name Output Key

Name

Description

Mount Point MOUNT_POINT The server directory where the

volume has being mounted.

Unmount Volume

Description

This action unmounts the volume given in mount path at the mount point.

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Component

Name

Select the component name from the

drop-down list.

PR or DR

Server

Mandatory

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 564

Input

Name

Description Input Key

Name

Optional/

Mandatory

Mount Point The server directory from where the

mount path volume has to be

unmounted.

MOUNT_POINT Mandatory

Outputs

There are no output keys for this action.

Mount Clone Volume

Description

This action mounts the volume given in clone mount path at the mount point.

Inputs

Input

Name

Description Input Key Name Optional/

Mandatory

Component

Name

Select the component

name from the drop-down

list.

Production or DR Server Mandatory

Mount Path The user should provide

the clone mount path with

IP address. He can provide

the same in key

CLONE_MOUNT_PATH.

CLONE_MOUNT_PATH Optional

Mount Point The server directory where

the mount path has to be

mounted.

MOUNT_POINT Mandatory

Outputs

There are no output keys for this action.

Unmount Clone Volume

Description

This action unmounts the volume given in clone mount path at the mount point.

Configuration

565

Inputs

Input

Name

Description Input Key

Name

Optional/

Mandatory

Component

Name

Select the component name from

the drop-down list.

Production or

DR Server

Mandatory

Mount Path The server directory from where the

mount path volume has to be un

mounted.

MOUNT_PATH Mandatory

Outputs

There are no output keys for this action.

Get Volume Size

Description

This action identifies the size of the volume.

Inputs

Input Name Description Input Key Name Optional/

Mandatory

Component

Name

Select the component name

from the drop-down list.

Production or DR

Server

Mandatory

Volume Path The path in which the volume

is configured

VOLUME_PATH Mandatory

Outputs

This action returns the size of the volume.

Output Name Output Key

Name

Description

Volume Path VOLUME_PATH The size of the volume.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 566

Trigger Site Level Drill

Description

This RAL triggers a drill of multiple groups of one site in a sequence.

Inputs

Input

Name

Description Key Values

Recovery

Group

Names

Recovery Group Names separated

by comma (,)

RG_NAMES

Drill Name The name of the drill, for example,

Switchover or Switchback, which

user needs to trigger.

DRILL_NAME

Outputs

The following are outputs for this action:

a. On success, it displays Successfully Triggered <Drill name> for the groups - <Group

Names>

b. On failure, it displays Failed to trigger <Drill name> for the groups and the reason

Configuration

567

Trigger Site Level FO

Description

This RAL triggers a drill of multiple groups of one site in a sequence.

Inputs

Input

Name

Description Key Values

Recovery

Group

Names

Recovery Group Names separated

by comma (,)

RG_NAMES

Outputs

The following are outputs for this action:

a. On success, the action displays Successfully Triggered Failover for the groups -

<Group Names>

b. On failure, the action displays Failed to trigger Failover for the groups and the reason

This RAL fetches values from

the Zerto Protection Schema

configuration.

Displays Session id as KV-

ZERTO_SESSION_ID

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 568

Zerto

Zerto Logon

Description

This RAL provides the session id, which will be used to perform all other operations.

Inputs Output

This RAL fetches values from

the Zerto Protection Schema

configuration.

Displays Session id as KV-

ZERTO_SESSION_ID

Zerto Logoff

Description

This RAL kills the current active session.

Inputs Output

This RAL fetches values from

the Zerto Protection Schema

configuration.

N/A

Zerto Change Recovery Host

Description

This RAL changes the recovery host of selected VPG/VM to the new host. The PS and Bat

scripts should be copied in the location C:\scripts\Zerto in ZVM server.

Inputs Output

VM_NAME, NEW_TGT_HOST,

and CUR_TGT_HOST

It is a synchronous call. Displays error

if it fails, otherwise displays the success

message.

Note

AgentNode should be configured for this RAL in advanced properties as Component.

Configuration

569

Zerto Delete VRA

Description

This RAL deletes the VRA based on the VRA IP provided as KV.

Input Output

VRA_IP Returns success when VRA is deleted.

Zerto Failover

Description

This RAL triggers the failover over the VPG.

Inputs Output

This RAL fetches values from

the Zerto Protection Schema

configuration.

Returns success when failover is

completed successfully.

Zerto Failover Test

Description

This RAL triggers the failover test on a VPG.

Inputs Output

This RAL fetches values from

the Zerto Protection Schema

configuration.

Returns success when FOTE (Failover

Test Exercise) is completed.

Zerto Force Sync VPG

Description

This RAL will sync VPG (not certified/tested).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 570

Inputs Output

This RAL fetches values from

the Zerto Protection Schema

configuration.

The sync status is displayed when the

sync is complete. If sync fails, it

displays the error message.

Zerto Launch New VRA

Description

This RAL launches new VRA on a new host (ESX).

Inputs Output

The following are the inputs:

▪ SITE_NAME: This

defines the ESX host

site name where user

needs to launch VRA.

▪ DS_NAME: This

defines the Datastore

name where user

needs to launch VRA.

▪ GROUP_NAME: This defines the ESX groups name (typically it is the by default name).

▪ HOST_NAME: This defines the ESX IP address or hostname.

▪ HOST_ROOT_PWD: This

defines the ESX host

root password.

▪ MEMORY_IN_GB:

This defines the

memory for VRA in

GB.

▪ NETWORK_NAME: This

This displays the Zerto task id as KV - ZERTO_TASK_ID

Configuration

571

defines the name of the network.

▪ DEF_GATEWAY: This

defines the default

gateway for the

network.

▪ SUBNET_MASK: This

defines the subnet mask

to identify the host.

▪ VRA_IP: This defines the IP address, which can be assigned to VRA.

▪ VRA_IP_CONFIG: This defines the type of IP configuration

required (Static or

Dynamic).

Zerto Resume VPG

Description

This RAL resumes the replication of VPG. This is not certified/tested.

Inputs Output

This RAL fetches values from

the Zerto Protection Schema

configuration.

Displays the error message if

replication fails. Otherwise, the success

message is displayed.

Zerto Unprotect VPG

Description

This RAL deletes the VPG. This is not certified/tested.

Inputs Output

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 572

This RAL fetches values from

the Zerto Protection Scheme

configuration.

Displays the error message if the delete action fails. Otherwise, the success message is displayed.

Zerto Wait for Task Complete

Description

This RAL waits till the task is complete and displays error if the task fails.

Input Output

ZERTO_TASK_ID Displays the success message if the task is successfully completed. Otherwise, displays the failure message.

Zerto Is VPG Exist

Description

This RAL confirms whether VPG Exists.

Inputs Output

ZVM IP, ZVM API PORT, ZVM

CLI PORT, VPG NAME Confirms whether VPG Exists.

Zerto Create VPG Settings

Description

This RAL creates new VPG settings for particular VPG.

Input Output

Fetches corresponding

protection schema details

from Zerto.

On success, it displays VPG settings id

for

VPG - <vpgname> is <vpsettingsid>

Configuration

573

Note

AgentNode should be configured for this RAL in advanced properties as Component.

Zerto Delete VPG

Description

This RAL deletes the Zerto VPG.

Input Output

Fetches corresponding

protection schema details

from Zerto.

The following are outputs:

a. On success, it displays

Successfully deleted <VPGName>

b. On failure, it displays Failed to

delete <VPGNAME>

Low Touch Oracle DG

Supported Features

We support

▪ Linux Platform RHEL 6.0 and above

▪ Oracle version 11.2.0.4.0 Enterprise Edition

▪ Provisioning workflow is provided only for remote agents

▪ By default, AMI is supported from the AWS Marketplace, AMI Id:ami-c0b429a8

https://aws.amazon.com/marketplace/pp/B00J8VRSNY/ref=srh_res_product_title?ie=UTF8&

sr=0-2&qid=1439972392422

The user can find the details of the AMI in the above provided link.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 574

Overview

The group creation of Oracle DG solution for Cloud/AWS through Low touch Wizards which

simplifies the Oracle DG group creation in RaaS environment follows a few assumptions

which are given below.

▪ This document describes about the group creation of Oracle DG solution through Low

touch Wizards

▪ Oracle Database should be available on the Production site.

▪ Management service should be discovered from IBM Resiliency Orchestration GUI

before initiating Low Touch wizard.

▪ This wizard supports for Linux server 6.0 and above and the database on Oracle

11.2.0.4.0 only.

Prerequisites

The prerequisites for proceeding with the Low Touch wizard are

Configuration Steps: These are set-up/configuration required at IBM Resiliency

Orchestration side before proceeding with the Low Touch Oracle Dataguard provisioning.

▪ Discovering AWS service

Click Discover> Management services> Add management service

Enter the following details to create a new management service

Field Description

Site Select a site from the drop-down list

Configuration

575

Management

Service Type

Select a management service type from the

drop-down list

Management

Service Name

Enter the management service name

Agent Node

Component

Select the agent node component from the

drop-down list

Aws Access Id Enter the Aws access id

Aws Secret Key Enter the AWS Secret key

Click Test Credentials to validate the

information

Click Cancel to cancel the action.

Or

Click Save to create a new management service.

Low Touch Wizard - Primary Server

The low touch wizard is mainly for provisioning the Oracle DB and DG on AWS.

The low touch wizard which simplifies the Oracle DG group creation in RaaS environment

follows a few assumptions and prerequisites.

1 Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2 Click Oracle Recovery with Dataguard on AWS button on the right side of the page.

The Oracle Recovery to AWS Wizard page appears.

▪ Primary Server- Checks for test credentials and creates a Primary Component

▪ Primary Database -Validates the database availability and its credentials. Also

validates the space required to take backup and backup folder permissions.

▪ AWS Information- Provides the details of AWS to Provision DR on AWS with Oracle DB

and DG

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 576

Enter the following details in the fields

Field Description

Type By default,the operating system is Linux.

Server Site Select the Server site from the drop-down list

IP Address

Enter the IP address

Server Managed

Remotely

Select the check box if it is remotely managed

or uncheck it for local agents

Oracle User Name Enter the Oracle user name

Port No. (SSH) Enter the Port no.

Password Enter the Password

Click on Test Credentials to confirm the

entered details

Configuration

577

Field Description

Assign to

Organisation

Select from the drop-down list

3 Click Cancel to cancel the action. It will cancel the action and delete the PR component.

OR

4 Click Next to go to the Primary Database page.

On clicking Next, the test credentials for username and password is checked and then the

primary server component is created.

The right side of the pane displays the three tabs. The highlighted tab indicates the current

tab to enter information by user.

Note:

If you move away from the wizard or close the browser, then a manual cleanup of subsystem

is required.

Primary Database

The Primary database checks the credentials and validates the backup path and available

space.

The Primary Database page is shown below.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 578

Enter the following details in the fields

Field Description

Listener Name Select Listener from the drop-down list

SID Displays the database SID

IP Address on Which

Oracle Listens

Enter the IP address

Port on Which

Oracle Listens Enter the Port no.

Database User

Name

Enter the Database User name

Password Enter the Password.

Click Test Credentials to confirm the entered

details

Backup path for DB Provide the backup path for the DB

Click Quit to cancel the action or click Next to move to the AWS information page.

On clicking Next we check the test credentials, space validation for backup path and also the

primary database.

To view the previous information, click the Prev Info located on the top right corner of the

page.

The following information is displayed by mousing over the list.

Field Description

Configuration

579

Primary Server Type Displays the Primary Server Type

Primary Server Site Displays the Primary Server Site name

Primary Server IP Displays the Primary Server IP address

Primary Server

Name

Displays the Primary Server name

Primary Server Port Displays the Primary server Port no.

Primary Server User Displays the Primary Server User name

Note:

If you move away from the wizard or close the browser, then a manual cleanup of subsystem

is required.

AWS Information

The AWS information page provides details of AWS for provisioning DR on AWS with Oracle

DB and DG such as Subnet ID, AWS Instance type and AWS Instance Name etc.

The AWS Information page is shown below.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 580

Enter the following details in the fields

Field Description

DR Site Select the DR Site from the drop-down list

Management

Service

Select the management Service from the drop

- down list

Region Select the Region from the drop-down list

VPC Select the VPC from the drop-down list. This is

dependent on the region

Subnet ID Select the Subnet ID from the drop-down list.

The Subnet ID is dependent on the VPC

Image/AMI ID Select the Image ID from the drop -down list.

AWS Instance Type Select the AWS Instance Type from the drop-

down list.

Configuration

581

Field Description

AWS Instance Name Enter the AWS Instance name

Security Group ID Select the Security Group ID from the

dropdown list. This is dependent on the

Subnet ID

Key Pair Select the keypair from the drop-down list

Upload the Keypair

file

Browse the keypair file and upload

Click Quit to cancel the action. It will cancel the action and delete the PR dataset and the PR

component.

OR

click Provision to start the Provision workflow of a DB and DG.

The workflow will execute Oracle DB/DG provisioning and also create a Oracle DG Group.

On clicking Provision the Workflow Execution page is displayed.

On mousing over the Prev Info the details of the Primary Server and Primary Database is

displayed in a drop-down box.

Field Description

Primary Server Type Displays the Primary Server Type

Primary Server Site Displays the Primary Server Site name

Primary Server IP Displays the Primary Server IP address

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 582

Field Description

Primary Server

Name

Displays the Primary Server name

Primary Server Port Displays the Primary server Port no.

Primary Server User Displays the Primary Server User name

Primary Database

Name

Displays the Primary Database Name

Primary SID Name Displays the Primary SID name

IP Address on which

Primary Oracle

Listens

Displays the IP address

Primary Oracle DB

Port

Displays the Primary Oracle DB Port no.

Primary Oracle DB

User

Displays the Oracle DB User name

Note:

If you move away from the wizard or close the browser, then a manual cleanup of subsystem

is required.

On clicking the See details tab, you are directed to the AWS Marketplace web page.

Low Touch Execution workflow

On clicking Provision, the Waas Execution page is displayed.

Configuration

583

The WaaS Execution page provides the following information about the workflow

Field Description

Version Displays the provisioning workflow version

Start Time Displays the time when the execution has

started

Time Elapsed Displays the elapsed time during execution

Execution Status Displays information about the number of

steps of the workflow that have been executed

and the remaining steps that need to be

executed.

The WaaS Execution page displays the following information

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 584

Field Description

Action Displays the name of the action

Time Initiated Displays the time when the execution has

been initiated

Time Elapsed Displays the elapsed time during execution

Status There can be three status namely:

▪ awaiting inputs

▪ Not Executed

▪ Executed

Note:

▪ Click Key Value Pairs to view the Key values configured for this

Workflow.

▪ Click Abort to stop workflow execution. The Reason to Abort pop-up

appears, enter the reason and click on Reason to Abort.On clicking

Quit, it quits the provisioning workflow and starts the execution of

rollback workflow.The rollback workflow will rollback the executed steps

in the provisioning workflow.

▪ Click Export to CSV to export the workflow details to .CSV file format.

▪ On successful completion of WaaS workflow, Oracle DB with DG group

is created.

▪ Go to Discovery> Groups > Recovery Group page to verify that the

group is created.

Configuration

585

Configuration

Configuring RPO/ RTO

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To configure RPO and RTO values for a Group, do the following:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group tab, the Recovery Group Listing page appears.

3. Click the required group from the GROUP NAME column. The Group Details Page

appears.

4. Click the Group Configuration tab.

5. Click the RPO/ RTO tab. This page allows you to configure the RPO/ RTO details of the

RG.

Configure the RPO/ RTO by providing following information:

Field Description

Desired RPO Enter the RPO goal for the application.

Note:

This field is mandatory and accepts numerals. The

value is entered either in seconds, minutes or hours

and maximum value that can be entered is calculated

for a month (i.e. maximum value for seconds is 24

(hours in a day)*60*60*30 (per month)).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 586

Field Description

RPO compute

Interval

Enter the time interval at which the RPO is computed

by the system automatically.

It is recommended that you have RPO compute

interval value less than or equal to“Apply Log

Interval” (as specified in the NormalCopy operation of

the respective DR Solution supported). The RPO value

is computed at an interval of not less than 5 minutes.

Note:

This field is mandatory and accepts numerals. The

value is entered either in seconds, minutes or hours

and the maximum value that can be entered is

calculated for a month (i.e. maximum value for

seconds is 24 (hours in a day)*60*60*30 (per

month)).

The value should always be greater than zero.

This value differs according to the DR Solution type.

RPO deviation

Threshold

Enter the RPO deviation value from the desired value

by which an alert and an event is to be raised.

Note:

When RPO deviation percentage is greater than the

configured value, an event is raised.

The properties of RTO are given below:

Desired RTO Enter the RTO goal for the application.

Note

This field is mandatory and accepts numerals. The value is

entered either in seconds, minutes or hours and maximum

value that can be entered is calculated for a month (i.e.

maximum value for seconds is 24 (hours in a day)*60*60*30

(per month)). Value should be always greater than zero.

Configuration

587

RTO deviation

Threshold

Enter the RTO deviation value from the desired value by which

an alert and an event is to be raised.

Note

Valid range of values is 1-99 only.

When RTO deviation percentage is greater than the configured

value, an event is raised.

Uses Block based

Replication

This field indicates that solution needs workflows for RTO

Computation. By default, it is not checked. If the replication

technology used for this group is block based, then user needs

to check this. Any configuration where there is a setup

requirement (like mounting volumes) before we can compute

RTO, user needs to check this field and configure the RTO

workflows. In such cases, a workflow is executed before and

after RTO computation logic (Depending on value of “Start

using RTO Computation Workflows” checkbox). For the

customer environment where there is no necessity to run RTO

workflow for computing RTO (For e.g. there is device provided

that is always mounted on DR side), then user can leave this

field unchecked. When checked, user gets option to configure

the RTO workflows and option to start using workflows.

Start using RTO

Computation

Workflows

Checkbox indicates if RTO workflows are configured and ready

to use. When checked, RTO workflows will be called before

and after the RTO Computation logic. When it is not checked,

then RTO calculation will use cached value of ETC (Expected

time to complete) of some of the action that needs RTO

workflows to be executed for ETC computation.

RTO computation is done at the same time when RPO is computed.

Configure the Data Lag Objective by providing following information:

Field Description

Desired Data Lag

Objective

Enter the Data Lag goal for the application.

Note

This field is mandatory and accepts numerals. The

value is entered either in KB/ MB/ number of files.

Data Lag deviation Enter the Data Lag deviation value from the

desired value by which an alert and an event is to

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 588

Field Description

Threshold be raised.

Note

When Data Lag deviation percentage is greater

than the configured value, an event is raised.

Note:

The minimum configurable value of RPO is 15 minutes.

Replication interval should be equal to or more than the dump log interval. Apply log

interval should be equal to or more than the replication interval. Configured RPO

should be more than dump log interval. Typically RPO should be double the dump

log interval.

6. Click SAVE to save the configured properties of RPO and RTO.

RTO Workflow Support

Some of the solutions that need RTO workflow support, additional fields, 'Uses Block

based Replication' and 'Start using RTO Computation Workflows' are shown, that user

needs to configure. These are shown for following solutions.

▪ For all log based Solutions and application subsystems with Block based replication

(like Hitachi Replication)

▪ DR Solution with Other Replicator

▪ DR Solution with Custom Replicator

User also needs to configure RTO workflows. Following are guidelines to configure the

RTO workflows.

1. We recommend user to use ‘no inform’ for all actions. This is required so that workflow

failure does not stop further execution of workflow during next RTO cycle. On failure, an

event is raised that can alert user about failures.

2. User should not use GroupLock RAL Action in RTO workflows.

3. Success of workflow is based on availability of key

‘PRE_RTO_STATUS’/’POST_RTO_STATUS’ with value of ‘SUCCESS’. If the key is not

available or available with some other value, it is considered as failure. User

implementing this workflow can insert an ‘Assignment Action’ at the end of success path

to indicate workflow is successful.

4. Whenever Pre/Post workflow fails, a WARNING event is raised (BCSMGR_RPORTO4). If the

event is not closed, then further failures of workflow would not raise BCSMGR_RPORTO4

event. Instead EVENTMGR02 is raised at regular interval.

5. PostRTO workflow is always executed if preRTO workflow is executed. This is irrespective

of success or failure of preRTO workflow.

Configuration

589

6. If pre RTO workflow fails, RTO would include cached value/default value for some of the

actions that are dependent on RTO workflows.

7. While computing RTO, some of the actions are going to returned cached value for ETC.

That means, these value would have collected at different timestamps. In such cases,

RTO as of time is shown to be timestamp of ETC computed having oldest compute

time. For e.g. If there are 2 actions in FO workflow, action1 has cached value collected at

time 10 AM, action2 has ETC computed at current time (lets say 10:30 AM), then ‘RTO as

of time’ value would be 10AM.

8. RTO workflows are ‘system workflows’ and would NOT be shown under ‘Workflowlist’ tab.

9. In reports page, these workflows are shown if ‘Show System Workflow’ checkbox is

checked.

In addition to the above configuration, RPO and RTO values are specific to solutions. These

specific values are configured depending on the type of the solution supported.

Configuring Notification Regarding Events

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To configure Notification regarding Events, perform the following:

1 Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2 Click Recovery Group tab, the Recovery Group Listing page appears.

3 Click the required group from the GROUP NAME column. The Group Details Page

appears.

4 Click the Group Configuration tab.

5 Click the Events tab.

Field Description

Event ID Displays the respective Event ID which

identifies each event.

Event Description Provides a brief description of the respective

event.

Event Severity Displays the level of severity of the respective

event.

Is _Alertable Events whose alertable field is true will be

displayed in the UI

Impact_GroupStatus Events whose Impact_GroupStatus field is

true, those events will impact the group

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 590

status health and continuity

Event Impact Provides information on affect/effects about

the event.

Notify Allows you to send notification regarding the

event to the user.

By default, SERIOUS and CRITICAL events are

notified.

6 Select the check boxes corresponding to the Events for which you want to notify the

user on occurrence of it.

Note:

To receive notification regarding the event, at least one notification list must be associated

with the group. For more information on creating notification list, refer to Adding

Notification List.

7 Click Update Selection button.

Configuring Event Policy

Events or Incidents occur as a consequence of a problem with Components, Datasets or

Protection Schemes. A Group is configured with all possible Events/Incidents depending up

on the solution type.

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

General Definitions:

Field Description

Event A casualty resulting in production data down.

An incident is an event with the highest

severity level (threat level).

Incident Consequences as a result of something

happened on an object.

To configure Events, perform the following:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click the Recovery Group tab, the Recovery Group Listing page appears.

Configuration

591

3. Click the required group from the GROUP NAME column. The Group Details page

appears.

4. Click the Group Configuration > Events tab.

This tabbed page lists the Event ID, it's description, severity and impact. You can select the

check boxes corresponding to the events for which you want to send notification to the user.

5. Click the Event ID link corresponding to the Event you want to configure. The Event

Configuration Details page is displayed providing information on the Event's

configuration along with the Policy Set Details as given below:

Field Description

Configuration for Event

Group Name Displays the Group name.

Event ID Displays the respective Event ID which

identifies each event.

Severity Displays the level of severity of the respective

event.

Is_ Alertable Events whose alertable is true will be displayed

in the UI

Description Provides a brief description of the respective

event.

Event Impact Provides information on affect/effects about the

event.

Impact_group

status

Displays the impact of the event on the group

status.

Notify

Update Selection

Select the checkbox to notify the updates

A Policy Set is defined as a combination of actions with respect to both day and night policy.

The Policy Set Details displays the following information:

Field Description

POLICY Displays the policy name

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 592

Field Description

Note:

There can be multiple instances of same Event

raised for a Group that require execution of

same policy. However, only one instance of a

policy can run at a time. In such cases, the

later instances of the event are put to FAILED

status.

For example, there are three instances of Event

E- E1, E2, and E3, raised for Group G, requiring

the execution of policy P. If P is being executed

for E1, its execution for E2 and E3 will be put

to FAILED status. Once the policy execution for

a Event is put to FAILED status, it cannot be

initiated again.

Instances of same event for different Group do

not affect each other.

TIME OF DAY Gives time of day when this policy will be

effective. (Currently, the time of day is always

24 hours). For example, the policy page shows

a timing gap of ’00:00 to 23:59’ hours, which

ultimately mean that the workflow, will get

executed when the incident occurs at any time

with in the given range of a day.

WORKFLOW NAME Displays the workflow name which is always

associated to the policy.

POLICY

EXECUTION MODE You can set this field to Manual or Auto.

Manual selection requires your intervention to

execute a policy.

6. Click workflow name link under WORKFLOW NAME column to configure the

workflow associated to the policy.

Adding Polar Event Script

This tool is used to manually add the polar cancellation to the events for which polar

cancellation is not implemented.

Configuration

593

The key features of this tool are:

▪ Group Status is based for events from 7.0 and we need to have polar cancellation for

all the events that are raised.

▪ For events which do not have polar cancellation add them manually.

The line of code to execute this tool in cancellation is:

EAMSROOT/bin/ AddPolarEventsMapping.sh

The typical output on execution of this code is :

./AddPolarEventsMapping.sh -e BCSSybaseLogEvent021 -c

BCSSybaseLogEvent014

configFile::: /opt/panaces/installconfig/PanacesAgent.cfg

logFileName::: AddPolarEventsMappingCLI

result::: null

level::: 7

eventName=BCSSybaseLogEvent021 polarEvent=BCSSybaseLogEvent014

Polar Mapping Added Successfully...

Note:

When BCSSybaseLogEvent014 is raised it will close BCSSybaseLogEvent021.

Site Ticker

To view the Site Ticker page information, perform the following steps:

1 Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Site Ticker and click Go to Site

Ticker. The Site Ticker page appears.

2 The Site Ticker page displays the following table:

Field Description

Name Select the Site name from the dropdown list

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 594

Field Description

Description Displays the information of the Site

From The Ticker will be enabled from that time

To The Ticker will be disabled after that time

Updated by Updated user

Updated on Updated time

Show Expired Ticker

On clicking the Show Expired Ticker, the Expired Site Ticker table is displayed.

Add Site Ticker

To add a Site Ticker, click on the Add Site Ticker button. A table is displayed.

Field Description

Name Select the Site name from the drop-down list

Description Provide the description

To Select the date from the calender

From Select the date from the calender

Click Create to create the new site.

Click Close to cancel the current operation.

Note:

The Site ticker count can be viewed for the DR, PR and SCC sites by clicking Monitor OR

Manage on the Navigation bar and then clicking the Sites tab.

Configuration

595

Vault Framework

Introduction

About Vault Framework

Vault is a password management software and its goal is to help organizations secure,

manage and track credentials for sensitive data and critical systems. Centralized

management of passwords at different levels, such as the operating system, database and

application level makes this highly effective and efficient.

The Vault Framework is a high-level framework that provides reusable business logic for

clients to integrate their applications, GUI controls and workflows with different Vault

algorithms. Extensive vault components enable seamless integration with the client’s

applications. The Framework provides enough flexibility to the clients to design an approach

that suits there requirements.

The next section provides Vault components, providers and functionalities common to any

Vault.

Vault Artefacts: Vault artefacts are essential for IBM Resiliency Orchestration to

communicate with any vendor specific Vault.

▪ Connection Parameter: Connection parameters are static for a specific vault. They

must be configured and can be seen in the IBM Resiliency Orchestration GUI, under

Discover >Credentials>ConfigureVault.

▪ Query Parameter: Query parameters are different for every subsystem. They must be

configured and can be seen in the IBM Resiliency Orchestration GUI, under Discover

>Subsystem>Components, Discover >Subsystem>Datasets and Discover

>Subsystem>Protection Schemes, when you select the Vault Type and select the

‘Fetch from Vault’ option.

Vault Providers: Vault providers are the APIs, JARs and Binaries that need to be configured

on the server and are specific to the Vault.

Vault Features: The following features are common to every vendor specific Vault software.

For more information on vault features refer to Vault Features

▪ Password Management and Password Caching: With password management, the Vault

agent encrypts the password for IBM Resiliency Orchestration and decrypts the

password just before making a call to the underlying system. The passwords are

cached at regular intervals and also get updated every time there is an inconsistency

of password in the Vault and the cache.

▪ Locking Agents Mechanism: The locking mechanism is applicable for subsystems

configured with Vault. The locking mechanism. The locking mechanism is designed

such that the agent locks all the calls to the underlying subsystem the moment a cred

fail is encountered. This avoids locking the underlying subsystem user to a great

extent.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 596

Integration with IBM Resiliency Orchestration

With minimal configuration, IBM Resiliency Orchestration integrates with vendor specific

Vault for clients who have implemented Vault password management software. IBM

Resiliency Orchestration passes the connection parameters and query parameters to the

Vault Agent. The agent executes the tcl script. This script acts like a medium between the

Vault agent and the Vault. All the required parameters to make request to the vendor specific

Vault are available with the tcl file. The TCL script will call the relevant Vault APIs, establish

communication (connection to the configured Vault server), and serve the (password)

requests from the Vault agent.

This integration has the following benefits:

1. It ensures that the user does not have to manually enter the username and password

to login to the IBM Resiliency Orchestration GUI.

2. Change in password in any of the Vault integrated client systems does not have an

impact on the Resiliency Orchestration Application as these changes are recognized by

Vault and the latest correct password is pushed to IBM Resiliency Orchestration GUI.

Configuration

597

Configuring Vault

This section provides steps to integrate any Vault algorithm with IBM Resiliency

Orchestration. The following table provides references to sample files and folders required to

complete the integration smoothly. The reference files are available at .

File Name in the Document Reference File Name

PanacesAgentGeneric.cfg PanacesAgentGeneric.cfg

Panaces.Properties panaces.properties

TestVault_config.xml cyberark_config.xml

TestVault.tcl cyberark_vault_connector.tcl

Vault Properties

Provisioning from the Customer

▪ Vault software should be installed and configured at customer datacenter. This

includes installing Providers, which are software modules from Vault for Application

integration with Vault. Customer needs to install Vault providers on Resiliency

Orchestration Server (This is the server where Resiliency Orchestration Management

application is running). If there are two IBM Resiliency Orchestration Servers for High

Availability, then Vault providers needs to be installed on both the Resiliency

Orchestration servers.

▪ Customer needs to provision vault such that the providers that are installed on

Resiliency Orchestration server have access to vault where passwords are stored and

has access to all the passwords that are required Resiliency Orchestration software.

▪ IBM Resiliency Orchestration software should be qualified for Vault 7.1 release.

▪ Customer should have Vault ‘provider software’ licenses for RHEL 5.0.

▪ Customer should export the Vault installation path in the current user profile to

establish communication between the Vault Provider and the IBM Resiliency

Orchestration Server. For Eg.: If the CyberArk is installed at /opt/CARKaim then the

end user should export the path in the user profile as

‘CARKAIM_HOME=/opt/CARKaim’.

Other Prerequisites

▪ Version, 7.1 must be installed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 598

▪ Set parameter IS_SERIALCALL_ENABLED=true in

<EAMSROOT>/installconfig/PanacesAgentGeneric.cfg. By default it is false. Make this

change for local agents as well.

▪ Set parameter IBM.vault.agent.onstartup = true in

<EAMSROOT>/installconfig/panaces.properties. By default it is false.

Configuring Vault Properties

1. Login to the IBM Resiliency Orchestration Server and open folder

$EAMSROOT/installconfig. You will see the Panaces.Properties file.

2. Update the values for the properties in the file as mentioned in the following table. The

values mentioned in the table are default values and can be changed by the user.

PropertyName Default

Value

Description

IBM.vault.cred.refetch 10

minutes

This is the time interval in minutes to

fetch the password from vault. This is

the time interval in minutes between

password fetches from vault. The

passwords from Vault for the vault

supported subsystems are encrypted and

cached in Resiliency Orchestration server

at regular configured time intervals. This

is the default value.

IBM.vault.lock.waittime 2 minutes

This is the wait timeout in minutes at the

agent side. If the agent does not get

new password in 2 minutes, the agent

throws an exception that it did not

receive new password and still continues

to wait. This is the default value.

IBM.vault.credcache.firstUpd

ateWaitTime

60

seconds

During the server start up, passwords for

subsystems that are vault supported are

fetched from vault and cached in

memory.

This is the wait time, where EAMS server

pauses for this wait time before the

passwords are fetched from vault and

cached. At Panaces Server startup, the

Configuration

599

PropertyName Default

Value

Description

Panaces server is paused for a

configured period of time. The Vault

Agent gets the passwords of all the

configured subsystems that are vault

supported from Vault and the encrypted

passwords are cached in Resiliency

Orchestration. This is the default value.

IBM.vault.credcache.updatec

red

true This is a Boolean property, when set to

true, Password caching is enabled.

Passwords for subsystems that are vault

configured are fetched from vault and

cached in memory. DB caching is

removed. None of the passwords fetched

from vault are saved in DB. By default,

password caching is enabled. This needs

to be turned off, if vault is not

configured. The cache always has

encrypted passwords. If this property is

set, all subsystems (when required) will

look for passwords from cache first and

then from vault if not found in cache.

This is the default value.

IBM.vault.credcache.cacheUp

dateInterval

3600

seconds

This is the interval in seconds, where a

cron job runs to fetch passwords for

vault supported subsystems and caches

in the memory. This cron job runs only if

password caching is enabled. Default

interval is kept as 1 hr (3600 sec). This

interval ideally should be more than 1 hr

(ex: 24 hrs). Also, should be more than

the interval mentioned in other

properties, IBM.vault.cred.refetch and

IBM.vault.lock.waittime.

IBM.vault.enableEncryption true This property is used to enable password

encryption in Resiliency Orchestration.

Default is set to ‘true’. When enabled,

IBM Resiliency Orchestration encrypts all

the passwords received from Vault and

the same are cached in Resiliency

Orchestration if caching is enabled. This

is the default value.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 600

PropertyName Default

Value

Description

IBM.vault.agent.onstartup false This property enables Vault agent to be

started before other remote agents start.

If this is set to true, the Panaces server

is paused for sometime, till the Vault

Agent starts.

If this is set to false, the Panaces server

will not be paused till the Vault Agent

starts, and the Vault agent gets started

along with all other remote agents.

By default, this property is set to false.

This property needs to be set to true, if

the client is using Vault.

Note: This property was introduced in

Vault Version 2.0

network.disconnect.threshold 2 minutes This property enables Vault to raise the

network down event after the specified

time has lapsed after the network has

gone down.

Configuring New Vault

This section provides instructions on configuring a new vault.

Note: To configure a new Vault, for example ‘TestVault’ in IBM Resiliency Orchestration Server using TCL, create a new folder ‘TestVault’

under $EAMSROOT/agent/vault/ and follow the steps below.

1. Login to the IBM Resiliency Orchestration Server

2. Create the following sub-folders under <EAMSROOT>/agents/vault/TestVault

folder.

a. /config/

b. /lib/

c. /script/

Configuration

601

3. Create a new vault configuration xml called TestVault_config.xml (the name of the

xml can be anything) and place it under

<EAMSROOT>/agents/vault/TestVault /config/ TestVault_config.xml

Note: Refer to the cyberark_config.xml file in the attachment.

4. The parameter ‘VaultType’: This is the name of the Vault. This should be same

as the folder name. Here the Folder name is TestVault so the vault type inside the

TestVault_config.xml must be ‘TestVault’.

Example: <VaultType>TestVault</VaultType>

5. The parameter ‘ConnectionParameter’s: Add each connection parameter required

to connect to the Vault. Provide ‘Name’, ‘Unique Id’ and ‘Description’ for each

connection parameter. ‘Type’ is not being used currently. All the connection

parameters configured here appear as mandatory fields while configuring a Vault.

Example:

<Name>: ‘Provider Port’, ‘Application ID’ and ‘Provider Timeout’ are the query

parameters provided by Cyberark.

<UniqueId>: Unique alias needs to be provided for each query parameter

<Description>: Description for each parameter

<Type>: It is currently not being used

<ConnectionParameter>

<Parameter>

<Name>Provider Port</Name>

<UniqueId>CYBERARK_PROVIDER_PORT</UniqueId>

<Description>CyberArk Provider Port</Description>

<Type>Integer</Type> <!-- Number/Text -->

</Parameter>

<Parameter>

<Name> Application ID</Name>

<UniqueId>CYBERARK_APPLICATION_ID</UniqueId>

<Description>CyberArk Application ID</Description>

<Type>Integer</Type> <!-- Number/Text -->

</Parameter>

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 602

<Parameter>

<Name> Provider Timeout</Name>

<UniqueId>CYBERARK_PROVIDER_TIMEOUT</UniqueId>

<Description>CyberArk Provider Timeout</Description>

<Type>Integer</Type> <!-- Number/Text -->

</Parameter>

</ConnectionParameter>

Note: Connection parameters are the parameters required to connect to a vault and provide unique id to each parameter. These parameters are

specific to specific Vaults. The Vault Vendor must provide these parameter names.

6. The parameter ‘QueryParameter’: Add each query parameter required to fetch

password form Vault. Provide ‘Name’, ‘Unique Id’ and ‘Description’ for each query

parameter. ‘Type’ is not being used currently. All the query parameters configured

here appear as mandatory fields while configuring a subsystem to use Vault.

Example:

<Name>: ‘Safe Name’ and ‘Object Name’ are the query parameters provided by

Cyberark.

<UniqueId>: Unique alias needs to be provided for each query parameter

<Description>: Description for each parameter

<Type>: It is currently not being used

<QueryParameter>

<Parameter>

<Name>Safe Name</Name>

<UniqueId>CYBERARK_SAFE_NAME</UniqueId>

<Description>CyberArk Safe Name</Description>

<Type>String</Type> <!-- Number/Text -->

</Parameter>

<Parameter>

<Name>Object Name</Name>

<UniqueId>CYBERARK_OBJECT_NAME</UniqueId>

<Description>CyberArk Object Name</Description>

<Type>String</Type> <!-- Number/Text -->

Configuration

603

</Parameter>

</QueryParameter>

Note: Query parameters are the parameters required to fetch password

from vault and provide unique id to each parameter. These parameters are specific to specific Vaults. The Vault Vendor must provide these parameter names.

7. Verify that the parameter <Connector> in the TestVault_config.xml is

<Connector>panaces.agents.vault.vaultagent.vaulttclconnector.VaultTclExec

utor</Connector>

8. Create a new tcl file, TestVault.tcl under

<EAMSROOT>/agents/vault/Arcos/script/

Note: Refer to the sample cyberark_vault connector.tcl file

9. Modify the parameter <args> in the TestVault_config.xml to point to the newly

created tcl file. This absolute path must be mentioned.

Example:

<args>/agents/vault/TestVault/script/TestVault.tcl</args>.

Note: Also, refer to sample cyberark_config.xml file

args tag should be relative path starting from /agents

Refer to the sample cyberark_vault connector.tcl file

To get the configured parameter in IBM Resiliency Orchestration in your

TCL

Call set parameter = [getKeyValue "UniqueID configured in xml "]

Example:

set providerPort [getKeyValue "CYBERARK_PROVIDER_PORT"]

Note: Please refer set sample cyberark_vault connector.tcl file

10. Add all vault specific libraries required to connect to vault to be kept under

<EAMSROOT>/agents/vault/TestVault/lib

Note: Refer to the attached zipped lib folder to understand the file structure and all the files in the lib directory.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 604

What goes in the TestVault.tcl file?

Note: Refer to sample cyberark_vault_connector.tcl file

1. Refer to the

<EAMSROOT>/agents/vault/TestVault/config/TestVault_config.xml while

creating the tcl file.

2. Create variables for each connection parameter mentioned in xml under #Connection

parameters.

3. Create variables for each query parameter mentioned in xml under #Query

parameters.

4. Using all parameters make vault specific API call and Set the retrieved password using

the statement setPassword $password.

Note:

In case of failure, raise appropriate exception by using raiseVaultConnectionException or raiseUnableToGetPwdException method.

raiseVaultConnectionException should be called when we are not able to connect to vault.

raiseUnableToGetPwdException should be called when system is able to

connect but not able to retrieve password.

In case you are not able to distinguish the error then call

raiseVaultConnectionException with proper error message.

Configuring Vault with IBM Resiliency Orchestration GUI

1. Login to IBM Resiliency Orchestration, go to the Discover >Credentials tab and click

ConfigureVault and the following screen appears.

Configuration

605

Note: The configured Vault type will appear in the drop-box. For Example: CyberArk is shown in the above picture. The parameters shown (Provider

Port, Application ID, Provider Timeout) are from the config.xml, for example: TestVault_config.xml.

2. For more information on the field values see the table below. The Name and Type are

static fields. The rest of the fields depend on the type of Vault. The Vault vendor must

provide information about these fields.

Field Name Description

Name Vault name you want to configure.

This is a mandatory field. Provide a

unique name.

Type You can select the Vault type from the

drop down list. This list will display the

vaults that are configured in the

‘Configuring New Vault’ step

mentioned above. This is a mandatory

field

Provider Port This is a mandatory field. Vault Vendor

to provide the value to connect to the

Vault.

Application Id This is a mandatory field. Vault Vendor

to provide the value to connect to the

Vault.

Provider Timeout This is a mandatory field. Vault Vendor

to provide the value to connect to the

Vault.

3. Click Create. The system takes you to the Credentials Listing Page.

Configuring Subsystems to use Vault with SCC GUI

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 606

Configuring Components with IBM Resiliency Orchestration GUI

Note: This step associates the subsystems to the respective Vaults. You need to define the Component.

Configuring Components

1. Click the Discover >Subsystems tab and the following Subsystems Listing Page

screen appears.

2. Select a Component Subsystem from theCreate New drop down list box and click

Go and the following screen appears.

3. Enter all the field information.

Note: Check the ‘Fetch from Vault’ check box and select the vault you want to associate to the component subsystem.

4. Click on ‘Test Credentials’ to test the Vault Connectivity. The test credentials should

pass if Vault is configured properly.

5. Click Save. The system takes you to the Subsystems Listing Page.

Configuring Datasets with IBM Resiliency Orchestration GUI

Note: This step associates the subsystems to the respective Vaults. You need to define the Datasets.

Configuring Datasets

1. Click the Discover >Subsystems tab and the following Subsystems Listing Page

appears.

2. Select a Dataset Subsystem from theCreate New drop down list box and click Go

and the following screen appears.

3. Enter all the field information.

Note: Check the ‘Fetch from Vault’ check box and select the vault you want to associate to the dataset subsystem.

4. Click on ‘Test Credentials’ to test the Vault Connectivity. The test credentials should

pass if Vault is configured properly.

5. Click Save. The system takes you to the Subsystems Listing Page.

Configuring Protection Schemes with IBM Resiliency Orchestration GUI

Note: This step associates the subsystems to the respective Vaults. You need to define the Protection Scheme.

Configuring Protection Scheme

Configuration

607

1. Click the Discover >Subsystems tab and the following Subsystems Listing Page

appears

2. Select a Protection Scheme Subsystem from the Create New drop down list box

and click Go and the following screen appears.

3. Enter all the field information.

Note: Check the ‘Fetch from Vault’ check box and select the vault you want to associate to the protection scheme subsystem.

4. Click on ‘Test Credentials’ to test the Vault Connectivity. The test credentials should

pass if Vault is configured properly.

5. Click Save. The system takes you to the Subsystems Listing Page.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 608

Vault Agent

Note: The Starting of the Agent is not necessary because the Vault Agent

starts by default, when IBM Resiliency Orchestration Server starts as a remote agent and can be seen in the Agent Listing page in IBM Resiliency Orchestration GUI. You will need to manually Start it only if the Agent does

not start for some reason.

Explicit Start/Stop of Vault Agent:

▪ The Vault Agent can be started and stopped from the ‘Agent Listing’ page. If Vault

Agent is stopped explicitly through ‘Agent Listing’ page, the subsequent IBM

Resiliency Orchestration Server startup will not start the Vault Agent.

▪ The IBM Resiliency Orchestration Server pauses for a maximum of two minutes, for

Vault Agent to start first. If the Vault Agent does not start during that time, IBM

Resiliency Orchestration server continues to start without the Vault Agent. In that

case, the Vault agent needs to be started explicitly from ‘Agent Listing’ page.

▪ Alternatively, the following property in panaces.properties can be used to pause

Panaces Server till all remote agents are

started.panaces.server.startupDelayForAgents = 0

The above property can be used to pause the panaces server till all the remote agents are

started and connected. A value for this property makes sure that all remote agents including

the vault agent are started and connected before the panaces server starts.

Any of the following options can be used to Start or Stop the Vault Agent explicitly.

Option 1

VaultAgent Start:

<EAMSROOT/bin> ./VaultAgent.sh start <RESILIENCY_ORCHESTRATION_IP>

LINUXSERVER

VaultAgent Stop:

<EAMSROOT/bin> ./VaultAgent.sh stop <RESILIENCY_ORCHESTRATION_IP>

LINUXSERVER

VaultAgent Status:

<EAMSROOT/bin> ./VaultAgent.sh status <RESILIENCY_ORCHESTRATION_IP>

LINUXSERVER

Option 2

1. Login to IBM Resiliency Orchestration.

2. Click icon and click Go to Agents.

Configuration

609

3. Click Stop next to the Vault Agent Staus column to stop the AgentOR click Start next

to the Vault Agent Status column to start the Agent.

Note: The Status column will show the status of Vault.

Java Heap Settings for Vault Agent:

By default, Xms and Xmx are set to 64 MB each. The heap memory can be modified in the

script, VaultAgent.sh.

On Vault agent crash, a dump file is created at $EAMSROOT on Resiliency Orchestration

server for further analysis.

Vault Features

Locking Agents Mechanism

Note: For agent locking to work, the agents have to be upgraded to 7.0.

Agent connectivity behavior to underlying OS or DB

The locking mechanism is designed such that the agent locks all the calls to the underlying

subsystem the moment a cred fail is encountered. This avoids locking the underlying

subsystem user to a great extent.

As soon as the Agent fails to connect to underlying system with invalid credentials, it will be

treated as login failure and the corresponding Resiliency Orchestration or Agent Monitoring

call will fail. The subsequent connection to underlying system will be blocked. A message will

be issued to the server to issue the latest password from Vault.

All the calls to agents are blocked until new password is pushed.

OR

All the waiting calls automatically get timed out after the configured time set in the property.

IBM.vault.lock.waittime = 2 minutes

For more details on the various configurable properties refer Configuring Vault Properties.

There are 2 mechanisms to push passwords for only failed accounts from Vault to the agents

through Resiliency Orchestration.

Auto Refresh:

In the Auto Refresh mechanism, the Resiliency Orchestration server pushes the passwords

for only failed accounts at regular intervals of time.

Resiliency Orchestration server will maintain a retry interval property in panaces.properties

file. Using this property Resiliency Orchestration server will issue a re-fetch password

instruction to vault agent and then retry login.

This interval of time is configured in panaces.properties using the property

IBM.vault.cred.refetch = 10 minutes.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 610

Resiliency Orchestration server fetches the passwords for the failed accounts every

configured ‘X’ minutes of time from Vault. Resiliency Orchestration server pushes the fetched

password only if the fetched password and the password with which the agents have failed

are not same. If they are same, the agents continue to wait and Resiliency Orchestration

server will try again after ‘X’ minutes of configured time.

Once the new password is pushed, all the blocked operations at the agents will resume. If

the agents do not get new passwords, all the blocked operations will continue to be blocked

OR will resume automatically on a time out with an exception.

Refresh Button:

When authentication failure takes place at the agent level, the Refresh button , in the

Subsystems Listing Page against each respective subsystem is enabled and all the calls to

the corresponding agent are blocked. On clicking the Refresh button, the password from

Vault is sent for the failed account to the respective agents.

Use Case 1:

When the component creds are used with DataSet and Protection Scheme, the refresh button

will only be enabled at the component level, however the cred will fail ( ) at component,

dataset and protection scheme.

Use Case 2:

When 'Fetch from Vault' is used across the subsystems the refresh button will be enabled

for Component, Dataset and Protection Scheme. All the three must pass the test

credentials.

Use Case 3:

When a Group Credential is configured with vault and used across Component, Dataset

and Protection Scheme, the Refresh button will appear for all the subsystems and must

pass the respective test credentials.

User Case 4:

When the subsystem’s password is changed during workflow execution , the workflow will

fail with an Awaiting Input error message.

To continue the execution of the workflow, the following steps must be done.

1. Make the subsystem active – Following are 2 ways to make the subsystem active

a. Click the ‘Refresh’ button against the subsystem. This will explicitly push the

password from Vault to the subsystem and should make the subsystem active,

if the password is correct.

Note: It is assumed here that passwords in Vault and Subsystem are in sync.

b. Wait for AutoRefresh to happen – Auto refresh automatically pushes the

password from Vault to the subsystem, if there is a change in the password.

Configuration

611

2. Wait for the subsystem to become active

3. Retry the failed workflow – Click the ‘Retry’ button to continue with the workflow.

Note: Clicking the Refresh button multiple times with wrong password in Vault may

lock the underlying subsystem.

Once the Refresh button is clicked the password from Vault is pushed to the

respective agent and the button will get disabled. If agents fail again with the

pushed passwords, the button will become enabled again for failed subsystems.

FAQs:

1. When can I view the Refresh button in the UI?

The Refresh button is visible only when there is an authentication failure for the

subsystem.

2. When is the Refresh button enabled?

The Refresh button is visible only when there is an authentication failure for the

subsystem.

3. When will the Refresh button be disabled?

This functionality presently does not exist.

Note: Workflows/RALs configured with TCL/Shell script which have Group

Credentials/Credentials as a part of the script, which bypass the agent and connect directly, do not aid the agent to track and control the connections to the underlying subsystem, hence locking at the agent level when the

credentials fail is not possible.

Password Management and Password Caching

The password exchange between the Vault Agent, IBM Resiliency Orchestration and the

Subsystems is encrypted. The vault agent will always return the password in an encrypted

form. The Resiliency Orchestration is unaware of the actual password, and does not try to

interpret or decrypt it. It supplies the encrypted password to the agents. The agent decrypts

the password just before making a call to the underlying system.

To enable caching, refer Vault Properties.

The passwords are cached at regular intervals. The cache is updated only when the password

fetched from vault and the password in cache are different.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 612

The logger “Schedule update: Cred cache:” shows the cached passwords (this should be

encrypted) at regular intervals of time. The default is 3 minutes so the Cache Update Job will

run every 3 minutes.

The logger “Placing credentials in memory for:” shows when subsystems select passwords

from memory

To verify the password from cache, check the log. It should print “Fetching credentials from

memory for:...”

Subsystems IBM Supports

The subsystems that IBM supports the Vault Framework for are listed below.

▪ Windows

▪ AIX

▪ HPUX

▪ Linux

▪ Solaris

▪ DB2

▪ MSSQL

▪ Oracle

▪ Sybase

▪ Oracle DG

▪ Vcenter

© IBM Corporation 2017 613

Dashboards

DR Operational Dashboard

Dashboard is for use by the DR Operator to get a DR Life cycle view of the various IT

applications in use by the organization.

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

To view Dashboard, go to home page, click Operational Dashboard link in the bottom right

corner.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 614

There are 3 panes in the Dashboard page:

▪ Title pane

This pane displays the following:

▪ Last refreshed Time: This represents the last content refresh time with respect

to server time.

▪ Summary pane

It displays the following details:

1. Group Recovery Snapshot - Current SnapShot

In Group Recovery Snapshot status-Current SnapShot, the unmanaged/under

maintenance groups will not be considered.

This module displays number of Groups in the following states:

DR Ready

In this state the DR dataset and PR dataset are in a known replication state and

the replication status is one of the following:

• Replication is not occurring between them

• Normal mode of data replication and restoration is occurring.

• Normal mode of data replication and restoration failed for some reason

DR Active

The control of business is switched to DR site. PR dataset is down on PR site and

replication does not occur in this site

DR Impaired

This is the initial state of the Group. In this state, the DR dataset is not in a

known replication state. It has to be synchronized with the PR dataset for any DR

activity to take place. DR may be impaired due to issues during the transit to

Failover BCM.

2. Events snapshot

It displays number of counts of Events:

1. Requiring User Input

2. Critical

3. Serious

3. IBM Resiliency Orchestration server snapshot

It displays the following:

1. Total number of users currently logged in.

2. Number of Admin role users currently logged in [Total count of Super

Administrator and Administrator users logged in].

3. Number of operator role users currently logged in.

4. Server uptime with days,hours and minutes.

Dashboards

615

5. Last successful backup status with day and time.

4. Replication snapshot

This module displays a graph showing Number of replications that are OK and

are Not OK.

The graph will have a line which denotes a scale showing total number of

groups considered for replication snapshot. It will start from 0 till the

maximum number of groups considered. A pointer will point to the number of

groups that is Not OK. This number is displayed above the pointer on the scale

as highlighted in the above image.

Note

It should be noted replication for unmanaged groups or groups under

maintenance will not be considered.

If replication is not licensed, the window shows 'This feature is currently not

licensed. Refer license tab for details'.

5. Active work flows snapshot

It displays count for the following workflows in progress:

1. BCO Workflows

2. Test Workflows

3. BPI workflows

4. System workflows

5. workflows waiting for user intervention

Note

This is a collapsible/expandable pane. By default this it’s in expanded mode

and can be collapsed and toggle between statuses by clicking on

collapse/expand icon on top center of this pane.

▪ Details pane

The pane (in the bottom) of the DR Manager Dashboard displays the

following for a list of Groups:

▪ Group Name

Note

A search box is given for the user to search for the Group name.

▪ Health – If any of the subsystems or all subsystems are down, a link

will be provided on the health status text. When clicked on the link it

displays its components with status as popup.

▪ Events

▪ Workflow

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 616

Note

By default grid contains all the groups of the user and will be filtered

on Summary pane actions or search condition entered in Search box.

Unmanaged/under maintenance groups will not be considered in the

groups listing.

Note:

Application Groups will not be displayed in DR operational/Manager Dashboard.

DR Manager Dashboard

The DR Manager dashboard solves DR Manager’s challenge of knowing how well their DR

solutions are meeting their recovery goals.

Key benefits:

▪ Knowing about the level of IT DR readiness - Single window console with real-time

visibility into the DR-readiness of applications, Real-time RPO and RTO reporting.

▪ Immediate visibility into failures - Events and alerts on conditions that impair

recovery readiness.

▪ Incorporate DR best-practices - Monitoring checks against best-practices DR

processes and providing alerts on deviations.

Click IBM Resiliency Orchestration Server User Role Management to see the privileges.

Dashboards

617

There are 3 panes in the Dashboard page:

▪ Title pane

This pane displays the following:

▪ Last refreshed Time: This represents the last content refresh time with respect

to server time.

▪ Summary pane

It displays the following details:

Group Recovery Snapshot Status-Current Snapshot

In Group Recovery Snapshot status-Current SnapShot, the unmanaged/under

maintenance groups will not be considered.

This module displays number of Groups in the following states:

DR Ready

In this state the DR dataset and PR dataset are in a known replication state and

the replication status is one of the following:

• Replication is not occurring between them

• Normal mode of data replication and restoration is occurring.

• Normal mode of data replication and restoration failed for some reason

DR Active

The control of business is switched to DR site. PR dataset is down on PR site and

replication does not occur in this site

DR Impaired

This is the initial state of the Group. In this state, the DR dataset is not in a

known replication state. It has to be synchronized with the PR dataset for any DR

activity to take place. DR may be impaired due to issues during the transit to

Failover BCM.

Note:

Group list shows maximum of two groups for each state. When click on any state,the

Details pane filters the group with that state and lists the belonging groups.

DR Drills Snapshot

The module displays summary of Test exercises in the system as follows:

Number of Drills in progress.

Next Upcoming Drill with days left.

Drills in last 30 days.

It displays count of Drills passed and failed in the last 30 days. Failed drills

number is a link. On click of the link it will filter the bottom pane with failed

status.

Note:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 618

If test is not licensed, the window shows 'This feature is currently not licensed.

Refer license tab for details'.

Replication Snapshot

This module displays a graph showing Number of replications that are OK and are

Not OK.

The graph will have a line which denotes a scale showing total number of groups

considered for replication snapshot. It will start from 0 till the maximum number of

groups considered. A pointer will point to the number of groups that is Not OK. This

number is displayed above the pointer on the scale as highlighted in the above image.

Note:

It should be noted replication for unmanaged groups or groups under

maintenance will not be considered.

If replication is not licensed, the window shows 'This feature is currently not

licensed. Refer license tab for details'.

Group RPO Snapshot

It displays the RPO and Data Lag % deviation for the groups which are managed in

the form of angular graphs. The graph displays 7 deviation bands as follows:

Deviation > 100

100 > Deviation > 75

75 > Deviation > 50

50 > Deviation > 25

25 > Deviation > 0

Success [Green]

Greyed out band based on steps of 4 for number of groups

The colors of the deviation bands is as per the snapshot.

The scale has 5 divisions and it will be displayed based on number of groups. The

needle points to the no. of deviated groups.

Note:

Click on any part of the graph will filter bottom pane with deviated groups.

If recovery is not licensed, the window shows 'This feature is currently not

licensed. Refer license tab for details'.

Event Snapshot

It displays count of following Events :

User Intervention Required

Open Critical Event

Open Serious Event

Active Workflow Snapshot

Dashboards

619

It displays count for the following workflows in progress:

BCO Workflows

Test Workflows

BPI workflows

System workflows

Workflows waiting for user intervention

▪ Details pane

The Details pane (in the bottom) of the DR Manager Dashboard displays the following

for a list of Groups:

▪ Group Name

Note:

A search box is given for the user to search for the Group name.

▪ RPO

▪ RTO

▪ Data Lag

▪ DR Readiness with description

▪ Drill

▪ By default grid contains all the groups of the user and will be filtered on

Summary pane actions or search condition entered in Search box.

Note:

Unmanaged/under maintenance groups will not be considered in the groups listing.

Note:

Application Groups will not be displayed in DR operational/ Manager Dashboard.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 620

Manage

The Manage page has four tabs namely:

1. Sites

2. Application Groups

3. Recovery Groups

4. Executing Workflows.

On clicking the Manage tab, the RG Listing page is displayed.

Filters

Filters help the user to set priority as per the requirements. While we can view four

type of filters for an AG we can view eight types of filters for the RG. Below are the

different types of filters.

Field Description

Type I Select this to give the RG priority I

Type II Select this to give the RG priority II

Type III Select this to give the RG priority III

Type IV Select this to give the RG priority IV

Manage

621

Field Description

DR Ready The RG is in this continuity state if:

▪ DR sync is in progress - NC workflow is

running

▪ DR sync is in progress- SLA is deviated by

12:23:45 - NC workflow is running but

RPO deviation is more than 100%

DR Active The RG is in this continuity state if:

▪ DR Resync is in Progress - RNC workflow

is running

▪ DR Active - Failover of the group is

successful

DR Impaired The RG is in this continuity state if:

▪ Switchover In Progress

▪ Switchback In Progress

▪ Failover In Progress

▪ Fallback In Progress

In Transit The RG is in this continuity state if:

▪ DR Init not started - After group is moved

to managed mode and NFC is not started

▪ DR Init is in progress - NFC workflow is

running

▪ DR Init is Aborted - NFC is aborted or

crashed

▪ DR Sync is Aborted - NC is aborted or

crashed

▪ DR Sync is Paused - Awaiting User Input

for Action Create File set - SLA is

deviated by 12:23:45 - NC is running but

awaiting

▪ DR Sync not started - NFC is successful

and group is moved to normal inactive

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 622

Field Description

▪ DR Resync is not started - After SO is

successful and RNC workflow is not

started

▪ DR Resync is Aborted - RNC is aborted or

crashed

Note :

The filter attributes are dynamic to what is configured in group labels (admin > Go to

group labels).

Group Health

Displays the Group Health for each RG with the following colors:

Group status is changed to Red if there are any alertable critical events raised.

Group Status is changed to Amber if any alertable warning and serious events are raised.

Group status is green when there are no critical, serious and warning events open and only info events are present.

Group Status is changed to Grey when no monitoring information is available.

The number displayed in each color indicates the RGs in that group health state. The

group health graph changes based on the events that are raised for the group.

Sites

To view all the Sites, click Manage > Sites

The Sites page displays the Site listing, PR Sites, DR sites and the IBM Resiliency

Orchestration site information.

Manage

623

The Site Listing page gives a numerical explanation of the recovery groups in each of

the PR Site, DR Site and the Resiliency Orchestration site.

In the PR Site table as shown in the below figure, the total number of active recovery

groups is displayed in the brackets. The group label by default is set to ALL. All the

application groups are displayed with the number of RGs that are a part of the AG.

The different colors represent the group health of the RG. The Recovery groups

represent the total number of RGs which are in different health

state.

The Site Listing page is displayed. Each site displays the number of active recovery

groups available at the production site.

The details of each production site is explained below.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 624

The table displays information about the stand alone recovery groups and recovery

groups that are a part of the application group.

The site information page displays the following details:

▪ The total number of recovery groups is displayed beside each production site.

▪ On selection of the required filter the recovery groups pertaining to that filter

is displayed.

▪ When the filter is set to All, all the recovery groups and application groups

are displayed

▪ The first column represents the number of stand alone recovery groups at the

production site.

▪ The second column represents the number of recovery groups in each

application group at the production site.

Note:

Even if one RG of an AG is a part of production site, it will list and give a count of all

RGs that are associated with the AGs.

Application Group

Application Group

An Application Group (AG) contains RGs. A RG cannot be part of more than one

AG at a time. AGs can be considered as container of RGs.

Manage

625

You can view the Application Group by clicking the Manage tab on the IBM

Resiliency Orchestration ™ GUI. As soon as the Groups are configured you can view

the application groups by navigating through the following path.

Click Manage > Application Group to view all the Application groups.

The application group page displays the following information:

Field Description

Type Displays the four types of filters, by default;

▪ Type 1

▪ Type II

▪ Type III

▪ Type IV

Note

The filter attributes are dynamic to what is

configured in group labels ( admin > Go to group

labels)

Group Name Displays names of the AGs.

While displaying AGs, the AG and the corresponding RGs are displayed in a tree structure. The Group Health of each RG is displayed with the following colors:

Group status is changed to Red if there are any alertable critical events raised.

Group Status is changed to Amber if any alertable warning and serious events are raised.

Group status is green when there are no critical, serious and warning events open and only

info events are present.

Group Status is changed to Grey when no monitoring information is available.

The number displayed in each color displays the RGs in that group health state.

Note

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 626

Field Description

You can view the Dashboard of the AG or RG by clicking the respective Group link.

RTO Displays Configured RTO, Current RTO with percentage of Deviation from the configured RTO and the Recovery Time.

Events Displays the events when there are undesired changes in the groups that take place. Events can either be critical or serious Events can be viewed in the

Sequence of events

On clicking the link of the AG, the AG Listing page is displayed.

The AG listing page displays the RTO and the Events information Relationship and

continuity Workflows.

By default, the AG page displays ten AGs. Click View All to view all the AGs in the

AG listing page.

The first navigation bar displays the first level of path, while the second navigation

bar displays the navigation path in more detail.

Each AG displays the number of RGs in the AG along with the group health graph.

On clicking the AG, the user is directed to the AG listing page.

Click on RTO to view the RTO status. The RTO summary status is displayed in the

RTO tab.

Click on Events to view the Sequence of Events that has occurred. The graph

displays the time and the date of the event occurrence.

If it is a critical event, it is represented in red and the serious event is represented in

amber color respectively as shown below.

The Relationship section has the following two links:

• Switch to Layers/Switch to Recovery Order

• Details

Note

The Details link appears only for Application Recovery for AWS solutions.

Manage

627

Switch to Layers and Switch to Recovery Order are the two links to view the

relationship of the RGs.

On setting the relationship status to Switch to layers, the RGs are displayed one

Beside the other..

In setting the relationship to switch to recovery group the RGs are one below the

other as shown below

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 628

Note

▪ Each box represents a recovery group

▪ The colors of the RGs represent the group health

▪ The icon represents the recovery group and the name of the recovery

group is displayed. On clicking the Recovery group name, the user is directed

to the Relationship table in the RG listing page of that RG.

▪ The Site location is displayed. Here the site location is PR

▪ Recovery Order is the position of the recovery groups and the numbering

starts from 0.

The Details link provides detailed information of the Application stack by displaying

the configuration for primary, on-premise VMs and the AWS configuration for remote

on-cloud devices and grouping the Application stack by Tiers.

The next table displays the Continuity workflows.

The Continuity Workflows information is also displayed.

Field Description

Workflow Name Displays the name of the workflow

Version status Displays information on the version status

Execution status Displays if the current state of execution

Dry Run Status Displays if Dry Run has been executed or not

Click on the View button to view the Workflow.

Click on the edit the Workflow.

AG Listing

The AG listing page displays the RTO and the Events information Relationship and

continuity Workflows.

Manage

629

By default, the AG page displays ten AGs. Click View All to view all the AGs in the

AG listing page.

The search bar is automatically backfilled with the search criteria based on the page

context. The breadcrumbs help navigate to the desired page.

Each AG displays the number of RGs in the AG along with the group health graph.

On clicking the AG, the user is directed to the AG Details page.

AG Details

Click Manage> AG Listing page > AG details.

Click RTO to view the RTO status. The RTO summary status is displayed in the RTO

tab.

Click on Events to view the Sequence of Events that has occurred. The graph

displays the time and the date of the event occurrence.

If it is a critical event, it is represented in red and the serious event is represented in

amber color respectively as shown below.

To view the relationship of RGs within the AG click Relationship.

The next table displays the Continuity Workflows.

Relationship

The Relationship between the RGs within the AG is displayed. There are two ways

of representing this; Layers and Recovery Order.

The layers will represent the relationship in teh form of layers and the recovery order

will represent the relationship in the order in which they will be recovered. Layers

showcase the serial order and recovery order represents the parallel execution of the

RGs.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 630

In setting the relationship to switch to recovery group the RGs are one below the

other as shown in the following figure.

▪ Each box represents a recovery group.

▪ The colors of the RGs represent the group health

Manage

631

▪ The icon represents the recovery group and the name of the recovery

group is displayed

▪ The Site location is displayed. Here the site location is PR.

Recovery Group

Recovery Group

Click Manage > Recovery Group to view the Recovery groups. The Group

Health meter in the RG page displays the number of recovery groups under each

state. The RGs can be classified under these are four colors which display the health

of the group.

The group health graph displays the recovery groups in each group health state. On

hovering over the graph the percentage of each group health is displayed.

The filter by default is set as Type 1. The RG listing page displays ten recovery

groups, on clicking View All, all the recovery groups are displayed. For each

recovery group, the following information is displayed.

Field Description

Group Name Displays names of the RGs

RPO Displays the configured RPO (in minutes) of the Group.

Note

If the configured RPO and the current RPO for the Group has crossed the threshold value you can view the deviation in red (or orange). If the deviation is within the threshold value, the deviation is represented in green.

RTO

Displays the RTO status (in minutes) for the Group.

The current RTO and the configured RTO is

displayed. If there is any deviation, the percentage is displayed.

Replication Displays when the last replication has occurred

Validation Displays information if the validation has been

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 632

executed.

There are eight types of filters for a RG. See Filters.

On clicking the Recovery Group, the RG Listing page is displayed.

RG Listing

Click Manage> Recovery Groups. The group health of each recovery group is

displayed beside the recovery group.

The RG Listing page is displayed. The RG Listing page displays the following details

of each recovery group.

Note:

For VM protection solutions,the RTO tab is not displayed. However the RG Group

listing page displays RTO as Workflow not published.

Field Description

Group Name Displays names of the RG

RPO Displays the configured RPO (in minutes) of the Group.

Note

If the configured RPO and the current RPO for the Group has crossed the threshold value you can view the deviation in red (or orange). If the deviation is within the threshold value, the deviation is represented in green. For more information se

RTO

Displays the RTO status (in minutes) for the Group.

The current RTO and the configured RTO is

displayed. If there is any deviation, the percentage is displayed. For more information see Viewing RTO Details

Replication Displays when the last replication occurred

Validation Displays information if the validation has been executed.

Manage

633

Click on the group name to view the RG Details page.

RG Details

To view the details of each RG, click Manage> Recovery Groups > on the RG

name.

Field Description

RTO Displays the RTO status (in minutes) for the Group.

The current RTO and the configured RTO is

displayed. If there is any deviation, the percentage is displayed.

RPO Displays the configured RPO (in minutes) of the Group.

Note

If the configured RPO and the current RPO for the Group has crossed the threshold value you can view the deviation in red (or orange). If the deviation is

within the threshold value, the deviation is represented in green.

Replication Displays when the last replication occurred

Events Displays the events. For more information click Sequence of Events

Validation Displays information if the validation has been executed.

Relationship in RG

The Relationship image displays the relationship between the RGs within the AG in

the PR and the DR site.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 634

represents the component. Clicking on the component link will display a

confirmation navigation message. Clicking Yes will take you to the respective

component and allow you to view or edit the component details.

represents the database. Clicking on the database link will display a confirmation

navigation message. Clicking Yes will take you to the respective database and allow

you to view or edit the database details.

represents the replicator. Clicking on the replicator link will display a

confirmation navigation message. Clicking Yes will take you to the respective

replicator and allow you to view or edit the replicator details.

Click View all workflows to view the BCO and BP workflows.

The BCO and BP workflows have the following:

▪ NormalFullCopy

▪ NormalCopy

▪ Faillover

▪ Fallback

▪ FallbackResync

▪ ReverseNormalcopy

The version status, execution status and the DryRun Status is of each workflow is

displayed

Click on the DryRun icon to Execute Dryrun.

Click DryRun to execute the DryRun

or

Manage

635

Click Cancel to cancel the DryRun execution.

Continuity Workflows

To view the business process workflows:

1. Click Manage> AG/ RG > Application Group / Recovery

Group Name.

2. The AG Details / RG Details page is displayed.

3. Click View All Workflows if it is a RG.

▪ Click the BCO tab, all BCO workflows are displayed for the RG

▪ Click the BP tab, all BP workflows are displayed for the RG.

The following details are displayed:

Field Description

Workflow Name Displays the name of the workflow.

Displays the group name for which you want to add the business process.

Version status Displays the group name for which you want to add the business process.

Execution status Displays information if the execution was success, crashed aborted or is awaiting input.

Dry Run Status Displays information if the workflow was a success, crashed, not executed or failed

▪ Click to execute the workflow.

▪ Click to DryRun the workflow

▪ Click to schedule the workflow execution.

▪ Click to preview the workflow.

▪ Click to edit the workflow.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 636

▪ Click to delete the workflow.

▪ Click Create New to create a new workflow.

Note

▪ If the group is in switchover or switchback, then the current DR state of the

group does not permit any continuity operations.

▪ To change the state of the group, go to Discover > groups page.

To view the execution history and the version history, click on the workflow name.

The Execution History displays the following information:

Field Description

Date Displays the date of execution

Time Taken Displays the time taken in seconds for execution

status Workflow execution status

Version Displays the version number

The Version History displays the following information:

Field Description

Version Displays the version number

Created On Displays the workflow created time

Created By Displays the User name

Executing Workflows

Executing Workflow

You can view the details of workflow which is currently executing along with the

details of each action of the workflow.

Manage

637

To view the Workflow, do the following:

1. Click Manage > Executing Workflows tab on the

navigation bar to view the RG listing page.

2. For the desired Group, select the Workflow link from the

WORKFLOW DETAILS column. The Workflow Execution page

appears.

3. Select the RG/AG from the drop-down list filter. If the selected

group is RG, then the eight types of filters are displayed and the if it is

an AG, then only four types of filters are displayed namely:

▪ Type I

▪ Type II

▪ Type III

▪ Type IV

1 If the selected group is a RG, only then the workflow drop-down list is displayed.

Select from the drop-down list.

▪ BCO

▪ BP

▪ Policy

▪ System Workflow

▪ All

The following details are displayed:

Field Description

Group Name Displays the name of the workflow.

Workflow name and Version

Displays the Workflow name and its present version.

Start Time Displays start time of the Workflow.

Time Elapsed Displays the time elapsed from the process of initiation to completion of the Workflow.

Status and results of RALS

Displays the status of the Workflow and also the count reflect number of completed actions versus total actions.

On clicking the Group name, the user is directed to the RG details page or the AG

details page of that group.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 638

On clicking the Workflow, the Execution History and Version History is displayed

Click executing link, the workflow page is displayed

Note:

▪ Click Key Value Pairs to view the Key values configured for

this Workflow.

▪ Click Abort to stop workflow execution. The Reason to Abort

pop-up appears, enter the reason and click on Reason to

Abort.

▪ Click Export to CSV to export the workflow details to .CSV file

format.

▪ Click the Workflow Actions tab to view the execution details

of actions within the workflow.

Field Description

Action Displays the name of the action.

TIME INITIATED Displays the exact start time of the action execution.

TIME ELAPSED (SEC) Displays the time calculated from the process of initiation to completion of the action.

TYPE Displays the type of action.

STATUS DETAILS Displays the status details of the action execution.

Note:

2 If the status is in EXECUTING mode, the user can click on the EXECUTING link to view Continue as Success or Continue as Failure option buttons. Depending on the requirement and by giving a reason, select any one of the option.

3 If the Status is Awaiting Input, depending on the requirement, user can select any one of the

below options:

4 Continue as Success

5 Continue as Failure

6 Retry

7 Quit

If user wants to know the reason for Awaiting

Manage

639

Input, click the View action log button.

8 Click on any link corresponding to desired action to view the following details for the action.

9 DB Logs

10 Tail Logs

11 Sys Logs

4. Click Go Back link to view the Active Workflow Listing page.

Note:

▪ DB Logs: Displays the Oracle and MSSQL DB Logs. Configure Error log path

while dataset discovery of MSSQL only then we will get the DB Log link for

MSSQL.

▪ Tail Logs: Displays the logs from the path configured in Custom Action.

▪ Sys Logs: Displays the Linux Operating System Logs.

In the Workflow Actions tab, the actions are grouped under the respective Action

Groups so that you can clearly know the action belongs to which Action Group.

Note:

Time Elapsed in the Workflow and total time elapsed for all Custom actions in the

workflow is not the same. It is dependent on multiple other factors.

Health Monitoring

The health of the group is continuously monitored and the current status is available

as a Group Health Graph in the Recovery group page. When there is a change in the

status of the health of the groups an event arises.

To navigate to the Group Health Graph, click Monitor OR Manage on the

Navigation bar. Then click Recovery Group. The Group Health meter in the

RG page displays the number of recovery groups under each state.

Viewing Group Relationship

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view relationship details of a Group, perform following steps:

1. Click Manage on the navigation bar. The RG Listing/ AG

Listing page appears.

2. Click desired Group from the GROUP NAME column. The

Recovery Group listing page for the respective RG or AG appears.

3. View the Relationship diagram.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 640

Group Dependency

The Group Dependency tab under the Application Group displays visual

representation of all RGs dependent on the AG. Click each RG name against its box

to display its Recovery Group. You can also view the order in which Failover will be

done during disaster recovery by checking the arrow above Group Failover order.

Recovery Group Relationship

You can view the relationship between the configured production and the DR in a

pictorial representation by navigating to the Recovery Group Details. This page

displays the solution specific replication details, names and status of the datasets,

protection scheme and components on production and DR servers.

You can expand or collapse the Replication, Component, and Dataset details by

clicking Expand All and Collapse All link at the top right corner of the page.

RPO and RTO Monitoring

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view RPO and RTO details of a Group, perform following steps:

1. Click Manage on the navigation bar. Click Recovery Groups.

2. Click desired Group from the GROUP NAME column. The Recovery

Group page for the respective RG or AG appears.

3. Click the RTO/ RPO tab respectively. The tabs are displayed for the

Recovery Group. This displays the following information:

Note:

For VM protection solutions,the RTO tab is not displayed. However the RG Group

listing page displays RTO as Workflow not published.

Field Description

App RPO Summary Displays Configured RPO, Current RPO with

percentage of Deviation from the configured

RPO and the Recovery Point. For more

information see Viewing App RPO Details.

Data RPO Summary Data RPO summery table will be displayed if

the solution support Data RPO. Viewing Data

RPO Details.

RTO Summary Displays Configured RTO, Current RTO with

percentage of Deviation from the configured

Manage

641

RTO and the Recovery Time. For more

information see Viewing RTO Details

RTO Breakup Displays the name of the Recovery Step

executed during the recovery process along

with the Expected Completion Time in

seconds.

Monitoring Replication

You can view the detailed Replication List by clicking Manage > Recovery Groups

and the Recovery Groups Listing page appears.

Select any Group name and click Group Replication tab.

In the Replication page you can monitor the replication process for each group by

viewing the detailed replication status of the group and the protection scheme

associated with the Group. Storage related information of the monitored RG and

information about data consistency i.e whether the DR site is in sync with the

Production without respect to data replication are also displayed. For example for a

Group configured under the SRDF Protection Scheme you can view the IDs of the

source and target symmetric units.

The Replication tab displays the Data log and the last updated time the files have

been replicated.

Field Description

Data Lag Displays the data lag information for the RG

Last Updated Displays the time when the RG was last updated

Click Stop Replication to stop the replication.

Click Start Replication to start the replication.

Click Refresh Details to refresh the replication page.

The replication details are displayed in the table:

Field Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 642

Protection Displays the replication type

Replication status Displays the status of the replication, Active Inactive and Unknown

Primary-Remote service

Displays the PR and DR information

Note

This table consists of basic information for all groups. Additional information will be

displayed, depending on the Replication Type.

Viewing Recovery Group Replication Details

To view the DR Solution specific replication details of the RG, perform the following

steps:

1 Click Manage> Recovery Groups. The RG Listing Page appears.

2 Click Group Name in the RG Listing Page.

3 Click the Replication tab.

4 The Replication Details page is displayed that lists the DR Solution specific

replication details. The Replication tab is displayed only for that Recovery Group.

You can monitor the current status of the replication between the production and DR.

For example, in the case of SRDF protection mechanism, the details of the protection

mechanism, the specific device names, the status of the WAN link connection

between the two RDF devices the mode of replication i.e synchronous or

asynchronous and the number of invalid tracks are displayed.

Click Stop Replication to stop the replication process.

Click the Refresh Details to refresh the information.

Monitor

643

Monitor

The Monitor page has four tabs namely:

1. Sites

2. Application Groups

3. Recovery Groups and

4. Executing Workflows.

On clicking the Monitor tab, the sites page is displayed.

Filters

Filters help the user to set priority as per the requirements. While we can view four

type of filters for an AG we can view eight types of filters for the RG. Below are the

different types of filters.

Field Description

Type I Select this to give the RG priority I

Type II Select this to give the RG priority II

Type III Select this to give the RG priority III

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 644

Field Description

Type IV Select this to give the RG priority IV

DR Ready The RG is in this continuity state if:

▪ DR sync is in progress - NC workflow is

running

▪ DR sync is in progress- SLA is deviated by

12:23:45 - NC workflow is running but

RPO deviation is more than 100%

DR Active The RG is in this continuity state if:

▪ DR Resync is in Progress - RNC workflow

is running

▪ DR Active - Failover of the group is

successful

DR Impaired The RG is in this continuity state if:

▪ Switchover In Progress

▪ Switchback In Progress

▪ Failover In Progress

▪ Fallback In Progress

In Transit The RG is in this continuity state if:

▪ DR Init not started - After group is moved

to managed mode and NFC is not started

▪ DR Init is in progress - NFC workflow is

running

▪ DR Init is Aborted - NFC is aborted or

crashed

▪ DR Sync is Aborted - NC is aborted or

crashed

▪ DR Sync is Paused - Awaiting User Input

for Action Create File set - SLA is

deviated by 12:23:45 - NC is running but

awaiting

Monitor

645

Field Description

▪ DR Sync not started - NFC is successful

and group is moved to normal inactive

▪ DR Resync is not started - After SO is

successful and RNC workflow is not

started

▪ DR Resync is Aborted - RNC is aborted or

crashed

Note :

The filter attributes are dynamic to what is configured in group labels (admin > Go to

group labels).

Group Health

Displays the Group Health for each RG with the following colors:

Group status is changed to Red if there are any alertable critical events raised.

Group Status is changed to Amber if any alertable warning and serious events are raised.

Group status is green when there are no critical, serious and warning events open and only info events are present.

Group Status is changed to Grey when no monitoring information is available.

The number displayed in each color indicates the RGs in that group health state. The

group health graph changes based on the events that are raised for the group.

Sites

To view all the Sites, click Monitor > Sites

The Sites page displays the Site listing, PR Sites, DR sites and the IBM Resiliency

Orchestration site information.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 646

The Site Listing page gives a numerical explanation of the recovery groups in each of

the PR Site, DR Site and the Resiliency Orchestration site.

In the PR Site table as shown in the below figure, the total number of active recovery

groups is displayed in the brackets. The group label by default is set to ALL. All the

application groups are displayed with the number of RGs that are a part of the AG.

The different colors represent the group health of the RG. The Recovery groups

represent the total number of RGs which are in different health

state.

The Site Listing page is displayed. Each site displays the number of active recovery

groups available at the production site.

The details of each production site is explained below.

Monitor

647

The table displays information about the stand alone recovery groups and recovery

groups that are a part of the application group.

The site information page displays the following details:

▪ The total number of recovery groups is displayed beside each production site.

▪ On selection of the required filter the recovery groups pertaining to that filter

is displayed.

▪ When the filter is set to All, all the recovery groups and application groups

are displayed

▪ The first column represents the number of stand alone recovery groups at the

production site.

▪ The second column represents the number of recovery groups in each

application group at the production site.

Note:

Even if one RG of an AG is a part of production site, it will list and give a count of all

RGs that are associated with the AGs.

Application Group

Application Group

An Application Group (AG) contains RGs. A RG cannot be part of more than one

AG at a time. AGs can be considered as container of RGs.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 648

You can view the Application Group by clicking the Monitor tab on the IBM

Resiliency Orchestration ™ GUI. As soon as the Groups are configured you can view

the application groups by navigating through the following path.

Click Monitor > Application Group to view all the Application groups.

The application group page displays the following information:

Field Description

Type Displays the four types of filters, by default;

▪ Type 1

▪ Type II

▪ Type III

▪ Type IV

Note

The filter attributes are dynamic to what is

configured in group labels ( admin > Go to group

labels)

Group Name Displays names of the AGs.

While displaying AGs, the AG and the corresponding RGs are displayed in a tree structure. The Group Health of each RG is displayed with the following colors:

Group status is changed to Red if there are any alertable critical events raised.

Group Status is changed to Amber if any alertable warning and serious events are raised.

Group status is green when there are no critical, serious and warning events open and only

info events are present.

Group Status is changed to Grey when no monitoring information is available.

The number displayed in each color displays the RGs in that group health state.

Note

Monitor

649

Field Description

You can view the Dashboard of the AG or RG by clicking the respective Group link.

RTO Displays Configured RTO, Current RTO with percentage of Deviation from the configured RTO and the Recovery Time.

Events Displays the events when there are undesired changes in the groups that take place. Events can either be critical or serious Events can be viewed in the

Sequence of events

On clicking the link of the AG, the AG Listing page is displayed.

The AG listing page displays the RTO and the Events information Relationship and

continuity Workflows.

By default, the AG page displays ten AGs. Click View All to view all the AGs in the

AG listing page.

The first navigation bar displays the first level of path, while the second navigation

bar displays the navigation path in more detail.

Each AG displays the number of RGs in the AG along with the group health graph.

On clicking the AG, the user is directed to the AG listing page.

Click on RTO to view the RTO status. The RTO summary status is displayed in the

RTO tab.

Click on Events to view the Sequence of Events that has occurred. The graph

displays the time and the date of the event occurrence.

If it is a critical event, it is represented in red and the serious event is represented in

amber color respectively as shown below.

The Relationship section has the following two links:

• Switch to Layers/Switch to Recovery Order

• Details

Note

The Details link appears only for Application Recovery for AWS solutions.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 650

Switch to Layers and Switch to Recovery Order are the two links to view the

relationship of the RGs.

On setting the relationship status to Switch to layers, the RGs are displayed one

Beside the other.

In setting the relationship to switch to recovery group the RGs are one below the

other as shown below

Monitor

651

Note

▪ Each box represents a recovery group

▪ The colors of the RGs represent the group health

▪ The icon represents the recovery group and the name of the recovery

group is displayed. On clicking the Recovery group name, the user is directed

to the Relationship table in the RG listing page of that RG.

▪ The Site location is displayed. Here the site location is PR

▪ Recovery Order is the position of the recovery groups and the numbering

starts from 0.

The Details link provides detailed information of the Application stack by displaying

the configuration for primary, on-premise VMs and the AWS configuration for remote

on-cloud devices and grouping the Application stack by Tiers.

The next table displays the Continuity workflows.

The Continuity Workflows information is also displayed.

Field Description

Workflow Name Displays the name of the workflow

Version status Displays information on the version status

Execution status Displays if the current state of execution

Dry Run Status Displays if Dry Run has been executed or not

Click on the View button to view the Workflow.

Note:

The user cannot edit the workflow in the View workflow page when navigating from

Monitor page.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 652

AG Listing

The AG listing page displays the RTO and the Events information Relationship and

continuity Workflows.

By default, the AG page displays ten AGs. Click View All to view all the AGs in the

AG listing page.

The search bar is automatically backfilled with the search criteria based on the page

context. The breadcrumbs help navigate to the desired page.

Each AG displays the number of RGs in the AG along with the group health graph.

On clicking the AG, the user is directed to the AG Details page.

AG Details

Click Monitor > AG Listing page > AG details.

Click RTO to view the RTO status. The RTO summary status is displayed in the RTO

tab.

Click on Events to view the Sequence of Events that has occurred. The graph

displays the time and the date of the event occurrence.

If it is a critical event, it is represented in red and the serious event is represented in

amber color respectively as shown below.

To view the relationship of RGs within the AG click Relationship.

The next table displays the Continuity Workflows.

Relationship

The Relationship between the RGs within the AG is displayed. There are two ways

of representing this; Layers and Recovery Order.

The layers will represent the relationship in teh form of layers and the recovery order

will represent the relationship in the order in which they will be recovered. Layers

showcase the serial order and recovery order represents the parallel execution of the

RGs.

Monitor

653

In setting the relationship to switch to recovery group the RGs are one below the

other as shown below

▪ Each box represents a recovery group.

▪ The colors of the RGs represent the group health

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 654

▪ The icon represents the recovery group and the name of the recovery

group is displayed

▪ The Site location is displayed. Here the site location is PR.

Recovery Group

Recovery Group

Click Monitor > Recovery Group to view the Recovery groups. The Group

Health meter in the RG page displays the number of recovery groups under each

state. The RGs can be classified under these are four colors which display the health

of the group.

The group health graph displays the recovery groups in each group health state. On

hovering over the graph the percentage of each group health is displayed.

The filter by default is set as Type 1. The RG listing page displays ten recovery

groups, on clicking View All, all the recovery groups are displayed. For each

recovery group, the following information is displayed.

Field Description

Group Name Displays names of the RGs

RPO Displays the configured RPO (in minutes) of the Group.

Note

If the configured RPO and the current RPO for the Group has crossed the threshold value you can view the deviation in red (or orange). If the deviation is within the threshold value, the deviation is represented in green.

RTO

Displays the RTO status (in minutes) for the Group.

The current RTO and the configured RTO is

displayed. If there is any deviation, the percentage is displayed.

Replication Displays when the last replication has occurred

Validation Displays information if the validation has been

Monitor

655

executed.

There are eight types of filters for a RG. See Filters.

On clicking the Recovery Group, the RG Listing page is displayed.

RG Listing

Click Monitor> Recovery Groups. The group health of each recovery group is

displayed beside the recovery group.

The RG Listing page is displayed. The RG Listing page displays the following details

of each recovery group.

Note:

For VM protection solutions,the RTO tab is not displayed. However the RG Group

listing page displays RTO as Workflow not published.

Field Description

Group Name Displays names of the RG

RPO Displays the configured RPO (in minutes) of the Group.

Note

If the configured RPO and the current RPO for the Group has crossed the threshold value you can view the deviation in red (or orange). If the deviation is within the threshold value, the deviation is represented in green. For more information se

RTO

Displays the RTO status (in minutes) for the Group.

The current RTO and the configured RTO is

displayed. If there is any deviation, the percentage is displayed. For more information see Viewing RTO Details

Replication Displays when the last replication occurred

Validation Displays information if the validation has been executed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 656

Click on the group name to view the RG Details page.

RG Details

To view the details of each RG, click Monitor> Recovery Groups > on the RG

name.

Field Description

RTO Displays the RTO status (in minutes) for the Group.

The current RTO and the configured RTO is

displayed. If there is any deviation, the percentage is displayed.

RPO Displays the configured RPO (in minutes) of the Group.

Note

If the configured RPO and the current RPO for the Group has crossed the threshold value you can view the deviation in red (or orange). If the deviation is within the threshold value, the deviation is

represented in green.

Replication Displays when the last replication occurred

Events Displays the events. For more information click Sequence of Events

Validation Displays information if the validation has been executed.

Relationship in RG

The Relationship image displays the relationship between the RGs within the AG in

the PR and the DR site.

Monitor

657

represents the component. Clicking on the component link will display a

confirmation navigation message. Clicking Yes will take you to the respective

component and allow you to only view the component details.

represents the database. Clicking on the database link will display a confirmation

navigation message. Clicking Yes will take you to the respective database and allow

you to only view the database details.

represents the replicator. Clicking on the replicator link will display a

confirmation navigation message. Clicking Yes will take you to the respective

replicator and allow you to only view the replicator details.

Click View all workflows to view the BCO and BP workflows.

The BCO and BP workflows have the following:

▪ NormalFullCopy

▪ NormalCopy

▪ Faillover

▪ Fallback

▪ FallbackResync

▪ ReverseNormalcopy

The version status, execution status and the DryRun Status is of each workflow is

displayed

Continuity Workflows

To view the business process workflows:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 658

1. Click Monitor> AG/ RG > Application Group / Recovery

Group Name.

2. The AG Details / RG Details page is displayed.

3. Click View All Workflows if it is a RG.

▪ Click the BCO tab, all BCO workflows are displayed for the RG

▪ Click the BP tab, all BP workflows are displayed for the RG.

The following details are displayed:

Field Description

Workflow Name Displays the name of the workflow.

Displays the group name for which you want to add the business process.

Version status Displays the group name for which you want to add the business process.

Execution status Displays information if the execution was success,

crashed aborted or is awaiting input.

Dry Run Status Displays information if the workflow was a success, crashed, not executed or failed

▪ Click to preview the workflow.

Note

▪ If the group is in switchover or switchback, then the current DR state of the

group does not permit any continuity operations.

▪ To change the state of the group, go to Discover > groups page.

To view the execution history and the version history, click on the workflow name.

The Execution History displays the following information:

Field Description

Monitor

659

Date Displays the date of execution

Time Taken Displays the time taken in seconds for execution

status Workflow execution status

Version Displays the version number

The Version History displays the following information:

Field Description

Version Displays the version number

Created On Displays the workflow created time

Created By Displays the User name

Executing Workflows

Executing Workflow

You can view the details of workflow which is currently executing along with the

details of each action of the workflow.

To view the Workflow, do the following:

1. Click Monitor > Executing Workflows tab on the

navigation bar to view the RG listing page.

2. For the desired Group, select the Workflow link from the

WORKFLOW DETAILS column. The Workflow Execution page

appears.

3. Select the RG/AG from the drop-down list filter. If the selected

group is RG, then the eight types of filters are displayed and the if it is

an AG, then only four types of filters are displayed namely:

▪ Type I

▪ Type II

▪ Type III

▪ Type IV

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 660

1 If the selected group is a RG, only then the workflow drop-down list is displayed.

Select from the drop-down list.

▪ BCO

▪ BP

▪ Policy

▪ System Workflow

▪ All

The following details are displayed:

Field Description

Group Name Displays the name of the workflow.

Workflow name and Version

Displays the Workflow name and its present version.

Start Time Displays start time of the Workflow.

Time Elapsed Displays the time elapsed from the process of initiation to completion of the Workflow.

Status and results

of RALS

Displays the status of the Workflow and also the count reflect

number of completed actions versus total actions.

On clicking the Group name, the user is directed to the RG details page or the AG

details page of that group.

On clicking the Workflow, the Execution History and Version History is displayed

Click executing link, the workflow page is displayed

Note:

▪ Click Key Value Pairs to view the Key values configured for

this Workflow.

▪ Click Abort to stop workflow execution. The Reason to Abort

pop-up appears, enter the reason and click on Reason to

Abort.

▪ Click Export to CSV to export the workflow details to .CSV file

format.

Click the Workflow Actions tab to view the execution details of actions within the

workflow.

Monitor

661

Field Description

Action Displays the name of the action.

TIME INITIATED Displays the exact start time of the action execution.

TIME ELAPSED (SEC) Displays the time calculated from the process of initiation to completion of the action.

TYPE Displays the type of action.

STATUS DETAILS Displays the status details of the action execution.

Note:

2 If the status is in EXECUTING mode, the user can click on the EXECUTING link to view Continue as Success or Continue as Failure option buttons.

Depending on the requirement and by giving a reason, select any one of the option.

3 If the Status is Awaiting Input, depending on the requirement, user can select any one of the

below options:

4 Continue as Success

5 Continue as Failure

6 Retry

7 Quit

If user wants to know the reason for Awaiting Input, click the View action log button.

8 Click on any link corresponding to desired action to view the following details for the action.

9 DB Logs

10 Tail Logs

11 Sys Logs

4. Click Go Back link to view the Active Workflow Listing page.

Note:

▪ DB Logs: Displays the Oracle and MSSQL DB Logs. Configure Error log path

while dataset discovery of MSSQL only then we will get the DB Log link for

MSSQL.

▪ Tail Logs: Displays the logs from the path configured in Custom Action.

▪ Sys Logs: Displays the Linux Operating System Logs.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 662

In the Workflow Actions tab, the actions are grouped under the respective Action

Groups so that you can clearly know the action belongs to which Action Group.

Note:

Time Elapsed in the Workflow and total time elapsed for all Custom actions in the

workflow is not the same. It is dependent on multiple other factors.

Health Monitoring

The health of the group is continuously monitored and the current status is available

as a Group Health Graph in the Recovery group page. When there is a change in the

status of the health of the groups an event arises.

To navigate to the Group Health Graph, click Monitor OR Manage on the

Navigation bar. Then click Recovery Group. The Group Health meter in the

RG page displays the number of recovery groups under each state.

Viewing Group Relationship

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view relationship details of a Group, perform following steps:

1. Click Monitor on the navigation bar. The RG Listing/ AG

Listing page appears.

2. Click desired Group from the GROUP NAME column. The

Recovery Group listing page for the respective RG or AG appears.

3. View the Relationship diagram.

Group Dependency

The Group Dependency tab under the Application Group displays visual

representation of all RGs dependent on the AG. Click each RG name against its box

to display its Recovery Group. You can also view the order in which Failover will be

done during disaster recovery by checking the arrow above Group Failover order.

Recovery Group Relationship

You can view the relationship between the configured production and the DR in a

pictorial representation by navigating to the Recovery Group Details. This page

displays the solution specific replication details, names and status of the datasets,

protection scheme and components on production and DR servers.

Monitor

663

You can expand or collapse the Replication, Component, and Dataset details by

clicking Expand All and Collapse All link at the top right corner of the page.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 664

RPO and RTO Monitoring

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view RPO and RTO details of a Group, perform following steps:

1. Click Monitor on the navigation bar. Click Recovery Groups.

2. Click desired Group from the GROUP NAME column. The Recovery

Group page for the respective RG or AG appears.

3. Click the RTO/ RPO tab respectively. The tabs are displayed for the

Recovery Group. This displays the following information:

Note:

For VM protection solutions,the RTO tab is not displayed. However the RG Group

listing page displays RTO as Workflow not published.

Field Description

App RPO Summary Displays Configured RPO, Current RPO with

percentage of Deviation from the configured

RPO and the Recovery Point. For more

information see Viewing App RPO Details.

Data RPO Summary Data RPO summery table will be displayed if

the solution support Data RPO. Viewing Data

RPO Details.

RTO Summary

Displays Configured RTO, Current RTO with

percentage of Deviation from the configured

RTO and the Recovery Time. For more

information see Viewing RTO Details

RTO Breakup Displays the name of the Recovery Step

executed during the recovery process along

with the Expected Completion Time in

seconds.

Monitor

665

Continuity Monitoring Overview

Monitoring facilitates viewing the state information of the continuity operations

execution, the replication statistics, and the Events for the groups being monitored.

Once the groups are in Managed state, you can monitor the following:

▪ Continuity - Provides information about the continuity state of the group

along with the current status of the RPO and RTO.

▪ Replication - Provides information about the replication mechanism along with

the details of data or files replicated for the respective group.

▪ Events - Provides information about significant Events and warnings for the

respective groups.

Click on the respective link to view the current status of the list of groups being

monitored. If you want to view the detailed information about Continuity or

Replication or Events for a specific group, click on the group from the Group Name

column available in the respective links.

Note

From Recovery Group or Application Group Dashboard in Continuity, Replication or

Events, you can navigate to Monitor, Manage, Reports, Drills or Discover page of a

displayed group by clicking on respective icon at the

top right corner of the respective group’s dashboard window.

Monitoring Replication

You can view the detailed Replication List by clicking Monitor > Recovery Groups

and the Recovery Groups Listing page appears.

Select any Group name and click Group Replication tab.

In the Replication page you can monitor the replication process for each group by

viewing the detailed replication status of the group and the protection scheme

associated with the Group. Storage related information of the monitored RG and

information about data consistency i.e whether the DR site is in sync with the

Production without respect to data replication are also displayed. For example for a

Group configured under the SRDF Protection Scheme you can view the IDs of the

source and target symmetric units.

The Replication tab displays the Data log and the last updated time the files have

been replicated.

Field Description

Data Lag Displays the data lag information for the RG

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 666

Field Description

Last Updated Displays the time when the RG was last updated

Click Refresh Details to refresh the replication page.

The replication details are displayed in the table:

Field Description

Protection Displays the replication type

Replication status Displays the status of the replication, Active Inactive and Unknown

Primary-Remote service

Displays the PR and DR information

Note

This table consists of basic information for all groups. Additional information will be

displayed, depending on the Replication Type.

Viewing Recovery Group Replication Details

To view the DR Solution specific replication details of the RG, perform the following

steps:

1 Click Monitor > Recovery Groups. The RG Listing Page appears.

2 Click Group Name in the RG Listing Page.

3 Click the Replication tab.

4 The Replication Details page is displayed that lists the DR Solution specific

replication details. The Replication tab is displayed only for that Recovery Group.

You can monitor the current status of the replication between the production and DR.

For example, in the case of SRDF protection mechanism, the details of the protection

mechanism, the specific device names, the status of the WAN link connection

between the two RDF devices the mode of replication i.e synchronous or

asynchronous and the number of invalid tracks are displayed.

Click the Refresh Details to refresh the information.

Events

667

Events

Event Life Cycle

Every event has a life cycle. When an event occurs, its status is "New", for which

some action (manual or automated) might be required. When the action is being

taken the event is associated with "Response in Progress" status. After completion of

the action, the event is associated with "Closed" status.

Automatic Closing of Events upon Aging

Aging is a process of moving unattended "New" events to "Closed" state. By default,

the aging period is set to 5 days. The aging is computed/performed at 00:00 AM

every day. All Events irrespective of its Severity but with "New" state older than the

aging period will be moved to "Closed" state except for User Input events.

Handling UserInputRequiredEvents

UserInputRequiredEvents cannot be moved to "Closed" or "Response in Progress"

states by the user. Once input for an userInputRequiredEvent is provided, it will be

moved to Closed state immediately. However, the corresponding

userInputObtainedEvent will be closed during aging process (or user can move it to

"Closed" state).

When IBM Resiliency Orchestration Server is started all userInputEvents

(userInputRequiredEvent/userInputObtainedEvent) will be moved to "Closed" state

irrespective of its status.

Events with policy execution

When the policy execution succeeds, the corresponding event will be automatically

moved to "Closed" state. Incase the policy fails, the event will be moved to

"Response in Progress" state automatically. The user is expected to respond to such

events and move to Closed state.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 668

Event Alarm

Event Alarm displays the number of critical events, serious events and input required

events across the applications. This will be displayed below navigation bar on all the

windows of the IBM Resiliency Orchestration.

The Critical Events are displayed in Red, and Input Required Events in Blue as shown

below:

If there are no corresponding events, then it will show zero. These counts will refresh

automatically in every 60 seconds. By default, these counts are shown for events

occurred in the past 5 days.

Click the corresponding icon on the Current Events to see the filtered list of events

based on severity. This navigates you to the View Events page.

User can also click on the Critical icon to view only critical events and UserInput

icon to view only UserInput events.

View Events

The Events DETAILS page displays Group events, user-input-required events and

System events. It displays the events occurred in the past 5 days by default.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view Events details, perform the following steps:

1. Click Current Events link in the Secondary Navigation Bar in the top right corner.

The Events page appears.

Following table explains the specific information displayed in the Events page.

Fields Functions and Descriptions

Advanced Filter This option allows advanced filter facility for events, based on event severity, user-input events and group names.

For more information, see Filtering Events.

Include Select the check box(es) to filter the events based on it's severity.

The available check boxes are Critical, Serious

Events

669

Fields Functions and Descriptions

and All User Input Events.

Event name Displays the name of the event along with the status.

Description Displays the description of the occurred event.

Group Name Displays the name of the Group.

TIME Displays date and time at which the event has occurred.

Severity Displays the severity level of the events.

- Critical

- Serious

- Warning

- Information

OPERATION Select the respective action for the event from the drop-down list.

The available options are:

Show SOE - Displays the Sequence of Events window.

Provide Input - This option appears for the

events that require your inputs. Selecting this option takes you to the Recent Execution Status window where you can provide the required inputs.

Execute Policy- Executes the policy associated

with the event.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 670

Fields Functions and Descriptions

Change State Select the state from the drop-down list.

The available options are Closed and Response In Progress.

Select the check box(es) corresponding to the events for which the state has to be changed, select the state from the drop-down list and click

.

Export to CSV Click this link to export the events to CSV format.

View All Events Click this link to view all events.

Click to sort the following columns:

Fields Descriptions

EVENT NAME Sorts by event name.

GROUP NAME Sorts by group name.

TIME Sorts by time of occurrence of event.

SEVERITY Sorts by event severity.

2. Click Event ID. The Event Details page opens as a pop-up window.

Fields Functions and Descriptions

Name Displays the event name. More than one event can have a same name.

Description Displays the description of the event.

Severity Displays the severity level of the events.

Impact Displays the impact of the event.

Events

671

Occurred On Displays group on which the event has occurred.

Occurred Time Displays time at which the event has occurred.

Policy Status Displays the policy status if policy is applicable for the event.

3. Click Close.

Note:

In some case, the "Provide Input" operation will be shown even for events for which

the input is already provided by some other user or in some other window. In these

cases, the user will be redirected to the workflow page but will not see the workflow

waiting for input. Refreshing the events page will remove these events from the list.

Viewing Group Events

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view Group Events details, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group tab, the Group listing page appears.

3. Click the required group from the GROUP NAME column. The Group Details

Page appears.

4. Click the Group Configuration tab.

5. Click the Events tab.

Field Description

Event ID Displays the respective Event ID which identifies

each event.

Event Description Provides a brief description of the respective event.

Event Severity Displays the level of severity of the respective event.

Event Impact Provides information on affect/effects about the event.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 672

Field Description

Notify Allows you to send notification regarding the event to the user.

By default, SERIOUS and CRITICAL events are notified.

Note:

There can be multiple instances of same Event raised for a Group that require

execution of same policy. However, only one instance of a policy can run at a time.

In such cases, the later instances of the event are put to FAILED status. For

example, there are three instances of Event E- E1, E2, and E3, raised for Group G,

requiring the execution of policy P. If P is being executed for E1, its execution for E2

and E3 will be put to FAILED status. Once the policy execution for a Event is put to

FAILED status, it cannot be initiated again. Instances of same event for different

Group do not affect each other.

Filtering Events

IBM Resiliency Orchestration provides you the facility to filter events, based on event

severity, user-input events, system events and group names.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view Events details, perform the following steps:

1. Click EVENTS on the navigation bar. The Events page appears.

OR

Click the List View link at the top right corner of the Events Summary area on

the Dashboard window.

2. Click the Advanced Filter link. This option allows advanced filter facility for

events, based on event severity, user-input events and group names.

Fields Functions and Descriptions

Select Event Type Select the checkbox(es) to filter events based on event type.

Events

673

Fields Functions and Descriptions

The available checkbox(es) are Group Events, All User Input Events, System Events.

Note:

The "System events" option will be available only to Administrator and Super Administrator users.

Select Event Severity Select the checkbox(es) to filter events based on event severity.

The available checkbox(es) are Critical, Serious, Warning, Info.

Select Event Status Select the checkbox(es) to filter events based on event status.

The available checkbox(es) are New, In Progress, Closed.

Select Groups Select the group(s) for which you want to filter events from the list box.

Hold down the "Ctrl" key to select more than one group. To select all groups associated with the user, select "-All My Groups-" option.

Complete Listing of Events

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

You can view detailed information about the different events that have occurred so

far in the entire DR environment by performing the following steps:

1. Click Current Events link in the Secondary Navigation Bar in the top right corner.

The Events page appears.

2. Click View All Events link at the top right corner of the window. It displays the

following information about an event:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 674

It displays the following information:

Fields Description

Event [ID] Displays the unique identification for the occurred event.

Event name Displays the name of the event.

More than one event can have the same name.

Group/ Subsystem Name

Displays the name of the Group or Subsystem to which the event is associated.

Severity Displays severity of the event. The difference in the

severity is shown by color coding. Refer Managing Events

for more details.

When the severity level goes high, the events are

considered as CRITICAL. Refer Viewing Group Events

topic for information about the possible severity levels for

an event.

Status Displays the status of the event.

Occurred time Displays the time at which the event occurred in the format yyyy-mm-dd hh:mm:sec.

For example, 2006-06-06 15:06:19.0.

Description Displays the description of the occurred event.

This page lists the events occurred in the DR environment.

The following table shows the functionality of each button:

Button Description

Refresh Refreshes the page to fetch the latest events.

Next This button is displayed when there are more events to be displayed other than the 30 events displayed on

Events

675

the current page.

Every BCO operation will be notified to the users configured in the Notification list of

that Group. The following are the sample notifications sent to the users configured to

the AG and it’s associated RGs.

When BCO is initiated on an AG, notifications are sent to users in the notification list

in the AG. Here is a sample mail.

Subject:

IBM Resiliency Orchestration: testAG1: Failover started at 2005-05-10

21:10:49.74

Notification:

Notification List: Test_NL1,

Group Details:

...Name: testAG1

Description: this is testAG1

Type: APPLICATION GROUP

Current Status: MANAGED, INACTIVE

Operational Details:

Continuity Operation: Failover

Status: Failover started

Start Time: 2005-05-10 21:10:49.74

End Time: -

Actions to be performed by User: None

After this, notifications are sent to the users of Notification List of every RG. Here is a

sample mail for RG.

Subject:

IBM Resiliency Orchestration: testFG1: Failover started at 2005-05-10

21:12:10.292

Notification:

Notification List: Test_NL1,

Group Details:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 676

Name: testFG1

Description: this is testFG1

Type: FUNCTIONAL GROUP

Current Status: MANAGED, INACTIVE

Operational Details:

Continuity Operation: Failover

Status: Failover started

Start Time: 2005-05-10 21:12:10.292

End Time: -

Actions to be performed by User: None

If a user input is required, then a notification is sent to all the users of the

Notification lists of the RG. Click here to see a sample mail.

Subject:

IBM Resiliency Orchestration: testFG1: Failover waiting for user input since

2005-05-10 21:13:17.953

Notification:

Notification List: Test_NL1,

Group Details:

Name: testFG1

Description: this is testFG1

Type: FUNCTIONAL GROUP

Current Status: MANAGED, INACTIVE

Operational Details:

Continuity Operation: Failover

Status: Failover blocked, awaiting user input

Start Time: 2005-05-10 21:12:29.0

End Time: -

You have to perform the following actions:

Events

677

Login to IBM Resiliency Orchestration and take the necessary actions for the Group

“testFG1”.

When the BCO on RG failed/succeeded then notifications are sent.

Subject:

IBM Resiliency Orchestration: testFG1: Failover failed at 2005-05-10

21:49:38.0

Notification:

Notification List: Test_NL1,

Group Details:

Name: testFG1

Description: this is testFG1

Type: FUNCTIONAL GROUP

Current Status: MANAGED, INACTIVE

Operational Details:

Continuity Operation: Failover

Status: Failover failed

Start Time: 2005-05-10 21:12:29.0

End Time: 2005-05-10 21:49:38.0

Perform the following actions:

Log in to IBM Resiliency Orchestration and check the detailed Workflow status on the

Application/ Recovery Group > RG listing > Group Name > Continuity Workflow Details

link to determine the reasons for failure.

When a BCO on RG fails, it translates to a AG failure. Then a notification is sent to all

notification lists of the AG.

Subject:

IBM Resiliency Orchestration: testAG1: Failover failed at 2005-05-10

21:50:04.0

Notification:

Notification List: Test_NL1

Group Details:

Name: testAG1

Description: this is testAG1

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 678

Type: APPLICATION GROUP

Current Status: MANAGED, INACTIVE

Operational Details:

Continuity Operation: Failover

Status: Failover failed

Start Time: 2005-05-10 21:12:08.0

End Time: 2005-05-10 21:50:04.0

You have to perform the following actions:

Log in to IBM Resiliency Orchestration and check the detailed action set status on the

Continuity pages to determine the reasons for failure.

Viewing Sequence of Events

The SOE bands are configured to show hours in the top band, and dates in the lower

band. These bands are configured to synchronize with each other such that panning

one band scrolls the other. The initial view of the Timeline format displays the

current date and time centered on the screen. Any events that have recently

occurred will be displayed. You can scroll by double clicking the mouse pointer on the

right or left side of the Timeline format.

Events are identified by name on the Timeline. Icons next to each event on the

Timeline will be the same icons used in the tabular list. Clicking on an event will pop-

up a bubble containing the time stamp associated with the event, the event number

and event description. You can close the pop-up by clicking anywhere outside the

bubble but within the Timeline format or by clicking the icon.

On clicking the Events tab, the sequence of events graph is displayed. The user can

also view the events by following the path below.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view sequence of events:

1. Click Current Events link in the Secondary Navigation Bar in the top right

corner. The Events page appears.

2. Select Show SOE from the Select Action drop-down list under OPERATION.

The Sequence of Events page appears.

Events

679

System Events

System events can be viewed only by super administrator or administrator. At least

one notification list or SNMP Trap Forwarder must be configured to receive

notifications regarding system events. There will not be any policy configuration for

system events.

Note:

There will not be any auto refresh to this page.

To view system events:

1. Click Admin > System Events on the navigation bar.

2. The System Events page appears with the following information.

Field Description

Event ID Displays the respective Event ID which identifies each event.

Event Description Provides a brief description of the respective event.

Event Severity Displays the level of severity of the respective event.

Event Impact Provides information on affect/effects about the event.

Notify Allows you to send notification regarding the event to the user.

By default, SERIOUS and CRITICAL events are notified.

3. Select the check box corresponding to the Event ID for which you want to

notify the user on occurrence of it.

Note:

To receive notification regarding the event, at least one notification list or SNMP Trap

Forwarder must be associated with the group. For more information on creating

notification list, refer to Adding Notification List.

4. Click the Update Selection button.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 680

Monitoring Events

You can view the summarized view of the properties of all configured Groups by

clicking the EVENTS tab on the navigation bar.

Following table explains the specific information displayed for each Group in the

Events page.

Field Description

Group Name Displays the name of the monitored RG .

Click this Group link to view the complete event

list of the Group.

Critical Displays the number of events of severity CRITICAL that have occurred at the RG level.

Refer Viewing Group Events topic for

information about the possible severity levels for an event.

SERIOUS Displays the number of events of type SERIOUS that have occurred on the RG.

View the complete list of events across groups by clicking the View All Events link

at top right corner of the page. This list displays BCS and Agent events. BCS events

are Group specific and are raised on different BCOs of a Group. Agent events are not

specific to a Group and are raised for various components of the DR environment.

Monitoring Users and Passwords for raised

Events

IBM Resiliency Orchestration provides monitoring of database users and passwords.

Adding, deleting a user and changing the password for a user raises a BCS Event in

IBM Resiliency Orchestration. These events inform you the changes done for

database users and their passwords. It is recommended to add or delete a user and

change the password, when Normal Copy is in progress.

For MSSQL and Sybase databases, the system level database user and the users

authenticated by this user are monitored. However, for the Oracle database, only the

user specified at the time of Oracle dataset setup is monitored.

Note

Events

681

Avoid using system level log-in credential while adding or deleting a user. This is to

avoid failing the operations running on the database, if you change the password

later.

IBM Resiliency Orchestration monitors the users and passwords related changes

every ten minutes. If more than one users are added in less than ten minutes, these

changes are summarized and reported in a single event. If one or more users are

added and deleted in less than ten minutes, two separate events are raised, one

each for adding and deleting users.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 682

group_dashboard_overview_htm

Recovery Automation

Managing Groups

Group Maintenance - Working with Different Modes of Group

This chapter describes how to change the modes of a Group.

However, Group's BCM state may change automatically as a result of failure of one

of the actions in a BCO.

Such situations are handled by IBM Resiliency Orchestration itself in the concrete DR

Solution. In a generic DR Solutions, IBM Resiliency Orchestration provides facility to

customize BCO workflows as per your needs. As part of this customization, you can

trigger another BCO, if the current BCO fails. This is achieved by adding a Trigger

BCO action manually in the workflow. However, it may be possible that the intended

action from Trigger BCO is already completed or in progress, when the current BCO

fails. This results in the failure of Trigger BCO action. In such cases, click Continue

in the Workflow Manager page to skip the failed action and to move to the next.

Continuity Management Overview

You can view the list of groups being managed by IBM Resiliency Orchestration by

clicking

either the Monitor or the Manage tab on the IBM Resiliency Orchestration GUI.

As soon as the groups are configured, you can edit, delete and manage the following

by clicking the Manage tab on the IBM Resiliency Orchestration GUI:

Recovery Automation

683

• RG Listing - Provides the list of groups being managed with the group

continuity state and the Workflow details.

• Executing Workflows - Provides the list of current actions of the respective

continuity operations being executed.

Click the respective links to view the current continuity operation and action set

being executed for a specific group.

Click on to sort the following columns:

Field Name Description

GROUP NAME Sorts by group states

CURRENT STATE Sorts by group continuity states

Note:

In Manage:

▪ You can change continuity states.

▪ You can initiate BCOs.

▪ You can Start and Stop replication.

To navigate to Monitor, Reports, Drills or Discover page of a displayed group:

1. Click Manage

2. Select the required tab from the drop down.

Note:

If the Group is in Switchover mode, it cannot be managed with only the Recovery

license enabled. To manage the Group, enable the Test license and change the state

to Normal mode.

Changing Group to Managed Mode

Any BCO on the Group can be performed only when the Group is in the Managed

state.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To change the Group to MANAGED mode, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 684

2. Click Recovery Group or Application Group tab, the respective Group listing

page appears.

3. Click corresponding to the desired group. The Continuity Operation window

appears.

4. Click the Manage Group button.

Note:

You cannot modify the Group details, when the Group is in Managed mode.

5. A message box with successful Group mode change operation is displayed.

Click OK on the message box displayed.

If the Group is in MANAGED mode currently and not executing any continuity

operation, it may be put into MAINTENANCE mode.

Changing Group to Maintenance Mode

Note

If a policy is being executed for a Group, you cannot change that Group to

Maintenance mode. Trying to move it anyway will display an error message. You may

need to stop the policy execution or let it complete before changing the Group to

Maintenance mode.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To change the Group into Maintenance mode, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing

page appears.

3. Click corresponding to the desired group. The Continuity Operation window

appears.

The maintenance activities can be used by the owner of the Group to bypass certain

activities or to recover from certain failures. All maintenance related activities should

be done only after moving the corresponding Group to Maintenance mode. Further,

all related agents should be stopped before performing maintenance activities.

Caution

Usage of this activity, if not performed correctly, may significantly impact the

Continuity Management of the Group. It is not recommended to be used by the end

user.

4. Click the Move to Maintenance button.

Recovery Automation

685

5. A message box with successful Group mode change operation is displayed.

Click OK in the message box displayed.

Note

To manage AG's, all the RG's should have similar modules assigned to them. And

each RG inside the AG should have atleast one module assigned.

icon corresponding to a group is enabled and you can change the group to

maintenance mode when no workflows are running or when BP workflows or event

policy workflows are running.

icon corresponding to a group is disabled and you cannot change the group to

maintenance mode during any BCO or SO/SB drills execution.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 686

Changing the Business Continuity State of a Group

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To move the Group from current Business Continuity State (BCS) to a new BCS,

perform the following operations:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group listing

page appears.

3. Click corresponding to the desired group. The Continuity Operation window

appears.

4. Click the Change Continuity State tab.

5. Select the required Group State field from the drop down list.

6. Click Change.

7. Click OK.

Note

A Group can be moved to a new continuity state only when the Group is not

executing any continuity operations.

The following are the Select Target State options for the below licenses:

Select Target

State options

Test

License

Recovery

License

Test and

Recovery

License

NORMAL RESET

NORMAL INACTIVE

FAILOVER ACTIVE

Recovery Automation

687

Select Target

State options

Test

License

Recovery

License

Test and

Recovery

License

FALLBACK ACTIVE

SWITCHOVER INACTIVE

Note

▪ icon corresponding to a group is enabled and you can change the Business

Continuity State of a Group when no workflows are running or when BP

workflows or event policy workflows are running.

▪ icon corresponding to a group is disabled and you cannot change the

Business Continuity State of a Group during any BCO or SO/SB drills

execution.

Business Continuity Operations

Based on the current BCM and BCS (Business Continuity State) of the Group,

continuity operations such as ‘Initiate NormalCopy’, ‘Initiate Failover’, 'Initiate

Fallback’ etc. are possible. These operations are listed as selectable buttons. The

complete list of operations is as given below:

Operations Description

Initiate NormalFullCopy

This operation initiates NormalFullCopy operation.

Initiate NormalCopy This operation initiates NormalCopy on the specified FG. This typically involves periodic extraction of data from production and application of changed data on

DR. In some DR Solutions, NormalCopy is a monitoring only operation, as the replication technology in use handles transferring the data between the production and DR databases.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 688

Operations Description

Stop NormalCopy This operation stops the NormalCopy on the Group under consideration. Clicking this button displays a

page to reconfirm the stopping of the operation.

Initiate Reverse NormalCopy

This operation is the reverse of the NormalCopy as this is initiated after the Switchover operation and

the data is replicated from production (configured DR) to the DR site (configured production).

Initiate Failover

This operation initiates Failover operation on the

Group during the failure of the production site.

Clicking this button displays a page to reconfirm the initiation of the operation.

Initiate Fallback This operation initiates a Fallback operation when production comes live again.

Change Continuity State

This operation lets you move a Group from the current BCS to a new BCS.

This operation is possible only when the Group is not executing any continuity operations currently.

Resume Operation This operation lets you to get back IBM Resiliency Orchestration server online after the server crash.

Note

In generic solutions, IBM Resiliency Orchestration provides facility to customize BCO

workflows as per your needs. As part of this customization, you can trigger another

BCO, if an action in the current BCO fails. This is achieved by adding a Trigger BCO

action manually in the workflow. However, it may be possible that the intended

action from Trigger BCO is already completed or in progress, when an action in the

BCO fails. This results in the failure of Trigger BCO action. In such cases, click

Continue in the Workflow Manager page to skip the failed action and to move to the

next.

The following table lists the next possible operation based on the current state of

operation.

Note

Reverse Copy button appear only when the DR Solution type supports these BCOs.

Recovery Automation

689

State Next Operation

Normal Reset Initiate NormalFullCopy, Change Continuity State, Move to Maintenance

Normal Inactive Initiate NormalCopy, Initiate Failover, Change Continuity State, Initiate Switchover, Move to Maintenance

Normal Transit -

Normal Active

Stop NormalCopy

Normal Failed Initiate NormalCopy, Initiate Failover, Change Continuity State, Initiate Switchover, Move to Maintenance

Normal Degraded Stop NormalCopy

Switchover Inactive Change Continuity State, Initiate Reverse Copy, Initiate Failover, Initiate Switchback, Move to Maintenance.

Switchover Transit -

Switchover Active Stop Reverse Copy.

Switchover Failed Initiate NormalCopy, Initiate Switchover, Initiate Failover, Change Continuity State

Failover Transit -

Failover Failed Initiate Failover, Initiate NormalCopy, Change Continuity State, Move to Maintenance

Failover Active Initiate Fallback, Change Continuity State, Move to Maintenance

Fallback Transit -

Fallback Failed Initiate Fallback, Change Continuity State, Move to Maintenance

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 690

State Next Operation

Fallback Active Initiate FallbackResync, Change Continuity State, Move to Maintenance

Normal Shutdown Resume Continuity operation, Change Continuity State, Move to Maintenance

Normal Stopping -

Normal Test Initiate NormalCopy, Initiate Failover, Change

Continuity State, Initiate Switchover, Move to Maintenance

(Do not perform any BCO when the test exercise are being performed on the Group)

The following table technically explains the Business Continuity Operations and the

state of production and DR server. It is applicable only for DR Solutions based on

Sybase and MSSQL databases.

BCO

Functionality

Production

Server’s

mode of

operation

DR

Server’s

mode of

operation

Before NormalFullCopy

Nil

Read, Write

No existence of database

After NormalFullCopy

Takes full dump of data from production to DR site and both servers are in sync with each other.

Read, Write Standby

NormalCopy Copies incremental log files from the production to DR.

Read, Write Standby

Reverse NormalCopy

(Not supported for DR Solutions

based on

Copies log files from current production site to current DR site.

Standby Read, Write

Recovery Automation

691

BCO

Functionality

Production

Server’s

mode of

operation

DR

Server’s

mode of

operation

MSSQL and

Sybase databases)

Auto Failover Production server is brought down and the DR server is made available

for access.

No Data is available

Read, Write

Manual Failover Standby Read/Write

Before Fallback Start

The server at the production site should not

have any data.

NA Read/Write

After Fallback The existing copy of data on the DR server (current

production server) is copied to the production. The data on the remote is deleted after a copy is

made to the production.

Read/Write Standby

FallbackResync This operation copies the incremental log on the current production server (DR) to the production server.

Read/Write

Standby

At the end of FallbackResync

The production server is brought back to production and the DR server is made

stand-by

Read/Write Standby

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 692

Configuration of BCOs

Every Group is associated to business continuity operations (BCO) through the

supported DR Solution types. The continuity operations for a Group are as follows:

▪ NormalFullCopy

▪ NormalCopy

▪ Failover

▪ Fallback

▪ FallbackResync

BCOs are configured when the actions associated to each operation are configured.

To configure a BCO perform the following steps:

1 Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2 Click Recovery Group or Application Group tab, the respective Group Listing

page appears.

3 Click the required group from the GROUP NAME column for which you want to

configure the BCOs. The Group Details Page appears.

4 Click the Group Configuration tab.

5 Click the Continuity tab.

6 Click respective BCO to configure its actions. This opens the Workflow Details

page with a list of actions.

Note

All actions should be configured before the execution of respective BCO.

Recovery Automation

693

NormalFullCopy

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To start the NormalFullCopy operation perform the steps provided in Executing

Business Continuity Operations topic in this Help.

In this operation, the full dump of the configured database on the production server

is copied to the DR server either manually or through network connection.

Refer to the ‘Executing BCOs’ topic in the respective solution guide under DR

Solutions Supported by IBM Resiliency Orchestration book in this Help for more

information on the execution of the NormalFullCopy operation.

At the end of this operation, the DR server goes to ‘standby’ mode and the

production server remains in read-write mode. At the end of this operation the DR

Solutions and the DR database are in-sync with each other.

When NormalFullCopy is initiated at the AG level, the operation gets triggered on the

associated RG to perform NormalFullCopy operation at the AG.

When this operation has been initiated, the actions associated with this operation will

be executed.

If Inform Upon is set to ‘ALL’ during the action configuration of this Business

Continuity Operation, then you can see a window pop-up displaying the status of the

operation at the completion of this operation. Suppose a particular action is not

executed correctly, then you can see action failure wizard. Click Retry button to re-

execute the action execution. If this message persists, please contact IBM Resiliency

Orchestration support.

If all the actions are executed, the Execution Status of the NormalFullCopy operation

can be viewed by clicking the Monitor OR Manage on the Navigation bar and

following the path-

Recovery Groups > Group Name > Continuity Workflows > Execution Status.

Note:

You can click the Pause/ Resume button at any time to pause or resume the

operation respectively for the Application Recovery on AWS solution (VMware to

AWS).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 694

NormalCopy

The operations that can be initiated next to NormalFullCopy are NormalCopy and

Failover. Failover is triggered only at the time of disaster. NormalCopy is a recurring

process, where the data is replicated to the DR site at a specified time interval to

make both the sites in-sync with each other.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To start the NormalCopy operation perform the steps provided in Executing Business

Continuity Operations topic in this Help.

During NormalCopy the incremental log files generated on the production server are

copied to the DR server at equal intervals. This is an on-going process and will never

end until the process is intentionally stopped or accidentally stopped by a disaster.

So, during this operation the production server is the primary server and the DR

server is the Stand by server.

For the SRS solution, NormalCopy is a monitoring only operation, as managing the

process of transferring data between the production and DR databases is handled by

the Sybase Replication Server.

Note

NormalCopy cannot be initiated during Test Exercises.

The execution window of the NormalCopy operation lists the following details:

▪ Configured Properties

▪ Current Properties

▪ Recent continuity operation

▪ NormalCopy Operation Additional Details

The table lists the values configured before initiating the NormalCopy operation. The

production site is the primary site at the time of NormalCopy operation. These values

are listed in the Configured column.

The value listed in the Current column indicates the current value depending on the

BCO execution. The current production site could be either primary or DR site

depending on the business continuity operation. When NormalCopy is going on, the

production site’s properties are displayed, as production site functions as the primary

site.

Properties Configured Current

Production site

The name of the primary site. This is applicable to the AG.

The name of the current production site. It may be either primary site or DR site depending on the current BCM. This is applicable to the AG.

Recovery Automation

695

Properties Configured Current

Production server

The name of the primary server.

The name of the current production server.

DR site This gives the DR site name. This is applicable to the AG.

This gives the DR site name if applicable otherwise it’s shown as ‘Not Applicable’. This is applicable to the AG.

DR server The name of the DR server.

This gives the DR site name if applicable otherwise it’s shown

as ‘Not Applicable’.

BCMs This lists the possible BCMs of the Group. This is applicable to the AG.

This shows the ongoing BCM. This is applicable to the AG.

BCM State Not Applicable. This gives the current BCM state. For state details refer BCM configuration section under Group properties. This

is applicable to the AG.

Current

Group State

Current state of the

group. Current state of the group.

Current Continuity Status

Current continuity status of the group.

Current continuity status of the group.

Recent Continuity Operation: (displayed only at the FG level)

Continuity Operation The name of the recent BCO executed.

Start time Time stamp of recent BCO start.

End time Time stamp of BCO completion.

To view the actions configured for the current continuity operation, click on Workflow

Details link corresponding to the Continuity Operation.

Recent Continuity Operation: (only at AG level)

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 696

Continuity Operation

The name of the recent BCO executed.

Start time Time stamp of recent BCO start.

End time Time stamp of BCO completion.

Recovery Groups This lists the RGs associated with the AG. Click on the RG link to view the Workflow details. This is specific to the

AG and the following details are common between AG and RG.

Start Time Displays the start time of the operation on that RG.

End Time Displays the end time of the operation on that RG.

NormalCopy Operation Additional Details: The following information is common

between the RG and the AG and it is specific to the DR Solution types. Refer to the

‘NormalCopy’ section under ‘Business Continuity Operations Management’ section in

the respective reference guides.

The NormalCopy additional details are displayed separately for all the RGs associated

to the AG on the NormalCopy execution window at AG level. For additional detail

pertaining to NormalCopy, refer to the respective books under DR Solutions

Supported by IBM Resiliency Orchestration book in this Help.

Example: For Application SubSystem solution type, the following information is

displayed under NormalCopy operation Additional Details table on the NormalCopy

execution page.

Application Files Modification Timestamp

Displays the time and date when the application files got modified.

Last Replicated Application File Timestamp

Displays the timestamp of the last replicated Application file.

During the NormalCopy operation the difference in data is transferred to the DR site.

In both these cases the current production site is primary and so the values in the

configured property and current property are the same. BCM in the current property

tables details the current operation, which is irrespective of production and DR site.

BCM in the configured property table shows the possible BCM operation at the time

of configuration.

Recovery Automation

697

For example: Assume that a disaster strikes at primary site, in this situation the

remote site has to be brought up to function as a production site. During this

operation the values of ‘Configured Property’ and ‘Current Property’ tables are

different as the current production site is DR site, BCM is Failover and DR site values

turns invalid as DR site does not exist during Failover operation.

Again during Fallback mode where the production starts functioning as primary, the

values in both the tables are same.

When the NormalCopy operation is stopped in response to an event that occurs

during data replication failure between production and the DR sites, then you can

automatically resume NormalCopy through a configured policy.

To know about the event and policy refer to Managing Events section of ‘Executing

BCOs’ chapter under DR Solution Supported by IBM Resiliency Orchestration book in

this Help.

You can set the frequency of dump and apply interval for NomalCopy at the time of

NormalCopy operation configuration for database log and Application SubSystem

solutions. Refer to the respective book under DR Solutions Supported by IBM

Resiliency Orchestration book in this Help for information on configuring the

NormalCopy frequency.

RPO and the Dump/Apply Intervals

The Apply Interval is usually set to more than or equal to the Dump Interval. The

RPO (Recovery Point Objective) should always be more than the greater of Dump

and Apply Log Interval. For example, if the Dump Interval is 5 minutes and the Apply

Interval is 10 minutes then, RPO should be 12 minutes or more.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 698

Reverse Normal Copy

This operation is performed after performing the Switchover operation. The Reverse

Copy operation is similar to the NormalCopy operation, but the replication happens

from the current production server to the current DR server.

The Reverse Copy operation execution page is same as the NormalCopy operation

execution page. To get information on the Reverse Copy operation page elements,

refer to ‘NormalCopy’ in this section.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To start Reverse Copy operation perform the steps provided in Executing Business

Continuity Operations topic in this Help.

Fallback

During this operation a full dump of data from the current production server (DR

server) is copied to the configured production server. Then the configured production

server is brought back to production at the end of the Fallback operation.

At the end of the Fallback operation, the state of the DR database is dependent on

the supported DR Solution type. In all DR Solutions, the production database is

brought into production at the end of the Fallback operation.

In Application SubSystemand MSSQL solutions, the DR database is brought into the

mounted state at the end of Fallback operation but in Sybase solution, the DR

database is brought into standby mode in the beginning of the FallbackResync

operation.

Note

All the RGs linked to an AG will be failed over or fallen back together always. Any

failure in a RG is treated as a failure in all the RGs and the same continuity action is

performed on all.

Refer to Executing Business Continuity Operations for information on initiating

Fallback operation.

Failover

The Failover operation is initiated when the production server goes down. Failover

can be initiated either manually or automatically. Failover is manually initiated by

stopping the NormalCopy operation. It is automatically initiated when events are

configured to start this operation on occurrence of disaster. Based on the severity

level of the occurred Events, the corresponding configured policy set will initiate

Failover operation.

Recovery Automation

699

For example, if the production database is down, an event will be raised. This event

will stop the ongoing NormalCopy and will initiate the Failover operation.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The execution status of the Failover operation cannot be seen as the operation

automatically triggered due to server down condition. During the server down

condition agents will not be able to connect to the server, and hence the execution

status of the Failover operation cannot be shown. Refer to Executing Business

Continuity Operations to know how to initiate Failover operation.

Failover operation can be performed only during certain situations after the sites are

switched over. IBM Resiliency Orchestration server is always placed in the configured

site i.e. DR site. After Switchover is performed, the configured DR becomes the

production server. So, the IBM Resiliency Orchestration server is said to be placed at

the production site after Switchover. In this case, if WAN link failure occurs between

the two sites, the control cannot be switched over to the DR site as it is done in

normal setup (where IBM Resiliency Orchestration server is placed in the remote

site) because IBM Resiliency Orchestration ™ is situated in the production site.

This setup (Switchover) supports Failover for the following conditions:

▪ Database down

▪ Database server down

This setup (Switchover) cannot support Failover for the following conditions:

▪ Site Collapse

▪ WAN link failure

IBM Resiliency Orchestration supports automatic failure when the events are

configured to initiate the Failover automatically on a failure or disaster. Otherwise,

the Failover operation is initiated manually.

For execution part of this operation based on the DR Solution type, refer to the

respective DR Solution reference guide.

When Failover is initiated at AG level, then this operation is executed on all RGs

associated to the AG. All the RGs will be failed over together always. Any failure in a

RG is treated as a failure in all the RGs and the same continuity action is performed

on all.

During Failover the DR server is brought into production. When the Failover

operation is executed on the Group, the ‘Additional Details’ section in the

NormalCopy page that displays the log file details cannot be seen as the Failover

operation is automatically triggered due to server down condition. During the server

down condition, agents will not be able to connect to the server, and hence, the

execution status of the Failover operation will not be shown.

Once Failover operation is complete, follow the path Manage > Recovery

Groups> Group Name > RG Details page initiate the next operation or refresh

the page to initiate next operation.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 700

The Failover time of the AG is calculated as sum of recovery time of all RGs

associated to the AG.

FallbackResync

This operation is initiated to bring the DR database and the production database in

sync.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To start the FallbackResync operation perform the steps provided in Executing

Business Continuity Operations topic in this Help. This operation has to be started

from the AG level Groups page.

An Example to have a Clear Understanding of all Five BCOs

Assume that, the production site is at Bangalore and the DR site is at Mumbai.

During NormalFullCopy the full dump is manually transferred from Bangalore server

to the Mumbai server. This operation synchronizes the data on the two servers.

During NormalCopy operation only incremental data is transferred to the Mumbai

server.

Assume that a disaster strikes the production site (Bangalore) 10.A.M 10-10-2005.

The Failover operation transfers the business to the DR server and it starts

functioning as the current production server.

Assume that the collapsed site comes back online at 2 P.M the same day. In the

Fallback operation the full dump from the Mumbai (current production) server is

copied to the Bangalore server (current DR). This operation may take some amount

of time (say 4 hours), during which some more transactions may happen in the

current production site. This additional data is also copied at the end of the Fallback

operation and the Bangalore server is brought into production.

During FallbackResync operation, the two servers are brought into sync and are

made ready for the NormalCopy operation.

Executing Business Continuity Operations

You can enable continuity operations on a group and manage its state details by

clicking Manage tab on the navigation bar. During execution of the BCO, the actions

configured for that BCO is executed in the order of configuration.

You can stop IBM Resiliency Orchestration services at any time during the execution

of BCO.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Recovery Automation

701

To execute NormalFullCopy, NormalCopy, or Reverse NormalCopy :

1. Click Manage> Recovery Groups > RG listing page is displayed. This page

lists all Groups assigned to the current user.

2. Click a group from the GROUP NAME column. Click View All Workflows.

3. The BCO workflows are displayed.

Note

Only Super Administrator can start/stop BCOs for Groups of other users. The users

with Administrator privileges can start BCOs for Groups assigned to them but cannot

stop BCOs initiated by other users for the same Groups.

4. Click the respective BCO to initiate the operation.

The following are the BCOs displayed:

▪ NormalFullCopy

▪ NormalCopy

▪ ReverseNormalCopy

Refer to Business Continuity Operations for more information.

5. Click Execute a confirmation pop-up is displayed with Execute and Cancel.

6. Click Execute to confirm the execution. Click Cancel to cancel the execution.

To execute Failover, Fallback, or FallbackResync :

1. Click Manage> Recovery Groups > RG listing page is displayed. This page

lists all Groups assigned to the current user.

2. Click a group from the GROUP NAME column. Click View All Workflows.

3. Click the Recovery Workflows tab to proceed with the continuity operations

execution.

Note

Only Super Administrator can start/stop BCOs for Groups of other users. The

users with Administrator privileges can start BCOs for Groups assigned to

them but cannot stop BCOs initiated by other users for the same Groups.

4. Click the respective BCO to initiate the operation.

The following are the BCOs displayed:

▪ Failover

▪ Fallback

▪ FallbackResync

Refer to Business Continuity Operations for more information.

5. Click Execute a confirmation pop-up is displayed with Execute and Cancel.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 702

6. Click Execute to confirm the execution. Click Cancel to cancel the execution.

On the Manage page, click the respective RG link under Recovery Groups to view

the list of actions executed on the RG along with the notification information. You can

manage the action being executed and choose to terminate a particular action from

the Recovery page.

Failover on any one of the RGs that are linked to an AG is defined as ‘Any BCO on

one is BCO on all’ i.e. if Failover is triggered on any one of the RG will trigger

Failover on the AG to which the RG is associated.

Note:

All RGs linked to an AG will be failed over or fallen back together always. Any failure

in a RG is treated as a failure in all the RGs and the same continuity operation is

performed on all RGs belonging to that AG.

Caution

Usage of the Failover operation may significantly impact the continuity management

of the Group, if not performed correctly.

Start and Stop Replication

The Replication Management allows protection parameter configuration, execution

and displays the health of replication activity. The replication mechanism is

applicable only in Normal mode. The Normal mode operation periodically obtains the

protection details and stores them. The Replication Management allows parallel

protection management operation on multiple Groups at the same time. You can

implement the configuration of protection parameters, based on the privilege

specification.

As part of the replication management, IBM Resiliency Orchestration provides the

following key capabilities for each database under protection:

▪ Monitor the health of WAN links (up or down conditions). This is applicable

only for an Application Group.

▪ Health of the log replication activity

▪ ndividual database level control

The above management capability is provided at each database level for higher

flexibility and decentralized management control.

The Replication Management is enabled only after the Group creation. The replication

status of the Application Group can be Active, Inactive, or Degraded based on the

status of the Recovery Group attached to it. The data replication occurs at the

Recovery Group level only. The replication failures are reported at Recovery Group

level, but elevated to Application Group level.

Recovery Automation

703

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Perform the following steps to initiate replication:

1. Click Manage> Recovery Groups on the navigation bar. The Recovery

Groups List page appears.

2. Click the desired Group from the Group Name column and click Replication

tab.

3. This page displays the replication details and you can monitor the health of the

data replication that is going on. You can perform the following operations on

the Group:

▪ Click Stop Replication to stop the replication after initiating the NormalCopy

operation.

▪ Click Start Replication to start replication to resume the operation after a

halt.

▪ Click Refresh Details to get latest replication details.

Note:

You can also Refresh Details by performing the following steps.

1. Click Monitor > Recovery Groups on the navigation bar. The Recovery

Groups List page appears.

2. Click the desired Group from the Group Name column and click Replication

tab.

3. Click Refresh Details to get latest replication details.

The information displayed in this page varies with the DR Solution type supported.

The replication properties depend on the BCO. The following topics explain about the

replication status during various BCO at Recovery Group and Application Group level.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 704

NormalFullCopy

The following details are displayed on the Recovery Group details > Replication tab.

Field Description

Replication Status Active

Last Successful

Replication Time Not Applicable

Last Failed Replication Time

Displays the time of the replication that had failed.

Last Replicated Data size

Displays the size of the data replicated. The data size is zero in case of replication failure or shows the replicated file size in case of successful replication.

In case of successful replication the value of Last replicated Data size increases as and when the additional data is copied from the Production to DR server.

NormalCopy and Reverse NormalCopy

The following details are displayed on the Recovery Group details > Replication tab.

Field Description

Fileset Name

Displays the name of the Fileset being replicated.

Protection Mechanism Displays the protection mechanism used for replicating the Fileset.

Replication Status Displays the replication status.

Last Successful Replication Time

Displays a time stamp of the last successful replication.

Recovery Automation

705

Field Description

Last Failed Replication Time

The value of this field is displayed only when failure had occurs during last replication.

Note

In the Normal Copy operation, if you click STOP button to abort the replication, the

PFR will not stop immediately. It will complete the file replication in progress and will

stop replicating further files. As a result, it may take few minutes to stop the

replication from Primary to DR.

On IBM Resiliency Orchestration Server restart, the continuing NormalCopy may not

resume again. To start it, refer Resuming NormalCopy on Server Restart for details.

Note

The properties of the Replication Management page during Reverse NormalCopy

operation (that is initiated after Switchover) remains the same as the NormalCopy

operation.

For example, Assume that the time of last replication is 10 a.m. and the amount of

data transferred is 4 MB. After replication has happened, consider 2 MB data has

been written onto Production and it will take one hour to copy data to the DR site.

After the difference in data has been copied to the remote site, the time of last

replication would be 11 a.m. and the last replicated data size would be 6 MB. In case

of replication failure during this operation, the last successful replication time would

remain as 10 a.m. and the replicated data size would be 4 MB and the last failed

replicated time would be the exact failure time (i.e. any time between 10 and 11

a.m.).

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 706

Switchover, Switchback, Failover, Fallback and FallbackResync

Data replication does not happen during Switchover, Switchback, Failover, Fallback

and FallbackResync operation and the non-availability of data is represented as

hyphen (’-‘) in the respective field.

The following details are displayed in the Replication tab at Application Group level:

Field Description

General Displays Production and DR site names.

Replication Status

This gives the current status of data replication. The various status of data replication are:

Managing Events

Events are failure or input required conditions in the DR environment. They are

classified into different severity levels based on the impact they cause to the DR

systems.

Different severity types are:

- Critical

- Serious

- Warning

- Info

Event would mean the highest threat level. The impact of an event on different

applications means different availability and management actions. The severity level,

Events is displayed when production data is down or database server is down. IBM

Resiliency Orchestration automates the management and execution of the policies

associated with each Event with optimal user intervention. It provides the capability

to customize policies associated with an Event condition to suit the needs of the

customer environment. IBM Resiliency Orchestration provides following key Event

Management capabilities for each Dataset under protection:

1. Identification of events that can impact the production data availability and

display the event details with the associated components that got affected.

2. All the events related to database, servers (primary and remote) will be

considered.

Recovery Automation

707

3. Provide alerts and notifications to configured users. E-mail and SMS

notifications will be sent to group of users, associated with a database

(application).

4. Customized policy configuration for each Event to suit the customer

environment.

5. Automated triggers to initiate the pre-configured policies, in response to the

failure condition.

To see all occurred events for a specific group take the folowing steps.

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group

listing page appears.

3. Click the required group from the GROUP NAME column to configure the

workflow. The Group Details Page appears.

4. Click Group Configuration> Events.

The Events tab displays the following details of Events/ events that occurred with

IBM Resiliency Orchestration.

▪ EVENT ID

▪ EVENT DESCRIPTION

▪ EVENT SEVERITY

▪ EVENT IMPACT

▪ NOTIFY

When event is raised, it does the following:

▪ Interacts with users to notify respective users about the event.

▪ Alerts to send notification list.

▪ Enables Continuity Manager to perform continuity actions such as Failover,

Fallback etc.

▪ Enables RPO/ RTO Manager to report all events that have an impact on RPO

and RTO, etc.

An event may be associated to a policy. A policy is a series of actions (operations)

that are executed in a certain sequence based on configuration parameters. These

are primarily defined to contain the impact caused by the event.

Managing Events through Event Correlation

Event Correlation helps manage the polar events. Polar Events can be explained by

an example. A network down event and a network up event are polar to each other.

If the network down event is followed by a network up event, then the network down

event must be canceled according to Event Correlation.

Event Correlation performs the following:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 708

▪ It cancels out polar events for all severity of events. However, the events that

are in EXECUTING or AWAITING INPUTS states are not cancelled though,

their polar events are raised. For example, if a network down is followed by a

network up event, then Event Correlation closes the network down event.

This allows you to focus on events that need your attention.

▪ It executes a policy in response to an event. Start of policy execution retires

the events that were polar to the event that started the policy execution.

Policy execution can be automatic or manual. It does not retire those events

that are not related to root cause of same failure. The events that are in

EXECUTING or AWAITING INPUTS states are not cancelled.

The polar events must be defined in a XML file to be used by the IBM Resiliency

Orchestration. At the time of installation, IBM Resiliency Orchestration deploys such

XML files for the solutions it supports. You may wish to edit these files to customize

them to your needs. However, you must restart the server after editing the XML file.

Following Table gives the names of the files that are deployed for the supported

solutions.

IBM Resiliency

Orchestration Supported

DR Solutions

Event Correlation XML Filename

MS SQL with PFR BCS-MSSQL-Logs-with-Panaces-File-Replicator-aec-rules.xml

Sybase with PFR BCS-SybaseLogPFR-aec-rules.xml

Sybase ASE with SRS BCS-SybaseSRS-aec-rules.xml

Application Subsystem with PFR BCS-ApplicationSubSystem-with-Panaces-File-Replicator-aec-rules.xml

The naming convention for the XML files is BCS-<BCSType>-aec-rules.xml. These

files must be placed under $EAMSROOT/installconfig/rules folder on IBM Resiliency

Orchestration Server.

Following Table gives the information about the XML tags that are used to define

Event Correlation rules:

Note

In XML, a tag with '/' indicates the end of that tag. For example, a tag </Rule>

indicates the end of the tag <Rule> used to define a Event Correlation rule.

Tag Description

<EventCorrelationRuleList> This tag indicates the start of the Event Correlation rules list.

<Rule> This tag indicates the start of definition of a Event Correlation rule.

Recovery Automation

709

Tag Description

<RuleType> This tag is used to specify the rule name you are going to define.

<InputEvent> This is used to specify the Event name that triggers the Event Correlation mechanism.

<PolarEvents> This tag indicates the start of the list of polar Events that are associated with <InputEvent>.

<PolarEvent> This tag specifies the name of the polar Event.

You may wish to do away with Event Correlation completely or partially . To disable

Event Correlation completely, you can do one of the following:

▪ Delete the XML file

▪ Take the back-up of the file in some other directory and remove it from the

current location or

▪ Delete the values specified for each tag.

To partially disable the unwanted rules in the XML file, do one of the following:

▪ Delete Rule

▪ Comment the rule tags

▪ Delete the tag values

List of Events based on severity can be classified as

Severity Events

Critical ▪ DR Related failure events like

o Replication failure for long time

o Server/App/DB down

▪ InfraFailures like

o Invalid credentials

o Remote server access failures

o Vault related failures

Serious ▪ SLA deviations like

o RPO deviation

o RTO deviation

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 710

Severity Events

o Datalag deviation

▪ Failures like

o Replication stopped/paused

o Process down

o App/DB specific or state related

events1

Warning ▪ IBM internal events

o Unable to compute RPO

o Agents down

o Network down2

Info ▪ All happy events

▪ Workflow user-input events3

Recovery Automation

711

Event Status

The interaction of Event Manager with others depends on the event status. The

following table lists possible status of an event:

Event Status Description

Open The status of an event is ‘Open’ only when the event is raised.

Notified An event for which notifications are sent to the

corresponding users through notification list.

For further details on notification list refer to Alerts topic.

Executing An event status is said to be ‘Executing’ only when a policy set for that event is under execution.

Some events may not have a policy set. In this case, this status is not applicable for that particular event.

Awaiting input The status change happens when the policy under execution requires user input.

Again this status is applicable for those events, which

have a policy associated to it.

Success An event status is successful when the policy under execution is successfully executed.

Failed An Event status is said to be ‘Failed’, when the policy under execution has failed.

Closed This state is manually set by the user when the associated problems are solved. But an event can be closed manually irrespective of the event status.

At any given point, only one instance of an event can be in open state and all other will be cancelled.

Event status is automatically updated by IBM Resiliency Orchestration in response to

the occurrence of above conditions.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 712

Synchronizing Date and Time between IBM Resiliency Orchestration Server and Client Machines

To adjust the Date and Time on client machines, perform the following steps:

1. Stop all Business Continuity Operations (BCO) including NormalCopy operation

on the Group(s) to which the machine belongs.

2. Move these Groups to Maintenance mode on IBM Resiliency Orchestration

Server.

3. Stop all agents on the machine.

4. Adjust the date/ time to be as close as possible to IBM Resiliency Orchestration

Server system time.

5. Restart all agents.

6. Restore Groups to Managed state.

7. Resume BCO operations on the Group(s).

To adjust Date and Time on IBM Resiliency Orchestration Server, perform the

following steps:

1. Stop all Business Continuity Operations (BCO) including NormalCopy operation

on all the Group(s).

2. Stop IBM Resiliency Orchestration Server.

3. Adjust the date/ time to clock time.

4. Restart IBM Resiliency Orchestration Server.

5. Resume BCO operations on all the Group(s).

713

Drills

Majority of the DR solutions fail at the time of disaster even with huge infrastructure

installation. This is either because there is no DR test plan in place or because the

plan is too complex or expensive to execute. Test Exercise provides complete

management control for performing DR test exercises and rehearsals. It provides

wizard based control to handle the exercises in an automated and reliable way.

IBM Resiliency Orchestration provides automated test exercise management for key

intrusive and non-intrusive tests. It provides following important capabilities:

▪ Individual FileSystem level test exercise execution and monitoring the status

of the same

▪ Automated execution of tests with wizard control for user intervention where

desired

▪ Intrusive test support – provides ‘Failover of the FileSystem’ test

▪ Non-intrusive test support – provides ‘DR FileSystem consistency and

integrity’ test

Each drill is pre-configured with a workflow to do the actual test and each of the

exercise is customized according to the your environment.

You have to execute the drills manually. IBM Resiliency Orchestration supports

executing multiple Drills in parallel. When Drills are being executed, allowing

continuity operations depends on the mode of the Drills you are executing. However,

Drills are not allowed, if the intended Group is under Unmanaged or Maintenance

mode.

The drills undergo different status during its life cycle. The possible values of status

are given in the following table:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 714

Status Description Next Possible Status

NEVER EXECUTED

The drills has never been executed so far.

START TEST

EXECUTING The drill is currently running. EXECUTING

SUCCESS The execution process has been successfully executed.

NO OPERATION

FAILED The execution process has

been failed.

STOP TEST/EXECUTING

AWAITING INPUT

The process is executing but requires user input. In this

case, there will be an action handler pop-up window requesting user input.

NO OPERATION

STOPPING This is an intermediate state indicating the drills in stopping. It goes in to this state when it is been manually triggered.

NO OPERATION

SHUTDOWN This occurs when IBM Resiliency Orchestration software or hardware fails or abnormal crash occurs.

NO OPERATION

The life cycle of the drills goes through seven processes. The initial state of the drills

is always NEVER EXECUTED.

Configuring Drills

Drills can be executed in any continuity state of a Group. It can be executed, while a

Business Continuity Operation (BCO) is running. If a drill interferes with a BCO, it

can impact the State of the System, BCOs, Group and Continuity health, and may

cause an Event.

Multiple drills can be run on Recovery Group simultaneously except for

Switchover/Switchback. However only one drill at a time can be executed on a

application Group.

During drill execution, the Group image will change to indicate that a drill is in

progress for that Group.

Drills

715

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To configure Drills, perform following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click the Recovery Group tab, the Recovery Group Listing page appears.

3. Click the required group from the GROUP NAME column. The Group Details

Page appears.

4. Click the Group Configuration tab.

5. Click the Drills tab.

Switchover

The Switchover operation is performed to run the business from the DR site, i.e. the

remote server is made to function as primary (production) server and the primary is

made to function as remote server for a desired amount of time.

The Switchover operation can be executed after NormalFullCopy operation or by

manually stopping the NormalCopy. To manually stop the NormalCopy operation click

Stop NormalCopy button on the NormalCopy operation execution page.

To configure switchover follow the path:

Go to Drills > Summary > Group Name.

The Drill Listing page is displayed.

Click Switchover.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Caution:

Disable the ‘Auto-Failover’ policy before initiating Switchover operation. To disable

the auto-failover policy, refer to the respective DR Solution book under DR Solutions

Supported by IBM Resiliency Orchestration.

During Switchover the BCM state is Switchover Transit.

The window elements after the Switchover has happened are same as the

NormalCopy Inactive BCM state except for a few things.

During Switchover Inactive state (i.e. after Switchover is complete) the Configured

properties and the Current properties differ i.e. the properties are interchanged.

For example consider the following configured properties:

Production Site: Mumbai

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 716

Production Server: Windows 1

DR Site: Bangalore

Production Server: Windows 2

After Switchover operation, the following information is displayed in Current

Properties section.

Production Site: Bangalore

Production Server: Windows 2

DR Site: Mumbai

Production Server: Windows 1.

If the operation fails during Switchover Transit, then BCM state moves to Switchover

Inactive.

Note

For Switchover, auto-failover policies need to be manually switched to manual for

RG's that are part of an AG.

Switchback

This operation brings the configured primary server to production and configured DR

server to function as remote (standby) server. This setup is same as the NormalCopy

operation. Once the Switchback operation is performed, the NormalCopy is started

on the Group.

To start the Switchback operation perform the steps provided in Executing Drills

topic in this Help.

To configure switchback follow the path:

Go to Drills > Summary > Group Name.

The Drill Listing page is displayed

Click Switchback.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Note

For Switchback, auto-failover policies need to be manually switched to manual for

RG's that are part of an AG.

Drills

717

Custom Drills

Customized drills can be added into or removed from IBM Resiliency Orchestration

dynamically. These drills can be created while creating a workflow. Such drills can be

added from Drills Dashboard page of a Recovery Group and Application Group.

Various actions can be imported into the customized test exercise using XML file

import. However, conventional method of configuring Drills by adding an action and

configuring it can also be followed.

To configure the Custom drills follow the path:

1. Click Drills on the navigation bar and click the Summary tab.

2. Click the desired Group Name. The Drill Listing page is displayed.

3. Click the custom drill.

Adding Drills

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To add a Drill:

1 Click Drills on the navigation bar and click the Summary tab.

2 Click the desired Group Name. The Drill Listing page is displayed.

Or

Click Discover>Groups on the navigation bar. Click Recovery Group tab and the

Recovery Group listing page appears. Click the desired group name from the Group

Name column. The Group Details Page appears. Click Drills on the sub navigation

bar. The Drills Listing Page is displayed.

3 Click Create New on the top right side of the page.

4 Enter Workflow Name in the text box and select Drill from the select Category

drop down list.

5 Click Create New.

Removing Drills

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Only customised test exercises can be deleted.

1 Click Drills on the navigation bar and click the Summary tab.

2 Click the desired Group Name. The Drill Listing page is displayed.

Or

Click Discover>Groups on the navigation bar. Click Recovery Group tab and the

Recovery Group listing page appears. Click the desired group name from the Group

Name column. The Group Details Page appears. Click Drills on the sub navigation

bar. The Drills Listing Page is displayed.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 718

3 Click corresponding to the customised drill to be deleted. A confirmation pop

up appears. Click Delete.

Configuring Drills

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

1 Click Drills on the navigation bar and click the Summary tab.

2 Click the desired Group Name. The Drill Listing page is displayed.

Or

Click Discover>Groups on the navigation bar. Click Recovery Group tab and the

Recovery Group listing page appears. Click the desired group name from the Group

Name column. The Group Details Page appears. Click Drills on the sub navigation

bar. The Drills Listing Page is displayed.

3 Click on the Edit button against the desired test exercise you want to configure.

The Edit Workflow page appears.

4 You can configure the drill either by adding actions one by one or by importing a

XML file containing workflow of the exercise.

Drills

719

IntegrityCheck Test Place holder

Integrity Check is a default drill which is applicable for all the DR solutions. When a

RG is created, by default IntegrityCheck drill will be displayed on GUI in the below

two places:

To configure the Integrity Check follow the path:

Go to Drills > Summary > Group Name.

The Drill Listing page is displayed

Click Integrity Check.

or

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group

Listing page appears.

3. Click the required group from the GROUP NAME column. The Group Details

Page appears.

4. Click Group Configuration > Drills

IntegrityCheck drills cannot be deleted and this comes with “custom” action

configuration.

Note:

The report will be enabled only if the Banking Module is licensed.

Listing Drill Schedules

To list the schedule of all the drills configured for a Recovery Group, perform the

steps given below:

1. On the Navigation bar, click Drills> Summary.

2. Click on the Group name.

3. The Workflow Calender at the right displays the scheduled and ongoing

workflows.

4. On clicking the Workflow Calender, a table is displayed with the information on

Workflow, Group, Date Recurrence and Approvers.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 720

Executing Drills

Each Drill is pre-configured with a workflow to do the actual drill and each of the

exercise is customized according to your environment.

You have to manually execute the Drill. IBM Resiliency Orchestration supports

executing multiple Drills in parallel. When Drills are being executed, then no

continuity operations are allowed and vice-versa.

In the other continuity modes, even if the Drill is initiated, it fails. When a Drill is

initiated on an AG, the Group continuity mode is changed to MANAGED_TEST. The

drills performed at AG level executes each drill at RG level and the result is elevated

to the AG. Common drills must be done sequentially in an order.

If an AG contains any RGs in parallel relationship then the Drill will be done serially.

As a result, Drills will ensure the orderly dependency among RGs. If there are any

parallel RG's, they would not be resolved simultaneously. Instead they will be taken

up one after the other. A Group cannot move into MAINTENANCE mode when in

MANAGED_TEST. During Drill, Change State is not allowed and during metadata

crash-recovery, MANAGED_TEST should not be allowed.

The Drills undergoes different status during its life cycle. The possible values of

status are given in the following table:

Status Description Next Possible Status

NEVER EXECUTED

The Test Exercise has never been executed so far.

START TEST

EXECUTING The Test Exercise is currently running.

EXECUTING

IDLE The Test Exercise has been successfully executed.

STOP TEST

FAILED The execution process has been failed.

STOP TEST/EXECUTING

AWAITING INPUT

The process is executing but requires user input. In this case, there will be an action

handler pop-up window requesting user input.

NO OPERATION

STOPPING This is an intermediate state indicating the Test Exercise in stopping. It goes in to this state when it is been

NO OPERATION

Drills

721

Status Description Next Possible Status

manually triggered.

SHUTDOWN This occurs when IBM Resiliency Orchestration

software or hardware fails or abnormal crash occurs.

NO OPERATION, RESUME TEST

Life cycle of a Drill goes through seven processes. The initial state of the Drill is

always NEVER EXECUTED. The list below explains the next possible state after each

state.

▪ Start Now

This operation initiates any test by triggering the associated workflow

execution. To start a test on the FG no BCO should be executing on the

Group. Upon successful initiation the status of the test is changed to

EXECUTING. After successful execution of test, the status is changed to

success. In case of failure, the status is changed to Failed. The events that

require input from you to proceed are listed in the Events list page. In this

page, select the Requires Action check box to display only those events that

require your input. In case of system crash or IBM Resiliency Orchestration

software crash the Test Exercise state is changed to shutdown.

▪ Stop Drills

This operation stops the test in progress. Whenever a test is stopped, it is

always considered as aborted. When the test is stopped, the status is

changed to FAIL.

Note

If you stop the Test Exercise then a message box is displayed confirming if

you want to stop it or not.

▪ Resume Drills

This operation resumes the test from the last executed action. As of now, it

always executes the workflow from the beginning.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The Drills can be executed by performing the following steps:

1. Click Drill> on the navigation bar. The Drill page appears.

2. Click Executing tab. All the active groups are displayed.

3. Click desired Group from the GROUP NAME column for which you want to

execute the drills. The Drill Listing page appears. This page provides the

following information:

▪ Drill Summary: This provides the summary of the drills as given below:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 722

▪ Total Tests Run - Displays total number of drills that were run for the

group.

▪ Tests Successful - Displays total number of drills that were successfully

run for the group.

▪ Tests Failed - Displays total number of drills that were failed and not

successfully completed the execution.

▪ Next Scheduled- Schedule the execution for a later time.

List of Groups with the following information:

▪ DRILL NAME - List of configured drills for the Group

▪ STATUS - Displays the status of the drill.

▪ LAST INITIATED - Displays the last execution time of the respective

drills.

▪ ACTION - Displays option to Start or Stop or Resume the drills

execution.

4. Click the Start Test link in the ACTION column to initiate the corresponding

test exercise of the respective group. You can configure the test exercise by

clicking Configure link in the Action column.

5. Click icon of the respective Group to view the workflow details of the drill.

The Viewing Workflow Execution Status page appears.

6. Click Back to Details to go back to the Drills page.

Drills State

Based on the current state of the Group, Drills such as 'Initiate Switchover', 'Initiate

Switchback' etc are possible. These operations are listed as selectable buttons. The

complete list of operations is as given below:

Initiate Switchover This operation initiates Switchover operation on production and DR site. On completing the Switchover operation, the DR site becomes

production and production site becomes DR site.

Initiate Switchback This operation switches back the DR site to production and the production site to DR after the

Switchover operation.

Note:

Drills

723

In generic solutions, IBM Resiliency Orchestration provides facility to customize drills

as per your needs. In case of failure of an action, click Continue in the Workflow

Manager page to skip the failed action and to move to the next.

The following table lists the next possible operation based on the current state of

operation.

State Next Operation

Normal Reset Initiate NormalFullCopy, Change Continuity State, Move to Maintenance

Normal Inactive Initiate NormalCopy, Initiate Failover, Change Continuity State, Initiate Switchover, Move to Maintenance

Normal Transit -

Normal Active Stop NormalCopy

Normal Failed Initiate NormalCopy, Initiate Failover, Change Continuity State, Initiate Switchover, Move to Maintenance

Normal Degraded Stop NormalCopy

Switchover Inactive Change Continuity State, Initiate Reverse Copy, Initiate Failover, Initiate Switchback, Move to Maintenance.

Switchover Transit -

Switchover Active Stop Reverse Copy.

Switchover Failed Initiate NormalCopy, Initiate Switchover, Initiate

Failover, Change Continuity State

Failover Transit -

Failover Failed Initiate Failover, Initiate NormalCopy, Change Continuity State, Move to Maintenance

Failover Active Initiate Fallback, Change Continuity State, Move to

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 724

State Next Operation

Maintenance

Fallback Transit -

Fallback Failed Initiate Fallback, Change Continuity State, Move to Maintenance

Fallback Active Initiate FallbackResync, Change Continuity State, Move to Maintenance

Normal Shutdown Resume Continuity operation, Change Continuity State, Move to Maintenance

Normal Stopping -

Normal Test Initiate NormalCopy, Initiate Failover, Change Continuity State, Initiate Switchover, Move to Maintenance

(Do not perform any BCO when the test exercise are being performed on the Group)

The following table technically explains the drills and the state of production and DR

server. It is applicable only for DR Solutions based on Sybase and MSSQL databases.

BCO Functionality Production

Server’s

mode of

operation

DR Server’s

mode of

operation

Switchover

(Not supported for DR Solutions based on

MSSQL and Sybase databases)

Configured production server is made as DR and vice-versa

NA NA

Switchback

(Not supported for DR

Solutions based on MSSQL and Sybase databases)

Reverse of Switchover operation

NA NA

Drills

725

Drill Listing

The Drill Listing page displays the following draft workflows. The user can also create

New Workflows.

The following are the twelve Draft workflows the user can select, namely

o Switchover

o Switchback

o Failover Exercise

o Remote Data Consistency

o StartAppPR

o StopAppPR

o RoleSwitchtoPR

o RoleswitchtoDR

o Recovery

o IntegrityCheck

Click on Edit to edit the workflow

Click on View to view the workflow.

Tracking Drills

You can track the Group on which Drill is running under Restricted or Unrestricted

mode. There are three following ways to track such Groups:

1. From the Drills Listing page

2. From the Drills Summary tab page

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To track the Group for a Drill from Drill Listing page, follow the steps given below:

3. In the navigation bar, click Drill> Executing.

4. In the Drills page, check the In Progress column against the desired Group.

It shows the number of drills being run on that Group.

To track the group for a Drill from Summary tab page, follow the steps given below:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 726

1. In the navigation bar, click Drill> Summary.

2. In the Summary page, check the WORKFLOW TYPE, CURRENT WORKFLOW,

and WORKFLOW STATUS columns for the desired Group. They give information

of whether or not a drills type of WORKFLOW TYPE is being executed on the

Group, its name and its execution status.

Changing Drills Mode

You can change the default Unrestricted mode of a drills to Restricted. To do this,

you need to edit a parameter value in the panaces.properties file.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Follow the steps given below to change the mode:

1. On the IBM Resiliency Orchestration Server, go to the $EAMSROOT/installconfig

directory.

2. Open panaces.properties file.

3. Edit the value of panaces.testExerciseMode parameter. The value of 0 indicates

Restricted mode and 1 indicates the Unrestricted mode.

Drills Interfering with BCO

While Restricted mode does not allow executing Drills along with any BCO,

Unrestricted mode does.

However, caution must be taken while configuring and executing a drill so as not to

interfere with the running BCO. If an Unrestricted Drill interferes with a BCO, it can

impact the State of the System, the BCO, Group and Continuity health, and may

cause an Event.

A Failover drill being executed at the time of Normal Copy operation is the simplest

example of a drill interfering with a BCO. Such execution can cause the Normal Copy

to fail.

Identifying Group under Unrestricted Test Mode

Unrestricted Test Exercise (UTE) allows you to execute a drill in any continuity state

of a Group. It can be run while a Business Continuity Operation (BCO) is running.

When a UTE is running for a Group, it does not put under TEST mode. As a result,

the Group health is not changed. During UTE, the Group image does not change to

indicate that an Unrestricted Test Exercise is in progress for that Group. This makes

it difficult to identify the Group on which UTE is being run.

Drills

727

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Follow the steps given below to identify such Groups:

1. Click Monitor or Manage on the navigation bar.

2. Click Executing Workflow.

3. In the Recovery Group Listing window, check WORKFLOW TYPE, WORKFLOW

DETAILS, and STATUS columns for the desired Group.

A Group with a UTE running on it will have WORKFLOW TYPE as Test Exercise,

WORKFLOW DETAILS will display the details of the workflow being executed, and

STATUS column will show the execution of the workflow of the Drills.

Effect of Drills on Group Status

In IBM Resiliency Orchestration, the Group mode changes are based on the mode of

Drills being run on it. If Restricted mode of Drills is running on a Group, the Group is

put under MANAGED_TEST mode. However, if Unrestricted mode of Drills is running

on a Group, the Group mode does not change. This makes it difficult to identify the

Group on which Unrestricted Test Exercise (UTE) is being run.

Viewing Drills

To view the Drills summary for a list of Groups, on the Navigation Bar, click

Drills> Summary > Group Name. You can also view from the Dashboard, by

clicking Drill.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The Drills page has the following tabs:

▪ Executing

▪ Scheduled

▪ Summary

Viewing Drills for a Group

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

This page will list all the Drills configured for a Group. The details displayed are:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 728

Field Description

Test Exercise Name Displays the Drill name.

Last Executed Status Displays the last execution status of the drill, BCO and BP.

Version Displays the published version or the draft version of the Drill, BCO and BP.

Dry Run status Displays the last dry run status of the Drill, BCO and

BP.

Visible Distinction of Workflows

Template - IBM Services does not own these

Workflows and will not be accountable.

Information is applicable only to Workflow Listing pages.

Pre packaged - IBM Services owns these Workflows and is accountable.

information is applicable to only Workflow Listing

pages

All NC's are Pre-Packaged

User Added - The workflows created by the user are displayed as the User Added, and are not delivered as a part of the solution.

Workflow Listing Icons START TEST

Click icon to start a Drill.

On clicking the Execute button, it displays another pop up, to confirm the execution. Click Execute to

confirm or click Cancel to cancel the execution.

Viewing automation status

To view the automation status, perform the following steps:

Drills

729

1. In the navigation bar, click Drills > Executing Workflows.

2. Select Viewing automation completeness status.

Field Description

BASE WORKFLOWS Displays the name of the basic workflows:

Normal copy

Normal full copy

Switch over

Switch back

Failover

Failback

Fusion Chart Click on to display the number of groups

configured.

Base workflow publish

status

Displays the number of base workflows published.

Click on a group from the list. Base workflow

configuration page appears.

Viewing Drills History Report

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Follow the steps given below to create and see the Test History Report for a defined

time period for all Groups.

1. In the navigation bar, click REPORTS.

2. In the Reports page that opens, under Advanced Reports select DR Drill/

Drill Report in the drop-down list for Select Report.

3. In the Date Range field, click to select the From date for the report you are

generating.

4. Click for the To field to specify the date up to which you want to generate

the report.

5. Click View.

The DR Drill Report displaying the date range you have specified gives the Group

wise information on the Drillss that are conducted. The information includes the Test

Name, its Start Time, End Time, Duration, and Status.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 730

To view the execution details of a desired Drill for a Group, click the Drill in the Test

Name column for that Group.

The Groups that did not have any Drills executed will have no values shown in their

column fields of this Report.

Viewing Workflow Calendar

To view the list of workflows scheduled, perform the following:

1. In the navigation bar, click Drills> Drill List.

2. Click Workflow Calendar.

The calendar lists the following:

Field Description

workflow Displays the workflow name.

Group name Displays the workflow name.

Date Displays the scheduled date

Recurrence Displays the type of recurrence to schedule the workflow.

For example:

Just once

Daily

monthly

weekly.

Approvers Displays the approvers' name.

Drills

731

Viewing Recent Execution Drills Status

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The detailed status of a drills can be seen separately from following two pages:

To view the details of the desired drills from the DR Drill/ Drills Report page,

follow the steps given below:

1. Generate the Drills Report for desired period of time.

2. In the generated report, for the desired Group, click the desired Drills in the

Drills column of the report.

3. This displays the detailed status of the Drills in Recent Execution Status

page.

To view the details of the desired Drills from the Drills page, follow the steps given

below:

1. On the navigation bar, click Drills > Summary. This opens the Drills page

that displays Group wise summary of the Drills.

2. Click desired Group under GROUP NAME column for which you want to see the

Workflows.

3. In the Group Workflow page that appears, click for the desired Drills to

view the detailed recent execution status of the Drills.

Drills Management

Majority of the DR solutions fail at the time of disaster even with huge infrastructure.

This is either because there is no DR test plan in place or because it is too complex

or expensive to execute. The Drills provides complete management control for

performing DR drills and rehearsals. It provides wizard based control to handle the

exercises in an automated and reliable method.

IBM Resiliency Orchestration provides automated drills management for key intrusive

and non-intrusive drills . It provides the following important capabilities:

▪ Individual FileSystem level drills execution and monitoring the status of the

same.

▪ Automated execution of drills with wizard control for user intervention where

desired.

▪ Intrusive drills support – provides ‘Failover of the FileSystem’ drills.

▪ Non-intrusive drill support – provides ‘DR FileSystem consistency and

integrity’ drills.

You can view list of drills configured for a group by clicking Drills on the Navigation

bar. The Drills page appears. This page provides the following information:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 732

Field Description

GROUP NAME Displays the name of the RG or AG

IN PROGRESS Displays the number of Drills which are

currently being executed for the Group

Configured Displays the number of Drills configured for the

Group

Never Executed Displays the number of configured drills that

were not executed

Failed Displays the number of Drills that were not

successfully completed

Success Displays the number of Drills that were

completed successfully

Aborted Displays the number of Drills that were aborted

manually

Note:

▪ Click of GROUP NAME column to sort by Group states.

▪ In Drills page, click on group from the GROUP NAME column for which you

want to execute the drills.

Scheduled

Viewing Scheduled

▪ Click Drills > Scheduled > on the navigation bar.

▪ Select RG /AG from the drop -down list. Select the filter.

▪ Click For Immediate 7 days to view the workflows which are scheduled for

the next seven days.

The Scheduled workflow page displays the following:

Drills

733

Field Description

Group Name Displays the name of the RG.

Drill name Displays the type of Drills

Scheduled Start Time

Displays the time when the drill has occurred

Scheduling Workflows

The workflows which have the version status as Published can be scheduled for

execution.

To schedule workflows,

▪ Click Drills > Summary > Group Name

▪ The Drill Listing page is displayed.

▪ Click the Calender to schedule the workflow.

The Schedule Workflow calender is displayed

Field Description

Group Displays the Group name

Workflow Displays the Workflow name

On selecting the Enable Schedule

Field Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 734

Recurrence Frequency

The radio active button is set to Just Once

Once on Select the date from the calender

Start Executing This Process at

Select time from the clock

Click Cancel to cancel the schedule and Done to save the changes.

Executing

Executing

▪ Click Drills > Executing

▪ Select RG /AG from the drop - down list. Select the filter.

The Executing page displays the following:

Field Description

Group Name Displays the name of the RG.

Drill name Displays the type of Drills

Time Started Displays the time when the drill has occurred

Elapsed Time Displays the time for execution

Status There can be two status namely

Awaiting Input

Drills

735

Field Description

Executing

On clicking the group name, the Drill listing page is displayed.

On clicking the status, the Execution page of the workflow is displayed. The following

information is displayed in the execution workflow page.

Field Description

Group Name Displays the name of the RG.

Workflow Name Displays the workflow name along with the version

Start Time Displays the time when the drill has occurred

Time Elapsed Displays the time for execution

Status There can be five status namely

▪ Awaiting Input

▪ Executing

▪ Success

▪ Failed

▪ Aborted

The next table displays information at the RAL level.

Field Description

Action Displays the RAL action

Time initiated Displays the time the execution has started

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 736

Field Description

Time Elapsed Displays the time of execution of the RAL

Status The status can be

▪ Awaiting input

▪ Unable to execute

▪ Success

▪ Crashed

▪ Aborted

Click on Key Value Pairs to view the key values in the execution page.

Click on Export to CSV to export the workflow.

Summary

Viewing Summary

To view the summary for a list of Groups, on the Navigation Bar, click Drills>

Summary> Group Name. You can also view from the Dashboard, by clicking

Drills.

The user can select either the recovery groups or Application groups from the drop -

down list. Filter is set to Type I by default. The continuity status is represented by

the color beside the group name.

The Summary tab has the following fields:

Field Description

Group name Displays the name of the Recovery Group or Application Group

Drafts Displays the state of the workflow

Published Displays the workflow

Drills

737

Field Description

Executing Displays the number of configured drills that are being executed

Last Executed Displays the date and time when the last execution has successfully been completed.

Next Scheduled Displays the date for the next drill

Click View all to view all the Recovery groups.

Note:

Click of GROUP NAME column to sort by group states.

Select Workflow

Click Drills > Summary > Group Name.

The Drills Listing page is displayed.

Click Create New.

The Select workflow tab is displayed.

▪ Click on to edit the workflow.

▪ Click on to view the Remote Check Preview page.

Viewing workflow details

To view the workflow details, perform the following:

1. In the navigation bar, click Drill> Summary.

2. Select the group.

3. The Drill Listing page displays the following information:

Current State:

Field Description

Current state Displays the current status of the workflow.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 738

Field Description

Version Displays the version number of the workflow.

Dry Run Displays the dry run status.

Executed Displays the last execution time stamp and the status of the workflow.

4. Click the view to view the each workflow.

5. The View Workflow page is displayed. To view the RALs in the workflow,

select the category from the drop - down list.

6. Click on to add action node information to the workflow.

7. Click Zoom in or view the workflow.

8. Click Edit to edit the workflow.

On clicking the workflow name the execution history and the version history details

are displayed.

Execution History:

Field Description

Date Displays the last execution date of the workflow.

Time Displays the time of the workflow in seconds.

Status Displays the last executed status of the workflow.

Version History:

Field Description

Version Displays the version number of the workflow.

Drills

739

Created ON Displays the date creation of the workflow.

Created BY Displays the user name, who created the workflow.

Executed Displays the last execution status.

Editing Workflows

▪ Click Drills > Summary > Group Name > > View Workflows.

▪ Click Edit.

On clicking Edit more actions can be carried out to the workflows.

▪ Click on ADD to include Actions, Action Groups, Workflows into the

workflow

▪ On selection of Actions the Replication category drop - down list is displayed

▪ Click the drop - down list to choose any category

▪ Click on to add a new action node

▪ Click Show all RALs to view all the RALs which opens the RAL Library.

▪ On selection of the Action Groups, the Show all RALs is highlighted. On

clicking it, the RAL Library is displayed.

▪ On selection of the Workflows, the user can select a signature solution from

the Select Signature Solution from the drop -down list. Click Import

Workflow to browse for the workflow files.

▪ Click to copy the node

▪ Click to delete the node

▪ Click on icon to add a fork node. It is used to execute actions in parallel.

▪ Click on icon to add a join node. It is used to wait for executed forked

actions.

▪ Click to rearrange the workflow.

▪ Click Key-Value List to Add key Value.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 740

▪ Click Save Now to save the Workflow

▪ Click Export. A popup window is displayed. Click No to cancel the action and

Yes to export the workflow.

▪ Click Next to Publish Workflow.

Viewing Published workflow by logged in user

Viewing Published workflow by logged in user

These published workflow can be viewed in the following ways.

From the Summary page, Executing page and Scheduled page:

1. Click the Summary, Executing or Scheduled tab from the Drills page.

2. Click on the specific group name. The Drills Listing page appears.

3. Click the Workflow Published by You button on the right of the page to view

the workflows published by the logged in user.

OR

1. Click the Drill name in the Drills Listing page. The drill history details page

appears.

2. Click the Workflow Published by You button on the right of the page to view

the workflows published by the logged in user.

741

Working with Workflow Manager

Working with Workflow Manager

Workflow is a sequence of steps/tasks performed to complete a business process.

The business process could be a Business Continuity Operation or DR Drill or EOD

operation.

Actions and workflows are a set of procedures that are configured to act against an

event in the DR environment. You cannot add or delete an Action from a Workflow

when it is being executed.

Workflow manager enables you to design the workflow logic, execute and view the

execution status.

Configuring the workflow involves:

▪ Design the workflow logic

- Insert/delete actions to be performed

- Provide/alter inputs to the actions

▪ Flow control

- Conditions to quit/abort workflow

- Handle failure conditions

- Recursion (execute an action periodically)

▪ Scheduling the workflow

Executing the workflow involves:

▪ Execute (start/stop) workflow

▪ Schedule workflow

Execution Status:

▪ Show execution status

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 742

System Workflows:

IBM Resiliency Orchestration will execute certain workflow(s) periodically based on

the DR solution for monitoring. Such workflows are called System workflows.

Workflow Execution Page

Clicking the Executing or Awaiting Input link in the Execution Status column will

navigate the user to the workflow execution page. This page will display the

information in the following table.

▪ Click the Show Canvas button to view the workflow details by loading the

canvas.

▪ Click zoom in to make the canvas bigger.

▪ Click zoom out to make the canvas smaller.

Field Description

Action Displays the name of the action.

TIME INITIATED Displays the exact start time of the action

execution.

TIME ELAPSED (SEC) Displays the time calculated from the process of

initiation to completion of the action.

TYPE Displays the type of action.

STATUS DETAILS Displays the status details of the action

execution.

Note:

1 If the status is in EXECUTING mode, the

user can click on the EXECUTING link to view

Continue as Success or Continue as Failure

option buttons. Depending on the requirement

and by giving a reason, select any one of the

option.

2 If the Status is Awaiting Input, depending

on the requirement, user can select any one of

the below options:

3 Continue as Success

4 Continue as Failure

5 Retry

Working with Workflow Manager

743

Field Description

6 Quit

If user wants to know the reason for Awaiting

Input, click the View action log button.

7 Click on any link corresponding to desired

action to view the following details for the action.

8 DB Logs

9 Tail Logs

10 Sys Logs

Resuming workflow after IBM Server failure

If IBM Resiliency Orchestration server fails due to hardware, network or other

problems, all workflows being executed also stops. When the server is up again, the

failed workflows can be resumed automatically or manually, depending on the

presence of recurring actions in it.

Note

When IBM Resiliency Orchestration server is up, if a workflow contains at least one

recurring action, the complete workflow is resumed from the start.

For a workflow that does not have any recurring actions, you need to take a decision

on its further execution. To do so, perform the following steps:

1. Click Manage> Recovery Groups > Group Name > on the navigation bar. The

Recovery Groups details page appears.

2. Click the Execute button for the workflow in the Continuity Workflows section.

3. Click the Resume button to continue the operation. UserInputRequired004

event will be raised and will be shown in the event banner indicating that user

intervention is required.

4. Click the Provide Input link on the Event Banner to open the Action Execution

Handler page. In the Workflow Execution Section on the right, do any one of

the following.

• Click Start to restart the Workflow from the beginning.

• Click Skip As Success to skip the current action considering it to be

successfully executed and continue with the next action.

• Click Skip As Failure to skip the current action considering it to be failed and

continue with the next action. The next action will be that pointed to by the

Failure path of the current failed action, not the normal Success path. If the

failure path of the failed action is pointing to “None” then the workflow will

terminate.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 744

• Click Resume to continue executing the current action.

• Click Quit to stop workflow execution. The complete workflow terminates

without executing any more actions.

Dealing with Failures of Workflow Execution

When certain action's execution is failed, you can view the action failure details in

the Recent Execution Status window.

To open the Recent Execution Status window:

1. Click the icon to view the events waiting for user input. All actions which

are configured to be informed are displayed here.

2. Click the Provide Input link for the event requiring your inputs. The Recent

Execution Status page appears.

In Workflow Graph & Inputs tab:

▪ In case of Action Execution Failed:

▪ Click Retry to retry the execution of the failed action.

▪ Click Continue to execute the next action. The next action will be that

pointed to by the Failure path of the current failed action, not the

normal Success path. If the failure path of the failed action is pointing

to None then the workflow will terminate.

▪ Click Quit to stop workflow execution. The complete workflow

terminates without executing any more actions.

▪ In case of Workflow Execution Recovery:

▪ Click Start to restart the Workflow from the beginning.

▪ Click Skip As Success to skip the action as success and continue with

next action.

▪ Click Skip As Failure to skip the action as failure and continue with

next action.

▪ Click Resume to continue executing the current action.

▪ Click Abort to abort executing Workflow.

Limitation:

Skip As Success and Skip As Failure features do not work if we configure Time to

execute property. Time to execute property is used to wait, before execution.

Working with Workflow Manager

745

Stopping Workflows

Workflows will be stopped only after completing the execution of current

action/action group. If there are any user input required by the action, then the

workflow will stop only after the input is provided.

The following is the behavior of stopping workflows with various configurations:

Action: If the action is executing, workflow will stop only after its completion.

1. Time To Execute (Wait): If this property is set, the action will wait for the

configured time before it actually performs the task. Workflow will stop only

after the action completes the Wait and performs the actual task.

i. Execution mode Manual: If this property is "Manual", then the action

will notify the user before performing the actual task.

▪ Clicking Continue will stop the workflow after performing the actual

task

▪ Clicking Quit will stop the workflow immediately without performing

the actual task

ii. Inform on Completion: If this property is set, then the action will notify

the user after the actual task. Workflow will stop only after clicking

"Continue" or "Quit". However, if this is a "retryable" action then

clicking on "Retry" will execute the action again. [For more information

on "Inform completion" and "Is Retryable" options, refer to

Configuring Actions.

2. Action Group: If the action group is executing, the workflow will stop only

after completing all actions in the action group.

If execution of an action within the action group results in abort of workflow, then no

further actions within action group will be executed. For example, clicking "Quit" in

"Execution Mode Manual" or "Inform Completion" for the action.

If there are multiple actions waiting for user input, then clicking "Quit" for one of the

actions will only complete that action/action group, but not the workflow. You need

to click "Quit" on all the actions that are waiting for user input for the workflow to

stop. For example, when "dump log" and "apply log" recurring actions need user

input, then clicking on "Quit" for "dump log" will complete only dump log but not

"apply log" action. Clicking on "Quit" on the "apply log" will stop the workflow. Any

workflow in progress can be aborted by clicking the "Abort" link on the Workflow

Execution Status page.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 746

Approving/Rejecting a workflow before

execution

A workflow, before execution of the actions in the workflow, asks for approval as a

user input [Workflow input page]. List of approver user accounts are displayed and a

password is asked for.

Notification email is sent to all users on the approver list having valid e-mail IDs

stating that the current workflow needs approval.

The required approver logs into the system (if on another machine), goes to the

page asking for approval [Workflow input page].

The Approver section displays the following information:

Field Description

Approver This is a drop-down list where the appropriate username can be selected.

Password This is a valid password for approving/rejecting the workflow execution.

Approve/Reject This is a radio button which selects workflow Approval/Rejection.

Remarks This field will be active only if the Reject radio button is selected. This field has a limit of 128

characters.

1. Click Submit.

Approving a workflow

▪ On selecting the Approve option, the first action of the workflow is executed

and then execution continues.

Rejecting a workflow

▪ On selecting the Reject option, the workflow execution is rejected. On

rejecting, the execution of the first action does not begin and the status of the

workflow is set to REJECTED.

Note

▪ Approval/Rejection of the workflow is audit logged in the system for future

reference.

Working with Workflow Manager

747

DryRun

Dry Run is a feature that test the checks the execution of a workflow. The aim

of the dry run is:

1. To ensure that the user has correctly configured the workflow with the right

sequence of actions and the inputs accurately defined.

2. To verify any changes made in the user configuration.

The result of the dry run is available in a report that provides the necessary

information. Any issues are identified with warnings or errors. The details are

dependent on the RAL. The report includes:

▪ Executed actions and their sequence.

▪ Server details.

▪ Input configuration values for the action.

▪ List of commands that are executed on the target server.

▪ List of input/ output keys and parameters.

▪ Pre-checks.

Note

You can view the available pre-check details of the individual RAL action, found in

Recovery Automation Library.

Mode

Actions can execute non-intrusive commands that does not change the state of the

system, such as check database state and check existence of file or directory. This is

the only mode of dry run execution and it is known as Dry Run with Pre-checks.

Process

When a dry run is executed, each action (that supports the dry run feature) of the

workflow runs in a manner that does not actually execute the command but logs the

final command or set of commands that are executed. Each action also logs other

supporting information, such as a list of checks. The result of the dry run is a

workflow execution report, similar to the real execution report along with added

information to assist the user in obtaining detailed information about the workflow.

Note:

The RAL actions that support dry run are enhanced to return information for the

reports. Not all RAL actions support this feature. For actions that do not support, logs

indicate the general information, such as server details and input configuration

values.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 748

Workflow Enhancements

Confirmation of Workflow Execution

1. After publishing a workflow an Execute button is displayed against each

workflow.

2. On clicking Execute , a confirmation pop-up is displayed with

Execute and Cancel.

3. Click Execute to execute the workflow.

4. Click Cancel to cancel the workflow.

After clicking the execute button the execution status bar is displayed by replacing

the listing icons. The status bar displays the executing RAL count.

Click the Executing link under Execution Status column of the workflow to navigate

to the workflow execution page.

Dryrun Execution

After publishing a workflow, Dryrun icon is displayed against the workflow.

On clicking Dryrun , a confirmation pop up is displayed with Dryrun and

Cancel. Click Dryrun to execute or click Cancel to cancel the Dryrun.

On clicking Dryrun it displays a spinner by replacing all the other icons such as Edit

and Delete.

When the Dryrun of a workflow is executing, the Dryrun count is displayed under the

Dryrun status column against the workflow.

Nested Workflow (Navigation to Workflow within a Workflow)

"Workflow Calling Workflow" enables the user to call sub workflows from the main

workflow execution page.

After configuring the workflow calling workflow, a nested workflow link is displayed in

the main execution page. Clicking the nested workflow link will navigate to the sub

workflow execution page.

From the sub workflow execution page, the user can navigate to the main workflow

execution page by clicking on parent workflow name on the breadcrumb.

Working with Workflow Manager

749

View Workflows

Click on the View icon against the workflow.

The view workflow page is displayed. In this page the user can only view (Read only)

RALs. The user cannot modify any values in the view workflow page.

Click on the edit icon in the view workflow page. The user is enabled now to navigate

to the Workflow Editor page.

Workflows Visual Distinction

The workflows are categorized into three types namely

1. Prepackaged

2. Template and

3. User Added

Pre-Packaged: These workflows are owned and shipped by IBM.

Template: Template is a workflow that can be used with modifications as per the

requirements.

User Added: The workflows created on the field by the user.

Stopping/Aborting Parent Workflows

While stopping/aborting the parent workflow, the child workflows are stopped.

Propagation of Nested Workflow Status

The child workflow status needs to be displayed in the parent workflow during all

stages: preexecution, execution, and post execution.

Parent Workflow Summary Counts

The following counts of parent workflow execution include the actions count of child

workflows:

▪ Completed steps

▪ Total steps

▪ Failed steps

▪ Not executed steps

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 750

In the parent workflow execution page, the Trigger action, which calls the child

workflow, displays the progress bar with count of Completed steps, Total steps,

Failed steps, and Not executed child workflow steps.

Glimpse of Nested Workflows

In the Parent Workflow Execution page, the user can expand the Trigger action to

see trending actions, which are in executing state and which need inputs. The

corresponding details such as action name, start time, elapsed time, and status

details displays.

Validating and Fortifying Nested Workflows

Prior to executing the parent workflow, all child except NormalCopy or

ReverseNormalCopy workflows will be locked, which means the user cannot Edit,

Delete, or Execute child workflows until the parent workflow completes its execution.

The user can edit parent workflow although it has child, which is in execution. The

user can edit the parent workflow when it has common child and other parent

workflow is in execution.

751

Validation

View Rules

Listing Validation Rules

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To list the Validation Manager Rules available in a Resiliency Orchestration Server

perform

the following steps.

1. Click Monitor OR Manage on the Navigation bar.

2. Click Recovery Groups > Group Name > Validation.

3. Click Validation Rules button. The Task Summary List window appears.

4. Click View Rules tab on the top left corner of the page.

5. Click on the specific category and the following details can be seen:

Field Description

Name Displays the rule name.

Description Displays the description of the rule selected.

Note:

▪ CUSTOM/ Linux/ Oracle/ MSSQL/ NetApp and VCentre default categories are

available.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 752

▪ Validation manager supports only Remote Agent model.

Tasks

Listing Tasks

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the Task list perform the following:

1. Click Monitor OR Manage on the Navigation bar.

2. Click Recovery Groups > Group Name > Validation.

3. Click Validation Rules button. The Task Summary List window appears.

▪ Selected Group will display the following details in a tabular form under Task

Summary:

Field Description

GROUP NAME Displays the group name

TASK NAME Displays the task name

TIME LAST

EXECUTED

Displays the time stamp of the task last executed.

TIME DURATION

[SEC]

Displays the time taken to execute the last task in

seconds.

SCHEDULE INFO Displays the task schedule information.

STATUS Displays the status of the last task executed.

Status can be PASS, Never Executed, Abort, or

Failed.

ACTION Displays the icon with link to execute and view

execution history.

Validation

753

Click Monitor or Manage > Recovery Groups > Group Name > Validation

The table displays the following information

Field Description

Task Name Displays the task name

Start Time Displays the start time

End Time Displays the end time

Execution Count Displays the execution Count

Execution Status Displays the execution status

Click the to view the Description and the Schedule Frequency.

Pre-Requisite:

To view the Task list, a group should be available.

Creating Tasks

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To create a task, perform the following steps:

1. Click Manage > Recovery Groups > Group Name > Validation.

2. Click Validation Rules button. The Task Summary List window appears with

the list of tasks for that specific group.

Note: Select Group from the drop-down list to create tasks for a different group.

3. Click the Customize Task link at the top right corner of the Task window. The

Create Task window is displayed.

• Configure the following field elements.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 754

Field Description

Task Name Enter a task name.

This field is mandatory.

Description Enter a description for the task.

Group name Select a group from the drop down list.

This field is mandatory.

All Rules Select the rules to create a task mentioned in this window.

Selected Rules ▪ Select one or more rules to add into the selected rules window by selecting the rule from All Rules window.

▪ Select one or more rules to remove from the selected rules window by selecting the rule back into the All Rules window.

Schedule Select the type schedule from the drop down list.

▪ Minutes

▪ Hourly

▪ Daily

▪ weekly

▪ monthly

▪ Now

Now

Now can be used to schedule a task execution, immediately.

3. Click Save to add the task.

Validation

755

Modifying Tasks

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify a Task, perform the following steps:

1. Click Manage > Recovery Groups > Group Name > Validation.

2. Click Validation Rules button. The Task Summary List window appears.

3. Click the Customize Task link at the top right corner. The Task List window

is displayed below the Create Task window.

4. Select a group from the Task List.

Each Group has the following fields:

• Task Name

• Description

• Rules

5. Click icon corresponding to the task that you want to modify. This opens

Modify Task page.

6. Make the required changes in the relevant field.

Note:

Task name cannot be modified.

7. Click Save to save the modifications.

Deleting Tasks

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a Task, perform the following steps:

1. Click Manage > Recovery Groups > Group Name > Validation.

2. Click Validation Rules button. The Task Summary List window appears.

3. Click the Customize Task link at the top right corner. The Task List window

is displayed below the Create Task window.

4. Select a group from the Task List.

Each Group has the following fields:

• Task Name

• Description

• Rules

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 756

5. Click the icon corresponding to the task that you want to delete. A

confirmation box is displayed with OK and Cancel option.

6. Click OK to delete the task.

Executing Tasks

Click Validation > Task on the navigation bar.

To execute the task, perform the following steps:

1. Click Manage > Recovery Groups > Group Name > Validation.

2. Click Validation Rules button. The Task Summary List window appears.

3. Select any task from a group.Click on icon to execute the task .

OR

1. Click Validation Rules button. The Task Summary List window appears.

2. Click the Customize Task link at the top right corner of the Task window.

3. Select a group and a task from the Task list window and click on to

execute the task.

View Recent execution status

Click on the status of the task. The following table appears:

Field Description

RULE Displays the name and its description

STATUS Displays the execution status

REPORT MESSAGE Displays the message with detailed description of failure.

or

Displays a success message if passed.

Viewing Execution History

To view the task execution history, perform the following steps:

Validation

757

1. Click Monitor OR Manage on the Navigation bar.

2. Click Recovery Groups > Group Name > Validation.

3. Click Validation Rules button. The Task Summary List window appears.

4. Select any task from a group.

5. Click on icon to view execution.

OR

1. Click Manage on the Navigation bar.

2. Click Recovery Groups > Group Name > Validation.

3. Click Validation Rules button. The Task Summary List window appears.

4. Click the Customize Task link at the top right corner of the Task window.

5. Select a group and a task from the Task list and click on icon to view

execution history.

The following tabular column is displays Task execution details of the selected task.

Field Description

Execution Start time

Displays the execution start time of the task.

Execution End Time

Displays the execution end time of the task.

Total Time Taken (sec)

Displays the total time taken to execute the task in seconds.

Status Displays the execution status.

6. Click on the task status link.

The following table appears:

Field Description

RULE Displays the name and its description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 758

Field Description

STATUS Displays the execution status

REPORT MESSAGE Displays the message with detailed description of failure.

or

Displays a success message if passed.

759

Reports

Reports Overview

You can generate reports on various continuity management and monitoring metrics

that includes RPO, RTO, and continuity operations for Groups under IBM Resiliency

Orchestration management.

You can generate the following reports:

▪ DR Drill/ Test Report - This report displays data for the drills carried out on

each Group.

▪ Events Report - This report displays the details of the events. The Events

Report option will be displayed only if the user has license for Recovery.

▪ RPO Report - This report fetches RPO details for the Group with the inputs

provided.

▪ RTO Report - This report displays the RTO details for the Group.

▪ Workflow Execution Report - This report displays the workflow execution

details.

▪ Data Lag Report - This report displays the amount of lag in data replication.

▪ WAN Report - This report provides a report on the WAN device during a

specified time period.

▪ Group Summary Report - This displays a summary of all the reports for the

selected group name for a fixed period of time.

▪ Test Summary Report - This displays a summary of the drills carried out for

the selected Group name for a fixed period of time.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 760

Note:

The Test Summary Report provides information about the recent status of all the

drills executed on a group. It provides two graphs - one displaying the execution

duration of each test instance, another displaying the success and failure status of

each test instance execution.

These graphs display multiple drills at a times. And within each drill, if it has multiple

instances of execution, those instances are also displayed. For example, if there are

two drills for the group, called drill 1 and drill 2, and if both were executed two

times, there will be four bars displayed in each graph, each bar representing one

instance of execution. Identification of the drill is done by the number (like 00.01

etc.) displayed in the horizontal-axis of the graph. This number corresponds to the

drill shown in the tabular listing, shown immediately above the graph.

You can navigate to reports by clicking REPORTS on the navigation bar. The

Reports page appears with the following information:

Reports Across All Groups

Select Report Displays drop-down list to select the report to be generated.

Date Range Displays From and To fields to select the period for which the reports are to be generated.

These fields are not displayed if you select Test Summary Report and Group Summary Report.

Include System Workflows

Displays the checkbox to select whether to include or exclude system workflows.

This is displayed only if you select Workflow

Execution report.

Reports per Group

GROUP NAME Displays Group names

DATA AVAILABLE SINCE

Displays the date with the time stamp from when the report data is available for the respective Group.

Click of GROUP NAME column to sort by Group states.

Reports

761

Note:

The report data is available for the Group that is under IBM Resiliency Orchestration

management.

Reports are available only at Recovery Group level. It is not applicable for Application

Group.

Viewing Reports Viewing DR Drill/Test Report

The following steps will display the consolidated DR Drill report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Select DR Drill/ Test Report from the Select Report drop-down list.

3 Select the period by clicking dates from the corresponding icon for From and To

fields.

4 Click View. The DR Drill Report page appears. This page displays the

consolidated summary for each of the drills with their GROUP NAME, DRILL NAME,

START TIME, END TIME, DURATION (HRS) and STATUS.

5 Click any DRILL NAME link. The Workflow Status Details page appears. This page

displays detailed report with the list of actions and their details.

Viewing BCP Test Report

The following steps will display the consolidated BCP Test Report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Select BCP Test Report from the Select Report drop-down list.

3 Select the period by clicking dates from the corresponding icon for From and To

fields.

4 Select the required Groups from the Select Groups list.

Click View. The BCP Test Report appears. This page displays the consolidated

summary for each of the drills with their Executive Summary, Introduction, DR Setup

and scope of Drill, DR Drill Details and Conclusion.

The Report also provides options like Print Report, Back to View Reports and Export

to PDF and RTF formats.

Note

The report will be enabled only if the Banking Module is licensed.

Viewing BCP Readiness Report

The following steps will display the consolidated BCP Readiness Report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Select BCP Readiness Report from the Select Report drop-down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 762

3 Select the required Groups from the Select Groups list.

4 Click View. The BCP Readiness Report page appears. This page displays the

consolidated summary for each of the tests with their Executive Summary, DR Setup

Description, and Application DR Readiness Detail.

The Report also provides options like Print Report, Back to View Reports and Export

to PDF and RTF formats.

Note

The report will be enabled only if the Banking Module is licensed.

Viewing Major Failure Report

The following steps will display the consolidated Major Failure Report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Select Major Failure Report from the Select Report drop-down list.

3 Select the period by clicking dates from the corresponding icon for From and To

fields.

4 Select the required Groups from the Select Groups list.

5 Click View. The Major Failure Report page appears. This page displays the

consolidated summary for each of the tests with their Executive Summary, DR Setup

Description, and Failure Details by Application.

The Report also provides options like Print Report, Back to View Reports and Export

to PDF and RTF formats.

Note

The report will be enabled only if the Banking Module is licensed.

Viewing BCP Integrity Check Report

The following steps will display the consolidated BCP Integrity Check Report for all

Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Select BCP Integrity Check Report from the Select Report drop-down list.

3 Select the period by clicking dates from the corresponding icon for From and To

fields.

4 Select the required Groups from the Select Groups list.

5 Click View. The BCP Integrity Check Report page appears. This page displays the

consolidated summary for each of the drills with their Summary and Application DR

Integrity Detail.

The Report also provides options like Print Report, Back to View Reports and Export

to PDF and RTF formats.

Reports

763

Integrity Check is a default drill which is applicable for all the DR solutions. When a

Recovery group is created, by default Integrity Check drill will be displayed on GUI in

the below two places.

▪ Discover > Groups > Select the Recovery Group > Group Configuration

> Drills

Integrity Check drill cannot be deleted and this comes with “custom” action

configuration.

Note:

The report will be enabled only if the Banking Module is licensed.

Viewing Events Report

1 Click REPORTS on the navigation bar. The Reports page appears

2 Under Report Across All Groups section, select Event Report from the drop

down list box and select the From Date and To Date.

• Select Event type (atleast one or all).

• Select Event severity (atleast one or all).

• Select Event status (atleast one or all).

• Select Group from the list box (atleast one or all)

3 Click on view button and the Events Report will appear.

Viewing Snapshot manager Report

Users can view reports through email as in-line text without logging into IBM

Resiliency Orchestration product. The two reports are as follows:

1. Summary Report

2. Detail Report

Four options have been configured for Executive Reports. They are as follows:

1 View Report

a. Summary Report: This link enables the logged-in user to view

Summary Reports contents before sending emails. The link will be

enabled only if managed groups are available.

b. Detail Report: This link enables the logged-in user to view Detail

Reports contents before sending emails. The link will be enabled only if

managed groups are available.

2. Configure Schedule

Both the summary report and detailed report can be configured in the same way. On

clicking the Configure schedule link, a pop window will appear and the user can

schedule the frequency of emails.

3 Edit email-recipients:

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 764

On clicking the Edit email Recipients link, a pop window will appear and the user can

add/ delete email–ids of the email recipients of summary and detail reports.

Note

Clicking the Add/ Delete buttons will not update the email-ids in the database table.

Click the save button to update the database table. Multiple email-ids (separated by

commas) can be added at a time.

i.Send Email Report

ii.An email can be sent only if the following fields are configured under

the Configure Notifications Email Server section.

iii.SMTP Server Name

iv.Sender E-mail address

v.Reply To

vi.Password

vii.Send Email Report Now : This option sends email to the configured

recipients immediately. The option may be disabled if

viii.no managed groups are available

ix.there are no email recipients configured.

x.Send Email Report at Configured interval : The reports will be mailed

to the configured recipients automatically based on the configured

interval.

Viewing reports for a group

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Click a Group from the GROUP NAME column. The Reports page with <group

name> appears. This page provides graphical representation of all the reports for the

specified Group.

Note:

1. You can navigate to Monitor, Manage, Drills or Discover page of a

displayed group by clicking on the respective icon at the top right

corner of the page.

2. Click the thumb-nail representation of the respective graph to

maximize the graph. Click Print Graph and select the printer to print

the graph.

Viewing Workflow Execution Report

This report consolidates the execution of Workflows related to BCOs, Drills, RPO, and

Business Processes.

1 Click REPORTS on the navigation bar. The Reports page appears.

Reports

765

2 Click a Group from the GROUP NAME column. The Reports page with <group

name> appears. This page provides graphical representation of all the reports for the

specified Group.

3 Click the snapshot under Workflow Execution. The Workflow Execution Trend

page appears.

4 Click the Workflow Execution Analysis link available on the top right corner of

the report. The Workflow Execution page for the Group is displayed with the

following information:

WORKFLOW EXECUTION Displays the name of the Workflow.

TYPE Enter the Workflow type. For example: BCO, Drills, or

Business Process.

Start Time Displays the start time of a BCO execution. The format

is: yyyy:mmm:dd hh:mm:ss

End Time Displays the end time of a BCO execution. The format is:

yyyy:mmm:dd hh:mm:ss

TIME TAKEN TO COMPLETE

Displays time (in HH:MM:SS format) taken by the

Workflow to complete its execution. This field is

displayed only for RG level reports.

INITIATED BY

Displays name of the IBM user who initiated the

Workflow. This field is displayed only for RG level

reports.

Status

Displays the status of execution of a BCO. The available

statuses are Executing, Failed, Aborted, Success, and

Awaiting User Input.

Approver Details If user approves the workflow, it displays the approver

name, approved time, and approval remarks.

Rejected Details If user rejects the workflow, it displays the name of the

person that rejected the workflow, time when the

workflow is rejected, and the remarks for rejection.

5 Click Workflow Trend Graph on the top right corner of the Reports page to view

the enlarged continuity graph.

Note

Trend Graph is available only for Continuity Operations report.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 766

Viewing Workflow Execution History

You can view the Workflow execution history by clicking its name in the Workflow

Execution Report page of a Group. To view this history, perform the following steps:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Click a Group from the GROUP NAME column. The Reports page with <group

name> appears. This page provides graphical representation of all the reports for the

specified Group.

3 Click the snapshot under Workflow Execution. The Workflow Execution Trend

page appears.

4 Click the Workflow Execution Analysis link available on the top right corner of

the report. The Workflow Execution page appears.

5 Click desired Workflow name in the Workflow Execution column to open the

Workflow Status Details page displaying the history.

Viewing Dry Run Report

The following steps will display the Dry Run report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Click a Group from the Reports Per Group. The Reports page with <group name>

appears. This page provides graphical representation of all the reports for the

specified Group.

3 From the Select Report drop-down list, select the Dry Run Execution.

4 Select the Date Range to list the dry runs executed during the time period.

Viewing Replication Report

This helps you to fetch a report on replications that have taken place so far.

1 Click Replication Reports link on the Reports for the Group window. The

Replication Reports for the Group window is displayed.

2 Select Duration from drop-down list box on the Replication Reports window.

3 Click Fetch button to retrieve the report.

4 Click Back to go back to the previous window.

Based on the time period you select, the Replication report for that group is

generated.

You can see the report generated with the following details on replication details for

the specified time period:

▪ RG Name – Displays the name of the Recovery group.

▪ Time of replication - Displays the time stamp of the replication.

▪ Size replicated – Displays the size of the replicated file.

▪ File included in the replicated- Displays the name of the file replicated.

Viewing RPO Report

Recovery Point Object report fetches RPO details with the input provided. To

generate report on RPO, perform the following steps:

Reports

767

1 Click RPO Reports link on the Reports for the Group window. The ‘RPO Reports

for the Group’ window is displayed.

2 Enter the options for RPO report generation.

3 Enter RPO Deviation Threshold in percentage.

4 Select Duration from the list box.

5 Click Fetch button to retrieve the report or click Back button to go back to the

previous window.

This fetches you RPO greater than the value entered in the ‘Deviation Threshold’ and

occurred during the time period specified in the ‘Duration’ field.

For example: The value specified in the ‘Deviation threshold’ is 30% and the

duration given is one week, then, on clicking the fetch button will throw RPO greater

than 30% that occurred one week back from the current time at which this query is

submitted to the database.

If the value provided is out of range or data is not available with in the range

specified, then a message box is displayed, informing report generation failure.

6 Click OK button on the message box to close it and enter new values for RPO

deviation threshold and duration.

Viewing WAN Report

The WAN Link Report provides a report on the WAN device during a specified time

period.

1 Select Duration from drop-down list box for which you want to fetch the report.

Based on the time period you select, the WAN link report for that Group and the

WAN device is generated.

2 Select the device name from the drop-down list and click GO button. The list

box contains all WAN devices belonging to that Group. Select a particular WAN

device to display the report on its associated ports with the “Port Name”, “Usable

Bandwidth”. and “Operation Status”.

To generate printable view of the reports, perform the following:

1. Click Printable View button on the respective reports generation window. This

button is displayed on the right top corner of the window. On clicking the

Printable view button opens a window displaying the generated report in a

printable form.

2. Click Print button to print the report.

3. Click Close Window to close the window.

Viewing Events Report

The following steps will display the consolidated Events report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Select Events Report from the Select Report drop-down list.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 768

Field Description

Date/Time Range

From Click and select the date/ time from which

the event started.

To Click and select the date/ time till which the

event occurred.

Select Event Type

Group Events Select this check box to generate report of the

group events.

All User Input

Events

Select this check box to generate report of all

user input events.

System Events Select this check box to generate report of the

system events.

Select Event Severity

Critical Select this check box to generate report of the

critical events.

Serious Select this check box to generate report of the

serious events.

Warning Select this check box to generate report of the

warning events.

Information Select this check box to generate report of the

information events.

Select Event Status

New Select this check box to generate report of new

events.

In Progress Select this check box to generate report of the

events whose status is In progress.

Closed Select this check box to generate report of the

events that are closed.

Reports

769

Field Description

Select Groups Select the required group from the list. The

report will have details of events associated

with the selected groups.

Hold down the "Ctrl" key to select more than

one group.

Viewing Dry Run Report

The following steps will display the Dry Run report for all Groups:

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Click a Group from the Reports Per Group. The Reports page with <group

name> appears. This page provides graphical representation of all the reports for

the specified Group.

3 From the Select Report drop-down list, select Dry Run Execution.

4 Select the Date Range to list the dry runs executed during the time period.

Field Description

From Click and select the start date.

To Click and select the end date.

Click the View Details button. The following details are displayed in tabular

form, as shown in the following table.

Field Description

Dry Run Execution Displays the name of the dry run execution.

Start Time Displays the start time and date of the dry run.

End Time Displays the end time and date of the dry run.

Initiated By Displays the user role that executed the dry

run.

Errors/Warnings Displays the number of errors and warnings

numerically in the format Errors/Warnings.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 770

5 Click on the name of the dry run below the Dry Run Execution column. The

window displays Dry Run Execution status.

6 The Dry Run Execution status displays the dry run report in Summary and

Detailed.

Summary Report

The Summary Report section displays the following:

▪ The name of the dry run execution.

▪ The user role that started the dry run.

▪ The number of errors and warnings.

▪ The start time of the dry run execution.

▪ The end time of the dry run execution.

Note

Click Export to CSV link to save the summary in a CSV file.

Detailed Report

The Detailed Report section displays the following:

▪ The name of each RAL.

▪ Image indicating success, fail or custom.

▪ Image representing the type of action.

▪ Execution environment:

1. Component IP

2. Component Name

3. Database Name

▪ All Key Value pairs for the given RAL.

▪ Errors and warnings are displayed with an image indicator and a descriptive

message.

▪ The actual RAL command.

Note

Click Hide Details link to hide the details for each RAL.

Point to the image representation of Type to view the type of workflow.

For actions that do not support the Dry Run feature, only framework level

information is logged.

Viewing Validation Report

The following steps will display the consolidated Validation report for all Groups:

Reports

771

1 Click REPORTS on the navigation bar. The Reports page appears.

2 Click any group from the group list from the page.

3 Select Validation Manager from the Select Report drop-down list.

Field Description

Date/ Time Range

From Click and select the date/time from which the event started.

To Click and select the date/time till which the event occurred.

The Validation Report provides a report during a specified time period.

1. Select Duration from drop-down list box for which you want to fetch

the report.

2. Based on the time period.

3. Select View Graph.

To generate printable view of the reports, perform the following:

▪ Click Printable View button on the on the right top corner of the respective

reports generation window.

▪ Click Print button to print the report.

▪ Click Close Window to close the window.

To view the Tabular view: Select Tabular View Button, this displays the list of task

executions in the below tabular form:

Task Name Displays the task name

Execution Start time Displays the execution start time.

Execution End time

Displays the execution end time.

Pass Rules Displays the number rules passed in the task execution.

Fail Rules Displays the number rules failed in the task execution.

Pass Rule % Displays the passed rule percentage.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 772

Note:

Application Group will have the following reports:

RTO

▪ Workflow execution

▪ Group summary report

▪ Test summary report

▪ Dryrun execution report

Printing Reports

After generating the selected report, the user can print the report, by performing the

following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click the appropriate group name. The report for the selected group name

appears.

3. In Select Report, select the appropriate report to print.

4. In Date Range, specify the period by selecting the dates in From and To

icons.

5. Click View graph. The snapshot of the report to be printed is displayed.

6. Click Print Graph to print the report.

To enable the print background option, perform any one of the following based on

the browser you are using:

Internet Explorer:

▪ Click Tools > Internet Options > Advanced. Under Printing category, select

the Print background colors and images check box.

Firefox:

1. Click File > Page setup > Format and Option. Select the Print background

(colors & images) check box.

2. Click Print Graph or Print Report, whichever displays at the bottom of the

report.

3. The Print dialog box appears. Click Print.

Note:

Reports

773

The lines in the graph will be visible in the print if the "print background colors and

images" option is enabled in the browser. This is a browser setting error and cannot

be handled by IBM Resiliency Orchestration software.

Exporting a Report

You can export a report after generating it as a Portable Document Format (PDF) or

as an HTML page.

Complete the following steps to export a report:

1. Click Reports on the navigation bar. The Reports page appears.

2. Select the group for which you want the report.

3. In the Select Report dropdown, select the report type.

Note:

The following reports can be exported as a PDF or HTML page:

• RPO

• Data RPO

• RTO

• Data Lag

• Test Summary Report

4. Click Customize Report Duration.

5. Specify the duration by selecting the dates in the Date Range fields by

selecting the dates from the From and To icons.

6. Click View Graph. The snapshot of the report displays in a graphical view.

7. Click Tabular View to view the report details in a tabular format.

8. You can save the report details by exporting the report as a PDF or an HTML

page by completing the following steps:

• Click Export to PDF to export the report as a PDF

• Click Export to HTML to export the report as a HTML page

The PDF or HTML displays in a separate window, and you can save the displayed

PDF or HTML to a location on your local drive from the menu options on the

screen.

Customizing Reports

You can customize the report to display specific report data for a given period by

performing the following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 774

2. Click desired Group in the GROUP NAME column. The Reports page with

<group name> appears.

3. Select the type of report to be customized from the Select Report drop-down

list. You can customize the following reports for the respective group:

▪ RTO Report

▪ Workflow Execution Report

▪ DryRun Execution Report

▪ Group Summary Report

4. Select the period by clicking dates from the corresponding icon for From

and To fields.

When Workflow Execution is selected, the Include System Workflows

checkbox is displayed.

5. Select the checkbox to display the system workflows also. For more information

regarding system workflows, refer Working with Workflow Manager.

Note:

Users with operator's privilege can generate reports.

Group Summary Report

This report displays the following information for the selected group name for last

seven days from today.

Field Description

Group Name Displays the selected group name.

Admin User Displays the name of the users who have the

permission to perform Admin activities.

Current State Displays the current state of the group.

DR Solution Signature Displays the workflow action for the DR Solution Signature.

Reports

775

Notification Displays the notification information for the group, if any.

Critical Events Displays the total number of critical events.

After displaying the group relationship architecture, the following report for the

selected group also displayed. Click Expand All to view the full details:

Section Description

Replication Details Displays the following replication details with the replication progress from the PR site to the DR site

for the group:

▪ Primary Service. Click the primary service link. The Protection Scheme Discovery page displays the details of Protection

Scheme Discovery and Specific details for the primary service.

▪ Primary Service Status

▪ Remote Service. Click the remote service link. The Protection Scheme Discovery page displays the details of Protection

Scheme Discovery and Specific details for the remote service.

▪ Remote Service Status

Dataset Details Displays the following dataset details for the selected group:

▪ Primary Dataset. Click the primary dataset link. The Dataset Discovery page displays the details of Dataset Discovery and Advanced details for the primary dataset.

▪ Primary Dataset Status

▪ Remote Dataset. Click the remote dataset link. The Dataset Discovery page

displays the details of Dataset Discovery and Advanced details for the remote dataset.

▪ Remote Dataset Status

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 776

Section Description

Component Details Displays the following component details for the selected group:

▪ Primary Component. Click the primary component link. The Component Discovery page displays the details of Component Discovery for the primary component.

▪ Primary Component Status

▪ Remote Component. Click the remote component link. The Component Discovery page displays the details of

Component Discovery for the remote component.

▪ Remote Component Status

Data Lag Summary over last 7 days

Displays the following:

▪ Times Data Lag exceeded Configured Value

▪ Maximum Deviation

▪ Maximum Period Data Lag Objective wasn't met

Data Lag Graph over last 7 days

Displays the DataLag (files) Versus the time period, indicating the Average, Maximum and Minimum datalag in a graph format.

Recovery Automation snapshot

Displays the following recovery automation snapshot details for the selected group:

▪ Failover Execution (estimate)

▪ Failover Execution (actual)

Workflow Execution Graph over last 7 days

Displays the workflow execution details for the last 7 days in a graphical form

Note:

Information on drills Workflows is available only when drills is licensed.

Reports

777

Section Description

Drills Details Displays the summary of drills details for the last 7 days that executed by the selected Group:

▪ Group Name

▪ Drill Name

▪ Start Time

▪ End Time

▪ Duration (Hrs)

▪ Status

RTO Graph over last 7 days

Displays the RTO details for the last 7 days of the selected group in the graphical form.

WAN Graph over last 7 days

Displays the WAN utilisation by the selected group for the last 7 days in a graphical form.

Test Summary Report

The Test Summary Report provides information about the recent status of all the

Drills executed on a Group. It displays the data for the last three years. This option

is available only in Tests License.

To generate Test Summary Report:

1. Click Reports on the navigation bar. The Reports page appears.

2. Select the group for which you want to generate the test summary report from

the Reports Per Group section.

3. Select Tests Summary Report from the Select Report drop-down list and

click View Graph. The Test Summary Report page appears.

Field Description

Group Name Displays the group name.

DR Solution Signature

Displays the DR solution signature.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 778

Field Description

# of drills Displays the unique number of drills that have been executed.

# of drills last Executed

Displays the total number of drills executed in the last 3 years.

Total Successful drills

Displays the total number of successful Drills.

Total drills Failed Displays the total number of failed drills.

Column Description

Drill NAME Displays the drills name.

AVG. DURATION Displays the average time taken for the successful execution of the drills.

To calculate the average duration, the report will consider the 10 instances over a period of 3 years time. Avg. Duration = Sum of time taken by each test instance of the test /total number of instances. This will be calculated only for successful drills.

DURATION (Min-Max)

Displays the minimum and maximum time taken for the successful execution of the drills.

This column will also have a bar chart to show duration trend.

SUCCESS RATE Provides information about succeeded and failed drills

Success Rate = Number of successful execution *100

Total number of execution

Displays the total number of times the drills was executed, and the number of times it succeeded and the number of times it failed. It is displayed both graphically

Reports

779

Column Description

and textually.

In the graphical representation, the green line represents the successful execution and the red line represents the failed execution.

In the textual representation, the text in green is the number of times the drills succeeded, the text in red is

the number of times the drills failed and the text in black is the total number of times the drills got executed.

Note:

Click the Print Report button to print the test summary report.

4. Click the test name link to view the execution details of the recent instances.

Field Description

START TIME Displays the start time of the drills execution.

END TIME Displays the end time of the drills execution.

DURATION(HRS) Displays the duration of the drills execution.

STATUS Displays the status of the drills execution.

The following charts are also displayed:

• "Execution duration" chart

Each of the bars shown in the graph will have a duration as tooltip.

• "Success Rate" Pie-chart

A green Pie representing the successful tests and red Pie representing the failed tests

will be displayed. Each of the Pies will have the succeeded/ failed tests' count as

labels.

5. Click the Details link corresponding to the test instance. The Execution

Status page appears.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 780

Field Description

Name Displays the name and status (in brackets) of the drill.

Group Displays the group to which the workflow belongs.

Start Time Displays the time at which the drills execution is initiated. The time taken for the execution is also displayed in brackets.

End Time

Displays the time at which the drills execution is completed.

View Details Click this link to view the Key value pair for this workflow.

Export to CSV Click this link to export the report to excel sheet.

Workflow Actions

Name Displays the name of the workflow action.

Status Displays the status of the workflow action.

Time Initiated Displays the time at which the action started.

Time Elapsed (Sec) Displays the time taken to complete the workflow action.

Type Displays the action type as a symbol.

Details Click the View Details link to view the execution log details.

Custom Report Framework

Using the Custom Reports framework, customer can develop customized reports

based on the data monitored and captured by IBM Resiliency Orchestration server.

Reports

781

This feature will have two distinct modules.

▪ Data Capturing Module to Generate Custom Reports

▪ Advanced Reports Module

Data Capturing Module to Generate Custom Reports

The data capturing module captures the following data for all the groups that are

monitored by IBM Resiliency Orchestration server.

▪ RPO

▪ RTO

▪ Protection Details

▪ Continuity Details

The above data will be available to the customer/ user in the form of database views

in the IBM Resiliency Orchestration metadata in mysql database. Using this,

customer/ user can develop reports using any of the reporting software which has

the capability to connect to mysql database and retrieve the data.

Database Views:

Data captured will be accessible by logging into the mysql database using the

following log in credentials:

User : IBMreporter

Password : IBM123 (which is the default password, which can be changed)

Database Name : panaces

Database URL : jdbc:mysql://host:port/panaces

For example: if the reporting module uses JDBC to connect to the mysql database,

then the typical JDBC connectivity URL would be

jdbc:mysql://localhost:3306/panaces where panaces is the name of the

database and 3306 is the port where mysql listens for incoming connections.

If mysql client is used, the command would be mysql -u IBMreporter -p panaces and

enter IBM123 when prompted for the password.

Click the links below for the database views:

▪ Report_RPO

A row will be added to this view whenever RPO is computed for a RG. The

columns and the details of the columns are given below.

Name Type Description

group_id int(11) Recovery Group ID.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 782

Name Type Description

group_name varchar(32) Recovery Group Name.

rpo_value int(11) RPO value in seconds.

rpo_deviation int(11) RPO deviation from the configured value in percentage.

time datetime Time when RPO was computed.

pri_last_txn_id varchar(255) Last transaction ID on the primary.

pri_last_txn_time varchar(255) Last transaction ID time on the primary.

dr_last_txn_id varchar(255) Last transaction ID on the DR.

dr_last_txn_time varchar(255) Last transaction ID time on the DR.

▪ Report_RTO

A row will be added to this view for each action in the Failover workflow

whenever RTO is computed for a Recovery group. The columns and the

details of the columns are given below.

Name Type Description

id int(11) ID to identify the rows of the RTO computation

instance.

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

rto_value int(11) RTO value in seconds.

Reports

783

Name Type Description

rto_deviation int(11) RTO deviation from the configured value in percentage.

time datetime Time when RPO was computed.

step_name varchar(64) Name of the action in the Failover workflow.

step_etc int(11) Estimated time to complete in seconds.

step_etc_time datetime Time when ETC was computed.

▪ Report_Protection

A row will be added to this view whenever replication details are fetched for a

Recovery group. Replication details are fetched for a functional group

periodically or whenever the Manage DR Solution page is visited/refreshed.

The columns and the details of the columns are given below.

Name Type Description

group_id int(11) Functional Group ID.

group_name varchar(32) Functional Group Name.

datalag int(11) Amount of data that is yet it be replicated.

throughput bigint(20) Replication throughput -

Applicable only for PFR.

status varchar(255) Status of the replication - ACTIVE/INACTIVE/DEGRADED.

time datetime Time when protection details was computed.

▪ Report MSSQL Continuity Details

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 784

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the MSSQL

Recovery groups. The columns and the details of the columns are given

below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

pri_last_backedup_translog varchar(255) Name of the last transaction log that was backed up on primary.

pri_last_backedup_translog_time datetime Time when last transaction log was backed up on primary.

dr_last_restored_translog varchar(255) Name of the last transaction log that was

restored up on DR.

pri_last_backedup_translog_time datetime Time of the last transaction log that was restored up on DR.

▪ Report_Oracle_Continuity_Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the Oracle

Recovery groups which includes Oracle-Log and Oracle-RAC-Log groups. The

columns and the details of the columns are given below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

Reports

785

Name Type Description

computed_time datetime Time when continuity details was gathered.

thread_no int(11) Oracle instance thread number.

pri_last_archived_logfile varchar(255) Last log file that was archived on primary.

pri_last_archived_log_time datetime Time when last log file was archived on primary.

pri_last_archived_log_seqno bigint(20) Sequence number of last log file that was archived on primary.

dr_next_archived_logfile_to_apply varchar(255) Next log file that needs to be applied on DR.

dr_last_applied_logfile_time datetime Time when last log file was applied on DR.

dr_last_appied_log_seqno bigint(20) Sequence number of last log file that was

applied on DR.

▪ Report_DB2_Continuity_Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the DB2

Recovery groups. The columns and the details of the columns are given

below.

Name Type Description

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 786

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

Pri_Dumped_File varchar(255) Name of the last

transaction log that was backed up on primary.

Pri_Dumped_File_TS datetime Time when last transaction log was backed up on primary.

DR_Loaded_File varchar(255) Name of the last transaction log that was restored up on DR.

DR_Loaded_File_TS datetime Time when last transaction log was restored on DR.

▪ Report Sybase Continuity Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the Sybase

Recovery groups which includes Sybase-Log-PFR, Sybase-Log and Sybase

SRS. The columns and the details of the columns are given below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

pri_last_backedup_translog varchar(255) Name of the last transaction log that was

Reports

787

Name Type Description

backed up on primary.

pri_last_backedup_translog_time datetime Time when last transaction log was backed up on primary.

dr_last_restored_translog varchar(255) Name of the last transaction log that was restored up on DR.

pri_last_backedup_translog_time datetime Time of the last transaction log that was restored up on DR.

▪ Report_Application Subsystem_Continuity_Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the Application

Sub System Recovery groups which includes Application SubSystem with PFR

and Application SubSystem with TC/ Other. The columns and the details of

the columns are given below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

pri_app_file_time datetime Time when the application file was last modified.

dr_app_file_time datetime Time until when the application data is available on DR.

▪ Report_PostgreSQL_Continuity_Details

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 788

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the PosgreSQL

Recovery groups. The columns and the details of the columns are given

below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

Pri_Transaction_File varchar(255) Name of the last transaction log file that was backed up on primary.

Pri_Transaction_Location varchar(255) Last transaction log location on primary.

DR_Transaction_File varchar(255) Name of the last transaction log that was received on DR.

▪ Report_MySQL_Continuity_Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the MySQL

Recovery groups. The columns and the details of the columns are given below

.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

Pri_Transaction_Log_File varchar(255) Name of the last transaction log file that

Reports

789

Name Type Description

was backed up on primary.

Pri_Transaction_Log_File_Pos varchar(255) last transaction log position executed on primary.

DR_Last_Master_Log_File varchar(255) Name of the last transaction log file that was applied on DR.

DR_Last_Master_Log_File_Pos varchar(255) last transaction log position executed on DR.

▪ Report_MS Exchange_Continuity_Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the MS

Exchange Recovery groups. The columns and the details of the columns are

given below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

Pri_Dumped_File varchar(255) Name of the last transaction log that was backed up on primary.

Pri_Dumped_File_TS datetime Time when last transaction log was backed up on primary.

DR_Loaded_File varchar(255) Name of the last transaction log that was restored up on DR.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 790

Name Type Description

DR_Loaded_File_TS datetime Time when last transaction log was restored on DR.

▪ Report_MSSQL Mirroring_Continuity_Details

A row will be added to the view whenever the continuity details are fetched

and is different from the previously fetched values for any of the MSSQL

Mirroring Recovery groups. The columns and the details of the columns are

given below.

Name Type Description

group_id int(11) Recovery Group ID.

group_name varchar(32) Recovery Group Name.

computed_time datetime Time when continuity details was gathered.

pri_last_backedup_translog varchar(255) Name of the last transaction log that was

backed up on primary.

pri_last_backedup_translog_time datetime Time when last transaction log was

backed up on primary.

dr_last_restored_translog varchar(255) Name of the last transaction log that was restored up on DR.

pri_last_backedup_translog_time datetime Time of the last transaction log that was restored up on DR.

Advanced Reports Module

Reports

791

Advanced Reports module is a powerful, flexible, and easy to use reporting solution

that provides browser based, parameter driven, dynamic report generation and

flexible report scheduling capabilities.

Advanced Reports supports a variety of open source reporting engines, including

JasperReports, JFreeReport, JXLS, and Eclipse BIRT,these are used to provide

support a wide range of reporting requirements and capabilities. Advanced Reports

also supports QueryReports and ChartReports, easy to create SQL based reports that

do not require a predefined report definition.

Advanced Reports provides a web based report generation and administration

interface with the following features:

▪ Support for a wide variety of export formats including PDF, HTML, CSV, XLS,

RTF, and Image.

▪ Web based Administration of Users, Groups, Reports, Charts, Parameters, and

Data Sources

▪ Flexible Scheduling capabilities including Daily, Weekly, and Monthly options

and multiple recipients.

▪ Comprehensive Report Parameter support including Date, Text, List, Query,

and Boolean parameters.

▪ Fine-grained security controls access to Reports, Scheduling and

Administration functionality.

▪ Report Auditing tracks start time, duration, status, and user of every report

generated.

▪ Support for multiple JNDI or Connection Pool DataSources for use in

generating reports.

▪ Support for Drill Down reports and external application integration via secure

report generation URL.

▪ Click Reports, the link Launch Advanced Reports is enabled if Advanced

Reporter module is licensed.

Advanced Reports' report generation and scheduling capabilities are also available

directly via the ReportService, is a Service-oriented architecture (SOA) for report

generation and scheduling. The ReportService provides the ability to quickly add

reporting functionality to existing or new applications through a comprehensive and

flexible API exposed as a SOAP web service and to HTTP GET/PUT requests.

Note:

This Advanced Reports will be enabled only if any of the following conditions meet:

▪ Advanced Reporting feature License is enabled.

▪ Audit Logging feature License is enabled.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 792

Viewing a Report

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view a report, perform the following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Advanced Reports. A pop up window is displayed if the feature is

licensed, otherwise a pop-up is displayed with an error. The Advance Reporter

pop-up has Last updated timestamp and has two buttons, they are:

▪ Click Launch Advanced Reports button, to launch the IBM Resiliency

Orchestration Custom Reporting Solution.

OR

▪ Click Update Advanced Report Data button, to update the latest replication

data for the Recovery group.

3. Select a Report Group from the list of Report Groups. The Reports section

appears.

4. Select a Report from the list of reports.

5. Enter the Runtime parameter for the report if needed and click

OK. The Export Options section appears.

Field Description

Export Type Select the format in which you want to export the report.

You can export the report in PDF, HTML, and CSV format.

Run Click to view the report in the same window.

Run in New Window Click to run the report in a new window.

Note:

▪ You can click the Back to Groups link to go back to the page where all the

Report Groups are listed.

Reports

793

▪ You can click the Back to Reports link to go back to the page where the

Reports are listed.

Scheduling a Report

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To Schedule a report, perform the following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Advanced Reports. A pop up window is displayed if the feature is

licensed, otherwise a pop-up is displayed with an error. The Advance Reporter

pop-up has Last updated timestamp and has two buttons, they are:

▪ Click Launch Advanced Reports button, to launch the IBM Resiliency

Orchestration Custom Reporting Solution.

OR

▪ Click Update Advanced Report Data button, to update the latest

replication data for the Recovery group.

3. Select a Group from the list of Report Groups. The Reports section appears.

4. Select a Report from the list of reports.

5. Enter the Runtime parameter for the report, if needed and click OK. The

Export Options section appears.

6. Click Schedule to schedule the report. The Schedule Options section is

displayed.

Field Description

Description Enter the description for the schedule.

Schedule Type

Once Select this option to run the report once on the date specified in the Start Date field, at the time specified in the Start Time field.

Hourly Select this option to run the report for few hours as specified in the # of Hours field.

The start date and start time of the report

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 794

Field Description

generation is as specified in the Start Date field and the Start Time field respectively.

# of hours field represents the number of hours the report should be generated from the start time

everyday.

Daily Select this option to run the report daily starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Weekdays Select this option to run the report on weekdays starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Weekly Select this option to run the report weekly starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Monthly Select this option to run the report monthly starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Cron Select this option to run the report according to a CRON expression entered in the Cron Expression field.

This option allows tremendous flexibility in the scheduling of reports.

Start Date Select the start date to run report.

Start Time Select the start time to run report.

The time format is HH:MM:AM/PM

Cron Expression Enter the CRON expression if Cron Schedule Type is selected.

The expression must be set with caution so as not to overload system resources.

# of hours It represents the number of hours the report should be generated from the start time everyday.

In other words, you give the start time and then for

how many number of hours you want the report to

Reports

795

Field Description

be generated. For example, if the start time is set to 10:00 AM and you want only till 12:00 Noon, the number of hours should be set to 2. So, if you want only one report at 10:00, then you set the number of hours to zero or use the Daily scheduling.

Another point to note is that, start time + the number of hours should not be more than 24. For example, if the start time is 7:00PM, the number of hours cannot be more than 4 since, 5 will make the schedule move to 12:00 AM which falls on the next day. In this case, an error message "Hour values

must be between 0 and 23" is displayed.

Recipients Enter the e-mail address of the report recipients.

If the field is left blank, the report will be sent to the e-mail address of the current user.

7. Enter the appropriate values in the relevant field and click Submit. The report

will be generated and delivered to the configured e-mail depending on the

schedule type.

Listing the Scheduled Reports

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To list a scheduled report, perform the following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Advanced Reports. A pop up window is displayed if the feature is

licensed, otherwise a pop-up is displayed with an error. The Advance Reporter

pop-up has Last updated timestamp and has two buttons, they are:

▪ Click Launch Advanced Reports button, to launch the IBM Resiliency

Orchestration Custom Reporting Solution.

OR

▪ Click Update Advanced Report Data button, to update the latest replication

data for the Recovery group.

3. Click Scheduled Reports to display all the scheduled reports.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 796

Modifying a Report Schedule

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify a scheduled report, perform the following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Advanced Reports. A pop up window is displayed if the feature is

licensed, otherwise a pop-up is displayed with an error. The Advance Reporter

pop-up has Last updated timestamp and has two buttons, they are:

▪ Click Launch Advanced Reports button, to launch the IBM Resiliency

Orchestration Custom Reporting Solution.

OR

▪ Click Update Advanced Report Data button, to update the latest replication

data for the Recovery group.

2. Click Scheduled Reports to display the list of all scheduled reports. The user

is redirected to the Scheduled Reports page.

3. Click Update to edit the scheduled details.

The Schedule Options page is displayed:

Field Description

Description Modify the description for the schedule.

Schedule Type

Once Select this option to run the report once on the date specified in the Start Date field, at the time specified in the Start Time field.

Hourly Select this option to run the report for few hours as specified in the # of Hours field.

The start date and start time of the report

generation is as specified in the Start Date field and the Start Time field respectively.

# of hours field represents the number of hours

the report should be generated from the start time everyday.

Daily Select this option to run the report daily starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Reports

797

Field Description

Weekdays Select this option to run the report on weekdays starting from the date specified in the Start

Date field, at the time specified in the Start Time field.

Weekly Select this option to run the report weekly starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Monthly Select this option to run the report monthly starting from the date specified in the Start

Date field, at the time specified in the Start Time field.

Cron Select this option to run the report according to a CRON expression entered in the Cron Expression field.

This option allows tremendous flexibility in the

scheduling of reports.

Start Date Select the start date to run report.

Start Time Select the start time to run report.

The time format is HH:MM:AM/PM.

Cron Expression Modify the CRON expression if Cron Schedule Type is selected.

The expression must be set with caution so as not to overload system resources.

# of hours It represents the number of hours the report should be generated from the start time everyday.

In other words, you give the start time and then for how many number of hours you want the

report to be generated. For example, if the start time is set to 10:00 AM and you want only till 12:00 Noon, the number of hours should be set to 2. So, if you want only one report at 10:00,

then you set the number of hours to zero or use the Daily scheduling.

Another point to note is that, start time + the number of hours should not be more than 24. For example, if the start time is 7:00PM, the

number of hours cannot be more than 4 since, 5 will make the schedule move to 12:00 AM which

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 798

Field Description

falls on the next day. In this case, an error message "Hour values must be between 0 and 23" is displayed.

Recipients Modify the e-mail address of the report recipients.

If the field is left blank, the report will be sent to the e-mail address of the current user.

5. Click Submit after modifying the scheduled details. The user will be redirected

to the Scheduled Reports page.

Deleting a Report Schedule

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a scheduled report, perform the following steps:

1. Click REPORTS on the Navigation bar. The Reports page appears.

2. Click Advanced Reports. A pop up window is displayed if the feature is

licensed, otherwise a pop-up is displayed with an error. The Advance Reporter

pop-up has Last updated timestamp and has two buttons, they are:

▪ Click Launch Advanced Reports button, to launch the IBM Resiliency

Orchestration Custom Reporting Solution.

OR

▪ Click Update Advanced Report Data button, to update the latest replication

data for the Recovery group.

3. Click Scheduled Reports to display the list of all scheduled reports.

4. Click Delete to delete the schedule. The user is redirected to the Scheduled

Reports page.

Audit Logging

Audit Log is also known as Activity Report. It is a license module and requires

Advanced Reporter license to view the Audit report. The goal is to enable audit

workflow configuration changes such that it can be viewed as part of the Audit

report.

Reports

799

Audit Log is used to improve security. The system administrator can use the

activities stored in the audit log to check for suspicious patterns of activity in an

attempt to detect security violations. If security is violated, the audit log can be used

to determine how and when the problem occurred and perhaps the amount of

damage done. This information is very useful, both for recovery from the violation

and, possibly, in the development of better security measures to prevent future

problems.

IBM Resiliency Orchestration logs the following information:

▪ Date and time at which the operation was performed.

▪ Group (if applicable) on which the operation was performed.

▪ User name performing the operation.

▪ IP address of the browser machine connected to IBM Resiliency Orchestration

Server through which the operation is performed.

▪ Operations performed by IBM Resiliency Orchestration user.

IBM Resiliency Orchestration logs the following operations performed by the

user:

Workflow Execution:

▪ Start/Initiate Workflow

▪ Stop/Abort Workflow

▪ User interaction during workflow recovery after IBM server failure

▪ User interaction when Execution Dependent is set to previous action

▪ User interaction when Execution Mode is set to Manual

▪ User interaction when Inform completion is set to Success or All or

Failure

Workflow Configuration:

▪ Changes to action properties of an action

▪ Enabling/Disabling singlestep for workflow

▪ Enabling/Disabling skip action during execution

▪ Changes to key-value pair(s) of the workflow

▪ Edit workflow name/description

▪ Workflow import

▪ Adding an action/actiongroup to workflow

▪ Deleting an action/actiongroup from workflow

▪ Configuration changes to workflow schedule

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 800

▪ Adding/Deleting a Business Process

▪ Adding/Deleting a Test Exercise

Note

▪ Audit Log's older than 365 days are purged. Purging is not configurable.

▪ When a group is deleted, corresponding Audit Log's will not be deleted along

with the group. However, the Audit Log will be purged after expiry as

mentioned above.

▪ Audit reports are shown only for Recovery Groups. With Application Groups,

Audit Log is available for all of the Recovery Groups belonging to the

Application Groups. But the audits are not grouped or categorized with

respect to Application Groups.

▪ Workflow configuration:

▪ Any changes to workflow schedule will be logged as one Audit Log. The

changes include one or all of the following:

▪ Enabling/disabling schedule.

▪ Changing schedule properties like recurrence frequency, date

range, start time etc.

▪ When workflow is imported, the Audit Log message will contain the

filename without path.

▪ Every time Save button is clicked in Workflow configuration page, it

will be treated as new changes and will be in Audit Log. The actual

changes (like diff) will not be done to detect whether changes really

exist. The following are a few which will be treated as workflow

configuration.

▪ Clicking on Save button without doing any changes.

▪ Deleted and added the same key-value for workflow.

▪ PFR action fileset filters are deleted and the same filters are

added in different order.

Viewing Audit Log Report

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view Audit Log Report (also known as Activity Report), perform the following

steps:

Reports

801

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Launch Advanced Reports. The launcher link is enabled if the feature is

licensed, otherwise the link is disabled. The IBM Resiliency Orchestration

Custom Reporting Solution window appears.

3. Click Activity Reports. The Reports section appears.

4. Select a Report from the list of reports. The Parameters page appears.

5. Click and select the start date if needed and click OK. The Export Options

page appears.

Field Description

Export Type Select the format in which you want to export the report.

You can export the report in PDF, HTML, and CSV format.

Run Click to view the report in the same window.

Run in New Window Click to run the report in a new window.

Schedule Click to schedule the report.

Note:

The Activity Report will not show non-user initiated workflows execution. For

example, for groups of solution type "...Other Replicator", IBM may periodically

execute ReplicationInfoWorkflow. For groups of solution type "...Full Database...",

IBM will periodically execute Pre and Post RPO workflows (if configured). These IBM

executed workflows will not appear in the Activity Report.

Scheduling Audit Log Report

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To schedule Audit Log Report (also known as Activity Report), perform the following

steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 802

2. Click Launch Advanced Reports. The launcher link is enabled if the feature is

licensed, otherwise the link is disabled. The IBM Resiliency Orchestration

Custom Reporting Solution window appears.

3. In the Groups page, click Activity Report. The Reports section appears.

4. Select a Report from the list of reports. The Parameters page appears.

5. Click and select the start date if needed and click OK. The Export Options

page appears.

6. Click Schedule to schedule the report. The Schedule Options section is

displayed.

Field Description

Description Enter the description for the schedule.

Schedule Type

Once Select this option to run the report once on the date specified in the Start Date field, at the time specified in the Start Time field.

Hourly Select this option to run the report for few hours as specified in the # of Hours field.

The start date and start time of the report generation is as specified in the Start Date field and the Start Time field respectively.

# of hours field represents the number of hours the report should be generated from the start time everyday.

Daily Select this option to run the report daily starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Weekdays Select this option to run the report on weekdays starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Weekly Select this option to run the report weekly starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Monthly Select this option to run the report monthly starting from the date specified in the Start Date field, at

Reports

803

Field Description

the time specified in the Start Time field.

Cron Select this option to run the report according to a CRON expression entered in the Cron Expression

field.

This option allows tremendous flexibility in the scheduling of reports.

Start Date Select the start date to run report.

Start Time Select the start time to run report.

The time format is HH:MM:AM/PM

Cron Expression Enter the CRON expression if Cron Schedule Type is selected.

The expression must be set with caution so as not to overload system resources.

# of hours It represents the number of hours the report should be generated from the start time everyday.

In other words, you give the start time and then for how many number of hours you want the report to be generated. For example, if the start time is set to 10:00 AM and you want only till 12:00 Noon, the number of hours should be set to 2. So, if you want only one report at 10:00, then you set the number of

hours to zero or use the Daily scheduling.

Another point to note is that, start time + the number of hours should not be more than 24. For example, if the start time is 7:00PM, the number of

hours cannot be more than 4 since, 5 will make the schedule move to 12:00 AM which falls on the next day. In this case, an error message "Hour values must be between 0 and 23" is displayed.

Recipients Enter the e-mail address of the report recipients.

If the field is left blank, the report will be sent to the e-mail address of the current user.

7. Enter the appropriate values in the relevant fields and click Submit. The

report will be generated and delivered to the configured e-mail depending on

the schedule type.

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 804

Listing Scheduled Audit Log Reports

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the scheduled Audit Log Reports (also known as Activity Report), perform

the following steps:

1. Click REPORTS on the navigation bar. The Reports page

appears.

2. Click Launch Advanced Reports. The launcher link is enabled

if the feature is licensed, otherwise the link is disabled. The IBM

Resiliency Orchestration Custom Reporting Solution window

appears.

3. Click the Scheduled Reports button at the top right corner to

view all the scheduled reports.

Modifying Audit Log Report Schedule

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify Audit Log Report (also known as Activity Report) schedule, perform the

following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Launch Advanced Reports. The launcher link is enabled if the feature is

licensed, otherwise the link is disabled. The IBM Resiliency Orchestration

Custom Reporting Solution window appears.

3. Click Scheduled Reports to display the list of all scheduled reports.

4. Click Update corresponding to the scheduled report to be updated. The user is

redirected to the Schedule Options section.

5. Modify the required fields:

Field Description

Description Modify the description for the schedule.

Schedule Type

Once Select this option to run the report once on the date specified in the Start Date field, at the time specified in the Start Time field.

Hourly Select this option to run the report for few hours

Reports

805

Field Description

as specified in the # of Hours field.

The start date and start time of the report generation is as specified in the Start Date field and the Start Time field respectively.

# of hours field represents the number of hours the report should be generated from the start time everyday.

Daily Select this option to run the report daily starting from the date specified in the Start Date field,

at the time specified in the Start Time field.

Weekdays Select this option to run the report on weekdays starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Weekly Select this option to run the report weekly starting from the date specified in the Start Date field, at the time specified in the Start Time field.

Monthly Select this option to run the report monthly starting from the date specified in the Start Date field, at the time specified in the Start

Time field.

Cron Select this option to run the report according to a CRON expression entered in the Cron Expression field.

This option allows tremendous flexibility in the scheduling of reports.

Start Date Select the start date to run report.

Start Time Select the start time to run report.

The time format is HH:MM:AM/PM

Cron Expression Modify the CRON expression if Cron Schedule Type is selected.

The expression must be set with caution so as not to overload system resources.

# of hours It represents the number of hours the report should be generated from the start time

IBM Resiliency Orchestration Administrator’s Guide

© IBM Corporation 2017 806

Field Description

everyday.

In other words, you give the start time and then for how many number of hours you want the report to be generated. For example, if the start

time is set to 10:00 AM and you want only till 12:00 Noon, the number of hours should be set to 2. So, if you want only one report at 10:00, then you set the number of hours to zero or use the Daily scheduling.

Another point to note is that, start time + the number of hours should not be more than 24.

For example, if the start time is 7:00PM, the number of hours cannot be more than 4 since, 5 will make the schedule move to 12:00 AM which falls on the next day. In this case, an error

message "Hour values must be between 0 and 23" is displayed.

Recipients Modify the e-mail address of the report recipients.

If the field is left blank, the report will be sent to the e-mail address of the current user.

6. Click Submit after modifying the scheduled details. The user will be

redirected to the Scheduled Reports page.

Deleting Audit Log Report Schedule

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete Audit Log Report (also known as Activity Report) Schedule, perform the

following steps:

1. Click REPORTS on the navigation bar. The Reports page appears.

2. Click Launch Advanced Reports. The launcher link is enabled if the feature is

licensed, otherwise the link is disabled. The IBM Resiliency Orchestration

Custom Reporting Solution window appears.

3. Click Scheduled Reports to display the list of all scheduled reports.

4. Click Delete, corresponding to the scheduled report to be deleted. The Delete

Scheduled Report Confirmation page appears. The page displays name,

description, start date and type of the Schedule.

5. Click Delete to confirm deletion.

Or

Click Cancel to abort deletion.

Reports

807

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corporation 2017

Discovery

Sites

Setting Up Sites

This chapter describes how to work with sites in the DR environment.

This section explains the following:

Adding Sites

Modifying Sites

Deleting Sites

Site Listing

Adding Organization

1. Login to CLI IBM Resiliency Orchestration server

2. Go to $EAMSROOT/bin

3. Unzip cdrm-ws-testclient.zip file

4. Go to /testclient/shellscripts

./addsubscriber.sh < Resiliency_Orchestration_IP> <Username> <Password> <Login Override>

For ex. ./addsubscriber.sh 192.168.20.69 ResiliencyOrchestrationAdmin Drmadmin123$ yes

Discovery

© Copyright IBM Corporation 2017

Enter subscriber details of Subscriber < Id, Name, Description> or

press enter to finish.

(For ex. 1001, CoreBanking, Banking Application Details)

Do you wish to continue on Failure if one subscriber addition fails

(y/n)?

Type 'y' to save the organization configured or 'n'to cancel.

Note:

Creation of organization with special character (_,space, etc.) is not supported.

Adding Sites

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To create a new location in the existing DR environment, perform the following

steps:

Note:

Resiliency Orchestration site will be created by default after installing the Resiliency

Orchestration server.

1. Click DISCOVER >Sites on the navigation bar. The Sites List

window appears with the following configured values.

▪ Site Name

▪ Address

▪ Site Incharge

▪ Site Status

2. Click the Create New Site link at the top right corner of the Sites List

window. The Create Site window is displayed.

IBM Resiliency Orchestration Administrator’s Guide

Configure the following field elements:

Field Description

Site Name Enter a unique name to the site being created.

This field is mandatory.

Note:

This field accepts up to 32 alphanumeric characters,

spaces and underscores. The site name can be started with an alphabet or a number.

Site Type Select the following site type from the drop-down list.

• On-Premise :This is for PR

• Cloud: This is for DR.

Note:

The Proxy SRA option will be available during SRA discovery if the component site is on cloud.

Site-in-charge ▪ Select an In-charge for the site from the drop-down list.

▪ The users of type Super Administrator and Administrator can become site-in-charge.

▪ Super Administrator has the privilege to manage all sites irrespective of the Groups assigned to the Super administrator.

▪ Administrator is privileged to manage those sites that belong to a Group to which the Administrator is the owner.

The site in-charge is the default user to whom the notifications about the Groups belonging to the site

are sent. The site in-charge is the owner of the site and takes charge of its maintenance work.

Site Address Enter the site address.

This field accepts a maximum of 255 characters.

This field is mandatory.

Discovery

© Copyright IBM Corporation 2017

3. Click Save to add the site.

OR

Click Cancel to quit the current operation.

4. On successfully adding the site, a message box is displayed.

5. Click OK in the message box to return to the Sites List page.

Modifying Sites

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify a Site, perform the following steps:

1. Click DISCOVER > Sites on the navigation bar. The Sites List window

appears with the following configured values.

▪ Site Name

▪ Address

▪ Site Incharge

▪ Site Status

2. Click icon corresponding to the site that you want to modify. This opens Edit

Site page. The site details can not be modified by users with Operator

privileges. Refer Adding Sites for field description.

Note:

Site name (city) cannot be modified.

3. Make the required changes in the relevant field.

4. Click Save to save the modifications.

OR

Click Cancel to quit current operation.

5. On successful modification, a message box is displayed. Click OK to return to

the Sites List page.

IBM Resiliency Orchestration Administrator’s Guide

Deleting Site

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

A site cannot be deleted, if there are components associated with it.

To delete a Site, perform the following steps:

1. Click DISCOVER > Sites on the navigation bar. The Sites List page appears

with the following configured values.

▪ Site Name

▪ Address

▪ Site Incharge

▪ Site Status

2. Click the icon corresponding to the site that you want to delete. A message

box is displayed confirming the deletion.

3. Click OK.

Site Listing

To view the sites created or available in a DR environment, click DISCOVER > Sites

on the navigation bar. You can also navigate to the Site List page by clicking List

View link at the top right corner of the Sites area on the Dashboard window.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The Sites List page displays following details:

Field Description

Site Name Displays the name of the site.

ADDRESS Displays the site address.

Discovery

© Copyright IBM Corporation 2017

Field Description

Site Incharge ▪ Displays the In-charge for the site.

▪ The users of type Super Administrator and Administrator can become site-in-charge.

▪ The site in-charge is the default user to whom the notifications about the Groups belonging to

the site are sent. The site in-charge is the owner of the site and takes charge of its maintenance work.

Site Status Displays the status of the site. Status can be

ACTIVE, INACTIVE, DEGRADED, N/A.

Note:

By default, a site is created and displayed with the name

RESILIENCY_ORCHESTRATION_Site in Site listing page.

Subsystem

Discovering Subsystem

A Subsystem comprises of Components, Datasets and Protection Schemes.

Component

A Component is an infrastructure object such as a Windows Server that participates

in Disaster Recovery.

For example, the WAN agent monitors WAN device across sites using SNMP (Simple

Network Management Protocol) services. There are multiple WAN ports for each

device. IBM Resiliency Orchestration sets up WAN device and configures its

corresponding ports.

Dataset

A Dataset indicates all related data that is the object of protection and/or

management by IBM Resiliency Orchestration. For example: Log files for Sybase.

A new Dataset is identified in the DR environment through the Discovery wizard.

Protection Scheme

A Protection Scheme is any protection mechanism that protects data. The Protection

Scheme is discovered after Component and Dataset discovery.

Note:

IBM Resiliency Orchestration Administrator’s Guide

If these subsystems are set up but their associated agents are not connected, the

subsystems status would be shown as Unknown. When agents will be connected, the

status will be updated with status of underlying system.

Auto Discovery

Auto Discovery helps you setup the Protection Scheme or Dataset automatically.

Compared to the manual discovery, auto discovery is an easy method, as it is

performed by IBM Resiliency Orchestration™ itself. Ensure that you have set up

respective agents before performing auto discovery.

This version of IBM Resiliency Orchestration supports auto discovery for the following

subsystems:

Dataset

▪ MSSQL

▪ Oracle

▪ PostgreSQL

▪ MySQL

▪ MS Exchange

▪ Sybase

▪ App Subsystem

Protection Scheme

▪ PFR

▪ Oracle DataGuard

▪ Hitachi Replication

▪ PostgreSQL SR

▪ EMC SRDF Replication

▪ Sybase Replication Server

▪ HP XP Replication

▪ MySQL SR

▪ MS Exchange SR

▪ NetApp SnapMirror

Credentials

Discovery

© Copyright IBM Corporation 2017

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears. The Credentials page now allows the creation of new Credential and

Vault.

Create New Credential Using Password

The following are steps for creating new credential using password:

1. Select DISCOVER > Credentials on the navigation bar. The Credentials

page displays.

2. Click Create Credential link in the top right corner. The Create

Credential page displays.

3. Click Password in Authentication Method.

4. Enter the User Name and Password.

5. Choose the Protocol from the drop-down list as displayed:

▪ wmi: If the server being managed is Windows.

▪ ssh: If the server being managed is Unix/Linux.

Note:

Depending on the selection of the Protocol, the Port No is displayed.

6. Enter the Label.

7. Click Save.

Create New Credential Using SSH

The following are steps for creating new credential using SSH:

1. Select DISCOVER > Credentials on the navigation bar. The Credentials

page displays.

2. Click Create Credential link in the top right corner. The Create

Credential page displays.

3. Click SSH in Authentication Method.

4. Enter the User Name and then click Choose File to specify the location of

PrivateKey file and select the file. The PrivateKey file name is displayed in

KeyPair field. Refer to Create SSH Key for details to create a SSH key.

5. By default, the ssh protocol is selected and Port No is displayed.

6. Enter the Label.

7. Click Save.

IBM Resiliency Orchestration Administrator’s Guide

To view the credentials, perform the following steps:

1. Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears.

2. Under Credential List section, click the label to view the Credential details.

Note:

The Objects Using field displays the subsystems which are using the credential.

To modify a credential, perform the following steps:

1. Click the button, the user will be directed to Edit Credentials page.

You can modify the User Name, Password, Port No. and Label.

2. Click Save after making the changes.

OR

Click Cancel to return to the Credentials page.

To delete a credential, perform the following steps:

1. Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears.

2. Click the Delete icon to delete a credential.

If any credential is used by a subsystem, the user cannot delete it. The

credential has to be detached from the subsystem, in order to delete it.

Note:

Apart from the Password field, the rest of the fields are mandatory.

The subsystem can be a component, dataset or protection scheme.

Port number can be edited only if the protocol selected is "ssh".

Create New Vault for CyberArk

To create a new Vault

1. Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears.

2. Click Create New Vault link in the top right corner. The Create Vault page

appears with the following fields:

Discovery

© Copyright IBM Corporation 2017

Field Description

Vault Name Name that is used to identify a vault.

Vault Type Select CyberArk from the drop - down list.

Provider Port

Enter the port number on which the provider runs. Default port number is 18923.

Provider Timeout Default provider timeout is 30 seconds.

Application ID Enter the ID that is configured in Cyber-Ark Vault software. Default ID is ResiliencyOrchestrationApp.

3. Click Save to save the vault or Cancel to cancel the vault creation.

Create New Vault for Eguard

To create a new Vault

1. Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears.

2. Click Create New Vault link in the top right corner. The Create Vault page

appears with the following fields:

Field Description

Vault Name Name that is used to identify a vault.

Vault Type Select Eguard from the drop down list.

Host IP

Enter the IP address number on which the provider runs.

Key File Link the key file

User Name Enter the user name

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Time Required (minutes)

To view the Vault

1. Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears.

2. Under Vault List section, click the Vault Name to view the Vault details.

To delete a Vault

1. Click DISCOVER > Credentials on the navigation bar. The Credentials page

appears.

2. Click the corresponding Delete icon to delete a Vault.

Agent Upgrade

Configuration

When Agentless model is used, Resiliency Orchestration software needs additional

configuration.

As part of subsystem discovery, user needs to provide additional information which is

used to access customer servers remotely. This include credential information to

access a customer server. These are described in subsystem discovery page in detail.

If multiple servers can be accessed using same credential information, Resiliency

Orchestration provides option to enter the credentials once and then can be attached

to any number of subsystems. This is explained under Credentials.

To use IBM Resiliency Orchestration as an Agentless model, user needs to discover

Resiliency Orchestration server machine as a component and start an agent on the

Resiliency Orchestration server system.

Refer Management, to start agent and refer Configuration, to discover a component.

Once this step is done, user can go ahead with other subsystems and group

discovery.

Prerequisites

The following are prerequisites for Agent upgrade:

a. The following ports should be opened between the Resiliency Orchestration

Server and agents:

Discovery

© Copyright IBM Corporation 2017

Field Description

8081 This is the port on which Jackrabbit listens.

8083 This is the port for Jackrabbit RMI

connection.

b. The user needs chmod 744 permissions to upload binaries to jackrabbit

repository.

IBM Resiliency Orchestration Administrator’s Guide

Upgrading the Agents

To upgrade the agent, check for the following:

▪ If IBM Upgrade Assist agent is installed in all the local agent components.

▪ If SFR is installed and the Remote agent components and protection schema

discovered. IBM Upgrade Assist agent is installed in the remote machine.

The following table explains each field in the Agent Upgrade page:

Field Description

Component Name This displays the name of the component discovered. For Agent, the component name is displayed and for SFR, the protection schema dependent component name is displayed.

Component IP This displays the IP address of the component.

Current Version

This displays the version of the Agent or SFR.

Note

Agent version is displayed if only the Agent is installed in the component.

Agent version is displayed if Agent and SFR both are installed in the component.

SFR version is displayed if only SFR is installed (no local agent is installed) in the component.

If IBM upgrade assist agent is not running then “-” is displayed.

Discovery

© Copyright IBM Corporation 2017

Field Description

Upgrade Status This displays the upgrade information whether it is:

Upgrade available If the required binaries are available in the repository.

Upgrade needed If Agent/SFR version is lesser than IBM Resiliency Orchestration version, and IBM Resiliency Orchestration version agent/SFR binaries are not available in repository.

Upgraded if already agent/SFR version is equal to

IBM Resiliency Orchestration version.

Click on the link Last Upgrade Status to view the details.

This displays the last upgrade information for the component.

Upgrade status can be successful or can display an

error message, if any error has occurred during the upgrade. If the upgrade has failed then the rollback status will also be displayed in upgrade status.

N/A will be displayed if no upgrades are done on the component.

Note:

If there is any error with the repository or IBM Upgrade Assist,an appropriate error message is displayed.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Upgrade Agent and SFR are installed in component: The upgrade button should be displayed only if the Agent and SFR are in Upgrade available state.

Note:

If either of the state is in upgraded/upgrade

needed, the upgrade button will not be

displayed.

If only the Agent is installed in the component: The upgrade button should be displayed only if the of Agent is in Upgrade available state. SFR upgrade is not applicable.

If only the SFR is installed in component: The

upgrade button should be displayed only if the SFR is in Upgrade available state. Agent upgrade is not applicable.

Component & WAN

Listing Components

The Components tab in the Subsystems page lists all the Components that have

been set up.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the Components, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Components tab.

Following table summarizes the information displayed on Components tab:

Discovery

© Copyright IBM Corporation 2017

Field Description

Name Displays the Component name.

IP Address Displays IP address of the Component.

Type Displays the type of discovered Components.

The types of Component available are WAN, Linux, AIX, Solaris, HPUX, and Windows.

This could be Linux server, NT server or Solaris, etc, server for Components and MS-SQL 2000 or Oracle 9i etc, for Datasets and PFR for Protection Scheme.

Site Displays the Site name to which IBM Resiliency Orchestration Objects are connected.

Status Displays the Component status. OS agents set the status for Components. The possible statuses are ACTIVE, INACTIVE and UNKNOWN.

▪ UNKNOWN: The status of the Component set up is

UNKNOWN, if the agents are not connecting to the

IBM server or when the agents are not running on the client machines.

▪ ACTIVE: The status of the Component set up is ACTIVE, if the agent is able to connect to respective

managed object and the object is online.

▪ INACTIVE: The status of the Component set up is INACTIVE, if the agent is able to connect to respective managed object and the object is off-line

or down.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Credential Status

Displays the Credential status of the subsystem.

The possible status are N.A, Success and failure.

▪ N.A: The status indicates that server is not locally managed.

▪ Success: The status indicates that the system is able to login successfully.

▪ Failure: The status indicates that the system is

unable to login and the Event is raised on failure.

Password Fetch

Click Refresh to get a new password from the Vault

3. To get information about the discovered Component, click the respective link

on the Subsystems-Components window. The Component Discovery

window appears with the information displayed on Type, Name, IP Address,

Component Site, Status, Server Managed Remotely, and Credential Status.

4. For WAN component subsystem, the Advanced Details section is displayed.

The Advanced Details provides information on the DR Solution specific configuration

for each of the Subsystem. The advanced details of the Subsystems are configured

at the time of DR Solution specific setup. Refer to the respective book under DR

Solutions supported by IBM Resiliency Orchestration in this online Help.

You can edit the respective component by clicking button adjacent to the

component. You can delete the respective component by clicking button adjacent

to the component.

Discovering Component

Component is an infrastructure object such as a Windows Server or WAN that

participates in a Disaster Recovery.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To discover a new Component

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Components tab.

Discovery

© Copyright IBM Corporation 2017

3. Select the type of Component Subsystem from the Create New drop-down list

at the top right corner of the Subsystems page. The drop-down list displays all

the Component Subsystems that can be created.

4. Click Go. The New Component Discovery page appears. The Subsystems

side bar page displays list of all the Components already discovered.

Provide the information for the following fields to configure the Component:

Field Description

Type Select the type of component from drop-down list.

The component could be a Wan server, AIX server, HPUX server, Linux server, Windows server, or Solaris server.

Name

By-default,the name is auto populated which is a combination of component type and server name/component ip.

OR

Provide a unique name for the component.

Note:

This field accepts alphanumeric characters, and underscores only. This field must start with an alphabetic character, and is limited to 32

characters. Name should not contain spaces.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

IP Address

Provide IP address of the component. The Ping... button will test the specified IP address, and indicate whether the address is accessible.

If you do not know IP address of the component, perform the following:

1. Enter hostname of the machine in the IP Address field.

2. Click Lookup by name... to find the IP address of the component by giving host name (DNS name) of the

component.

3. Enter the host DNS name in the User Prompt pop-up window. For example: hostname.company name.com. This will lookup the IP address of the respective component.

Make sure to assign one component to one

server. Only if you are discovering components for Sybase SRS Group, you can assign two components to one server.

Note:

The IP Address field consists of numbers and periods and should fall within the following range

and format.

0.0.0.0 to 255.255.255.255

Component Site

Select the site name from drop-down list where the Component has to be discovered.

Note

If no site is available in the list, an alert message is displayed. It is recommended that you create site before discovering the components.

Discovery

© Copyright IBM Corporation 2017

Field Description

Server Managed Remotely

By default,Server Managed Remotely check box is selected.

Note

Deselect the checkbox, to manage the Server by

installing Agents on that Server; A message, "Please install agents (if not already installed) on this server and start agent" is displayed.

Refer to Installation guide for more information.

Credentials This will be activated only on selecting the Server Managed Remotely check box. The following credentials will be available, select any one based on the requirement:

▪ Add New Credentials: Enter the UserName and Password. The UserName

field will include the Domain Name also. By default, the Port No (SSH) will be displayed. It is created only for specified users. A Fetch from vault check box is

displayed along. The fields Safe Name, Object Name and a vault list will be

enabled on selecting the Fetch from vault check box.

▪ Other credentials are displayed which are created under Group credentials. For example: Unix, Linux or, Windows. It is

in disabled mode and on selection of this option it is attached here.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Test Credentials Select Test Credentials button to validate the credentials entered. Appropriate message is shown, if credential is success or fails.

Note:

Any incorrect domain will be treated as local user and test credentials will try to validate with local user password.

Note:

▪ The create new option for all the components are similar, except for WAN

Component Subsystem.

The WAN port is the interface between the router and WAN device(s).

Following fields are applicable only if you are setting up WAN device:

Field Description

WAN Device discovery

Community String

Enter the community string.

It is, a password that allows access to a network device.

The person responsible for the network device typically sets the community strings.

Port Name Enter a unique name to identify the port.

Port IP Enter the IP Address of the port.

Port Subnet Mask Enter the Subnet mask of Port IP.

The Subnet mask is the network address and bits reserved for identifying the sub network. This can be used to identify the subnet to which an IP address belongs by performing a bitwise AND operation on the mask and the IP address.

Discovery

© Copyright IBM Corporation 2017

Field Description

Usable Bandwidth (Port Speed)

Enter the usable bandwidth.

It is the load (in %) of data transfer across the WAN device port by Up or Down stream and is represented in Kbps.

For example, 60% of data with 3 Kbps.

5. Click Save to save the component discovery information and return to

Subsystems window.

Modifying Component

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify Component details, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Components tab. The discovered Components are displayed.

3. Click corresponding to the component to be modified. The Edit

Component Discovery page appears.

4. Modify the required fields. For more information, refer to Discovering

Component.

5. Click Save to save the changes.

OR

Click Go Back to quit current operation.

Deleting Component

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a discovered Component, perform the following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Components tab. The discovered Components are displayed.

IBM Resiliency Orchestration Administrator’s Guide

3. Click corresponding to the component to be deleted. A message box is

displayed confirming the deletion.

4. Click OK in the message box.

Datasets

Listing Datasets

The Datasets tab in the Subsystems page lists all the Datasets that have been

discovered.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the discovered Datasets, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Datasets tab.

Following table summarizes the information displayed on Datasets tab:

Field Description

Name Displays the Dataset name.

Type Displays the type of the discovered Dataset.

The available types are MS-SQL 2000, Oracle 9i, Sybase, and Application Sub System.

Site Displays the Site name to which the IBM Resiliency Orchestration Objects are connected.

Discovery

© Copyright IBM Corporation 2017

Field Description

Status Displays the status of the subsystem.

The possible status are ACTIVE, INACTIVE and UNKNOWN.

The agents are responsible for setting the status of the Components, Datasets, and Protection Scheme.

OS agents set the status for Components.

Database agents set the status for Datasets.

SRDF, VVR and PFR agents set the status for the Protection Scheme.

▪ UNKNOWN: The status of the Components, Datasets and Protection Schemes set up is UNKNOWN, if the agents are not connecting to the IBM server or when the agents are not running on the client machines.

▪ ACTIVE: The status of the Components, Datasets and Protection Schemes set up is ACTIVE, if the agent is able to connect to respective managed object and the object is online.

▪ INACTIVE: The status of the discovered

Component, Datasets and Protection Scheme is INACTIVE, if the agent is able to connect to respective managed object and the object is off-line or down.

Credential Status

Displays the Credential status of the subsystem.

The possible status are N.A, Success and failure.

▪ N.A: The status indicates that server is not locally managed.

▪ Success: The status indicates that the system is able to login successfully.

▪ Failure: The status indicates that the system is unable to login and the Event is raised on failure.

managed remotely

It displays the information, whether the server is managed remotely or not.

IBM Resiliency Orchestration Administrator’s Guide

The Advanced Details section provides information on the DR Solution specific

configuration for each of the Subsystem. They are configured at the time of DR

Solution specific setup. Refer to the respective book under DR Solutions

supported by IBM Resiliency Orchestration in this online help.

You can edit the respective dataset by clicking the icon adjacent to the dataset.

You can also delete the respective dataset by clicking button adjacent to the

dataset.

Discovering Datasets

A Dataset indicates all related data that is the object of protection and/or

management by IBM Resiliency Orchestration. You should discover the component

before proceeding with the dataset discovery. Refer to Discovering Component for

more details.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To discover a new Dataset, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Datasets tab.

3. Select the type of Database Subsystem from Create New drop-down list at the

top right corner. The drop-down list displays all the Datasets Subsystems that

can be created.

4. Click Go. The New Dataset Discovery page appears and the Subsystems side

bar page displays the list of all the Datasets that are already discovered.

Provide the information on the following fields to configure Dataset.

Field Description

Dependent

Component Select the component (server) containing the

Dataset from the drop-down list.

If the component is not present, abort the dataset discovery and initiate Component discovery from the same 'Create New' drop-down list.

Type Displays the type of Dataset you already selected.

Discovery

© Copyright IBM Corporation 2017

Field Description

You have the option to change your selection.

Dataset Name By default, the dataset name is auto populated which is a combination of dataset type and

component name.

OR

Enter a unique name for dataset.

Note:

This field only accepts alphanumeric characters and must start with an alphabetical character. It should not have a space.

Credentials This will be activated only on selecting the Server Managed Remotely check box. The following are the credentials available, select any one based on the requirement:

▪ Use Component Credentials: If the user wish to use the default credentials provided, select this option.

▪ Add New Credentials: Enter the UserName

and Password.

Note:

Port No (SSH) is fetched automatically, once the Dependent Component is selected.

▪ Other credentials are displayed which are created under Group credentials. Example: Unix, Linux or, Windows. It is in disabled mode and on selection of this option it is attached here.

Test Credentials Select Test Credentials button to validate the credentials entered. Appropriate message is shown,

if credential is success or failure.

5. Click Save to save the Dataset Discovery information and return to

Subsystems window.

For information related to DR Solution dataset:

Discovering MSSQL Dataset

IBM Resiliency Orchestration Administrator’s Guide

Discovering Oracle Dataset

Discovering Sybase Dataset

Discovering Application Subsystem Dataset

Discovering DB2 Dataset

Discovering PostgreSQL Dataset

Discovering MySQL Dataset

Discovering MS Exchange Dataset

Discovering MSSQL Dataset

IBM Resiliency Orchestration agent for MSSQL is designed to support multiple MSSQL

databases. Each MSSQL database to be protected by IBM Resiliency Orchestration

must be discovered as a separate dataset. The IBM Resiliency Orchestration agent

for MSSQL is configured per MSSQL instance which can have multiple databases

created on it. It takes the list of datasets discovered and monitors each one of

them.

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

Perform the following steps to configure the advanced details for the MSSQL dataset.

1. Enter the following information:

Field Description

Dependent Component

Select the component from the drop-down list

Type Select MSSQL from the drop-down list

Dataset Name Enter the dataset name

MSSQL Instance Details.

Database Name Provide the name of the pre-installed MSSQL

database. Click the Discover button, if the database

already exists. Auto Discovery will attempt to retrieve the Data File Name and Transactional Log File Name fields automatically.

Enter the details in the fields given below, if you want

Discovery

© Copyright IBM Corporation 2017

Field Description

to discover the dataset manually.

Note:

This field allows a maximum of 16 alphanumeric characters, starting with an alphabetic character.

Click Test Credentials to verify the entered credentials.

Data File Name

[include path]

Enter the name of the MSSQL data file(s) including

the data file path.

This field accepts one value at a time.

To add multiple values, enter the next value and click Add. The list of data files must contain an MDF file.

Click Modify or Delete to modify or delete the data file name.

Transactional Log File Name [include path]

Enter the name of the transactional log file(s) including the transactional log file path.

This field accepts one value at a time.

To add multiple values, enter the next value and click Add.

Click Modify or Delete to modify or delete the transactional log file name.

2. Click Save to save the changes.

Note:

To auto-discover the DB, you have to provide the database name.

Discovering Oracle Dataset

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

To discover a new Oracle Dataset, perform following steps:

IBM Resiliency Orchestration Administrator’s Guide

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Datasets tab.

3. Select the type of Database Subsystem from Create New drop-down list at the

top right corner. The drop-down list displays all the Datasets Subsystems that

can be created. Select Oracle.

4. Click Go. The New Dataset Discovery page appears and the Subsystems side

bar page displays the list of all the Datasets that are already discovered or

Click to edit the existing dataset.

Perform the following steps to configure the advanced details for the Oracle dataset.

5. Enter the following information.

Field Name Description

Dependent Component Select from the drop-down list

Type Select Oracle from the drop-down list

Dataset Name Enter the Dataset name.

Use Credentials

Credentials Select from the drop-down list. Click Test Credentials to verify the entered details.

Label Displays the label name.

User Name Enter the user name

Password The user can enter the password or fetch from Vault.

Note:

When the user selects vault, the drop- down list is enabled.

Note

When the user selects SIM from the drop-down

list, the Q1 and Q2 textboxes are displayed.

Discovery

© Copyright IBM Corporation 2017

Field Name Description

Port No. (SSH) Enter the port number.

Click on Agent is Connected, the Agent Details pop-up window is displayed.

Oracle Details

Database SID Select the Enter New SID option to provide the new database SID in the field given.

Select the Select discovered SID option to

choose the existing Oracle System ID (SID) from the drop-down list.

Database Instance Service Name

Enter the database instance service name only if your setup has a service name in tnsnames.ora different from that used by the SID. Otherwise, leave it blank.

Port on which Oracle listens

The default is 1521.

Check the port number in listener.ora and enter it if auto-discovery does not work.

This field is mandatory.

IP address on which Oracle listens

Displays the IP address of the chosen component.

This field is mandatory.

Authentication type Select the DB for database authentication. Select OS for OS authentication.

OS Authentication is supported only for local agents and Oracle 11g.

Database UserName Enter an oracle user name with system privileges. IBM’s Oracle Agent will be using this to monitor

IBM Resiliency Orchestration Administrator’s Guide

Field Name Description

and manage the database.

This field is mandatory.

Fetch from vault This is a checkbox. Check this field to retrieve the password from the Vault. Two new fields Safe Name and Object Name will be displayed on selecting the Fetch from vault check box. Enter the Safe Name and Object Name for the identified account. This information should be the

same as what is configured in Vault. Once this

configuration is done, IBM Resiliency Orchestration software gets the password from Vault through the Cyber Ark provider.

Refer Vault Integration for more details on Vault Integration.

Database Password The password is provided by the Vault if the customer has installed the Vault Software. If not, then the user has to enter the password manually.

This field is mandatory.

After entering the above parameters, click the Discover button to execute automatic discovery.

The following columns, except where noted, will be filled in automatically.

Oracle Home Enter as set in $ORACLE_HOME.

This field is mandatory.

DB Initialization File Type

Select the DB initialization file type. The options are pfile or spfile.

For primary, this is usually spfile. For DR, this is usually pfile.

DB Initialization File Path

Enter the path to the pfile or spfile.

Discovery

© Copyright IBM Corporation 2017

Field Name Description

This field is mandatory.

DB Initialization File Name

Enter the name of the pfile or spfile.

This field is mandatory.

Data files Enter the database data files, separated by commas. From SQL > select name from v$datafile;

Redo logs Enter the database redo log files, separated by commas. From SQL > select member from

v$logfile;

Control files Enter the database control files, separated by commas. From SQL > select name from

v$controlfile;

Archivelogs location Enter the folder where Oracle dumps or applies

archive log files. From SQL > archive log list;

Standby Archivelogs location

Enter the alternate folder from which Oracle will look for archive log files to apply.

6. Click Save to save the changes.

Tip

Clicking the Agent is CONNECTED link displays Agent Details pop-up window.

When you scroll the Agent Details window in internet explorer using mouse wheel,

the background window also scrolls. To avoid this, use the scroll bar provided by the

Agents Details window.

Discovering Sybase Dataset

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

Perform the following steps to configure the advanced details for the Sybase dataset.

IBM Resiliency Orchestration Administrator’s Guide

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Datasets tab.

3. Select the type of Database Subsystem from Create New drop-down list at the

top right corner. The drop-down list displays all the Datasets Subsystems that

can be created. Select Sybase.

4. Click Go. The New Dataset Discovery page appears and the Subsystems side

bar page displays the list of all the Datasets that are already discovered or

Click to edit the existing dataset.

5. Enter the following information. All fields are mandatory.

Field Description

Dependent Component Select from the drop-down list

Type Select sybase from the drop-down list

Dataset Name Enter the Dataset name.

Sybase Details

Server Name Server name is case sensitive and should exactly match the real server name.

Database Name

Provide a name for the Database that will be protected by IBM Resiliency Orchestration.

Note

Allows maximum of 16 characters that includes alphanumerics. It should start with an alphabet.

Click Test Credential to verify the credentials.

Discovery

© Copyright IBM Corporation 2017

Field Description

Input for Data Device name

Enter the name of the data device on which the configured Sybase database is created. This

information (and the following fields) can be obtained by running “sp_helpdb <database name>” system procedure on the data server. There can be more than one data device and each will have to be entered.

Note:

This field accepts only alphanumerics and an underscore.

Size allotted on data device [MB]

Enter the size (in MB) allocated on the data device to the given Sybase Database and click

Add.

If you want to delete the entries on the data device, select the respective entry in the list box and click Delete.

Input for Log Device

name

Enter the name of the log device on which the Sybase database is created.

Use the same procedure mentioned for the

"Input for Data Device name" field to obtain this information.

Note:

This field accepts only alphanumerics and an

underscore.

Size allotted on log device [MB]

Enter the size (in MB) that is allowed on the log device and click Add.

If you want to delete the entries on the log device, select the respective entry in the list box and click Delete.

Note:

You can add multiple data devices and log devices for the database by entering the

values in the respective fields.

6. Click Save to submit the changes.

IBM Resiliency Orchestration Administrator’s Guide

Discovering Application Subsystem Dataset

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

Enter the following information to configure specific details for the AS dataset:

Field Description

Dependent Component Select from the drop-down list

Type Select AppSubsystem from the drop-down list

Dataset Name Enter the Dataset name.

FileSystem Details

Data File Name [Include Path]

Enter the location of the backup file path for the filesystem on the production server in the Data File Name [include path] field.

Click Add to add multiple files.

Click Modify to modify the file path.

Click Delete to delete the file path by

Click Save to save the changes.

Discovering DB2 Dataset

Refer to Discovering Dataset to configure the generic details for New Dataset

Discovery.

1. Enter the following information:

Field Description

Dependent Component

Select the component from the drop-down list

Type Select MSSQL from the drop-down list

Discovery

© Copyright IBM Corporation 2017

Field Description

Dataset Name Enter the dataset name

Perform the following steps to configure the advanced details for the DB2 dataset.

2. Enter the database name.

Field Name Description

DB2 details

Database Name

Enter the Database name.

After entering the above parameters, click the Discover button to execute automatic discovery.

The following columns, except where noted, will be filled in automatically.

Registry configuration

DB2COMM This variable specifies the communication managers that are started when the database manager is started.

DB2ADMINSERVER This variable specifies the DB2 Administration Server.

DB2INSTDEF This variable sets the value to be used if DB2INSTANCE is not defined.

DB2SYSTEM This variable Specifies the name that is used by your users and database administrators to identify the DB2 database

server system. If possible, this name should be unique

within your network.

Manager Configuration

Database manager authentication

Displays the database manager authentication type.

Default database path Displays the path of the default database.

IBM Resiliency Orchestration Administrator’s Guide

Field Name Description

DB2ADMINSERVER This variable specifies the DB2 Administration Server.

Monitor health of instance and databases

Displays the status of the monitor.

Notification Level Displays the level of notification.

TCP/IP Service name Displays the name of the TCP/IP service.

db2start/db2stop timeout (min)

Displays the timeout duration in minutes for db2start/db2stop.

SYSADM group name Displays the user group name that belongs to SYSADM role.

SYSCTRL group name Displays the user group name that belongs to SYSCTRL role.

SYSMAINT group name Displays the user group name that belongs to SYSMAINT role.

SYSMON group name Displays the user group name that belongs to SYSMON role.

Transaction manger database name

Displays the name of the database transaction manager.

Database Configuration

Backup pending Displays the status of backup.

Restore pending Displays the status of restore.

Rollforward pending Displays the status of rollforward.

Database is consistent Displays the status of datbase consistency.

Fallover log archive path Displays the path of the fallover log archive.

Discovery

© Copyright IBM Corporation 2017

Field Name Description

Mirror log path Displays the path of the mirror log.

New log path Displays the path of the new log.

Path to log files Displays the path to log files.

Overflow log path Displays the path of the overflow log.

First log archive method Displays the status and method of first log archive.

Second log archive method Displays the status and method of second log archive.

Option for logarchmeth1 Displays the option for the method of first log archive.

Option for logarchmeth2 Displays the option for the method of second log archive.

log file size Displays the size of log file.

Number of primary log files Displays the numerical quantity of primary log files.

Number of secondary log files

Displays the numerical quantity of secondary log files.

Log retain for recovery status

Displays the status of the log retain for recovery.

User exit for logging status Displays the status of the user exit for logging.

Note:

Few fields mentioned in the above table does not display any value. This is limitation

in DB2 version 9.7 with Linux and Windows Operating System.

3. Click Save to save the changes.

Note:

Clicking the Agent is CONNECTED link displays Agent Details pop-up window.

When you scroll the Agent Details window in internet explorer using mouse wheel,

the background window also scrolls. To avoid this, use the scroll bar provided by the

Agents Details window.

IBM Resiliency Orchestration Administrator’s Guide

Discovering PostgreSQL Dataset

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

PostgreSQL dataset discovery involves discovering the cluster data directory and the

details of the database. Multiple PostgreSQL cluster instances on the same server is

also supported.

Before discovering the dataset, PostgreSQL agent should be configured with the

following parameters by the user. The same agent can be configured to connect to

all the cluster instances running on that particular component.

Enter the following fields to discover a new dataset

Field Description

Dependent Component Select the component from the drop-down list

Type Select Oracle from the drop-down list

Dataset Name Enter the Dataset name.

1. Enter the following information.

Field Name Description

PostgreSQL Home The directory where PostgreSQL is installed

PostgreSQL Data The cluster data directory

Host IP The IP address on which the PostgreSQL is listening and the clients can connect

Host Port The port on which the PostgreSQL is listening and the clients can connect

User Name The user name using which the agent should connect

Password The password for the user

2. To configure a new cluster instance, select Add New from the drop down list

and specifying the data directory.

Discovery

© Copyright IBM Corporation 2017

3. To remove an existing configuration of a cluster instance, select the data

directory of the cluster from the drop down list and click Delete.

4. Click Save to save the changes.

To discover the dataset, enter the following information:

Field Name Description

Cluster Data Directory The cluster data directory

Database name Enter the data base name

1. Click Discover.

2. Click Save to save the changes.

Note:

The data directory given here should match the data directory given in the agent

configuration. If the agent is not configured at all or not configured for the entered

data directory, then an error message is displayed indicating that the agent is not

configured.

If the agent is configured and if the agent is able to connect to the database, the

following configuration parameters will be discovered.

Configuration

Parameter Name

Configuration Parameter Value

WAL Level hot_standby

Archive Mode on

Archive Command cp %p /path_to/archive/%f

Hot Standby on

Standby Mode -

IBM Resiliency Orchestration Administrator’s Guide

Configuration

Parameter Name

Configuration Parameter Value

Trigger File -

Restore Command -

Note:

Standby Mode, Trigger File and Restore Command will be discovered only for the

standby database. For the production database these will be empty. This does not

anyway impact the SO-SB operation on the discovered dataset.

Tip

Clicking the Agent is CONNECTED link displays Agent Details pop-up window.

When you scroll the Agent Details window in internet explorer using mouse wheel,

the background window also scrolls. To avoid this, use the scroll bar provided by the

Agents Details window.

Discovering MySQL Dataset

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

MySQL dataset discovery involves discovering the cluster data directory and the

details of the database. Multiple MySQL cluster instances on the same server is also

supported.

Before discovering the dataset, MySQL agent should be configured with the following

parameters by the user. The same agent can be configured to connect to all the

cluster instances running on that particular component.

1. Enter the following fields to discover a new dataset

Field Description

Dependent Component Select the component from the drop-down list

Type Select Oracle from the drop-down list

Dataset Name Enter the Dataset name.

2. Enter the following information.

Discovery

© Copyright IBM Corporation 2017

Field Name Description

MySQL Data The MySQL data directory

Host IP The IP address on which MySQL is running and the clients can connect

Host Port The port on which MySQL is listening and the clients can connect

User Name The user name using which the agent should

connect

Password The password for the user

3. To configure a new cluster instance, select Add New from the drop down list

and specifying the data directory.

4. To remove an existing configuration of a cluster instance, select the data

directory of the cluster from the drop down list and click Delete.

5. Click Save to save the changes.

To discover the dataset, enter the following information:

Field Name Description

Cluster Data Directory

The cluster data directory

Binary log Directory The binary log directory

Database name The data base name

1. Click Discover.

2. Click Save to save the changes.

Note:

The data directory given here should match the data directory given in the agent

configuration. If the agent is not configured at all or not configured for the entered

data directory, then an error message is displayed indicating that the agent is not

configured.

IBM Resiliency Orchestration Administrator’s Guide

If the agent is configured and if the agent is able to connect to the database, the

following configuration parameters will be discovered.

Configuration

Parameter Name

Configuration Parameter Value

Server id 2

Socket /var/lib/mydb/mydb.sock

Log Bin ON

Binary Log Format MIXED

Note:

Standby Mode, Trigger File and Restore Command will be discovered only for the

standby database. For the production database these will be empty. This does not

anyway impact the SO-SB operation on the discovered dataset.

Tip:

Clicking the Agent is CONNECTED link displays Agent Details pop-up window.

When you scroll the Agent Details window in internet explorer using mouse wheel,

the background window also scrolls. To avoid this, use the scroll bar provided by the

Agents Details window.

Discovering MS Exchange Dataset

Refer to Discovering Dataset to navigate and to configure the generic details for

discovering dataset.

Before discovering the dataset, MS Exchange agent should be configured with the

following parameters by the user. The same agent can be configured to connect to

all the cluster instances running on that particular component.

1. Enter the following fields to discover a new dataset

Field Description

Dependent Component

Select the component from the drop-down list

Discovery

© Copyright IBM Corporation 2017

Field Description

Type Select Oracle from the drop-down list

Dataset Name Enter the Dataset name.

2. Enter the following information.

Field Description

Host Name Name of the host.

Install Path Path where IBM Resiliency Orchestration scripts for MS-Exchange are installed.

3. Click Save to save the changes.

4. Click Close to close the pop-up.

To discover the dataset

1. Click Get DB to display the drop-down list of Database names.

2. Select the Database name from the available list.

Field Name Description

Database Name Name of the Database.

3. Click Discover.

4. Click Save to save the changes.

Note:

The data directory given here should match the data directory given in the agent

configuration. If the agent is not configured at all or not configured for the entered

data directory, then an error message is displayed indicating that the agent is not

configured.

If the agent is configured and if the agent is able to connect to the database, the

following configuration parameters will be discovered.

IBM Resiliency Orchestration Administrator’s Guide

Configuration

Parameter Name

Configuration Parameter Value

Name Mailbox DR

Server EXCHDR

AdministrativeGroup Exchange Administrative Group FYDIBOHF23SPDLT

DatabaseCreated True

Description

DatabaseCopies Mailbox DR\EXCHDR Mailbox DR\EXCHPR Mailbox DR\EXCHDR 25

Servers EXCHDR EXCHPR EXCHDR25

ReplayLagTimes EXCHDR, 00:00:00 EXCHPR, 00:00:00 EXCHDR25, 00:00:00

TruncationLagTimes EXCHDR, 00:00:00 EXCHPR, 00:00:00 EXCHDR25,

00:00:00

LogFilePrefix E00

LogFileSize 1024

IsPublicFolderDatabase False

ExchangeVersion 0.10 14.0.100.0

WhenCreated 01112012 20:33:59

Tip:

Clicking the Agent is CONNECTED link displays Agent Details pop-up window.

When you scroll the Agent Details window in internet explorer using mouse wheel,

the background window also scrolls. To avoid this, use the scroll bar provided by the

Agents Details window.

Discovery

© Copyright IBM Corporation 2017

Modifying Dataset

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify Datasets, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Datasets tab. The discovered Datasets are displayed.

3. Click corresponding to the dataset to be modified. The Dataset Discovery

page appears.

4. Modify the required fields. For more information, refer to Discovering Dataset.

5. Click Save to save the changes.

OR

Click Go Back to quit current operation.

Cloning a Dataset

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Note:

The cloning of Datasets is supported for the following databases:

• Oracle

• MSSQL

• DB2

To clone a Dataset, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems page

appears.

2. Click the Datasets tab. The discovered Datasets are displayed.

3. Click the Clone icon corresponding to the dataset to be cloned. The selected

Dataset is cloned and a message displayed.

The cloned Dataset is an exact duplicate of the selected Dataset.

4. You can modify the cloned Dataset, if required. For more information, refer to

Discovering Dataset.

IBM Resiliency Orchestration Administrator’s Guide

Deleting a Dataset

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a discovered Dataset, perform the following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Components tab. The discovered Components are displayed.

3. Click corresponding to the component to be deleted. A message box is

displayed confirming the deletion.

4. Click OK in the message box.

Protection Schemes

Listing Protection Schemes

The Protection Scheme tab in the Subsystems page lists all the Protection

Schemes that have been set up.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the Protection Schemes, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Protection Schemes tab.

Following table summarizes the information displayed on Protection Schemes tab:

Field Description

Name Displays the Protection Scheme name.

Type Displays the type of the discovered Protection scheme.

The available types of Protection schemes are PFR, Hitachi Replication, and Oracle Data Guard.

Site Displays the name of the site to which the IBM Resiliency Orchestration objects are connected.

Discovery

© Copyright IBM Corporation 2017

Field Description

Status Displays the status of the subsystem.

The possible statuses are ACTIVE, INACTIVE and UNKNOWN.

The agents are responsible for setting the status of the Components, Datasets, and Protection Scheme.

SRDF, VVR and PFR agents set the status for the Protection Scheme.

▪ UNKNOWN: The status will be UNKNOWN, if the agents are not connecting to the IBM server or when the agents are not running on the client machines.

▪ ACTIVE: The status will be ACTIVE, if the agent is able to connect to respective managed object and the object is online.

▪ INACTIVE: The status will be INACTIVE, if the agent is able to connect to respective managed

object and the object is off-line or down.

Credential Status

Displays the Credential status of the subsystem.

The possible status are N.A, Success and failure.

▪ N.A:The status indicates that server is not locally

managed.

▪ Success:The status indicates that the system is able to login successfully.

▪ Failure: The status indicates that the system is unable to login and the Event is raised on failure.

managed remotely

It displays the information, whether the server is managed remotely or not.

The advanced details provides information on the DR Solution specific configuration

for each of the Subsystem and are configured at the time of DR Solution setup. Refer

to the respective book under DR Solutions supported by IBM Resiliency

Orchestration.

IBM Resiliency Orchestration Administrator’s Guide

You can edit the respective protection scheme by clicking the icon, adjacent to

the protection scheme. You can also delete the respective protection scheme by

clicking the icon, adjacent to the protection scheme.

Discovering Protection Scheme

Discovering Protection Scheme

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Note

If these subsystems are discovered, but their associated agents are not connected,

the subsystems status would be shown as Unknown. When agents will be

connected, the status will be updated with status of underlying system.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select the type of Protection Scheme from the Create New drop-down list at

the top right corner of the Subsystems page. The drop-down list displays all the

Protection Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide information on the following fields to configure Protection Scheme:

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent

Discovery

© Copyright IBM Corporation 2017

Field Description

is connected to the IBM Resiliency Orchestration server. This is applicable for all protection schemes except for the one that requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, and underscores and the name must start with an alphabet. It should not have a space.

This field is mandatory.

Management Host Select DR Solution specific Component from the drop-down list to be associated to the protection scheme.

If no components are present, abort Protection Scheme discovery and initiate Component discovery.

Credentials This will be activated only on selecting the Server Managed Remotely check box. The following are the credentials available, select any one based on the requirement:

▪ Use Component Credentials: If the user

wish to use the default credentials provided, select this option.

▪ Add New Credentials: Enter the UserName and Password.

Note

Port No (SSH) is fetched automatically, once the Dependent Component is selected.

▪ Other credentials are displayed which are created under Group credentials. Example: Unix, Linux or, Windows. It is in disabled mode and on selection of this option it is

attached here.

Test Credentials Select Test Credentials button to validate the credentials entered. Appropriate message is shown,

if credential is success or failure.

IBM Resiliency Orchestration Administrator’s Guide

4. Depending on the protection scheme selected, the Auto Discovery or Manual

Discovery is enabled. Click respective discovery buttons.

Note:

• The device groups with atleast one device are shown.

• The device groups with none of the devices configured are not

shown (because re-discovery is not supported yet)

5. Depending on the protection scheme selected, the Auto Discovery or Manual

Discovery is enabled. Click respective discovery buttons.

▪ For PFR, Manual Discovery is enabled.

▪ For Sybase Replication Server (SRS), DataGuard and Hitachi, Auto

Discovery tab is enabled.

For information on DR Solution protection schemes,

Discovering PFR Protection Scheme

Discovering Sybase SRS Protection Scheme

Discovering DataGuard Protection Scheme

Discovering Hitachi Protection Scheme

Discovering Custom Replicator Protection Scheme

Discovering EMC SRDF Protection Scheme

Discovering PostgreSQL SR Protection Scheme

Discovering IBM Global Mirror Protection Scheme

Discovering HP XP Protection Scheme

Discovering_HADR_Protection_Scheme

Discovering SBR Protection Scheme

Discovering MySQL SR Protection Scheme

Discovering MS Exchange Protection Scheme

Discovering NetApp SnapMirror Protection Scheme

Discovering HP3PAR Protection Scheme

Discovering Zerto Protection Scheme

Discovering PFR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

Discovery

© Copyright IBM Corporation 2017

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note:

If these subsystems are discovered, but their associated agents are not connected,

the subsystems status would be shown as Unknown. When agents will be

connected, the status will be updated with status of underlying system.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select PFR from the Create New drop-down list at the top right corner of the

Subsystems page. The drop-down list displays all the Protection Schemes that

can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection Scheme.

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent is connected to the IBM Resiliency Orchestration

server. This is applicable for all protection schemes except for the one that requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, and underscores and the name must start with an

alphabet. It should not have a space.

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Scheme discovery and initiate Component discovery.

Fileset Name If Fileset Name is provided then it should start with an alphabet, can contain alpha numeric, underscore

and maximum of 64 characters.

Fileset Name is auto-generated (if not provided) during group creation).

4. Click Save to save the entered details to complete protection scheme setup.

Discovery

© Copyright IBM Corporation 2017

Discovering Sybase SRS Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

Perform the following steps to configure the SRS Protection Scheme.

1. Enter the details for the following fields:

Field Description

Endpoint Details

Primary or Replicate?

Select the database role. The available options are:

▪ Primary Database

▪ Replicate Database

You have to select each of the databases, one after the other and provide the information

individually for production and Replicate databases.

Dataset Name

Select the respective dataset name of the database from the drop-down list. The drop-down list contains the datasets available on both production and replicated database.

If you have chosen the production database, then choose the corresponding dataset from the drop-down list.

Rep Server Name (as in interfaces file)

Enter the name of the Sybase Replication Server as given in $SYBASE/interfaces.

Rep Server Port Number (as in interfaces file)

Enter the port number of the Sybase Replication Server as given in $SYBASE/interfaces.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Replication Server Credentials

Provide the following login details for SRS.

▪ User Name - Provide the system administrator login name. By default, it is "sa"

▪ Password - Provide the system

administrator password.

▪ Password (confirm) - Re-type the password to confirm.

RSSD Credentials

Provide the following login details for RSSD. If the login details are the same as the Replication Server, then enable the Same as Replication Server check box.

2. Perform any of the following:

▪ Click Reset to re-enter the values.

▪ Click Discover to discover the SRS protection scheme.

Discovering DataGuard Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

Perform the following steps to configure the advanced details for the DataGuard

protection scheme.

1. Enter the details for the following fields:

Field Description

Select SID

Database SID

Select the Oracle System ID (SID) from the drop-down list.

Discovery

© Copyright IBM Corporation 2017

Field Description

Port on which Oracle listens

The default is 1521.

Check the port number in listener.ora and enter it if auto-discovery does not work.

IP address on which

Oracle listens

Displays the IP address of the chosen

component.

Authentication type Select the DB for database authentication. Select OS for OS authentication.

OS Authentication is supported only for local agents and Oracle 11g.

Database Username

Enter an oracle user name with system privileges. IBM’s Oracle Agent will be using this

to monitor and manage the database.

Fetch from Vault This is a checkbox. Check this field to retrieve the password from the Vault. Two new fields Safe Name and Object Name will be

displayed on selecting the Fetch from vault check box. Enter the Safe Name and Object Name for the identified account. This information should be the same as what is configured in Vault. Once this configuration is done, IBM Resiliency Orchestration software

gets the password from Vault through the Cyber Ark provider.

Refer Vault Integration for more details on Vault Integration.

Database Password

The password is provided by the Vault if the

customer has installed the Vault Software. If not, then the user has to enter the password manually.

User's privilege/role (SYSDBA/SYSOPER/etc)

Role of the database username given for DR

IBM Resiliency Orchestration Administrator’s Guide

Field Description

for the database management.

After entering the above parameters, click the Get Destinations button to search for the destinations.

Stand-by Destinations

Selects standby destination from the list of

auto-discovered destinations.

After entering the above parameters, click Discover to discover the destination automatically.

The following columns will be filled in automatically.

Destination ID

Displays Destination ID for replicating this database. Destination details are specified in

v$archive_dest at this Destination Id.

Protection Mode

Displays the Max Performance/Max Protection or Max Availability.

Standby Connect String

Displays the string to connect to standby database.

Replication Pair

Displays the pair name generated for this

dataguard configuration.

2. Click Save to save the changes.

Discovery

© Copyright IBM Corporation 2017

Discovering Hitachi Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

Perform the following steps to configure the advanced details for the Hitachi

protection scheme.

1. Enter the details for the following fields:

Column Description

Group Device Group name as specified in HORCM file.

Type Replication type (Truecopy/ ShadowImage/ Universal Replicator)

Instance HORCM instance config file name.

Status Current status of the replication. (Active/Inactive/Unknown)

Configure Allows to further configure the groups.

2. Click Advanced Configuration. The Device Group Information pop-up

appears.

Field Description

Device Group Information

Group Name Displays the Device Group name as specified in HORCM file.

Type Displays the replication type.

The available types are Truecopy, ShadowImage and Universal Replicator.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Status Displays the current status of the replication.

The status can be Active, Inactive, or Unknown.

Fence level Displays the Fence level setting for replication pair.

The options are Status, Data and Never.

Replication Mode Displays the replication mode.

The options are Sync or Async.

HORCM File Displays the HORCM instance config file name.

Status Information

Pair Name Displays the name of individual device pair in Device

group.

Pair Status Displays the current status of the device pair. (PAIR PSUS)

Pair% Displays

▪ Copy Operation rate in COPY State

▪ Sidefile % when in PAIR (for Async)

▪ Identical percentage of BITMAP in spit state

▪ Journal usage rate for UR.

Config Information

P-VOL and S-VOL Information

Device Displays the device name as specified in HORCM file.

System Displays the sequence number of Storage Box.

Discovery

© Copyright IBM Corporation 2017

Field Description

Port Displays the port number of the device.

Target Displays the target Id of the device.

LUN Displays the Logical Unit Number of the device.

Vol Size[MB] Enter the size of device.

This field is mandatory.

Enter Service Name Displays the protection scheme service name.

Enter Sidefile % Enter/Displays the maximum cache % available for use by Truecopy async sidefiles.

It displays the auto-discovered value. With certain older version of CCI software, it is not possible to auto-discover. In such cases, user needs to enter the value. For that please refer to Hitachi Truecopy

documentation to find out how to get this value.

3. Click Save in the Device Group Information page.

4. Click Finish.

Note:

Auto Discovery would return only those Device Group for which both the HORCM

instances are running. The Device Group for which no HORCM instance is running or

only one of the HORCM instance is running cannot be auto discovered.

IBM Resiliency Orchestration Administrator’s Guide

Discovering Custom Replicator Protection Scheme

Custom Replicator in IBM Resiliency Orchestration is introduced to provide:

▪ Ability for doing health monitoring of Replication in terms of object status

changes and group status changes for unsupported replication by addition of

scripts on field.

▪ Start and Stop of replication from manage replication page by addition of

script on field.

▪ Raise group event and agent event for replication UP and DOWN. User need

not write raise event scripts for it.

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering Custom replicator.

The advanced configuration details varies for different custom replicators. You have

to enter appropriate information in the fields which are displayed based on the

selected replicator. Click Save to save changes.

Discovering EMC SRDF Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

Perform the following steps to configure the advanced details for the EMC SRDF

protection scheme.

1. To discover the new agent, register and configure the agent and then click

Discover Now button.

or

Select the Management Host to discover already registered and configured

agents.

Under Select SRDF Subsystem section, all the devices, groups and its RDFs &

BCVs will be listed.

2. Click Advanced Configuration. The SRDF Details pop-up appears.

The following details are shown for RDF devices:

Discovery

© Copyright IBM Corporation 2017

Field Description

SRDF Details

Group Name Displays the Device Group

Type Displays the device type

Possible values are RDF1, RDF2 or BCV

SID SID of the local Symmetrix

Remote SID SID of the remote Symmetrix

Pair State Displays the current pair state

It can be one of the following:

▪ Sync In Progress

▪ Synchronized

▪ Consistent

▪ Split

▪ Failed Over

▪ R1 Updated

▪ R1 Update In Progress

▪ Suspended

▪ Partitioned

▪ Mixed

▪ Invalid

▪ TransIdle

Replication Mode Displays the replication mode.

The possible values are Synchronous or

Asynchronous.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Device Domino Display whether domino is Enabled or Disabled

Applicable only if the replication mode is

Synchronous.

Consistency Display whether consistency is Enabled or Disabled

Applicable only if the replication mode is Asynchronous

RDF Device Details: The following is shown for each RDF device

Logical Device

Name

Displays the logical name of the device

Symmetrix Device Displays the symmetrix device name/id

Remote device The remote Symmetrix device to which this logical

device is paired

Device Size Size in MB

Device State The device state

The possible values are:

▪ RW

▪ WD

▪ NR

Config Information

Discovery

© Copyright IBM Corporation 2017

Field Description

Service Name Displays the auto generated protection scheme

service name.

Enter a new service name if required

R1 Invalid Tracks

high threshold

Displays the default invalid

tracks threshold (250 MB). Events will be raised if invalid tracks reaches/exceeds this value.

Enter a positive integer based on the business

goals.

Note: Recommended value is around 10% to 20% of the device size.

The following is shown for BCV devices

Field Description

SRDF Details

Group Name Displays the Device Group

Type Displays the device type (BCV)

SID SID of the local Symmetrix

BCV Device Details: The following is shown for each BCV device

Logical Device

Name

Displays the logical name of the device

Symmetrix

Device

Displays the symmetrix device name/id

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Attached to RDF

Logical Device

The RDF logical device to which this BCV device is attached

Device Size Size in MB

Device State The device state

The possible values are:

▪ RW

▪ WD

▪ NR

Config Information

Service Name Displays the auto generated protection scheme

service name.

Enter a new service name if required

3. Click Save in the Device Group Information page.

4. Click Finish.

Note

1. Auto Discovery would return only those Device Group for which have atleast

one device. The Device Group that do not have any devices configured, cannot

be auto discovered.

2. The agent should be configured properly for auto discovery.

Discovery

© Copyright IBM Corporation 2017

Discovering PostgreSQL SR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note

There is no specific agent for PostgreSQL SR Protection Scheme. Its status depends

upon replication status.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select PostgreSQL SR from the Create New drop-down list at the top right

corner of the Subsystems page. The drop-down list displays all the Protection

Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection

Scheme:

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent is connected to the IBM Resiliency Orchestration server. This is applicable for all protection schemes

except for the one that requires manual discovery.

Name

By-default, the protection schema is auto populated which is a combination of protection type and

component name.

OR

Provide a unique name for protection scheme.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

This field accepts alphanumeric characters, and underscores and the name must start with an alphabet. It should not have a space.

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection Scheme discovery and initiate Component discovery.

PostgreSQL Home The directory where PostgreSQL is installed

This field is mandatory

PostgreSQL Data The cluster data directory

This field is mandatory

4. Click Save to save the entered details to complete protection scheme setup.

Discovering IBM Global Mirror Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

It is useful for the solution and for the IBM administrator if the two sets of

parameters are identical to the extent possible. For example, Primary and DR should

have the same LUN ids. The protection scheme discovery parameters are listed in

the table below.

Perform the following steps to configure the advanced details for the IBM Global

Mirror protection scheme.

1. Enter the details for the following fields:

Discovery

© Copyright IBM Corporation 2017

Discovery

Parameters

Description

HMC Hardware Management Console IP Address.

DeviceID Identifies Production Storage Unit, e.g. IBM 1750-6830402.

RemoteDeviceID Identifies DR Storage Unit

HMC_User HMC User Name

HMC Password File

Password file with full path, e.g. /opt/<password file name>

DSCLI Command Path

DSCLI binary with full path, e.g. /opt/dscli/dscli

Global Mirror Session

Global Mirror Session Id

Local LUN List Global Copy LUN list, e.g. 0.02, 0203, 0204 [A- LUN list].

Remote LUN List Remote Global Copy LUN list [B- LUN list].

Local Flash Copy LUN List 1

Local Flash Copy LUN list [C- LUN list].

Local Flash Copy LUN List 2

Local Flash Copy LUN list [D- LUN list].

2. Click Save.

Note:

If the protection object to be discovered is of primary, then A, C and D LUN

information should be of primary and B should be of DR.

If the protection object to be discovered is of DR, then A, C and D LUN information

should be of the DR and B should be of primary.

IBM Resiliency Orchestration Administrator’s Guide

Discovering HP XP Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

Perform the following steps to configure the advanced details for the Hitachi

protection scheme.

1. Enter the details for the following fields:

Column Description

Group Device Group name as specified in HORCM file.

Type Replication type (Truecopy/ ShadowImage/ Universal Replicator)

Instance HORCM instance config file name.

Status Current status of the replication. (Active/Inactive/Unknown)

Configure Allows to further configure the groups.

2. Click Advanced Configuration. The Device Group Information pop-up

appears.

Field Description

Device Group Information

Group Name Displays the Device Group name as specified in HORCM file.

Type Displays the replication type.

The available types are Truecopy, ShadowImage and Universal Replicator.

Status Displays the current status of the replication.

Discovery

© Copyright IBM Corporation 2017

Field Description

The status can be Active, Inactive, or Unknown.

Fence level Displays the Fence level setting for replication pair.

The options are Status, Data and Never.

Replication Mode Displays the replication mode.

The options are Sync or Async.

HORCM File Displays the HORCM instance config file name.

Status Information

Pair Name Displays the name of individual device pair in Device group.

Pair Status Displays the current status of the device pair. (PAIR PSUS)

Pair% Displays

▪ Copy Operation rate in COPY State

▪ Sidefile % when in PAIR (for Async)

▪ Identical percentage of BITMAP in spit state

▪ Journal usage rate for UR.

Config Information

P-VOL and S-VOL Information

Device Displays the device name as specified in HORCM file.

System Displays the sequence number of Storage Box.

Port Displays the port number of the device.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Target Displays the target Id of the device.

LUN Displays the Logical Unit Number of the device.

Vol Size[MB] Enter the size of device.

This field is mandatory.

Enter Service Name Displays the protection scheme service name.

Enter Sidefile % Enter/Displays the maximum cache % available for use by Truecopy async sidefiles.

It displays the auto-discovered value. With certain older version of CCI software, it is not possible to auto-discover. In such cases, user needs to enter the value. For that please refer to Hitachi Truecopy

documentation to find out how to get this value.

3. Click Save in the Device Group Information page.

4. Click Finish.

Note:

Auto Discovery would return only those Device Group for which both the HORCM

instances are running. The Device Group for which no HORCM instance is running or

only one of the HORCM instance is running cannot be auto discovered.

Discovery

© Copyright IBM Corporation 2017

Discovering HADR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note:

There is no specific agent for HADR Protection Scheme. Its status depends upon

replication status.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select HADR from the Create New drop-down list at the top right corner of

the Subsystems page. The drop-down list displays all the Protection Schemes

that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection Scheme.

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent

is connected to the IBM Resiliency Orchestration ™ server. This is applicable for all protection schemes except for the one that requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, spaces

and underscores and the name must start with an alphabet.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection Scheme discovery and initiate Component discovery.

Agent Information

Agent Name Displays the name of the agent.

Description Displays the description of the agent.

Status Displays the status of the agent.

Object Class Displays the class of component object.

Object Type Displays the type of component object.

IP Address The IP address on which the HADR is running and the clients can connect.

Time of Install Displays the time when the OS Agent was installed.

HADR Details

DB2 Instance Username

Enter the instance username of DB2.

Database Name Enter the name of the database of DB2

Database Username Enter the user name of the database using which the agent should connect.

Database Password Enter the password of the database.

4. Click Save to save the entered details to complete protection scheme setup.

Discovery

© Copyright IBM Corporation 2017

Discovering SBR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note:

If these subsystems are discovered, but their associated agents are not connected,

the subsystems status would be shown as Unknown. When agents will be connected,

the status will be updated with status of underlying system.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select SBR from the Create New drop-down list at the top right corner of the

Subsystems page. The drop-down list displays all the Protection Schemes that

can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes discovered.

Provide necessary information on the following fields to configure Protection

Scheme:

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent

is connected to the IBM Resiliency Orchestration server. This is applicable for all protection schemes except for the one that requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, and

underscores. The name must start with an alphabet. It should not have a space.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection Scheme discovery and initiate Component discovery.

Replicationset Name Replication set name which you have created on replication server.

HOST IP Enter the replication host IP Address.

For primary protection scheme, enter the source

host IP Address and for DR protection scheme, enter the target IP Address.

SBRROOT Enter the SBRROOT path for IBM Resiliency Orchestration server.

Volumes Enter the volume name.

To enter the multiple volume names, separate each name by a comma.

4. Click Save to save the entered details to complete protection scheme setup.

Discovery

© Copyright IBM Corporation 2017

Discovering MySQL SR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note:

There is no specific agent for MySQL SR Protection Scheme. Its status depends upon

replication status.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select MySQL SR from the Create New drop-down list at the top right corner

of the Subsystems page. The drop-down list displays all the Protection

Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection Scheme:

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent

is connected to the IBM Resiliency Orchestration ™ server. This is applicable for all protection schemes except for the one that requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, and

underscores and the name must start with an alphabet. It should not have a space.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection Scheme discovery and initiate Component discovery.

IP Address The IP address on which the MySQL is running and the clients can connect

User Name The user name using which the agent should connect

Password The password for the user

Port number The port number on which the MySQL is listening and the clients can connect

4. Click Save to save the entered details to complete protection scheme setup.

Discovering MS Exchange Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note:

The MS-Exchange Replication Agent will run under the component privileges.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

Discovery

© Copyright IBM Corporation 2017

2. Select MS Exchange from the Create New drop-down list at the top right

corner of the Subsystems page. The drop-down list displays all the Protection

Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection Scheme:

Field Description

Exchange Server Host Name

Displays the Exchange Server Host Name

Exchange installpath Path where IBM Resiliency Orchestration scripts for MS-Exchange are installed.

Exchange Database Name

Displays the Database Name.

Exchange Domain Displays the Domain Name.

Exchange User Displays the User Name.

Exchange Password Displays the Password.

4. Click Save to save the entered details to complete protection scheme setup.

IBM Resiliency Orchestration Administrator’s Guide

Discovering NetApp Snap Mirror Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

The details required for creating a NetApp SnapMirror protection object is

completely automated in IBM Resiliency Orchestration. User has to first create

the Component (server) object comprising of the IP address of the NetApp filer.

Perform the following steps to configure the details for the NetApp SnapMirror

protection scheme.

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select NetApp SnapMirror from the Create New Subsystem drop-down list

at the top right corner of the Subsystems page. The drop-down list displays all

the Protection Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection Scheme.

Field Description

Location “Filer Name:Volume (or QTree) Name”. This appears automatically in a drop down box and user has to select one.

Filer Name Source or destination storage system. (Auto updated)

SnapMirror Type VOLUME or QTREE. Auto filled.

LUN/QTree Path Either LUN or QTree name that exists in the Location chosen above. This appears automatically in the drop down box and the user has to select one.

IGroup List Initiator Group. Auto filled. This appears only if ISCSI is used.

Discovery

© Copyright IBM Corporation 2017

Field Description

LUN ID List List of LUN numbers in the IGroup List. Auto filled.

4. Click Save to save the details.

Discovering HP3PAR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note:

If these subsystems are discovered, but their associated agents are not connected,

the subsystems status would be shown as Unknown. When agents will be

connected, the status will be updated with status of underlying system.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The

Subsystems page appears.

2. Select HP3PAR from the Create New drop-down list at the

top right corner of the Subsystems page. The drop-down list displays all

the Protection Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears

and the Subsystems side bar page displays list of all the Protection

Schemes discovered.

Provide necessary information on the following fields to configure Protection Scheme.

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its

agent is connected to the IBM Resiliency

Orchestration™ server. This is applicable for all

protection schemes except for the one that

requires manual discovery.

IBM Resiliency Orchestration Administrator’s Guide

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, and

underscores and the name must start with an

alphabet. It should not have a space.

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection

Scheme discovery and initiate Component

discovery.

Remote Copy

Volume Group

Enter the Remote Copy Volume group for the

management host that ensures write order

consistency.

Virtual Volume List Enter the Virtual Volume List that is supported

by the Remote Copy Volume Group.

Lun List Enter the Logical unit number list for the

management host.

Host List List of host machines for the management host.

4. Click Save to save the entered details to complete protection scheme

setup.

Discovery

© Copyright IBM Corporation 2017

Discovering Zerto Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic

details for discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should

discover the component and dataset before proceeding with the protection scheme

discovery.

Note

There is no specific agent for ZERTO Protection Scheme. Its status depends upon

replication status.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The

Subsystems page appears.

2. Select ZERTO from the Create New drop-down list at the top

right corner of the Subsystems page. The drop-down list displays all the

Protection Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears

and the Subsystems side bar page displays list of all the Protection

Schemes discovered.

4. Provide necessary information on the following fields to

configure Protection Scheme.

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its

agent is connected to the IBM Resiliency

Orchestration server. This is applicable for all

protection schemes except for the one that

requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters,

spaces and underscores and the name must

start with an alphabet.

This field is mandatory.

IBM Resiliency Orchestration Administrator’s Guide

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection

Scheme discovery and initiate Component

discovery.

Agent Information

Agent Name Displays the name of the agent.

Description Displays the description of the agent.

Status Displays the status of the agent.

Object Class Displays the class of component object.

Object Type Displays the type of component object.

IP Address The IP address on which the ZERTO is running

and the clients can connect.

Time of Install Displays the time when the OS Agent was

installed.

ZERTO Details

ZVM IP Zerto Virtual Manager IP address.

ZVM API Port Zerto Virtual Manager API Port.

ZVM CLI Port Zerto Virtual Manager CLI Port.

*ZVM Username Zerto Virtual Manager user name.

*ZVM Password Enter the password of the database.

VPG Name Enter the name of the Virtual Private Group.

Discovery

© Copyright IBM Corporation 2017

4. Click Save to save the entered details to complete protection scheme

setup.

*Indicates ZVM login Credentials should be vCenter Credentials for which the ZVM is

configured.

IBM Resiliency Orchestration Administrator’s Guide

Modifying Protection Schemes

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify Protection Schemes, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The

Subsystems page appears.

2.

3. Click Protection Schemes tab. The discovered Protection

Schemes are displayed.

4. Click corresponding to the Protection Scheme to be

modified. The Protection Scheme Discovery page appears.

5. Modify the required fields. For more information, refer to

Discovering Protection Scheme.

6. Click Save to save the changes.

OR

Click Go Back to quit current operation.

Discovery

© Copyright IBM Corporation 2017

Deleting Protection Schemes

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a discovered Protection Scheme, perform the following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Click the Protection Schemes tab. The discovered Protection Schemes are

displayed.

3. Click corresponding to the protection scheme to be deleted. A message

box is displayed confirming the deletion.

4. Click OK in the message box.

Agent Node Configuration

The agent node mapping can be configured from the GUI by navigating to Discover

>Agent Node on the IBM Resiliency Orchestration dashboard. Here, the user can

provide a one-on-one mapping between the two IP addresses, or an IP range for the

component IP. The range is denoted using the CIDR notation. For example,

10.4.12.0/22 represents the address range 10.4.12.0 - 10.4.15.255 (network mask

255.255.252.0).

The Agent Node Mapping page has the following details.

Field Description

Agent Node Server IP Displays a valid Agent Node Server IP address.

PR/DR Machine IP Range Displays a valid IP address with/without valid mask.

Agent Node Mapping Displays range of IP which are mapped to multiple Agent Node servers.

Note:

When Agent Node mappings are modified or deleted, the changes are not reflected

immediately. For the changes to take effect, the following steps have to be followed:

1. Move the respective group to MAINTENANCE

2. Edit the component, change the component to Local Agent (by unchecking

Server Managed Remotely) and save the component.

IBM Resiliency Orchestration Administrator’s Guide

3. Again Edit the component, change the component to Remote Agent (by

checking Server Managed Remotely and providing credentials) and save the

component. This will take the latest Agent Node mapping configured.

Converged

Converged infrastructure packages multiple information technology (IT) components

into a single, optimized computing solution. Components of a converged

infrastructure solution include servers, data storage devices, networking equipment

and software for IT infrastructure management, automation and orchestration.

This chapter describes how to work with UCS Directors and UCS Director DR Map for

DR.

UCS Directors

Cisco UCS Director unifies and automates end-to-end IT converged infrastructure

management processes by abstracting the complexity of individual devices,

hypervisors, and virtual machine.

UCS Directors section explains the following:

Adding UCS Directors

Modifying UCS Directors

Deleting UCS Directors

Listing UCS Directors

UCS Director DR Map for DR

Virtual Data Centre (vDC) Map for DR is used to configure IBM Resiliency

Orchestration on which vDC on the DR site should the resources be allocated for DR

for a given VM on the primary. This map needs to be created for each vDC on the

primary for which DR might be needed.

UCS Director DR Map for DR section explains the following:

Adding UCS Director vCD Map for DR

Deleting UCS Director vCD Map for DR

Listing UCS Director vCD Map for DR

Discovery

© Copyright IBM Corporation 2017

UCS Directors

Adding UCS Directors

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To add a new UCS director in the existing DR environment, perform the following

steps:

1. Click DISCOVER > Converged tab on the navigation bar. The Converged

page appears with the following configured values.

▪ NAME

▪ SITE

▪ CREDENTIAL STATUS

Click Add UCS Director link at the top right corner of the Converged page

should navigate to 'Add UCS Director' page.

Configure the following field elements.

Field Description

Name Provide a unique name to the UCS Director being

created.

This field is mandatory.

Note:

This field accepts up to 32 alphanumeric characters, spaces and underscores. The UCS Director name can start with an alphabet.

SITE Select the Site from the drop-down list.

Access Key To obtain the Access key:

▪ Login to CISCO UCS Director

▪ click on Admin link,select the User information window.

▪ Click on the Copy key button from the Advanced tab, to copy the access key.

▪ Paste the Access key in IBM Resiliency Orchestration server's Add UCS director page.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

SERVER IP Provide the UCS Director IP Address.

2. Click on Test Credentials to test the credentials entered.

3. Click Save to add the UCS director account.

OR

Click Cancel to quit the current operation.

4. On successfully adding the UCS Director, a message box is displayed.

5. Click OK in the message box to return to the UCS Director List page.

Modifying UCS Directors

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify a UCS director, perform the following steps:

1. Click DISCOVER > Converged tab on the navigation bar. The Converged

page appears with the following configured values.

▪ NAME

▪ SITE

▪ CREDENTIAL STATUS

2. Click icon corresponding to the UCS Director that you want to modify. This

opens Edit UCS Director page. The UCS Director details can not be modified

by users with Operator privileges. Refer Adding UCS Directors for field

description.

Note:

Site and UCS Director name cannot be modified.

3. Make the required changes in the relevant field.

4. Click Save to save the modifications.

OR

Click Go Back to return to the UCS DIRECTOR LIST page.

5. Click OK to return to the UCS Director List Page.

Discovery

© Copyright IBM Corporation 2017

Delete UCS directors

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a UCS Director, perform the following steps:

1. Click DISCOVER > Converged tab on the navigation bar. The Converged

page appears with the following configured values.

• Name

• Site

• Status

2. Click the icon corresponding to the UCS Director that you want to delete. A

message box is displayed confirming the deletion.

3. Click OK in the message box. The UCS director account should be deleted.

Listing UCS Directors

To view the UCS Directors created or available in a Resiliency Orchestration

environment, click DISCOVER > Converged on the navigation bar.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The Converged page displays following details in a tabular form:

Field Description

Name Displays the name.

Site Displays the site.

Credential Status Displays the status of the site.

Status can be Unknown/Active/Inactive.

UCS Director vDC Map for DR

Adding UCS Director vDC Map for DR

IBM Resiliency Orchestration Administrator’s Guide

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To create a new location in the existing DR environment, perform the following

steps:

1. Click DISCOVER > Converged on the navigation bar. The UCS Director vDC

Map for DR List appears with the following configured values.

• Name

• Primary UCS Director

• PRIMARY Group

• PRIMARY vDC

• DR UCS Director

• DR Group

• DR VDC

2. Click the Define vDC Map link at the bottom right corner of the Converged

page. The Define vDC Map for DR page is displayed.

Configure the following field elements.

Note:

▪ To create a UCD Director vDC Map, PR And DR UCSD accounts should be

created and its agents should be active and listed in Admin > Agents page.

Field Description

Name Displays the name of the UCS Director.

Primary UCS Director

Select the account from the drop down list.

This field is mandatory.

PRIMARY Group Select the group name from the drop down list.

This field is mandatory.

Discovery

© Copyright IBM Corporation 2017

Field Description

PRIMARY vDC Select the vDC from the drop down list.

This field is mandatory.

DR UCS Director Select the account from the drop down list.

This field is mandatory.

DR Group Select the DR UCSD group name from the drop down list.

This field is mandatory.

DR vDC Select the vDC from the drop down list.

This field is mandatory.

DR PlaceHolder

Datastore

Select the DR Placeholder Datastore name from the

drop down list.

This field is mandatory.

STORAGE ACCOUNT

Select the storage account from the drop down list.

FILER Select the Filer from the drop down list.

AGGREGATES Select the type of aggregate from the drop down list.

POLICY If DR has policies.

Then,

Select the type of policy from the drop down list.

▪ Computing

▪ Storage

▪ Network

IBM Resiliency Orchestration Administrator’s Guide

3. Click Save to add the UCS Director vDC Map for DR.

OR

Click Cancel to quit the current operation.

4. On successfully adding the UCS Director vDC Map for DR, a message box is

displayed.

5. Click OK in the message box to return to the Converged page.

Deleting UCS Director vDC Map for DR

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

A UCS Director DR Map cannot be deleted, if there are components associated with

it.

To delete a UCS Director vDC Map, perform the following steps:

1. Click DISCOVER > Converged on the navigation bar. The UCS Director vDC

Map List page appears with the following configured values.

▪ Name

▪ Primary UCS Director

▪ Primary Group

▪ Primary vDC

▪ DR UCS Director

▪ DR Group

▪ DR vDC

2. Click the icon corresponding to the UCS Director vDC Map that you want to

delete. A message box is displayed confirming the deletion.

3. Click OK in the message box.

Listing UCS Director vDC Map for DR

To view the UCS Director DR Map created in a DR environment, click DISCOVER >

Converged on the navigation bar.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The UCS DIRECTOR vDC Map for List page displays following details in a tabular

form:

Discovery

© Copyright IBM Corporation 2017

Field Description

Name Displays the group name.

Primary UCS Director

Displays the name.

Primary Group Displays the group name.

Primary vDC Displays the Primary vDC name.

DR UCS Director Displays the name.

DR Group Displays the group name.

DR vDC Displays the DR vDC name.

Aggregate Info Displays the hyperlink with info.

Information

The Information List displays following details in a tabular form:

Aggregates Information:

Field Description

STORAGE ACCOUNT

Displays the storage account name.

FILER Displays the Filer name.

AGGREGATES displays the aggregates name.

PlaceHolder Datastore Information:

Field Description

IBM Resiliency Orchestration Administrator’s Guide

Field Description

PlaceHolder Datastore(s)

displays the Placeholder datastore's name.

1. Click Cancel to quit current operation.

Management Service

Adding Management Service

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To create a new Management service in the existing DR environment, perform the

following steps:

1. Click DISCOVER > Management Service on the navigation bar. The

Management Service List page appears with the following configured values.

▪ Name

▪ Type

▪ Site

▪ Status

2. Click the Add Management Service link at the top right corner of the

Management Service List page. The New Management Service page is

displayed.

▪ Configure the following field elements for Vcenter:

Field Description

SITE Select the site from the drop down list.

This field is mandatory.

MANAGEMENT SERVICE TYPE

Select the management service type from the drop-down list.

• VCENTER

Discovery

© Copyright IBM Corporation 2017

Field Description

This field is mandatory.

MANAGEMENT SERVICE NAME

Provide the management service name.

This field is mandatory.

This field accepts a maximum of 255 characters.

vCenter Server Provide IP address of the component. The Ping... button will test the specified IP address, and indicate whether the address is accessible.

If you do not know IP Address of the component, perform the following:

1. Click Lookup by name... to find the IP address of the component by giving host name (DNS name) of the component.

2. Enter the host DNS name in the User Prompt pop-

up window. For example: hostname.company name.com. This will lookup the IP address of the respective component.

Make sure to assign one component to one server. Only if you are discovering components for Sybase SRS Group, you can assign two components to one server.

Note:

The IP Address field consists of numbers and periods and should fall within the following range and format.

0.0.0.0 to 255.255.255.255

This field is mandatory.

PORT Provide the port number.

This field is mandatory.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

USER NAME Provide a unique name for the account being created.

Note:

This field accepts up to 32 alphanumeric characters, underscores. The name can start with an alphabet or a number.

This field is mandatory.

PASSWORD The password is used to authenticate the VCenter

user within IBM Resiliency Orchestration ™.

This field is mandatory.

This field accepts up to 16 alphanumeric characters including at least one digit.

Note:

The password cannot contain the character patterns listed below. The behaviour cannot be predicted if these are used:

▪ <script>(.*?)</script>

▪ Src=*

▪ Eval

▪ Expression

▪ JavaScript

▪ VBScript

▪ Onload

▪ Iframe

▪ <*>

Fetch from Vault This checkbox must be selected if you want the

vault software management system to serve the

password request.

Vault Name You must select the specific vault name from

the drop-down listbox. This will display input

Discovery

© Copyright IBM Corporation 2017

Field Description

boxes for query parameters specific to the vault.

These parameters are required by the vault to

serve the password request.

Note:

The query parameters for the CyberArk vault is

Safe name and Object name.

▪ Configure the following field elements for AWS:

Note:

An Agent node is created, this is mandatory for creating an AWS profile.

Field Description

SITE Select the site from the drop down list.

This field is mandatory.

MANAGEMENT SERVICE TYPE

Select the management service type from the drop-down list.

• AWS

This field is mandatory.

MANAGEMENT SERVICE NAME

Provide a unique name to the management service being created.

Note:

This field accepts up to 32 alphanumeric characters,

spaces and underscores. The site name can be started with an alphabet or a number.

This field is mandatory.

This field accepts a maximum of 255 characters.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

AMAZON REGION Select a region from the drop down list.

AWS ACCESS ID Provide the AWS Access id.

This field is mandatory.

AWS SECRET KEY Provide the secret key.

This field is mandatory.

3. Click on Test Credentials to test the credentials entered.

4. Click Save to add the management service.

5. On successfully adding the management service, a message box is displayed.

6. Click OK in the message box to return to the Management Service List page.

Modifying Management Service

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify a Management Service, perform the following steps:

1. Click DISCOVER > Management Service on the navigation bar. The

Management Service List page appears with the following configured values.

For VCenter:

▪ Management Service Type

▪ Management Service Name

▪ VCenter Server

▪ Port

▪ User Name

▪ Password

2. Click icon corresponding to the management service that you want to

modify. This opens Edit Management Service page.

3. Make the required changes in the relevant field.

Discovery

© Copyright IBM Corporation 2017

4. Click Save to save the modifications.

OR

Click Go Back to quit the current operation.

5. On successful modification, a message box is displayed.

6. Click OK in the message box to return to the Management Service List page.

For AWS:

1. Click DISCOVER > Management Service on the navigation bar. The

Management Service List page appears with the following configured values.

▪ Management Service Type

▪ Management Service Name

▪ Agent Node Component

▪ Aws region

▪ Aws Access Id

▪ Aws Secret key

2. Click icon corresponding to the management service that you want to

modify. This opens Edit Management Service page.

Note:

For AWS: Management service type,Management service name and Agent node

component cannot be modified.

Make the required changes in the relevant field.

3. Click Save to save the modifications.

OR

Click Go Back to quit the current operation.

4. On successful modification, a message box is displayed.

5. Click OK in the message box to return to the Management Service List page.

Deleting Management Service

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To delete a Management Service, perform the following steps:

1. Click DISCOVER > Management Service on the navigation bar. The

Management Service List page appears with the following configured values.

▪ Name

▪ Type

IBM Resiliency Orchestration Administrator’s Guide

▪ Site

▪ Status

2.

a. Click the icon corresponding to the management service that you

want to delete. A message box is displayed confirming the deletion.

For Objects with dependencies:

b. Click the icon corresponding to the management service that you

want to delete. A message box is displayed confirming the deletion,

"Selected Object cannot be deleted. Check for any dependencies".

3. Click OK in the message box.

Management Service List

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the Management Service created or available in a DR environment, click

DISCOVER > Management Service on the navigation bar.

The Management Service List page displays following details in a tabular form:

Field Description

Name Displays the name of the management service.

TYPE Displays the type of the management service.

Site Displays the name of the site.

Status Displays the status of the site.

Status can be ACTIVE, INACTIVE, UNKNOWN.

The Discover Details List page displays following details in a tabular form:

Discover Instance for AWS:

Field Description

Discovery

© Copyright IBM Corporation 2017

Field Description

Instance Name Displays the name of the AWS instance.

Instance ID Displays the id of the AWS instance.

Instance PRIVATE IP

Displays the name of the site.

1. Select the check box.

2. Click Save VM to save the AWS Instances.

3. On successfully adding the AWS instance, a message box is displayed.

4. Click OK in the message box to return to the Management Service List page.

Discover Images for AWS: Amazon machine images.

Field Description

AWS IMAGE Name Select the image

AWS IMAGE ID Enter the image id.

AWS IMAGE IP Enter the image ip.

1. Click Save image to save the image.

2. On successfully adding the AWS image , a message box is displayed.

3. Click OK in the message box to return to the Management Service List page.

SRA

SRA Discovery

Pre conditions before Provisioning

▪ PR - SRA site and VCentre management service should be the same.

▪ DR - SRA Site and AWS management service site should be the same.

▪ VCentre management service and AWS management service should be

discovered.

IBM Resiliency Orchestration Administrator’s Guide

▪ One SRA has to be discovered for PR.

▪ Two SRAs have to be discovered DR out of which one is the Proxy SRA.

▪ Before provisioning, SRA agent, SVR Service, PFR Service and PFR agent

should be running in both the PR and the DR (AWS Cloud) machines.

▪ The VM which is protected, the CBT should be enabled and VMware tool

should be installed.

To discover SRA follow the path given:

1. Click Discover > SRA Discovery.

2. Click Create SRA. The Create SRA Discovery page appears.

3. Enter the following field details in the Create SRA Discovery page.

Field Description

Type Displays SRA.

IP Address Enter the IP address. Click Ping

Click Lookup by name

Name Enter the name

Component

Site

Select the component as

RESILIENCY_ORCHESTRATION_Site

Credentials Select the credentials. Click Test Credentials to verify

the data

Assign to

Organization

Select the organization as default

Proxy IP Enter the Proxy SRA IP in this field. This filed is

displayed when the component site is on cloud.

4. Click Save.

SRA Listing

Discovery

© Copyright IBM Corporation 2017

To view the SRAs created, click DISCOVER > SRA Discovery on the navigation

bar. The SRA Subsystems page appears. You can also navigate to the SRA

Subsystems page by clicking View SRA List link at the top right corner of the

Create SRA Discovery page.

The SRA Subsystems list page displays following details:

Field Description

NAME Displays the name of the SRA.

IP ADDRESS Displays the IP Address of the SRA along with the

information about it being a Proxy SRA.

SITE Displays the component site.

SITE TYPE Displays the following site types.

On Premise:When the location is on premise

On Cloud:When the location is on cloud

STATUS Displays the following status:

Unknown: Where there is no communication

between the component site and SRA.

Active: When the is communication between the

component site and SRA.

ACTION Click the edit icon to edit the SRA

Click the delete icon to delete the SRA.

.

ADC Profile

IBM Resiliency Orchestration Administrator’s Guide

ADC is the new way of defining, deploying and managing application continuity in

cloud. ADC makes application’s continuity independent of the underlying

infrastructure. It allows the cloud applications to request for their continuity

requirements through policies to the cloud management platform and the ADC

intelligence built into the cloud management platform delivers the requested

continuity. ADC interfaces with the underlying infrastructure to enact application’s

recovery life-cycle. ADC will respond to the application’s changing continuity needs

and deliver by interfacing with the underlying infrastructure.

This chapter describes how to work with an ADC profile and explains the following:

Adding ADC profile

Modifying ADC profile

Deleting ADC profile

Listing ADC profile

Adding ADC Profile

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To create a new ADC profile in the existing Resiliency Orchestration environment,

perform the following steps:

1. Click DISCOVER > ADC Profile on the navigation bar. The ADC Profile List

appears with the following configured values.

▪ Name

▪ Allocation Type

▪ Allocation Percentage

▪ RPO (Minutes)

▪ Network

▪ Storage

2. Click the Add ADC Profile link at the top right corner of the ADC Profile List

page. The New ADC Profile page is displayed.

Configure the following field elements.

Field Description

Discovery

© Copyright IBM Corporation 2017

Field Description

NAME Provide a unique name to the service profile being created.

This field is mandatory.

Note:

This field accepts up to 32 alphanumeric characters, spaces and underscores. The Service profile name starts with an alphabet.

DESCRIPTION Provide the description for the service profile.

This field is mandatory.

ALLOCATION TYPE Select any one option from the drop-down list.

▪ Allocated

▪ Reserved

This field is mandatory.

ALLOCATION PERCENTAGE(25-100)

Provide the percentage to be allocated between 25-100.

This field is mandatory.

RPO (MINUTES) > 5 mins

Provide the time in minutes.

Note:

Time should be greater than 5 minutes.

This field is mandatory.

NETWORK Select the following option from the drop down list.

"Use UCS Director VDc Policy"

IBM Resiliency Orchestration Administrator’s Guide

Field Description

STORAGE Select the following option from the drop down list.

"Use UCS Director VDc Policy"

3. Click Save to add the ADC profile.

4. On successfully adding the ADC profile, a message box is displayed.

5. Click OK in the message box to return to the ADC profile List page.

Discovery

© Copyright IBM Corporation 2017

Modifying ADC Profile

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To modify an ADC Profile, perform the following steps:

1. Click DISCOVER > ADC Profile on the navigation bar. The ADC Profile List

window appears with the following configured values.

▪ Name

▪ Description

▪ Allocation Type

▪ Allocation Percentage

▪ RPO

▪ Network

▪ Storage

2. Click icon corresponding to the service profile to modify. This opens Edit

ADC Profile page. The details can not be modified by users with Operator

privileges.

Note:

ADC Profile Name cannot be modified.

3. Make the required changes in the relevant field.

4. Click Save to save the modifications.

OR

Click Go back to return to the ADC Profile List.

5. On successful modification, a message box is displayed.

6. Click OK in the message box to return to the ADC Profile List page.

Deleting ADC Profile

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

An ADC Profile cannot be deleted, if there are components associated with it.

To delete an ADC Profile, perform the following steps:

1. Click DISCOVER > ADC Profile on the navigation bar. The ADC Profile List

page appears with the following configured values.

IBM Resiliency Orchestration Administrator’s Guide

• Name

• Allocation Type

• Allocation Percentage

• RPO

• Network

• Storage

2. Click the icon corresponding to the ADC Profile that you want to delete. A

message box is displayed confirming the deletion.

3. Click OK in the message box.

Listing ADC Profile

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To view the ADC profile lists created or available in a IBM Resiliency Orchestration

environment, click DISCOVER > ADC Profile on the navigation bar.

The ADC Profile List page displays following details in a tabular form:

Field Description

Name Displays the name of the site.

ALLOCATION TYPE Displays the allocation name.

ALLOCATION PERCENTAGE

Displays the percentage allocated.

RPO Displays the RPO entered in minutes.

Note:

Time should be greater than 5 minutes.

This field is mandatory.

NETWORK Displays the type of network used.

Discovery

© Copyright IBM Corporation 2017

Field Description

"Use UCS Director VDC Policy"

STORAGE Displays the type of storage used.

"Use UCS Director VDC Policy"

Group Creation

Groups

You can view the summary of groups configured under various types in the

dashboard. The Groups category displayed the number of groups configured against

each type such as Business Groups, 3 Site Groups, Application Groups, and

Recovery Groups. This section also displays the total of all the groups.

If the group is licensed, the following actions can be performed:

Changing the functional module for a group.

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group

listing page appears.

3. Click on the required group Name in the Group Name column and the Group

Details page is displayed.

4. Click the Group Configurations tab.

5. Click the License tab. This tab will have an option to specify the licensed

functional module "Recovery" and/or "Test" for that group.

6. The Licensed modules are shown as enabled for that Group.

7. The user can access the licensed modules for that Group. The disabled options

cannot be accessed.

8. Click Save.

Note:

▪ The Save button is enabled only if the Group is in Maintenance/Unmanaged

Mode. If the Save button is disabled, the user has to use the Discover

>Groups link to move the group to Maintenance mode and to enable it.

IBM Resiliency Orchestration Administrator’s Guide

▪ On clicking the Save button without any modules selected, a warning

message "At least one module has to be enabled for the group" is displayed.

▪ On clicking the Save button with one or more modules selected, the group will

be assigned with the selected modules and the user can perform any

functionality related to that module.

The IBM Resiliency Orchestration server will count the licenses appropriately as per

the modules checked by the user.

Specifying the functional module for a group during group creation

1. Click Save after creating the Group. The Group Configuration page is displayed.

2. Click the License tab. The tab displays options to specify the licensed functional

modules for that Group.

3. The licensed modules are enabled and the unlicensed modules are shown as

disabled.

Note:

The "Enable" button will be enabled only if the group is in “Maintenance/Unmanaged

mode”. For a newly created group, the "Enable" button will be shown as enabled.

▪ On clicking the "Enable" button without any modules selected, a warning

message "At least one module has to be enabled for the group" is displayed.

▪ On clicking the "Enable" button with one or more modules selected, the group

will be assigned with the selected modules and user can perform any

functionality related to that module.

The IBM Resiliency Orchestration server will count the licenses appropriately as per

the modules checked by the user.

Creating / Editing Groups

A Group is created / Edited by discovering Components, Datasets and Protection

Schemes and by associating them to a site. Refer Adding Sites and Discovering

Subsystem for more information.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

A Group is configured completely by performing following steps:

1. Group Details

2. Define Relationship

3. Provide Solution Details

4. Configure a Group

▪ Configure RPO/ RTO/ Data Lag Objective

Discovery

© Copyright IBM Corporation 2017

▪ Configure Continuity Operations

▪ Configure Events

▪ Configure Drills

▪ Configure Notifications

▪ Configure SNMP

▪ Configure Business Processes

▪ Configure Group License

Following diagram explains the Group creation / Editing process. This will be

displayed on the BG, AG, and RG creation page.

Indicates that the respective step has been completed.

Indicates that the respective step has not been completed.

Navigate to Groups page by clicking DISCOVER > Groups. The Groups page

appears. Select Application Groups or Recovery Groups and the respective Group

Listing page appears which displays the list of Groups available with their status.

Note:

You can also view the details of a Group by clicking the respective link in the Group

Name column.

Creating Recovery Groups

A Recovery Group (RG) is created to protect data. The data protection is done by

binding the data to the associated Components and Protection Scheme present in the

DR infrastructure.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Note:

RG can be created only after component, dataset, and protection scheme are

discovered.

IBM Resiliency Orchestration Administrator’s Guide

When PFR is used for data replication and NormalFullCopy operation of IBM

Resiliency Orchestration is not used, you have to create a new fileset and associate it

to the new Group. If the NormalFullCopy operation is performed by IBM Resiliency

Orchestration, then the filesets are created by IBM Resiliency Orchestration itself.

For more information on fileset creation, refer Add Fileset topic in PFR Online Help.

The fileset creation is not applicable for other replication tools.

To create a RG:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Discover Recovery Group button on the right side of the page, the

Create Recovery Group page appears.

Enter the following details.

Field Description

Group Name Enter a unique name for the Recovery Group.

If the Group name already exists, a message is

displayed prompting you to enter a different name

for the Group.

This field is mandatory.

Note:

Group name should not be empty. It can have a

maximum of 32 characters that includes

alphanumeric characters and underscore. It

should start with an alphabet only and should not

contain any blank spaces.

Description Enter a description for the RG.

Group Priority Choose the type of priority from the drop-down

list to associate with the RG.

Discovery

© Copyright IBM Corporation 2017

Field Description

Solution Signature Select the type of DR Solution from the drop-

down list.

This field is mandatory.

Refer to the Advanced Group Configuration

topic for the respective DR Solution available

under DR Solutions Supported by IBM Resiliency

Orchestration.

The Include Redo Logs checkbox is displayed,

only if you select any of the Oracle DR Solutions

from the drop-down list.

Enable the Include Redo Logs checkbox if the

DR Solution supports Redo Logs.

At present, IBM Resiliency Orchestration supports

Redo Log for Oracle Archive Logs with Hitachi

Replication and Oracle Archive Logs with Other

Replicator” only.

Note:

If you select Include Redo Logs checkbox, ensure

that you set up additional protection schemes for

redo log protection on production and DR

respectively.

Configured RPO/RTO Enter the RPO/RTO values. You can configure the

values in seconds, minutes or hours.

This field is mandatory.

Note:

▪ The RPO/RTO values are dependent on the

DR Solution type selected. For an RG that

does not have an impact on AG’s

RPO/RTO, its RPO/RTO values though

configured, will be shown as N/A.

▪ Configured RPO/RTO will be disabled in

Test License packages.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Configured Data Lag

Objective

Enter the Data Lag Objective value. You can

configure the value in KB/MB/ number of files.

This field is mandatory.

Note:

▪ The Data Lag Objective unit is dependent

on DR solution type selected. If a PFR

solution is selected, than the unit will be

the number of files.

▪ Configured Data Lag Objective will be

disabled in Test License packages.

This server is part of

a Cluster

Select the checkbox, only if the DR Solution is

supported on a cluster.

If you select this checkbox, provide the Cluster

Timeout time in seconds.

Refer to Support for Cluster for more information.

Part of Flex pod. Select the checkbox, only if it is a part of Flex

Pod.

Note:

For more information go to Creating Flexi RG.

4 Click Next to proceed with the Define Group Relationship.

5 Define Group Relationship by configuring the following elements for Production

and Remote sites. To configure these elements, you can either click the links

available under Configuration Process section or on the respective pictorial

representation.

▪ Server Component

▪ Application Dataset

▪ Data Protection

▪ Network Component

Discovery

© Copyright IBM Corporation 2017

Note:

▪ After defining each of the elements as mentioned above, the pictorial

representation of the respective icons becomes (tick mark icon) indicating that

the elements have been set up.

▪ At any point during group configuration, click Back to go back to the previous

page or click Cancel to abort the group configuration.

6 Click Next. A message box is displayed indicating the Group has been created

successfully.

7 If Group creation fails, "Group Details" page of the create group will be shown

with the error message.

8 Click OK to configure DR Solution specific details.

For specific information on this configuration, refer to respective pages under DR

Solutions Supported by IBM Resiliency Orchestration.

Perform any of the following:

▪ Click Save to create Recovery Group.

▪ Click Reset to set the previous values in the GUI.

▪ Click Cancel to quit the current window without saving changes.

Server Component

During the Group creation process, configure the server component.

To configure the server component, perform the following steps:

1. In the Create Recovery Group page, after entering the details for Group

Details, click Next.

2. In Define Relationship, click Server Component from the Configuration

Process section or click the icon. The Select Components window is

displayed. It displays the list of Primary and Remote components discovered

during component discovery.

3. Select the component for Primary and Remote sites by clicking the respective

check box from the Primary Components and Remote Components list.

You can select more than one component at a time.

4. Click Save to save the changes.

5. Click Close Window to close the window.

Note:

The components that you select on the Select Component window will be saved

and shown when you open this window next time.

IBM Resiliency Orchestration Administrator’s Guide

Application Dataset

During the Group creation process, after configuring the Server component, user

need to configure Application Dataset.

To configure the Application Dataset, perform the following steps:

1. In the Create Recovery Group page, after entering the details for Group

Details, click Next.

2. In Define Relationship, click Application Dataset from the Configuration

Process section or click the icon. The Select Datasets window is

displayed. It displays the list of components discovered during dataset

discovery on Primary and Remote sites for the respective solutions supported

by IBM Resiliency Orchestration.

3. Click the Show all datasets checkbox to display the datasets, even if these

are already in use.

4. Select the dataset for Primary and Remote sites by clicking the dataset from

the Primary Dataset and Remote Dataset lists. You can select only one

dataset for Primary and Remote sites at a time.

Note:

The Dataset is unique for a Group.

5. Click Save to save the changes.

6. Click Close Window to close the window.

Note:

The dataset(s) that you select on the Select Datasets window will be saved and

shown when you open this window next time.

Data Protection

To configure the data protection schemes, perform the following steps:

1. In the Create Recovery Group page, after entering the details for Group

Details, click Next.

2. In Define Relationship, Click Data Protection from the Configuration

Process section or click the icon. The Select Protection Schemes

window is displayed. It displays the list of components discovered during

protection scheme discovery on Primary and Remote sites for the respective

solutions supported by IBM Resiliency Orchestration.

3. Select the protection scheme for Primary and Remote sites by clicking the

protection scheme from the Primary Protection and Remote Protection

lists. You can select only one protection scheme for Primary and Remote sites

Discovery

© Copyright IBM Corporation 2017

at a time. If you do not find a Protection Scheme, abort the operation and

initiate discovery.

Note:

▪ Select at least one protection scheme from the list. The protection scheme

selection is not available for Oracle RAC with PFR solution as Oracle RAC itself

creates its own filesets based on the number of nodes configured.

▪ The Protection Scheme should not be used in more than one Group. If used,

replication might not happen for one or more Groups simultaneously.

▪ If you enable redo log protections for any of the following solutions, ensure

that you select additional protection schemes on primary and remote to

protect redo logs :

▪ Oracle Archive Logs with Veritas Volume Replicator

▪ Oracle Archive Logs with SRDF

▪ Oracle Archive Logs with Global Mirror

4. Click Save to save the changes.

5. Click Close Window to close the window.

Note:

The protection scheme(s) that you select on the Select Protection Schemes

window will be saved and shown when you open this window next time.

Viewing Recovery Group Details

You can view the Recovery Group Details by performing the following steps:

1. Click Discover on Navigation bar.

2. Click Groups on the Sub-navigation bar. The Groups window is displayed.

3. Click Recovery Group tab, the Recovery Group listing page appears.

4. Click any Recovery group in the Group Name column. The Recovery Group

Details window is displayed. This window provides the following tabs:

Group Details - Displays the following information:

▪ Name of the group

▪ Associated AG

▪ Brief description of the group

▪ Solution along with the type of replication selected for the group

▪ Configured RPO and RTO for the group along with the priority set for the

group.

IBM Resiliency Orchestration Administrator’s Guide

You can edit the group details by clicking the Edit Group button, if you have

administrator privileges.

▪ Relationship - Displays the names of the datasets and components

configured for the primary and the remote site with specific details about the

chosen protection mechanism. You can view and configure each subsystem by

clicking the corresponding subsystem icon on the pictorial representation of

the relationship between the different subsytems. This opens the Protection

Details, Dataset Details, or Component Details pane which displays the

list of configured components, datasets or protection scheme.

▪ Solution Details - Displays the solution specific information. For example, in

the case of Application subsystem with PFR solution this tab displays the

custom script location and the critical process (es) which are resulting in

‘Application Down’ status.

▪ Group Configuration - Displays the following options for group

configuration:

▪ Continuity- Displays the list of BCOs that can be performed on the group.

Click each BCO link to configure the Workflow of the operation and add

any custom action(s).

▪ RPO/ RTO- You can configure the RPO/ RTO values for the RG.

▪ Drills- Displays the drills that can be performed on the RG. Click each drill

to link to configure the different actions of the drills or to add custom

action(s).

▪ Events- Displays the Events/ Events page for the group. Click each event

ID to view the event details.

▪ SNMP- You can add a new SNMP Trap Forwarder or select from the

existing trap forwarder list for sending notifications to the RG.

You can also click the corresponding icon to modify the configured properties for

each continuity operation.

Editing Recovery Group

A Recovery group can be edited only when it is in UNMANAGED or MAINTENANCE

and in Normal Continuity mode. Group edit is not allowed during crashed states.

When in these modes, Discovery Groups page will show “Edit Group” icon

enabled/highlighted, disabled otherwise.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To edit a RecoveryGroup (RG):

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group tab, the Recovery Group listing page appears.

Discovery

© Copyright IBM Corporation 2017

3. Click on edit group icon for the group you want to edit. The Group Details

page will be shown.

Go to Changing Group to Maintenance Mode to enable the edit group option.

Field Description

Group Name The name of the group.

This field is not editable.

Description

Description of the RG.

This field is editable.

Solution Signature Type of DR Solution.

This field is not editable.

Configured RPO/RTO The RPO/RTO values. You can configure the

values in seconds, minutes or hours.

This field is editable.

Note:

The RPO/RTO values are dependent on the DR

Solution type selected. For an RG that does not

have an impact on AG’s RPO/RTO, its RPO/RTO

values though configured, will be shown as N/A.

Configured Data Lag

Objective

Enter the Data Lag Objective value. You can

configure the value in KB/MB/ number of files.

This field is editable.

Note:

▪ The Data Lag Objective unit is dependent

on DR solution type selected. If a PFR

solution is selected, than the unit will be

the number of files.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

This server is part of

a Cluster

Shown selected if the DR Solution is supported on

a cluster. The configured cluster timeout will also

be displayed.

This field is editable.

Refer to Support for Cluster for more information.

4. Click Next to Define Group Relationship.

5. Define Group Relationship by configuring the following elements for Production

and Remote sites.

To configure these elements, you can either click the links available under

Configuration Process section or on the respective pictorial representation.

"Application Dataset" cannot be configured during edit group.

▪ Server Component

▪ Data Protection

▪ Network Component

Note:

At any point during group configuration, click Back to go back to the previous page

or click Cancel to abort the group configuration.

6. Click Next to configure DR Solution specific details.

For specific information on this configuration, refer to respective pages under DR

Solutions Supported by IBM Resiliency Orchestration book in this Help file.

If configuration fails, the "Group Details" page of the edit group will show an error

message.

7. Perform any of the following:

▪ Click Submit to edit Recovery Group.

Note:

When the Submit button is clicked, a dialog window appears stating that

certain workflows, such as NormalCopy, SwitchOver, SwitchBack etc. will

be moved to the Draft state and that these workflows will need to be

Discovery

© Copyright IBM Corporation 2017

published before executing them. Click OK to accept and click Cancel to

cancel this behavior.

▪ Click Reset to set the previous values in the GUI.

▪ Click Cancel to quit the current window without saving changes.

8. If more than one data protection pairs have been added to the group,the

workflows of the group needs to be reviewed and customized to handle all the

data protection pairs. The workflows that are pre-loaded/pre-packaged will

handle only one pair of the data protection. If the group is of the type MSSQL

Logs with PFR, Application SubSystem with PFR or Sybase Logs with PFR,

then the workflows have to be completely removed by importing a new

workflow XML and then needs to be customized.

Application Group Workflow Auto Generation

Application Group (AG) workflows are auto-generated based on the Recovery Group

(RG) dependency. A user should make sure that all RGs are in proper state, before

executing any of the workflows.

For example to start an AG level Fail-over, all the RGs under an AG should be in

“Normal Inactive” state.

Points to remember:

AG Workflow auto-generation uses pattern base on the RG dependency and triggers

one of the pre-defined RG workflow. User has to fill all those pre-defined RG

workflows for proper execution of BCOs like Switch-over, Switch-back or Fail-over

from AG. Requirement is that all the workflows are in “Published” state before

triggering any AG BCOs.

The pre-defined RG workflows are:

▪ StartAppPR

▪ StopAppPR

▪ StartAppDR

▪ StopAppDR

▪ RoleSwitchToPR

▪ RoleSwitchToDR

▪ Recovery

It is recommended not to edit the auto-generated workflows of AG.

IBM Resiliency Orchestration Administrator’s Guide

Network Component

To configure the network component, perform the following steps:

1. Click Network Component from the Configuration Process section or click

the icon. The Select Components window is displayed. It displays the

list of network components discovered during Component Discovery for Primary

and Remote sites.

2. Select the component for Primary and Remote sites by clicking the respective

checkbox from the Primary Components and Remote Components list. You

can select more than one component at a time.

3. Click Save to save the changes.

4. Click Close Window to close the window.

Note:

The components that you select on the Select Components window will be saved

and shown when you open this window next time.

Support for Cluster

IBM Resiliency Orchestration supports Active-Passive and Active-Active clustering.

Based on the type of clustering, its configuration differs. IBM Resiliency Orchestration

provides cluster support to the following solutions:

▪ Active - Passive Cluster Support

▪ MSSQL with PFR

Cluster support for MSSQL-PFR requires Cluster Timeout interval to be

configured at the time of Recovery Group creation. It also requires the

virtual IP to be specified in the IBMAgentGeneric.cfg file for the cluster

to work. The IP address must be specified against the parameter

PANACES_SQLAGENT_DBNODE_ADDRESS. This parameter must be

configured for MSSQL cluster. At the time of recovery after disaster,

PFRconfig.bat file must be run to fail over the continuity to the cluster

node. Automatic running of this file can be configured in the cluster.

▪ Oracle True Copy with Veritas Cluster Support (VCS)

Oracle True Copy being the block replication based solution requires

only Cluster Timeout interval to be set at the time of Recovery Group

creation. Groups must be configured with Virtual IP.

▪ Active - Active Cluster Support

▪ Oracle RAC

Discovery

© Copyright IBM Corporation 2017

While creating a Group, Oracle RAC cluster support requires the Node

and Dataset configuration to be done at Production and DR site.

Protection scheme is automatically detected.

Note:

To use IBM Resiliency Orchestration to support cluster, the replication volume must

be on shared device to avoid data loss. For example, for MSSQL and Sybase, the

volume/directory where the transactional logs are dumped by IBM Resiliency

Orchestration™ must be shared. For Oracle the archive log location must be on

shared storage.

Perform following steps to enable IBM Resiliency Orchestration to support Cluster. It

is assumed that you have already installed cluster software on all the nodes.

1. Install required agents on all the nodes in a cluster. Refer to IBM Resiliency

Orchestration Installation Guide for information on Agent installation.

2. Configure cluster software so that it starts communicating to IBM Resiliency

Orchestration agents during cluster fail-over. Ensure that configuration of

cluster software starts IBM Resiliency Orchestration agents after the underlying

software being managed by the agent is up and active.

3. If RG is part of the cluster, then refer to Creating Recovery Group for

configuring the group on a cluster.

4. If you are using PFR as protection mechanism, refer to PFR Online Help for

more information on configuring the cluster software.

Creating an Application Group

One or more Recovery Groups are grouped together to form an Application Group

(AG). An AG can be created after RG's creation or RGs can be added later by editing

the AG.

Note:

You can view only those AGs that are assigned to you, by assigning an AG to a user,

all RGs under an AG will be automatically assigned to the user.

To create an AG, perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Select Application Group tab, the Application Group listing page appears.

3. Click Discover Application Group button on the right side of the page, the

Create Application Group page appears.

Enter the following details to create an Application Group.

Field Description

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Organization If you are using Enterprise Resiliency Orchestration leave it with default value.

Note:

This is applicable to CDRM only.

Application Group Name

Enter a unique name for the AG.

If the Group name already exists, a message is displayed indicating you to enter a different name for the Group.

This field is mandatory.

Note:

Group name should not be empty. It can have a maximum of 32 characters that includes alphanumeric characters and underscore . It should start with an alphabet only and can contain blank spaces.

Description

Enter a description for the AG.

Group Priority (new field)

Enter a unique name for the AG.

If the Group name already exists, a message is displayed indicating you to enter a different name for the Group.

This field is mandatory.

Note:

Group name should not be empty. It can have a maximum of 32 characters that includes alphanumeric characters and underscore. It should start with an alphabet only and should not contain

any blank spaces.

Discovery

© Copyright IBM Corporation 2017

Field Description

Select Recovery Groups

▪ To associate RG to an AG, select the RG from the left side multiple selection List box and click >> button. The selected RGs are

added to the AG, when they are moved to the right side List box.

▪ To deselect the associated RGs from the AG click << button to move the RG from the

right side window to the left side window.

The order of the RGs dependencies is taken from top to down in the order of selection i.e. the Group that

is selected first (which appears at the last in the listing on right side box) will be failed over first and

then the Group immediately above the last will be failed over next and so on.

You can also establish a relationship between Recovery Groups while associating them to the AG.

4. Click Next to create the Failover Dependency.

You can drag RGs from Move Recovery Groups list box to Failover

Dependencyarea to define the parallel or sequential relationship.

The order of the RG dependencies is taken from top-down in the order of

selection i.e. the Group that is selected on top will be failed over first and

then the Group immediately below the first will be failed over next and so on.

You can also establish a relationship between the RGs while associating them

to an AG.

AG level workflows like Switch-over, Switch-back and Fail-over will be

generated automatically based on this Failover dependency.

5. Click Next to provide the AG details. Enter RTO value in seconds for an AG in

the Configured RTO text boxes. The values can be given either in

hours/minutes/seconds from the drop-down list.

Note:

▪ Actual RTO for AG will be calculated based on the auto-generated Fail-over

workflow of the AG.

IBM Resiliency Orchestration Administrator’s Guide

▪ AG will support only RTO no RPO.

6. Perform any of the following:

▪ Click Back to go back to the previous page.

▪ Click Finish to save the changes.

▪ Click Cancel to quit the current operation.

Viewing Application Group details

You can view the Application Group Details by performing the following steps:

1. Click Discover on Navigation bar.

2. Click Groups on the Sub-navigation bar. The Groups window is displayed.

3. Click Application Group tab, the Application Group listing page appears.

4. Click any Application group in the Group Name column. The Application Group

Details window is displayed.

Editing Application Group

An application group can be edited only when it is in UNMANAGED or MAINTENANCE.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To Edit a Application Group perform the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Application Group tab, the Application Group listing page appears.

3. Click on edit group icon for the group you want to edit. The Group Details

page will be shown. The Group details cannot be modified by users with

Operator privileges.

Field Description

Organization The organization to which the AG

belongs.

This field is not editable.

Discovery

© Copyright IBM Corporation 2017

Field Description

Group Name The name of the group.

This field is not editable.

Description Description of the AG.

This field is editable.

Group Priority Select the type of priority from the

drop-down list.

Select Recovery Groups Recovery Groups can be added or

removed in this field.

Note:

You can edit AG only if AG is in Maintenance or Unmanaged mode.

4. Make the required changes in the relevant field.

5. Click Next to proceed with Create Failover Dependency page.

6. Click Next to proceed with Application Group Details page.

7. Click Back to go back to previous page.

8. Click Finish to save the changes.

9. Click Cancel to quit the current window without saving changes.

Deleting a Group

To delete a Group, it must meet the following criteria:

▪ It must be either in Unmanaged or Maintenance mode.

▪ It must not be associated with any other Group.

For the groups that do not meet above criteria, the Delete icon is disabled.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The Groups created can be deleted by performing the following steps:

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group

listing page appears.

IBM Resiliency Orchestration Administrator’s Guide

3. Click icon corresponding to the Group that you want to delete. A message

box is displayed confirming the deletion.

Super Administrator has the privilege to create and delete a Group. Super

Administrator can delete any group (created by him or by other user

categories).

However, the Administrator can delete only those Groups that are

assigned to or created by him. When a Group is deleted, the fileset(s)

corresponding to the Group should also be deleted.

Note:

▪ You need at least one RG to retain an AG. If you delete the last RG then that

RG and its associated AG also gets deleted.

▪ You can delete AG only if it is in Maintenance or Unmanaged mode.

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corporation 2017

IBM Resiliency Orchestration Logs

Working with Logger

To perform all configurations related to logs, click Admin on the navigation bar. The

IBM Resiliency Orchestration Administration page appears. Scroll down to the

Logs Summary and click Go to Logs. The IBM Resiliency Orchestration Logs

page appears.

IBM Resiliency Orchestration Logs page appears with the following information:

Column Description

Agent Displays the list of agents connected to IBM Resiliency Orchestration Server.

Status Displays the status of agents to indicate whether the agent is Connected or Disconnected

Component Displays the component where the agent has been installed.

Agent Node Displays the agent node for the agent.

IBM Resiliency Orchestration Administrator’s Guide

Column Description

Debug Level Provides the debug level drop-down list. You can see the debug level drop-down list only if the agent is connected

to IBM Resiliency Orchestration server. If the agent is not connected to IBM Resiliency Orchestration server, you see Unavailable in the Debug level column.

You can set the following preferences for log files on the right pane of IBM Resiliency

Orchestration Logs page:

▪ View the complete path of the log files stored on IBM Resiliency Orchestration

server in the Retrieved Logs will be stored on IBM Resiliency

Orchestration Server at the following location text box.

▪ Set the debug level for IBM Resiliency Orchestration server log by selecting

the debug levels from Server Debug Level Selection drop-down list. Refer

to Setting Debug Level for more information.

▪ Set IBM Resiliency Orchestration server and Agent Log Retention period.

Refer to Retaining Log for more information.

▪ Set the Server log file size limit on IBM Resiliency Orchestration server. Refer

to Setting Log File Size for more information.

Logger Overview

Logger maintains a periodic log of IBM Resiliency Orchestration operations. The log

files are created for the following modules of IBM Resiliency Orchestration:

▪ IBM Resiliency Orchestration GUI

▪ IBM Resiliency Orchestration Server

▪ Log file per Agent per Server

The naming format of the log file is a module name followed by that day's date with

'.log' as extension.

The logger has the following configurable options:

▪ Agent Debug Level

▪ IBM Resiliency Orchestration Server Debug Level Selection

▪ Server Log Retention Period

▪ Agent Log Retention Period

▪ Log File Size

You can also retrieve log files and filter log files by making specific choices.

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

Each module can be configured with a debug level. There are nine debug levels to

record an on-going process of IBM Resiliency Orchestration, ranging from ERROR to

VERBOSE 2.The debug levels control the information logged into the log file.

The following table explains the purpose of each debug level:

Debug Level Description

ERROR Logs all errors occurred or occurring in the system. This is the minimal debug level. In a real time environment, generally it would be sufficient to log

errors. In such cases, debug level has to be set to ERROR and only errors occurring will be logged.

WARNING This debug level forecasts the problem.

INFO

Keeps the user informed about the operation being performed.

DEBUG 1

DEBUG 2

DEBUG 3

DEBUG 4

Provides info on the cause of the error that has occurred. Typically this will help the support team and engineers to zoom into the actual problem.

VERBOSE 1 Logs information on all the activities that happen on the system.

VERBOSE 2 Logs every happening in the system. Typically threaded executions use this level to avoid creation of huge log files. For example, if RPO and RTO is not being computed, then this level needs to be set to debug the problem.

The entries to the log file are maintained in a unique format, which is <time

stamp>::<thread name> ::< severity level> :: <module name> :: <sub module

name> :: <message>

For example, 07/23/2004 06:50:37 PM :: RPORTOHandlerThread::VERBOSE ::

SERVER :: ACPAgentManagement :: no events from any agent at this moment.

IBM Resiliency Orchestration Administrator’s Guide

To perform all configurations related to logs, click Admin on the navigation bar. The

IBM Resiliency Orchestration Administration page appears. Scroll down to the

Logs Summary and click Go to Logs. The IBM Resiliency Orchestration Logs

page appears with the following information:

Column Description

Agent Displays the list of agents connected to IBM Resiliency Orchestration Server.

Status Displays the status of agents to indicate whether the agent is Connected or Disconnected

Component

Displays the component name where the agent has been installed.

AGENT NODE Displays the agent node of the agent.

Debug Level Provides the debug level drop-down list. You can see the debug level drop-down list only if the agent is connected to IBM Resiliency Orchestration server. If

the agent is not connected to IBM Resiliency

Orchestration server, you see Unavailable in the Debug level column.

You can set the following preferences for log files in the right pane of IBM Resiliency

Orchestration Logs page:

▪ View the complete path of the log files stored on the IBM Resiliency

Orchestration server in the Retrieved Logs will be stored on IBM

Resiliency Orchestration Server at the following location text box.

▪ Set the debug level for IBM Resiliency Orchestration server log by selecting

the debug levels from Server Debug Level Selection drop-down list. Refer

to Setting Debug Level for more information.

▪ Set IBM Resiliency Orchestration server and agent log retention period. Refer

to Retaining Log for more information.

▪ Set the log file size limit on IBM Resiliency Orchestration server. Refer to

Setting Log File Size for more information.

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

Setting Debug Level

The Debug Level is the minimum severity level of the entries to be made into the log

file. The log files are created every midnight and the entry will actually be entered

into the log file, if it is at least as severe as the current debug level of the logger.

For example, if a module makes a log entry with severity level VERBOSE, but the

current debug Level is INFO, then this entry will not be written into the log file

because VERBOSE is not as severe as INFO. Therefore, the Debug Level decides how

many entries will be written to the log file. These log files are created at every

midnight.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

You can set the debug level for the log files by performing the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Logs Summary and click

Go to Logs. The IBM Resiliency Orchestration Logs page appears.

2. The Debug Level Selection can be done for Agents and IBM Resiliency

Orchestration Server one at a time. Based on the debug level, the entries are

made into the respective log file.

3. To select the debug level for Agents, perform the following steps:

i.In the DEBUG LEVEL column, select the debug level from the drop-down list

adjacent to the Agents on the IBM Resiliency Orchestration Logs page. A

message box is displayed indicating the successful modification of the debug

level.

ii.Click OK in the message box.

Note:

The debug level information for IBM Resiliency Orchestration Server and

Agents is stored along with the preceding level information into the log file.

For example, If the selected debug level is WARNING for the SERVER module

then the severity levels information logged into the log file are ‘ERROR’ and

‘WARNING’. If the selected debug level is VERBOSE, then it logs all the

preceding severity level information into the log file.

Retaining Log

IBM Resiliency Orchestration automatically purges the agent and server log files

based on the following:

▪ Size of the log file directory

▪ Days specified to retain log files

IBM Resiliency Orchestration Administrator’s Guide

As the log files are created every mid-night, they get accumulated and occupy the

server space. To free up the server space the old log files are deleted.

The log files are retained depending upon the retention period specified in ‘Days’ and

the log files are purged based on the size and the retention period.

In Days- Specifies the time period in number of days to retain the latest log files,

after which IBM Resiliency Orchestration deletes the oldest log files.

In size- Specifies the maximum size of the log file directory, where the IBM

Resiliency Orchestration server and agent log files reside. IBM Resiliency

Orchestration starts purging the oldest log files when the directory size exceeds the

maximum limit.

To know in detail about purging and retention of log files, consider the following

example:

Consider the following details:

Days – 5 (input)

Size – 100 MB (input)

Current Date – 12 Jan 2006

To purge and retain log files IBM Resiliency Orchestration, always considers the log

file older to the current date i.e. from the log file created on 11 Jan 2006 to the

oldest log file in the directory.

To purge the log file, IBM Resiliency Orchestration considers size as the primary

factor and the number of the days as the secondary factor. When the size of the log

file directory exceeds beyond 100 MB, IBM Resiliency Orchestration deletes the

oldest log file one by one till the directory size goes below 100 MB.

When the size of the log file directory is lesser than 100MB, then IBM Resiliency

Orchestration considers the number of days specified (i.e. 5) to retain the log files of

the past five days and to delete the oldest log file one by one in descending order.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To select a log retention period, perform the following steps:

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Logs Summary and click

Go to Logs. The IBM Resiliency Orchestration Logs page appears.

On the right pane, set the Server Log Retention Period and Agent Log

Retention Period by performing the following steps under the respective

sections:

▪ Select Log Retention Period from the Days drop down list box. The

log retention period can be given only in number of days. The minimum

number of day is 1 and the maximum number of day is 30.

▪ Enter size of the log files in Mega Bytes (MB) in the Size field. The size

in MB is the threshold limit of the log file directory, beyond which the log

files are purged by IBM Resiliency Orchestration at a stipulated time

(usually at mid-night).

2. Click Save button.

Operational History

IBM Resiliency Orchestration server will automatically purge (delete) the metadata

and retain the required data for the retention period configured by the user. Data

available for reports is influenced by the metadata maintained by IBM Resiliency

Orchestration server.

Purging happens between 00:00 AM to 01:00 AM automatically based on the

configuration.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To manage purging of the metadata, perform the following steps:

1. Click Admin on the navigation bar, the IBM Resiliency Orchestration

Administration page appears.

2. Scroll down to the Operational History Summary and click Go to

Operational History. The IBM Resiliency Orchestration Server

Operational History Management page appears. There are two tabs option:

▪ Purge Log Now

▪ Edit Log Retention Period

Purge Log Now

This tab shows the current retention period configured. The default values for the

Retention Period are given below:

IBM Resiliency Orchestration Administrator’s Guide

Log Information Retention Period in Days

User 90 (3 months)

Replication 365 (1 year)

RPO/RTO 365 (1 year)

WAN Devices 90 (3 months)

Workflow (BCO, Test, BP, Policy)

1095 (3 years)

System Workflow 90 (3 months)

Continuity Details 90 (3 months)

Event 90 (3 months)

Validation Manager 30 (1month )

Clicking on Purge Now button will purge the metadata. This is useful when the

retention interval is altered and the metadata needs to purged immediately.

Depending on the installed licenses, the following logs are available for purging, as

given in the below table.

Purge Log Now

options

Test

License

Recovery

License

Recovery

and Test

License

User Log

Replication

RPO/RTO

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

Purge Log Now

options

Test

License

Recovery

License

Recovery

and Test

License

WAN

Internal Workflow

Continuity

Events

Workflow Log

▪ BCO

▪ BP

▪ Policy

▪ Test

Validation Manager

Edit Log Retention Period

Provide retention period in days for each log. Click Save Configuration to save.

This configuration will be effective only from the next automatic purge cycle.

However, to purge immediately, refer Purge Log Now above.

Setting Log File Size

You can limit the size of the server and agent log file to have better manageability

over the log files created during various operations. The maximum size of a log file is

defined by providing the size in megabytes. When the log file reaches the specified

size, IBM Resiliency Orchestration saves the log file with the module name and a

sequence number for better identification.

IBM Resiliency Orchestration Administrator’s Guide

The file naming convention is shown below:

Format: Module NameDateHH:MM_Sequence number.Log

For example:PanacesServer07-23-0404:55_1.log

PanacesServer07-23-0404:55_2.log

These log files are saved under a directory and are purged or retained on providing

retention period and size of the directory on the Log Retention page.

For more information on this refer to ‘Log Retention Period’ section in this guide.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To set Log File Size, perform the following:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Logs Summary and click

Go to Logs. The IBM Resiliency Orchestration Logs page appears.

2. In the right pane, enter the Limit in Mega Bytes (MB) in the Log File Size

Limit area. When the size of the log file exceeds the specified limit, IBM

Resiliency Orchestration saves the log file and provides a sequence number.

The sequence number is used to refer to the log file.

3. Click Save. A message box is displayed.

4. Click OK in the message box.

Fetching Log Files

This option allows you to retrieve a log file from a corresponding site to IBM

Resiliency Orchestration Server.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To retrieve a log file, perform the following steps:

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Logs Summary and click

Go to Logs. The IBM Resiliency Orchestration Logs page appears. Click the

Fetch Logs tab.

2. Provide the necessary inputs for the following fields:

Field Description

For Select the group from the drop-down list for which you want to fetch logs.

get logs for last Select the time duration in hours for which you want to fetch the logs.

3. Click the Fetch Log button. This opens a dialog box on windows to save the

log file.

Note:

To learn how to fetch log files using IBM Resiliency Orchestration command line tool,

see Fetching Log files using Resiliency Orchestration log CLI tool.

Note:

When the panaces is running with non-root, the system logs will not be fetched until

read permission is granted for the non-root user. The non-root user, by default, does

not have read permission for the system logs (/var/log/messages etc.).

System Capture

This option allows you to capture and view system details corresponding to IBM

Resiliency Orchestration Server.

To retrieve a log file, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Logs Summary and click

Go to Logs. The IBM Resiliency Orchestration Logs page appears. Click the

System Capture tab.

2. Provide the necessary inputs for the following fields:

Field Description

IBM Resiliency Orchestration Administrator’s Guide

Choose Group Select the group from the drop-down list for which you want to fetch logs.

▪ Select 1 group from the list assigned to

the user.

3. Click the Fetch System Capture button. This opens a dialog box on windows,

with a zip folder.

4. Extract the folder and open the system capture html page with the latest time

stamp.

The IBM Resiliency Orchestration System Capture html page contains the

following details:

Field Description

Group Details Group Details

Group Details contains the following information:

▪ Group configuration details

▪ Group Name

▪ Relationship

▪ Subsystems

▪ Component Subsystem

▪ Database Susbsystem

▪ Protection Scheme Subsystems

Solution Signature

RPO configuration

RTO configuration

DataLag configuration

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

Field Description

Private details( This provides the replication details of the group)

Notifications

Notifications contains the following information:

▪ Notification list

▪ BCO

Test Exercises

Test Exercises contains the following information:

▪ Test Name, its description and the

test schedule in a tabular column.

Business Process Integration

Business Process Integration contains the

following information:

▪ Business Process Name, Business

Process Description, Frequncy and

Schedule in a tabular column.

Events:

Events contains the following information:

▪ Event Name, Event Description,

Event Severity, Notification Status,

and Event Impact in a tabular

column.

License details:

License details contains the following

information:

Modular Name, Enabled in a tabular column.

Active Workflows:

Active Workflows details contains the following information:

Current Workflow name, Status, Start time in a tabular column.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Continuity Details

Agent List

Listing Log Files

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To list the log files, perform the following steps:

1. Click Tools menu.

2. Click Logs.

3. Select Operations. The User Operations window is displayed.

This window displays the log files for all the actions performed. The operations

search is based on the following:

▪ Timestamp

▪ Object

▪ Status

These options are used to optimize the search and are not mandatory. The operation

performed so far can be retrieved irrespective of the search options by clicking the

All operations button present at the bottom of left frame.

To retrieve the operations performed based on timestamp, perform the following:

1. Click the Timestamp radio button in the left frame of the window.

2. Enter From and To timestamp in Select Timestamp & enter data in 2004-

12-21 10:42:12.0’ format fields in the format specified.

3. When any one of the option is selected, the search button at the bottom of the

left frame gets activated.

4. Click Search to search the operations based on the selected option.

Note:

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

All three options (Timestamp, Objects and Status) cannot be selected at a time.

The following table lists the details of an operation:

Field Description

Time This gives the exact time of the operation.

Module This gives the name of the module on which the operation has been performed.

Object This gives the name of the object on which the operation has been performed.

Operation The gives the name of the operation performed.

Status The status of the performed operation is given here.

Description This field describes the operation.

To retrieve the information of the FAILED operations, perform the following steps:

1. Click the Status radio button on the left frame.

2. Enter the status of the operation in Select Status & enter status field.

3. Click the Search button to retrieve the operation based on the specified status.

This retrieves the ‘Failed’ operations.

To view the operations performed on a specific object, perform the following:

1. Click the Object radio button in the left frame.

2. Enter the name of the object in Select Object & enter object name field.

3. Click the Search button to retrieve the required information. This retrieves the

user operations performed on that particular object.

4. If you click the All Operations button, the User Operations window displays

log details of all the operations.

Filtering Log Files and Advanced Log Fetching

The log file fetching can be narrowed down by specifying date/time period (both start

date/time and end date/time) of the log occurrence and Log Source.

IBM Resiliency Orchestration Administrator’s Guide

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To filter Logs and perform Advanced Log Fetching:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Logs Summary and click

Go to Logs. The IBM Resiliency Orchestration Logs page appears. Click the

Fetch Logs tab.

2. Click the Advanced link. The Advanced Log Fetch section appears.

3. Provide the necessary inputs for the following fields:

Field Description

Step 1: Choose Date/Time Duration

Start Date/Time Click and select the start date/time of the log occurrence.

End Date/Time Click and select the end date/time of the log occurrence.

Step 2: Choose Log Source

Choose Group Select the group(s) for which you want to fetch logs from the list box.

Hold down the "Ctrl" key to select more than one group.

For each Group get the following Logs

IBM Resiliency

Orchestration Agent Logs

Select the checkbox to fetch Agent Logs.

Selecting this checkbox automatically selects Agent Logs, Agent Configuration, and System Logs checkbox(es) which the user can clear, if required.

IBM Resiliency Orchestration Server Logs

Select the checkbox to fetch Server Logs.

Selecting this checkbox automatically selects Server Logs, Server Configuration, and System Logs checkbox(es) which the user

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

Field Description

can clear, if required.

4. Click the Fetch Log button. This opens a dialog box on Windows to save the

log file.

Note:

To learn how to fetch log files using IBM Resiliency Orchestration command line tool,

see Fetching Log files using Resiliency Orchestration Log CLI tool.

Fetching Log files using CLI tools

Resiliency Orchestration Log Fetching / Extracting

Pre-requisites:

The user that logs on to the system to run the tool should have read/write/execute

permissions (recursive) on EAMSROOT folder (This is Resiliency Orchestration server

software installation directory).

Log fetching:

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

drmlogs.sh provides a Command line utility that can be invoked on the Resiliency

Orchestration server to collect the Resiliency Orchestration software logs. The logs

are created as zip file on the Resiliency Orchestration server.

The following command line options are provided for:drmlogs.sh

[--user=<User>]

[--password=<password>]

1.

▪ The user is a IBM Resiliency Orchestration user name.

▪ It should have the administrator privileges.

▪ The user is an optional parameter and defaults to ‘panaces’ if the user

option is not given.

IBM Resiliency Orchestration Administrator’s Guide

▪ The password is an optional parameter and it prompts for password, if

password option is not given.

{ <--time =dd/mm/yyyy,hh:mm , --duration=N > }

1.

▪ Logs from time given as --time option and up to duration of 'N hours'

are collected (provided both are given).

▪ If duration option is not given, it means logs from –-time to current

time.

▪ If only --duration option is given, it means last 'N hours’ of logs from

current time.

▪ One of --time and --duration option must be provided.

▪ The time is taken as local time of the server from where the logs are

collected. If there is a time drift between the Resiliency Orchestration

server and the agents, then the logs collected may not be consistent

between the server logs and the agent logs.

[--server=[logs] [,config] [,system]]

[--server-other=<comma separated file paths>]

[--agent=[logs] [,config] [,system]]

[--agent-other=<comma separated file paths>]

1.

▪ --server and –-agents options specify the list of information to be

collected from the Resiliency Orchestration server and the agents

systems. The list of information to be collected is specified as comma

separated values.

▪ ‘logs’ keyword specifies IBM Resiliency Orchestration logs to be

collected. These are files under DRMROOT/var/log/*,

DRMROOT/panacesFileReplicator/filesets/*

▪ ‘config’ keyword specifies IBM Resiliency Orchestration configuration

files. These are files under DRMROOT/installconfig/*.

▪ --server-other and –-agent-other option is any arbitrary file. Full file

path needs to be given. This file will be retrieved only if the user has

permission to that file.

▪ If none of the server and agent option is given, it defaults to agent and

server logs.

[--group =<group name> [--c] [--d] [--p]]

[--component =<cname1>[,<cname2]*]

[--dataset =<datasetname>[,<datasetname>]*

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

[--protection =<protectionScheme> [,<protectionScheme>]*

▪ Either –group or combination of -component,-dataset,-protection

needs to be provided.

▪ Group option specify group name for which to collect logs. This should

be a functional group and cannot be an application group. If specified

that a group name does not exist, then an appropriate message is

shown.

▪ If no other option [like --c or --d or --p] is present, then for the given

group, all the logs of dependent subsystem are collected. Dependent

subsystem include dataset/protection/component from both primary

and dr site. If –c, --d or -–p options are given, only components or

dataset or protection, depending on an option given, would be

retrieved.

▪ --component, --dataset, --protection specifies comma separated list

of names for which to collect log files.

--filename <filename>

▪ Filename is the name of the output file. The filename should be a

complete path name, otherwise it is the current directory. If this

option is not given, a file is generated in $EAMSROOT/var/log. The

name of the generated file will be displayed as “<user-

name>_IBMLogs-uniqueNumber.zip."

Extracting logs:

drmlogs.sh can also be used to extract the log files from zipped log file, when files

cannot be extracted using other unzip utilities. This utility can extract archive files up

to 4GB size created by IBM log fetcher only. The utility is supported for RHEL Version

5 UNIX (and later versions) running Java Runtime Environment 1.5 (and later

versions).

This can be invoked as follows:

$EAMSROOT/bin/drmlogs.sh {--extract=<absolute-path-of-zip-file> --

destination=<destination-dir>} [--buffer-size=<N-bytes>]

The placement of the command line parameters should exactly match as per the CLI

usage presented above i.e. The user can use this CLI with the following commands

only (e.g.):

▪ $EAMSROOT/bin/drmlogs.sh --extract=/opt/mycreatedzipfile.zip --

destination=/opt/zipcontent

▪ $EAMSROOT/bin/drmlogs.sh --extract=/opt/mycreatedzipfile.zip --

destination=/opt/zipcontent --buffer-size=10000

IBM Resiliency Orchestration Administrator’s Guide

Any other format of the CLI will not extract the zip file and will be considered for

fetching Resiliency Orchestration logs. Following options are provided.

--extract:

The value should be the absolute path of the zip file which needs to be

extracted. The command invoking user should have the required

permissions to open the file. This is a mandatory parameter.

--destination-dir:

The value should be the absolute path of the directory to which the

extracted files have to be written. The command invoking the user

should have the required permissions to create, open, read and write

files and directories in this directory recursively. This is a mandatory

parameter.

--buffer-size:

The value should be a positive integer between 1 and 33554432 (i.e.

32MB). This is an optional parameter. This is the size of page

read/written during extraction of the zip file. In the event of user not

specifying the option, the default 2MB buffer is used. User specifying a

value greater than 32MB, a buffer size of 32MB will be used. Any invalid

value defaults to 2MB. (Note: This is a performance tuning parameter

and should be used with care).

IBM Resiliency Orchestration Logs

© Copyright IBM Corporation 2017

Resiliency Orchestration Log Admin

drmlogadmin.sh

Log collection CLI can be used to retrieve any files from the customer server as long

as the user with which the agent is running has privilege to access those files. To

give control to the user to determine which files outside of Resiliency Orchestration

Installation folder, is allowed to be retrieved by log collection tool, an admin tool is

provided. Using admin cli, the user can enable or disable certain path or the ability to

collect system log files. By default, only collection of system logs (like

/var/log/message on linux or oracle alert logs etc) are enabled that are outside of

Resiliency Orchestration Installation folder. Any other files outside of Resiliency

Orchestration Installation folder cannot be accessed until user adds the paths.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The following command line options are provided:

[--user <User>]

[--password <password>]

▪ The user is a Resiliency Orchestration user name.

▪ It should have Super administrator privileges.

▪ The user is an optional parameter and defaults to ‘panaces’ if user

option is not given.

▪ The password is an optional parameter and it prompts for password, if

password option is not given.

[--list ]

▪ Lists the current configuration. It lists the files or logs that are allowed

to be collected. By default system log files are allowed.

[ --add-file=CompName:FilePath [, CompName2:FilePath2].. ]

Value of this option is a list of comma separated string of

“CompName:FilePath1”. CompName is name of component where the file

path “FilePath1” is allowed to be accessed by log cli.

[--add=system_logs]

To add allowing collection of system log. By default this is enabled.

[--remove-file= CompName:FilePath [, CompName2:FilePath2].. ]

Removing file path from the list of allowed file paths.

IBM Resiliency Orchestration Administrator’s Guide

[--remove=system_logs ]

Removing collection of system logs.

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corporation 2017

Licensing

Licensing

A License enables the user to access various functionalities of the IBM Resiliency

Orchestration software. A license key is provided to the customer when licenses are

procured. The license key defines one or more license packages that will be enabled

to the user.

Each License modules are a set of functional modules. The following are the various

License modules:

License modules Description

Recovery This license is selective for a specific group and constitutes of Monitor, Manage and BP modules.

Test This license is selective for a specific group and constitutes of Test module.

Reverse Recovery The license is not selective for a specific group and will need Recovery and Test licenses to be enabled for the

group. It constitutes of Reverse Monitor and Reverse Manage.

Advanced Reporter This license is global and not selective for a specific group

High Availability This license is global and not selective for a specific group

IBM Resiliency Orchestration Administrator’s Guide

License modules Description

Audit Logging Advanced Reporter license must be licensed for Audit Logging to be licensed.

Note:

Atleast one of the license module types (Enterprise/Resiliency Orchestration CI-

PHYSICAL/Resiliency Orchestration CI-Virtual) should be licensed for license modules

Test or Recovery else respective functionality will be disabled and cannot be used.

IBM Resiliency Orchestration Discovery, standard reports and administration are

horizontal functions that will be available irrespective of the license. To procure and

install license, click Procuring and Uploading License. Additional license can be

procured as and when required on top of existing license.

Licensing Introduction

License Details page displays information on the type of license and its expiration. It

also shows to whom the IBM Resiliency Orchestration is licensed to. License details

are verified each time when you login into IBM Resiliency Orchestration.

Following are the different IBM Resiliency Orchestration licenses available:

▪ Enterprise: License for using Enterprise Resiliency Orchestration features in

IBM Resiliency Orchestration. Drills, Recovery, Reverse Recovery and

banking modules are available with Enterprise license.

▪ Resiliency Orchestration - CI Physical: License for using Resiliency

Orchestration features with Physical servers in IBM Resiliency Orchestration.

Drills, Recovery and Reverse Recovery modules are available with

CI_PHYSICAL_FLEXPOD license

▪ Resiliency Orchestration - CI Virtual: License for using Resiliency

Orchestration features with VIRTUAL servers in IBM Resiliency Orchestration.

Drills, Recovery and Reverse Recovery modules are available with

CI_VIRTUAL_FLEXPOD license.

▪ Common modules: Common functional modules like AdvancedReporter,

IBMHA and Auditlogging are applicable to all the above license module types

and Common modules license will enable to use these features.

IBM Resiliency Orchestration license is of following three types:

Licensing

© Copyright IBM Corporation 2017

▪ Evaluation License: This is a demo or trial license that allows you to use

IBM Resiliency Orchestration features for a specified trial period. On

completion of this period, the license expires and you cannot access the

features. Use this license to evaluate the product and to help decide the

license type you would like to go for.

▪ Perpetual License: This license has a module based expire dates. Each

licensed module will have either same or different expiry date. As a result, the

license details page displays individual modules and their expiry dates.

▪ Not for Sale License: This type of license gives unlimited access to all the

features of IBM Resiliency Orchestration. This license does not expire. It is

suitable for IBM™ partners.

In following situations, you need to contact IBM Support at

[email protected] to get assistance on licensing.

▪ When license is not found or found invalid.

▪ When the evaluation (demo) license expires.

▪ When one or more modules of your licensed copy are about to expire.

▪ When one or more module of your licensed copy is expired already.

Procuring and Uploading License

License has to be bought, depending upon the required number of

servers/databases/replications and functional modules and type of license.

Types of Licenses based on expiration:

▪ Expirable License: This license will expire after the specified date.

▪ Perpetual License: This license will never expire.

Contact your supplier for procuring the above licenses.

Viewing License information procured

Validity of procured license and its detailed information can be viewed using the

Command Line Interface (CLI). The CLI should be provided with the licensekey.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Follow the commands to execute in the CLI:

1. Login into IBM Resiliency Orchestration Server (Linux Server) and open a

command terminal.

2. Run $EAMSROOT/cli/>sh DRMLicense.sh

IBM Resiliency Orchestration Administrator’s Guide

OR

$EAMSROOT/cli>./DRMLicense.sh

Upon running the script, DRMLicense prompt will be displayed:

DRMLicense>

3. Type the following syntax to view licensekey:

view licensekey <-l --licensefile> <licensefile name with path>

For example,

DRMLicense>view licensekey -l /tmp/license.xml

OR

DRMLicense>view licensekey --licensefile /tmp/license.xml

4. Press Enter.

5. If licensekey is valid, the following license information appears on the screen:

▪ Customer Name.

▪ Customer Id and Order Id information.

▪ License module type

▪ License Type.

▪ License expiration information based on the License type.

▪ Product Name and Version.

▪ Information of number of Server/Databases/Replications for Recovery

and Test modules.

▪ License information for other modules.

6. If licensekey is invalid, corresponding error message will be displayed.

Uploading License

A valid license can be uploaded anytime and does not require, restarting of

Resiliency Orchestration Server or its agents. However, Resiliency Orchestration

Server should be running to upload the license.

To upload the license information to the server:

1. Login into IBM Resiliency Orchestration Server (Linux Server) and open a

command terminal.

2. Run $EAMSROOT/cli/>sh DRMLicense.sh

OR

$EAMSROOT/cli>./DRMLicense.sh

Licensing

© Copyright IBM Corporation 2017

3. Upon running the script, DRMLicense prompt will be displayed: DRMLicense>

Type the following syntax to Upload licensekey:

upload licensekey <-l --licensefile> <licensefile name with path>

For example,

DRMLicense>upload licensekey -l /tmp/license.xml

OR

DRMLicense>upload licensekey --licensefile /tmp/license.xml

Press Enter.

4. uploaded license is valid, the message "The license is installed successfully" will

be displayed.

5. uploaded license is invalid, corresponding error message will be displayed.

Upgrading license

Please contact your supplier to procure additional licenses. Refer Uploading license

section above to upload the license.

Note:

Already installed license cannot be uninstalled. For example, if only Recovery license

is currrently installed, it cannot be uninstalled/downgraded by installing Test only

license.

IBM Resiliency Orchestration Administrator’s Guide

View the Uploaded License

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The uploaded license information can be viewed using CLI or User Interface (UI).

Using CLI:

1. Login into IBM Resiliency Orchestration Server (Linux Server) and open a

command terminal

2. Run $EAMSROOT/cli/>sh DRMLicense.sh

OR

$EAMSROOT/cli>./DRMLicense.sh

Upon running the script, DRMLicense prompt will be

displayed:DRMLicense>

Type the following command in the CLI prompt and press enter.

show installed license

The following information appears:

▪ Customer Name

▪ Customer Id

▪ Order Id

▪ License Module Type: Displays list of license module types installed like

Enterprise, CI_VIRTUAL_FLEXPOD, CI_PHYSICAL_FLEXPOD, COMMON etc with

their property details.

▪ License Type- EVAL or REGULAR

▪ License Expiry date for EVAL license type modules.

▪ Module Names: Displays details of Test or Recovery or both modules.

▪ Number of Servers

▪ Number of Database

▪ Number of Replications

▪ Banking functional module is only part of Enterprise license module type.

Licensing

© Copyright IBM Corporation 2017

▪ COMMON Modules: Displays whether the below common modules for all

license module types are licensed or not.

▪ Advanced Reporter

▪ Audit Logging

▪ IBM HA

Using UI:

In the UI, click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the License Summary and click Go

to License. The IBM Resiliency Orchestration License Usage Summary page

appears. Refer License Usage.

Enabling / Disabling for a Group

The group has to be in MAINTENANCE/UNMANAGED mode to perform enable/disable

License functionality.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

1. Click DISCOVER > Groups on the navigation bar. The Groups page appears.

2. Click Recovery Group or Application Group tab, the respective Group

Listing page appears.

3. Click the required group from the GROUP NAME column. The Group Details

Page appears.

4. Click Group configuration > License.

5. Select/deselect the License modules check boxes as required.

6. Click Save button.

Note:

Atleast one License Package should be selected, to save.

License Usage

To view the installed license and usage details, click Admin on the navigation bar.

The IBM Resiliency Orchestration Administration page appears. Scroll down to the

License Summary and click Go to License. The IBM Resiliency Orchestration License

Usage Summary page appears.

IBM Resiliency Orchestration Administrator’s Guide

Displays the following list of license modules Installed in a tabular format on different

tabs:

▪ Enterprise

▪ Common modules

▪ Resiliency Orchestration-CI Physical

▪ Resiliency Orchestration-CI Virtual

This page contains the following information for all license modules:

Customer information

Customer name

Note:

Each license module info is displayed in tabular format with the below information:

Enterprise tab

▪ License Type

▪ License expiry based on license type

License expiration information will not be displayed on procurement of Perpetual

License.

The following information is displayed in Installed Licences, in tabular column:

Field Description

Module Name Displays the module name.

The modules are:

▪ Recovery

▪ Test

▪ BankingModule

▪ ReverseRecovery

Number of Servers

Displays the number of servers.

Number of Databases

Displays the number of databases used.

Licensing

© Copyright IBM Corporation 2017

Number of Replications

Displays the number of replications done.

Used Licences: The counts represent the aggregate usage of Recovery and Test

license packages. The number of Servers section will include both Physical and

Virtual machines.

The following information is displayed in Used Licences, in a tabular column:

Field Description

Module Name Displays the module name.

The modules are:

▪ Recovery

▪ Test

Number of Servers

Displays the number of servers.

▪ Physical

▪ Virtual

Number of Databases

Displays the number of databases used.

Number of Replications

Displays the number of replications done.

Group wise License Usage Details - These counts represent group-wise usage of

Recovery and Test license packages. Since some of the subsystems would have been

shared among groups, the sum of this group-wise count need not match the above

used license count. The number of Servers section will include both Physical and

Virtual machines.

COMMON modules Tab:

▪ License Type

▪ License expiry based on license type

IBM Resiliency Orchestration Administrator’s Guide

License expiration information will not be displayed on procurement of Perpetual

License.

Displays a list of Installed common license modules with their respective license

status:

▪ AdvancedReporter

▪ AuditLogging

▪ IBM HA

Resiliency Orchestration - CI Virtual tab

▪ License Type

▪ License expiry based on license type

License expiration information will not be displayed on procurement of Perpetual

License.

Displays a list of Installed license modules with their respective license status:

Field Description

Module Name Displays the module name.

The modules are:

▪ Recovery

▪ Test

Number of Virtual Machines

Displays the number of virtual machines used.

The following information is displayed in Used Licences, in a tabular column:

Field Description

Module Name Displays the module name.

The modules are:

▪ Recovery

▪ Test

Licensing

© Copyright IBM Corporation 2017

Field Description

Number of Virtual Machines

Displays the number of virtual machines used.

Group wise License Usage Details - These counts represent group-wise usage of

Recovery and Test license packages. Since some of the subsystems would have been

shared among groups, the sum of this group-wise count need not match the above

used license count. The number of Servers section will include both Physical and

Virtual machines.

Resiliency Orchestration - CI Physical tab

▪ License Type

▪ License expiry based on license type

License expiration information will not be displayed on procurement of Perpetual

License.

Displays a list of Installed license modules with their respective license status:

Field Description

Module Name Displays the module name.

The modules are:

▪ Recovery

▪ Test

Number of Servers

Displays the number of servers being used.

The following information is displayed in Used Licences, in a tabular column:

Field Description

Module Name Displays the module name.

The modules are:

▪ Recovery

IBM Resiliency Orchestration Administrator’s Guide

Field Description

▪ Test

Number of servers Displays the number of servers being used.

Group wise License Usage Details - These counts represent group-wise usage of

Recovery and Test license packages. Since some of the subsystems would have been

shared among groups, the sum of this group-wise count need not match the above

used license count. The number of Servers section will include both Physical and

Virtual machines.

Group

The following are license criteria:

When License Limit Exceeded

This occurs when the license usage count exceeds the purchased license count. On

detecting that the used license count is exceeding the available license, a message

"Your license usage count has exceeded the permissible count of licenses for the

license module<List of license modules>. Please contact your supplier to purchase

additional licenses" is displayed.

When the license is about to expire

Each day, system verifies the current date with license expiration date. If it detects

that the license expires in 15 days, a message “Your license usage count has

exceeded the permissible count of licenses for the license module<List of license

modules>. Please contact your supplier to purchase additional licenses” is displayed.

If the license is going to expire in a day, the system will send a mail every hour

regarding the license expiration.

No license installed

If license is not installed, user will not be allowed to login and the system will prompt

the user the following message, "There is no valid license available on your system.

Please contact technical support for more information".

When license has expired for all the modules

The user will not be allowed to login. The following message will be displayed if a

license expires, “Your license is expired. Please install a new license and try again or

contact your supplier to purchase the license”.

When license has expired for fewer the modules.

Licensing

© Copyright IBM Corporation 2017

This occurs when the license expired for any license modules. On detecting that the

used license expiry for any license module type, a message "Your license expired of

for the license module<List of license modules>. Please contact your supplier to

purchase additional licenses" is displayed..

Note:

If licenses are expired for all the license module types, user will not be allowed to

login.

When the license is about to expire and exceeded.

This occurs when the license is of expirable type and is about to expire in 15

days;and even if license usage count is exceeded. If the license is going to exipire in

24hours (a day), the system will send mail to all the authorised person at every one

hour. The following message will be displayed "Your license usage count has

exceeded the permissible count of licenses and your license usage count has

exceeded the permissible count of licenses. Please contact your supplier to purchase

additional license".

Home Page Options

The following are the Home page options available for the below licenses:

Home page

options

Recovery

License

Test

License

Recovery

and Test

License

Events List View

Main Dashboard

Continuity List

View

Manage Group List View

IBM Resiliency Orchestration Administrator’s Guide

Home page

options

Recovery

License

Test

License

Recovery

and Test

License

Group Dashboard

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corp. 2017

High Availability of IBM Resiliency Orchestration Server

High Availability (HA) of IBM Resiliency

Orchestration Server

IBM Resiliency Orchestration comes with the following mechanisms to protect itself

from any disasters:

▪ IBM Resiliency Orchestration Crash Recovery

▪ IBM Resiliency Orchestration Metadata Recovery

▪ IBM Resiliency Orchestration Server Recovery

If IBM Resiliency Orchestration server processes or hardware crashes during

execution, it can recover automatically from the operations that were being executed

at the time of crash.

IBM Resiliency Orchestration server obtains a backup of the meta-data at regular

intervals and stores the meta-data. When IBM Resiliency Orchestration server

crashes, the meta-data is lost from the time it has been backed up last to the time of

server crash. In this case, we need to recover from the last backed up information.

When IBM Resiliency Orchestration server crash occurs during execution of any

continuity operation, Test Exercise operation or an Event Management operation, the

server recovers from these operations and provides an option to resume the

operation after the server is restarted.

During an Application Group crash recovery, first an attempt is made to recover all

its Functional Groups and then the Application Group is recovered. During this

process one or more Recovery Groups might fail leading to an inconsistent state of

Application Group and its Recovery Groups. All further operations performed on the

Application Group might not succeed.

IBM Resiliency Orchestration Administrator’s Guide

When the HA feature is licensed, GUI will enable the following:

▪ Admin > Go to Server Failover Summary > Configuration

▪ Admin > Go to Server Failover Summary > Status

HA System events is displayed in System Events page.

Continuity Operation Recovery

If a Group is in the middle of a continuity operation, IBM Resiliency Orchestration

moves the continuity state of the Group to SHUTDOWN upon startup of IBM

Resiliency Orchestration server.

For example, if the current operation is Failover TRANSIT and the server crashes, the

continuity operation on the Group would be moved to Failover SHUTDOWN state.

Continuity Recovery

If the server has been stopped or crashed in the middle of the workflow execution

you can resume the actions.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

To recover actions in a workflow, select any one of the following workflow

resumption:

1. Click Manage > Recovery group on the navigation bar.

2. The Recovery group listing page appears. This page lists all groups assigned

to the current user.

3. Click desired Group from the GROUP NAME column. The Recovery Groups

page appears.

4. Click Recovery Group to do one of the following:

▪ Initiate NormalCopy

This operation is specific to each Recovery Group and involves periodic

extraction of data from Primary and application of changed data on DR. The

Replication mechanism copies incremental log files from the primary to DR.

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Field Description

Current BCM Displays the current Business Continuity state.

Continue to Initiate the DR Operation? Select this check box if you want to initiate the DR operation.

▪ Initiate Failover

This operation allows Primary server to be brought down and the DR server to

be made available for all business applications.

Field Description

Current BCM Displays the current Business Continuity state.

Continue to initiate the DR Operation Select this check box if you want to initiate the DR operation.

Or Use Change Continuity State( ) icon from Discover > Groups List View.

A dialog box is displayed based on the selection.

This operation lets you move the Business Continuity State of a Group from the

current to a new Business Continuity State. This operation is possible only when the

Group is not executing any continuity operations currently.

Field Description

Current BCM Displays the current Business Continuity state.

Select Target State Select the target state that you want to move from the current state.

The available options are: Normal RESET, Normal INACTIVE, Failover ACTIVE and Fallback ACTIVE.

Continue to Initiate the DR Operation Select this check box if you want to initiate the DR operation.

IBM Resiliency Orchestration Administrator’s Guide

5. Enter the appropriate details in the dialog box.

6. Click Continue to proceed with the resumption OR click Abort to abort

executing the workflow.

Note:

If an action in Action Group was executing at time of crash then the Action Group

execution is started from the first action in the Action Group.

To recover an workflow that has recurring actions (even in Action group), executing

at the time of system crash, then workflow from the first action is restarted

automatically.

Event Management Recovery

The Event recovery page during Group recovery gives an opportunity for the user to

recover at individual event and corresponding policy level. All the events that are in

the middle of execution, at the time of IBM Resiliency Orchestration Server going

down or at the time of Metadata backup is being taken, would be listed during the

recovery. The user can browse through this list and selectively close or resume these

events or corresponding policies from where they have stopped. The user can also

close all the open events in one go by a click of a button, which is applicable if the

recovery is from older metadata backup.

Drills Recovery

If a Group is in the middle of a Drills, IBM Resiliency Orchestration moves the drill

state to SHUTDOWN, upon startup. Along with this, the Drills page provides a

resume operation button called Resume to resume the stopped drill.

IBM Resiliency Orchestration Meta Data

Recovery

IBM Resiliency Orchestration server can be recovered using a backup copy on the

production server itself or using the replicated copy on the DR server. In both cases,

the recovery procedures are similar and performed using the Recovery Wizard.

To use this option, the Backup Manager must be configured to take regular backups

at the desired intervals so that a recent copy of the metadata is available for

recovery.

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

To enforce recovery, the IBM Resiliency Orchestration Server needs to be started in

recovery mode after completing the metadata restores procedure or recovery

procedure. To bring up IBM Resiliency Orchestration Server in recovery mode,

execute following command:

$(command prompt) IBM recover

Once IBM Resiliency Orchestration Server comes up in recovery mode; all the

configured availability Groups will be marked for recovery forcing you to complete

the recovery process before doing any normal activity with that Group. An AG can be

marked for recovery only if it has at least one RG associated with it. However an AG

will be in Maintenance mode if it has no RGs associated with it. There is no Recovery

for BG.

Each Group needs to be recovered independently. The recovery starts by clicking on

that particular Group. The recovery process involves 3 different steps as shown

below:

1. Group Status Recovery

During this part of the recovery, you can recover Group status.

The Group Status Recovery page displays the Group status as per the metadata copy

and lets the user to set the correct Group status that represents the current

environment. The Group status selected for an AG will be applicable for all its

associated RGs. In other words, the AG and its RGs possess the same group status

after this “Group status recovery step”.

2. Continuity Mode Recovery

Once the Group status is selected, the continuity mode recovery lets you recover to

the right mode based on the chosen Group status.

During this process, Group’s continuity mode is recovered to the mode that

represents the environment. Similar to the Group status, for an AG the chosen BCM

state is used for its RGs also.

3. Event Policy Recovery

During the Event policy recovery, you can view the policies that are being executed

at the time of the crash. This lets you close all the executing policies or keep them

open for later selective closure or resumption of these policies.

IBM Resiliency Orchestration Administrator’s Guide

If there are no policies executing for corresponding Group then there will be nothing

shown in ‘Event Manager Recovery’ box in the above page will be empty. If an AG is

being recovered, then all policies that are in executing state for all the associated

FGs will be displayed in the above page. To know in detail about the event, click on

the respective event name link on the above page. This opens a page describing the

event. Click on the policy link on the above page to view the corresponding Workflow

status details page.

Once the recovery process is complete a page displaying ‘successful completion of

the operation is shown. Click Done to close the page.

IBM Resiliency Orchestration Server Recovery

IBM Resiliency Orchestration Server Failover

When IBM Resiliency Orchestration Master Server goes down, the control is

transferred to the IBM Resiliency Orchestration slave server. When you bring up the

slave server during the Master Server failover make sure you follow the points given

below:

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Note:

The following is applicable only for Remote Agents.

1. Run following update statement on ‘panaces’ database.

update agent_csa set ac_anode_ip=’<Slave Server IP>’ where

ac_anode_ip=’<Master Server IP>’;

update agent_csa set ac_ipaddress=’<Slave Server IP>’ where

ac_ipaddress=’<Master Server IP>’ and ac_as_id = ‘6’;

Update Vault Agent

update agent_csa set ac_ipaddress=’<Slave Server IP>’ where

ac_ipaddress=’<MasterServer IP>’ and ac_as_id in (select as_id from agent_ssa

where as_name='Vault Agent’);

update component set c_ipaddr=’<Slave Server IP>’ where c_name = ‘<Master

server component name>’;

update component_OSServer set cos_mgmt_ipaddr=’<Slave Server IP>’ where

cos_mgmt_ipaddr = ‘<Master Server IP>’;

Note:

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Replace above statements with the following:

▪ <Slave Server IP> to IP address of the slave server.

▪ <Master Server IP> to IP address of master server which is failed.

▪ <Master server component name> to component name discovered for Master

server.

2. While transferring the control to the slave server, ensure that the IBM

Resiliency Orchestration services on the slave server are started without

stopping the MySQL replication.

3. Manually start IBM Resiliency Orchestration services on the slave server. Once

the services are started, the agents automatically establish connection with the

slave server.

After recovering the IBM Resiliency Orchestration master server, perform the

following steps before starting the IBM Resiliency Orchestration services on the IBM

Resiliency Orchestration master server:

1. Stop the IBM Resiliency Orchestration services on the slave server.

2. Take the MySQL metadata dump on the slave server using the following

command:

mysqldump -u root --databases panaces pfr advancedreporter -R --

triggers > panaces_dump.sql

3. Copy the dump to the master server.

4. Drop the IBM Resiliency Orchestration MariaDB database on the

production server by executing the following command at the command

prompt:

▪ mysql>drop database panaces;

▪ mysql>drop database pfr;

▪ mysql>drop database advancedreporter;

5. Load the MySQL dump that is copied from slave server to master

server by issuing the following command:

i. command from the terminal:

ii. mysql -u root < panaces_dump.sql

6. Run following update statement on ‘panaces’ database.

i. update agent_csa set ac_anode_ip=’<Master Server IP>’ where

ac_anode_ip=’<Slave Server IP>’;

ii. update agent_csa set ac_ipaddress=’<Master Server IP>’ where

ac_ipaddress=’<Slave Server IP>’ and ac_as_id = ‘6’;

iii. update component set c_ipaddr=’<Master Server IP>’ where c_name

= ‘<Master server component name>’;

iv. update component_OSServer set cos_mgmt_ipaddr=’<Master Server

IP>’ where cos_mgmt_ipaddr = ‘<Slave Server IP>’;Note

IBM Resiliency Orchestration Administrator’s Guide

v. Replace in above statements with the following:

▪ <Slave Server IP> to IP address of the actual slave

server.

▪ <Master Server IP> to IP address of actual master server.

▪ <Master server component name> to component name

discovered for Master server.

7. Start IBM Resiliency Orchestration services on the master server.

Once the services are started, the agents automatically establish connection with

the Master server.

IBM Resiliency Orchestration Server Failover configured for UCS Director

When IBM Resiliency Orchestration Master Server goes down, the control is

transferred to the new IBM Resiliency Orchestration.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

When you bring up the new server during the Master Server failover (High

Availability), the following needs to be done:

1 Login to UCS Director UI.

▪ In Physical tab>>Compute

2 Select Default Pod>>Go to IBM Continuity tab > Click icon corresponding to

the UCS Director account and provide the new IP address for IBM Resiliency

Orchestration.

3 Click Save to save the modifications.

▪ Go to Administration, Physical Accounts>

4 Select the IBM Resiliency Orchestration account.

5 Click on Test connection.

Note:

During IBM Resiliency Orchestration fallback, the above changes needs to be

undone.

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Monitoring Server Recovery

IBM Resiliency Orchestration server continuously monitors the metadata replication

that is setup for high availability of IBM Resiliency Orchestration Server.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

The current status of the replication can be seen by doing the following:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears.

2. Scroll down to the Server Failover Summary and click Go to Server

Failover. The Server Failover page appears.

The Status tab displays the following details:

Field Description

Replication Information

Replication Status Displays the replication status.

The Status are:

▪ ON: Replication is happening.

▪ OFF: Replication is not happening.

▪ FAILED: Replication is not happening, due to an

error encountered during replication.

Last Dumped Log

File

Displays the name of the last dumped log file.

Position Displays the position within the last dumped log file.

Last Applied Log

File

Displays the name of the last applied log file.

Last Applied Log

File Position

Displays the position within the last applied log file.

Slave State Displays the current status of the slave.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

The states are:

▪ Waiting for master update- The initial state before

Connecting to master.

▪ Connecting to master- The thread is attempting to

connect to the master.

▪ Checking master version- A state that occurs very

briefly, after the connection to the master is

established.

▪ Registering slave on master- A state that occurs

very briefly after the connection to the master is

established.

▪ Requesting binlog dump- A state that occurs very

briefly, after the connection to the master is

established. The thread sends to the master a

request for the contents of its binary logs, starting

from the requested binary log file name and

position.

▪ Waiting to reconnect after a failed binlog dump

request- If the binary log dump request failed (due

to disconnection), the thread goes into this state

while it sleeps, then tries to reconnect periodically.

The interval between retries can be specified using

the CHANGE MASTER TO statement or the --

master-connect-retry option.

▪ Reconnecting after a failed binlog dump request-

The thread is trying to reconnect to the master.

▪ Waiting for master to send event- The thread has

connected to the master and it is waiting for binary

log events to arrive. This can last for a long time if

the master is idle. If the wait lasts for

slave_net_timeout seconds, a timeout occurs. At

that point, the thread considers the connection as

broken and makes an attempt to reconnect.

▪ Queueing master event to the relay log- The thread

has read an event and is copying it to the relay log

so that the SQL thread can process it.

▪ Waiting to reconnect after a failed master event

read- An error occurred while reading (due to

disconnection). The thread is sleeping for the

number of seconds set by the CHANGE MASTER TO

statement or --master-connect-retry option

(default 60) before attempting to reconnect.

▪ Reconnecting after a failed master event read- The

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Field Description

thread is trying to reconnect to the master. When

connection is established again, the state becomes

Waiting for master to send event.

▪ Waiting for the slave SQL thread to free enough

relay log space- You are using a nonzero

relay_log_space_limit value, and the relay logs

have grown large enough that their combined size

exceeds this value. The I/O thread is waiting until

the SQL thread frees enough space by processing

relay log contents so that it can delete some relay

log files.

▪ Waiting for slave mutex on exit- A state that occurs

briefly as the thread is stopping.

Last Error Number Displays the last error number.

Last Error Displays the detailed description of the last error.

Configuration Information

Master Replication

Log Buffer Size

Displays the buffer size of the master replication log.

Master Replication

Type

Displays the type of the master replication.

Master Server ID Displays the server ID of the master.

Slave Server ID Displays the server ID of the slave.

Master IP Displays the IP address of the master.

Master User Displays user name of master server.

Master Port Displays the port ID of the master.

Connect Retry Displays the number of seconds after which the master

tries to reconnect. The default value is 60.

3. Click the Configuration tab. The Failover Configuration page appears. This

is used to configure IBM Resiliency Orchestration server for monitoring the

metadata replication.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Slave Server Host

Name/ IP

Enter hostname or IP address of the configured

MySQL slave server.

MySQL Details on Slave Server

User Name with

Admin Privileges

Enter the user name with administrator

privileges to log on to MariaDB database.

Password Enter the password to log on to MariaDB

database.

Port number Enter the port number on which the MySQL

slave server is listening.

4. Enter appropriate information in the relevant fields. Click Save.

Events

IBM Resiliency Orchestration server also raises an event when the metadata

replication state changes. These events can be seen from the events page and will

categorized under System Events.

The following are the Events related to High Availability of IBM Resiliency

Orchestration:

Event Impact Description Criticality

HASystemEvent001 High

Availability of

IBM

Resiliency

Orchestration

software

resumed

Replication of

IBM

Resiliency

Orchestration

data to

failover site

has started.

INFO

HASystemEvent002 High

Availability of

IBM

Resiliency

Orchestration

software

stopped

Replication of

IBM

Resiliency

Orchestration

data to

failover site

has stopped.

SERIOUS

HASystemEvent003 High

Availability of

IBM

Resiliency

Error

encountered

while

replicating

SERIOUS

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Orchestration

software

encountered

an error

IBMResiliency

Orchestration

data to

failover site.

Metadata Replication using Automated Script

MySQL replication works in a Master-Slave mode where a server acts as master,

while one or more servers act as slaves. IBM Resiliency Orchestration presently

supports one slave process communicating to one master. Any changes made to the

files on the master server are written to the binary log. The binary log files are

updated with the latest changes and the server maintains an index of the files to

keep track of log rotation. A replication process from the slave communicates to the

master to read the binary log and applies the changes to its own database.

Check the pre-requisites and then perform the configurations shown below for

recovery of the IBM Resiliency Orchestration server during failover.

Pre-requisites

▪ Log in as root user.

▪ Create MySQL user for Master and Slave host in mysql.user tables of both

servers with all grant privileges. This is required to validate the MySQL

servers locally and remotely.

Note: Creating MySQL user for Master and Slave host can be avoided if the

user can access mysql as a root user.

(For Example, create two MySQL users for both Master and Slave hosts in Master

host and two MySQL users for both Master and Slave host in Slave host using the

below command.

CREATE USER 'user'@’server ip address’ IDENTIFIED BY 'password';

GRANT ALL ON *.* TO 'user'@'server ip';

GRANT ALL PRIVILEGES ON *.* TO 'user'@'server ip’ WITH GRANT OPTION;

Adding password is optional. If password is not added, leave it blank with the quotes

such as:

CREATE USER 'user'@’server ip address’ IDENTIFIED BY ' ';

IBM Resiliency Orchestration Administrator’s Guide

▪ Configure PanacesAgentGeneric.cfg file in $EAMSROOT/installconfig of both

servers.

Note:

When each script is executed, a common log file called Metadata_Replication_Log.log

is generated and its execution details will be logged into this log file. If the log file

already exists, then the logs will be appended here.

Preliminary Configuration

Before doing server Failover, it is mandatory that the following entries are added in

the file ‘PanacesAgentGeneric.cfg’ (available in $EAMSROOT/installconfig) on both

primary and DR agents.

PANACES_MASTER_SERVER_ADDRESS=<IP address of IBM Resiliency

Orchestration master server>

PANACES_MASTER_SERVER_CONNECTIONATTEMPTS_BEFORE_FAILOVER=10

PANACES_MASTER_SERVER_RECONNECT_INTERVAL=25

PANACES_SLAVE_SERVER_ADDRESS=<IP address of IBM Resiliency

Orchestration slave server>

PANACES_SLAVE_SERVER_CONNECTIONATTEMPTS_BEFORE_FAILOVER=10

PANACES_SLAVE_SERVER_RECONNECT_INTERVAL=40

After server Failover is complete, the IBM Resiliency Orchestration should be started

on the slave server. At this point, it is mandatory that the master server should not

be running.

At any point of time, the IBM Resiliency Orchestration server should not run on both

master and slaver servers simultaneously.

Clean and Reset the Panaces MariaDB Database on Slave Server

Follow these steps to clean/reset the IBM Resiliency Orchestration metadata on the

slave server before establishing communication between the two servers. These

commands should be executed on the IBM Resiliency Orchestration slave server.

cd $EAMSROOT/IBMHAConfiguration

./resetmysqlonslave.sh [--user <mysql_username>] [--pwd

<mysql_password>] [--sport <slave_mysql_port>] [--help]

▪ If no username is given, default username will be taken as ‘root’.

▪ Information provided within the brackets [] are optional.

▪ If the port number is not provided, then the default port number used is

3306.

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Master Server Configuration

The following are the details of MySQL configuration on the master server.

▪ Stop the IBM Resiliency Orchestration server by entering the following

command

$EAMSROOT/bin/panaces stop

▪ Copy $EAMSROOT/IBMHAConfiguration/mastercnf/my.cnf to /etc

cp $EAMSROOT/IBMHAConfiguration/mastercnf/my.cnf /etc/

▪ Run master.sh

cd $EAMSROOT/IBMHAConfiguration/

./master.sh --master <master_ip> [--muser <master_mysql_username] [--

mpwd <master_mysql_pwd] [--mport <master_mysql_port>] --slave

<slave_ip> [--suser <slave_mysql_user>] [--spwd <slave_mysql_pwd>] [-

-sport <slave_mysql_port>] [--mysqlcnf_loc <location_of_my.cnf>] [--

lic_small/--lic_medium/--lic_large]

▪ Information provided within the brackets [] are optional.

▪ Master IP and slave IP are mandatory. Rest are optional.

▪ If muser/suser is not given, then the default muser/suser is 'root'.

▪ If mport/sport is not given, then the default port is '3306'.

▪ If the location of my.cnf is not specified, then the default location is /etc.

▪ lic_small/lic_medium/lic_large indicate the installation sizes. This is

currently optional.

▪ If MySQL service is not running, start manually

service mysqld start

▪ Copy the panaces.tar file generated in the mentioned directory to the slave

server.

▪ Start the IBM Resiliency Orchestration server by entering the following

command

$EAMSROOT/bin/panaces start

Slave Server Configuration

The following are the details of MySQL configuration on the slave server.

▪ Stop the IBM Resiliency Orchestration server by entering the following

command

$EAMSROOT/bin/panaces stop

▪ Run slave.sh

cd $EAMSROOT/IBMHAConfiguration/

IBM Resiliency Orchestration Administrator’s Guide

slave.sh --master <master_ip> [--muser <master_mysql_user>] [--mpwd

<master_mysql_pwd>] [--mport <master_mysql_port>] [--mysqlcnf_loc

<target_location to copy my.cnf>] --slave <slave_ip> [--suser

<slave_mysql_user>] [--spwd <slave_mysql_pwd>] [--sport

<slave_mysql_port>] [--lic_small|--lic_med|--lic_large] [--m_log_file

<master_binary_log_file>] [--m_log_pos <master_binary_log_pos>]

./resetmysqlonslave.sh [--user <mysql_username>] [--pwd

<mysql_password>] [--sport <slave_mysql_port>]./resetmysqlonslave.sh

[--user <mysql_username>] [--pwd <mysql_password>] [--sport

<slave_mysql_port>]

▪ Information provided within the brackets [] are optional.

▪ Master IP and slave IP are mandatory. Rest are optional.

▪ If muser/suser is not given, then the default muser/suser is 'root'.

▪ If mport/sport is not given, then the default port is '3306'.

▪ If the location of my.cnf is not specified, then the default location is /etc.

▪ lic_small/lic_medium/lic_large indicate the installation sizes. This is

currently optional.

▪ If MySQL service is not running, start manually

service mysqld start

Note:

▪ The script validate_master_slave.sh is being internally used by master.sh and

slave.sh for input validation purpose.

However, this script can be used by the user only for validating purpose (This will not

change the state of the database).

The following has to be executed to validate the master and slave details-

Validating Master and Slave

./validate_master_slave.sh --master <master_ip> [--muser

<master_mysql_username] [--mpwd <master_mysql_pwd] [--mport

<master_mysql_port>] --slave <slave_ip> [--suser <slave_mysql_user>]

[--spwd <slave_mysql_pwd>] [--sport <slave_mysql_port>]

- Master ip and slave ip are mandatory. Rest are optional.

- If no muser/suser is given, default muser/suser will be 'root'

- If no mport/sport is given, default port will be taken as 3306

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

▪ Automated scripts will replace my.cnf with default my.cnf. If changes are

required, add them manually.

For details about the design of the script for the preliminary configuration, master

server configuration and slave server configuration, click Script Design.

Metadata Replication with Manual Steps

MySQL replication works in a Master-Slave mode where a server acts as master,

while one or more servers act as slaves. IBM Resiliency Orchestration presently

supports one slave process communicating to one master. Any changes made to the

files on the master server are written to the binary log. The binary log files are

updated with the latest changes and the server maintains an index of the files to

keep track of log rotation. A replication process from the slave communicates to the

master to read the binary log and applies the changes to its own database.

Perform the following configurations to recovery the IBM Resiliency Orchestration

server during failover:

Preliminary Configuration

Before doing server Failover, it is mandatory that the following entries are added in

the file ‘PanacesAgentGenericConf.cfg’ (available in $EAMSROOT/installconfig) on

both primary and DR agents.

PANACES_MASTER_SERVER_ADDRESS=<IP address of IBM Resiliency

Orchestration master server>

PANACES_MASTER_SERVER_CONNECTIONATTEMPTS_BEFORE_FAILOVER=10

PANACES_MASTER_SERVER_RECONNECT_INTERVAL=25

PANACES_SLAVE_SERVER_ADDRESS=<IP address of IBM Resiliency

Orchestration slave server>

PANACES_SLAVE_SERVER_CONNECTIONATTEMPTS_BEFORE_FAILOVER=10

PANACES_SLAVE_SERVER_RECONNECT_INTERVAL=40

After server Failover is complete, the IBM Resiliency Orchestration should be started

on the slave server. At this point, it is mandatory that the master server should not

be running.

IBM Resiliency Orchestration Administrator’s Guide

At any point of time, the IBM Resiliency Orchestration server should not run on both

master and slaver servers simultaneously.

Master server configuration

The following are the details of MySQL configuration on Master server. If there is no

password to access MySQL application, then the part of commands in italics need not

be entered.

▪ Stop the IBM Resiliency Orchestration server by entering the following

command

# /opt/panaces/bin/panaces stop

▪ Add or modify the following entries in /etc/my.cnf at the master site. If the

file does not exist, create one.

[mysqld]

innodb_log_buffer_size=8M

innodb_flush_log_at_trx_commit=1

innodb_file_io_threads=4

max_binlog_size=20M

max_allowed_packet=16M

max_connections=500

log_bin=panacespri_binlog

binlog-do-db=panaces

binlog-do-db=advancedreporter

binlog-do-db=pfr

server-id=1

datadir=/var/lib/mysql

binlog-format=ROW

log_warnings=1

▪ Log in to the master server and issue the following commands:

# MySQL –u root –p

mysql> grant replication slave on *.* to root@<IP address of slave>

-> identified by <’slave mysql password’>;

mysql> grant all on *.* to root@<IP address of slave>

-> identified by < ‘slave mysql password’>;

mysql> flush tables with read lock;

mysql> show master status;

Note down the file name and the position values. If binary log is not already

enabled, the output will be empty. In that case the File name should be

noted as “empty string '' and the position as 4.)

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

mysql> exit

▪ Shut down the master server by executing the following command from the

shell prompt

# mysqladmin -u root –p shutdown

▪ Tar the ‘panaces’, ‘advancedreporter’, 'pfr', ‘mysql’ folders, ‘ibdata1’ and

‘ib_logfile*’ data files (for copying into slave server).

# cd /var/lib/mysql

# tar -cvf panaces.tar panaces advancedreporter pfr mysql ibdata1

ib_logfile*

FTP the tar file to the slave server under /var/lib/mysql directory

▪ Restart the server

# service mysql start

▪ Start the IBM Resiliency Orchestration server

# /opt/panaces/bin/panaces start

Slave Server Configuration

The following are the details of MySQL configuration on Slave server. If there is no

password to access MySQL application, then the parts of commands in italics need

not be entered.

▪ If MySQL is already running on the slave server, shut it down.

# mysqladmin -u root –p shutdown

▪ Add or modify the following entries in /etc/my.cnf on slave server. If the file

does not exist, it can be created.

[mysqld]

innodb_log_buffer_size=8M

innodb_file_io_threads=4

max_allowed_packet=16M

max_connections=500

server-id=2

log_warnings=1

▪ Un-tar the data files that was copied from the master server and modify the

permissions.

# cd /var/lib/mysql

#/var/lib/mysql> tar -xvf panaces.tar

#/var/lib/mysql> chown –R mysql:root panaces;

#/var/lib/mysql> chown –R mysql:root advancedreporter;

#/var/lib/mysql> chown –R mysql:root pfr;

#/var/lib/mysql> chown mysql:mysql ibdata1

IBM Resiliency Orchestration Administrator’s Guide

#/var/lib/mysql> chown mysql:mysql ib_logfile*

▪ Restart the MySQL server.

# service mysql start

If master and slave mysql – have different passwords, then login using

master password, and change password to slave password using

command

set password for 'root'@'localhost'=password('slave mysql password');

▪ Log on to the MySQL server and execute the following command to start the

replication.

mysql> change master to master_host=<'IP address of master'>,

-> master_user='root', master_password=<'slave mysql password'>,

-> master_log_file=<'file name noted down in step 1'>,

-> master_log_pos=<position noted down in step 1>;

mysql> start slave;

▪ Check the status by issuing the following command.

mysql> show slave status;

# Grant access to mysql from the master server for monitoring the

replication

mysql> grant all on *.* to root@<IP address of master>

-> identified by < ‘slave mysql password’>;

IBM Resiliency Orchestration server running remote Agents

1. Install PFR on both the Resiliency Orchestration Servers.

2. Create a fileset using PFR GUI to replicate the remote agent configuration and

scripts

i. Fileset Name: DRMHA

ii. Source IP : Master Resiliency Orchestration Server

iii. Target IP : Slave Resiliency Orchestration Server

iv. Replication Interval: Recommended is 30 minutes.

v. Symbolic link option: Replicate symbolic link only

vi. Setup source and targets

a. Source Dir/File : $EAMSROOT /remote (on Master IBM Resiliency

Orchestration)

b. Target Dir/File: $EAMSROOT/remote (on Slave IBM Resiliency

Orchestration)

c. Source Dir/File : $EAMSROOT /work (on Master IBM Resiliency

Orchestration)

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

d. Target Dir/File : $EAMSROOT/work (on Slave IBM Resiliency

Orchestration)

Note:

If any other directories are used to keep custom

developed/customer scripts those have to be added to the

replication source and target.

3. Enable Replication: Enable

4. Exclude the libraries and log directories from replication

a.Exclude var directory

i. Source Folder: $EAMSROOT/remote

ii. File/Folder: var

iii. Select Directory

iv. Select case sensitive

v. Select recursive

b. Exclude mssql directory

i. Source Folder: $EAMSROOT/remote

ii. File/Folder: mssql

iii. Select Directory

iv. Select case sensitive

c. Exclude oracle directory

i. Source Folder: $EAMSROOT/remote

ii. File/Folder: oracle

iii. Select Directory

iv. Select case sensitive

5. Sync Delete Files: Uncheck

6. Synchronization: Uncheck

7. Large File Support: Uncheck

8. After Fileset creation, start PFR on Master and Slave Resiliency Orchestration.

9. Replication can be monitored using PFR GUI

Replication User Password Change

1. Master password got changed:

IBM Resiliency Orchestration Administrator’s Guide

Execute the following SQL on slave:

stop slave

change master to master_password='<new-master-password>';

grant all on *.* to root@<IP address of master>

-> identified by < ‘slave mysql password’>;

start slave

2. Slave Password got changed:

Execute the following SQL on master:

grant replication slave on *.* to root@<IP address of slave>

-> identified by <’slave mysql password’>;

GRANT FILE ON *.* TO

<slave-user>@<slave-ip-address> IDENTIFIED BY '<new-slave-password>';

3. Both the passwords changed:

i. Follow (1)

ii. Follow (2)

Preferably, you can also reset the system and start the replication all-over again.

Following are the steps to perform the action.

i. Execute 'stop slave' on slave m/c.

ii. Execute 'reset slave' on slave m/c.

iii. Execute 'reset master' on master m/c.

Note:

▪ If the user(s)/password(s) of IBM Resiliency Orchestration Databases

(panaces, pfr, advancedreporter) are changed on MasterServer then ensure

that the same is configured on Slave Server Installation. Refer to Installation

Guide ("Configuring IBM Resiliency Orchestration Server section") for how to

configured user/password for IBM Resiliency Orchestration Databases.

▪ This deletes the binlog files generated at master and not yet applied on slave

m/c.

4. Use the HA setup document to setup high availability again.

Clean and Reset the panaces MariaDB database on Slave server

Follow these steps to clean/reset the IBM Resiliency Orchestration metadata on the

slave server before establishing communication between the two servers. These

commands should be executed on the IBM Resiliency Orchestration slave server.

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

# mysql –u root –p

mysql> stop slave;

mysql> reset slave;

mysql> drop database panaces;

mysql> drop database advancedreporter;

mysql> drop database pfr;

mysql> exit

# mysqladmin -u root –p shutdown

# cd /var/lib/mysql

# /var/lib/mysql> rm ib* *relay*

Note:

Restart the slave server after clearing the IBM Resiliency Orchestration metadata by

executing following command:

# service mysql start

Script Design

MySQL replication works in a Master-Slave mode where a server acts as master,

while one or more servers act as slaves. The script design of the preliminary

configuration, master server configuration and the slave server configuration for

MySQL are listed below.

Prerequisites

▪ The IBMHAConfiguration folder should be copied to $EAMSROOT/ only. The

folder contains the following information:

1. mastercnf/ my.cnf

2. slavecnf/ my.cnf

3. validate_master_slave.sh

4. master.sh

5. slave.sh

6. resetmysqlonslave.sh

▪ Log in as a root user.

▪ Create MySQL users for the master and the slave hosts in mysql.user tables of

both the servers, with all privileges. This is required to validate both the MySQL

servers, locally and remotely.

IBM Resiliency Orchestration Administrator’s Guide

▪ Configure PanacesAgentGeneric.cfg file in $EAMSROOT/installconfig of both the

servers.

Note:

When each script is executed, a common log file called Metadata_Replication_Log.log

is generated and its execution details will be logged into this log file. If the log file

already exists, then the logs will be appended here.

validate_master_slave.sh (Execution of this script is optional. If the user wants to

check the validity of the given input, this script can be used. Although, this script is

being internally called by master.sh and slave.sh)

▪ Reads input in the following order and validates according to the input given:

./validate_master_slave.sh --master <master_ip> [--muser

<master_mysql_username] [--mpwd <master_mysql_pwd] [--mport

<master_mysql_port>] --slave <slave_ip> [--suser <slave_mysql_user>]

[--spwd <slave_mysql_pwd>] [--sport <slave_mysql_port>] [--help]

For example: ./validate_master_slave.sh --master

192.168.1.5 --muser root --mpwd IBM --slave 172.168.1.5 -

-suser root --sport 3308

▪ Master IP and slave IP are mandatory. Rest are optional.

▪ If invalid or no arguments are given, the application will display help

content and exit

▪ Reads all the input given by the user. If the MySQL usernames are not

provided, then the default username will be taken as “root”.

master.sh

▪ Reads input in the following order, then validates and executes according to

the input given:

./master.sh --master <master_ip> [--muser <master_mysql_username] [--

mpwd <master_mysql_pwd] [--mport <master_mysql_port>] --slave

<slave_ip> [--suser <slave_mysql_user>] [--spwd <slave_mysql_pwd>] [-

-sport <slave_mysql_port>] [--mysqlcnf_loc <location_of_my.cnf>] [--

lic_small/--lic_medium/--lic_large] [--help]

For ex: ./master.sh --master 192.168.1.5 --muser root --

mpwd IBM --slave 172.168.1.5 --sport 3308

• If the panaces server is running, then the script will request the user

to stop the panaces server and try again.

• This script calls validate_master_slave.sh with the provided

arguments.

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

• If invalid or no arguments are provided, then the application will

display the help content and exit.

• If the MySQL username is not provided, then the default username

will be taken as “root”.

• If the validation is unsuccessful, then the application will exit.

• If the location of my.cnf is not specified, then the default location will

be taken as /etc.

1. Logs in to MySQL and runs the following commands depending upon the

password is empty or not:

grant replication slave on *.* to slave-mysql-user@<IP address of slave>

identified by <’slave mysql password’>; grant all on *.* to slave-mysql-

user@<IP address of slave> identified by < ‘slave mysql password’>; flush

tables with read lock; show master status;

2. If the above set of commands fail to execute, the application will exit.

3. Currently, the user needs to note down the Master Log File (default value=””)

and Master Log Pos (default value=4) values.

4. Shuts down MySQL service.

5. Runs the following commands –

cd /var/lib/mysql

If advancedreporter exists:

tar -cvf panaces.tar panaces advancedreporter pfr mysql ibdata1

ib_logfile*

If advancedreporter does not exist:

tar -cvf panaces.tar panaces pfr mysql ibdata1 ib_logfile*

6. If any of the above set of commands fail to execute, the application will exit

7. The script starts the MySQL service automatically. If the service fails to start,

then the user will be prompted to start manually. The user will also be

prompted to copy the panaces.tar file to slave’s datadir and to start panaces

server.

slave.sh

▪ Reads input in the following order, then validates and executes according to

the input given:

./slave.sh --master <master_ip> [--muser <master_mysql_username] [--

mpwd <master_mysql_pwd] [--mport <master_mysql_port>] --slave

<slave_ip> [--suser <slave_mysql_user>] [--spwd <slave_mysql_pwd>] [-

-sport <slave_mysql_port>] [--mysqlcnf_loc <location_of_my.cnf>] [--

lic_small/--lic_medium/--lic_large] [--m_log_file <master_log_file>]

[--m_log_pos <master_log_pos>] [--help]

IBM Resiliency Orchestration Administrator’s Guide

For example: ./slave.sh --master 192.168.1.5 --muser root --

mpwd IBM --slave 172.168.1.5 --sport 3308

• If the panaces server is running, then the script will request the user

to stop the panaces server and try again.

• This script calls validate_master_slave.sh with the provided

arguments.

• If invalid or no arguments are provided, then the application will

display the help content and exit.

• If the MySQL username is not provided, then the default username

will be taken as “root”.

• If validation is unsuccessful, then the application will exit.

• If the location of my.cnf is not specified, then the default location will

be taken as /etc.

• If only one of the following file have default value, then the

application will exit. Both the files should have either the default

values or the user defined values. The execution will fail, if the

correct combination values of following is not provided.

o Master_Log_File

o Master_Log_Pos

• If the MySQL service is running, application will shut down the

service.

• Un-tars the copied panaces.tar in the mentioned directories and

modifies the permissions of the tar contents.

• If un-tarring is not successful, then the application will exit.

1. Executes the following set of commands-

cd $datadir

$datadir> tar -xvf panaces.tar

$datadir> chown –R mysql:root panaces;

If advancedreporter exists:

$datadir> chown –R mysql:root advancedreporter;

$datadir> chown –R mysql:root pfr;

$datadir> chown mysql:mysql ibdata1

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

$datadir> chown mysql:mysql ib_logfile*

2. If any of the above commands fail to execute, then the application will exit.

3. The script starts MySQL service automatically. If MySQL service doesn’t start

successfully, then the application will exit.

4. If the master and the slave MySQL passwords are different, then the

application logs in using the master’s password and then change the password

to slave's password.

5. Logs in to MySQL server and executes the following commands, depending

upon the mysql passwords are given or not:

change master to master_host=<'IP address of master'>,

master_user='master-mysql-user', master_password=<'slave mysql

password'>, master_log_file=<'file name noted down in step 1'>,

master_log_pos=<position noted down in step 1>; start slave; show slave

status; grant all on *.* to root@<IP address of master> identified by <

‘slave mysql password’>;

6. If any of the above commands fail to execute, then the application will exit.

resetmysqlonslave.sh

▪ Reads input in the following order, then validates and executes according to

the input given:

./resetmysqlonslave.sh [--user <slave_mysql_user>] [--pwd

<slave_mysql_pwd>] [--port <slave_mysql_port>]

For example: ./resetmysqlonslave.sh

• If the MySQL username is not provided, then the default username

will be taken as “root”.

• The application will login to MySQL server and execute the following

set of commands:

stop slave;

reset slave;

drop database panaces;

If advancedreporter exists:

drop database advancedreporter;

drop database pfr;

• After logging out of MySQL server, the script will run the following

commands:

mysqladmin -u <slave-mysqluser> [–p<slave-mysqlpwd>] [-P

<slave_mysql_port>] shutdown

cd /var/lib/mysql

/var/lib/mysql> rm ib* *relay*

IBM Resiliency Orchestration Administrator’s Guide

• Starts the MySQL service automatically. If the service fails to start,

then the user will be prompted to start manually.

Backup

About Backup and Restore Mechanisms

Backup Mechanism

Backup mechanism is a procedure using which backup of configured data is taken on

a configured server.

Restore Mechanism

Restore mechanism is a procedure using which backup of configured data is

performed on a configured server.

IBM Resiliency Orchestration supports following backup and restore mechanisms:

Backup Mechanism Restore

Mechanism

When to use?

IBM Resiliency

Orchestration

Internal Backup

IBM Resiliency

Orchestration

Internal Restore

Select this

mechanism to take a

full backup or restore

of the configured

database with the

help of IBM

Resiliency

Orchestration.

Backup using user

supplied Command

Restore using user

supplied Command

Select this

mechanism to

provide your own

backup or restore

commands to

perform a full backup

or restore of the

configured database.

External backup External restore Select this

mechanism to

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

Backup Mechanism Restore

Mechanism

When to use?

mechanism mechanism perform a full backup

or restore of the

configured database

with the help of the

third party backup or

restore software.

You can configure the backup and restore mechanisms during NormalFullCopy and

Fallback operations configuration.

Backup Manager

IBM Resiliency Orchestration Backup Manager provides the protection mechanism for

server Metadata, which contains all the sever configuration information. Backup

Manager provides online backup of the metadata automatically using a pre-

configured schedule. In addition, on demand backup of the metadata can be done

manually by clicking Backup Now button on the Backup Manager page. Ensure that

the Backup is configured before taking the backup. All the backup copies go to a pre-

configured location on the server. Thus Backup Manager reduces the unplanned

downtime for IBM Resiliency Orchestration Server by recovering from the latest copy

of metadata.

Click IBM Resiliency Orchestration Server User Role Management to see the

privileges.

Backup Manager Configuration

IBM Resiliency Orchestration supports the following backup configurations and must

be configured before taking any backup.

To configure the backup, perform the following:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Backup Summary and click

Go to Backup. The Backup Manager page appears.

2. In the right pane, under Configure Backup provide information for the

following:

Field Description

Destination path Provide the location of the backup file to be

IBM Resiliency Orchestration Administrator’s Guide

saved.

Backup at Select the time slot (24 hrs time scale) of

backup from the drop-down list.

Frequency There are two types of frequency backup:

▪ Daily – Backup is fired daily at a

configured time in Backup At field.

For example, if the configured time is

15:00 hrs, then the backup is taken at

15.00 hrs everyday.

▪ Weekly – In this case backup is fired

weekly on the mentioned day at a

specified time. For example, if the day

mentioned is Sunday, and the time of

backup is 15.00 hrs, then on every

Sunday the files are backed up at

15.00 hrs.

Active Copies This displays the number of active copies and

about the availability of number of latest

generated backup copies in that path.

3. Click Save to save the backup details.

Listing Backup Manager Information:

To view the configured backup information, perform the following steps:

1. Click Admin on the navigation bar. The IBM Resiliency Orchestration

Administration page appears. Scroll down to the Backup Summary and click

Go to Backup. The Backup Manager page appears.

2. This page provides the configured backup information (refer to the above table)

along with the following additional details of the backup file:

▪ Backup Destination Path

▪ Frequency of Backup

▪ Frequency of Backup Day

▪ Scheduled Backup time

▪ Number of Active Copies

▪ Size of Backup in Kb

▪ Time of Last Backup

▪ Backup File name

High Availability of IBM Resiliency Orchestration Server

© Copyright IBM Corp. 2017

IBM Resiliency Orchestration backup software supports online backup, which is

independent of the backup schedule.

Server Memory Management

Depending on the expected number of groups that will be supported by IBM

Resiliency Orchestration Software, Java maximum heap memory limit parameter

needs to be specified. It is defined in the variable named DRM_SERVER_JVM_MEM

which is located at starting lines of IBM Resiliency Orchestration startup script DRM

Install root/bin/panaces. Default value of this variable is set to -Xmx256m.

Following are the recommended values:

▪ No change is required for less than 20 groups.

▪ Configuration with more than 20 groups but less than 50: -Xmx512m is

recommended.

▪ Configuration with more than 50 groups but less than 100: -Xmx1024m is

recommended.

▪ Configuration with more than 100 groups: -Xmx2048m is recommended.

Note:

You must stop IBM Resiliency Orchestration server before trying to edit this setting.

Restart the server after the setting is done.

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corp. 2017

Interoperability Matrix

IBM Resiliency Orchestration Monitoring

Normal Monitoring

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

MSSQL Logs with

PFR

Yes Yes Yes Yes

MSSQL Logs with Log Shipping

Yes Yes Yes Yes

MSSQL Logs with NetApp Snap Mirror

Yes Yes Yes Yes

Oracle Archive Logs with PFR

Yes Yes Yes Yes

Oracle Archive Logs with DataGuard

Yes Yes Yes Yes

Oracle Archive Logs with NetApp Snap Mirror

Yes Yes Yes Yes

Oracle Archive Logs with Hitachi

Yes Yes Yes Yes

Interoperability Matrix

© Copyright IBM Corp. 2017

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

Replication

Oracle RAC Archive Logs with PFR

Yes Yes Yes Yes

Oracle RAC Archive Logs with

DataGuard

Yes Yes Yes Yes

Oracle RAC Archive Logs with Hitachi Replication

Yes Yes Yes Yes

Oracle Full Database with Hitachi Replication

Yes Yes Yes Yes

Sybase Logs with PFR

Yes Yes Yes Yes

Sybase ASE with Sybase Replication Server

Yes Yes Yes Yes

Sybase Logs with Hitachi Replication

Yes Yes Yes Yes

Application SubSystem with

PFR

Yes Yes Yes Yes

Application

SubSystem with

NetApp SnapMirror

Yes Yes Yes Yes

Application SubSystem with Hitachi Replication

Yes Yes Yes Yes

DR Solution with Other Replicator

Yes Yes Yes Yes

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

Sybase Logs with HP XP Replication

Yes Yes Yes Yes

Application SubSystem with HP XP Replication

Yes Yes Yes Yes

Oracle Archive Logs with HP XP Replication

Yes Yes Yes Yes

Oracle RAC Archive Logs with HP XP Replication

Yes Yes Yes Yes

Oracle Full Database with HP XP Replication

Yes Yes Yes Yes

Oracle RAC Full Database with HP XP Replication

Yes Yes Yes Yes

Oracle Full Database with EMC SRDF Replication

Yes Yes Yes Yes

Oracle RAC Full Database with EMC SRDF Replication

Yes Yes Yes Yes

Application

SubSystem with EMC SRDF Replication

Yes Yes Yes Yes

PostgreSQL with SR

Yes Yes Yes Yes

Oracle Full Database with IBM Global Mirror

Yes Yes Yes Yes

Interoperability Matrix

© Copyright IBM Corp. 2017

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

Replication

Application SubSystem with IBM Global Mirror

Replication

Yes Yes Yes Yes

MySQL Solution using SR

Yes Yes Yes Yes

MS Exchange Solution

Yes Yes Yes Yes

MSSQL Mirroring Yes Yes Yes Yes

IBM Resiliency Orchestration Administrator’s Guide

Reverse Monitoring

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

MSSQL Logs with PFR

Yes Yes Yes Yes

MSSQL Logs with Log Shipping

Yes Yes Yes Yes

MSSQL Logs with NetApp Snap Mirror

Yes Yes Yes Yes

Oracle Archive Logs with PFR

Yes Yes Yes Yes

Oracle Archive Logs with DataGuard

Yes Yes Yes Yes

Oracle Archive Logs with NetApp Snap Mirror

Yes Yes Yes Yes

Oracle Archive Logs with Hitachi Replication

Yes Yes Yes Yes

Oracle RAC Archive Logs with PFR

Yes Yes Yes Yes

Oracle RAC Archive Logs with

DataGuard

Yes Yes Yes Yes

Oracle RAC Archive Logs with Hitachi

Replication

Yes Yes Yes Yes

Oracle Full Database with Hitachi Replication

No Yes No Yes

Interoperability Matrix

© Copyright IBM Corp. 2017

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

Sybase Logs with PFR

No Yes No Yes

Sybase ASE with Sybase Replication Server

No Yes No Yes

Sybase Logs with Hitachi Replication

No Yes No Yes

Application SubSystem with PFR

Yes Yes Yes Yes

Application SubSystem with NetApp SnapMirror

Yes Yes Yes Yes

Application

SubSystem with Hitachi Replication

Yes Yes Yes Yes

DR Solution with Other Replicator

Yes Yes Yes Yes

Sybase Logs with HP XP Replication

No Yes No Yes

Application SubSystem with HP XP Replication

Yes Yes Yes Yes

Oracle Archive Logs with HP XP Replication

Yes Yes Yes Yes

Oracle RAC Archive Logs with HP XP Replication

Yes Yes Yes Yes

Oracle Full Database with HP

No Yes No Yes

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by

IBM Resiliency

Orchestration

Continuity

Monitoring

Health

Monitoring

RPO/RTO

Monitoring

Replication

Monitoring

XP Replication

Oracle RAC Full Database with HP XP Replication

No Yes No Yes

Oracle Full

Database with EMC SRDF Replication

No Yes No Yes

Oracle RAC Full Database with EMC SRDF Replication

No Yes No Yes

Application SubSystem with EMC SRDF Replication

Yes Yes Yes Yes

PostgreSQL with

SR Yes Yes Yes Yes

Oracle Full Database with IBM Global Mirror Replication

No Yes No Yes

Application SubSystem with IBM Global Mirror Replication

Yes Yes Yes Yes

MySQL Solution

using SR Yes Yes Yes Yes

MS Exchange Solution

Yes Yes Yes Yes

MSSQL Mirroring Yes Yes Yes Yes

Interoperability Matrix

© Copyright IBM Corp. 2017

Note:

Reverse Monitoring (monitoring while the Group is in Switchover Mode) is a licensed

feature. The Replication, Continuity and RPO Monitor features be allowed by the

product only if Reverse Monitoring is enabled. Contact IBM Service to enable this

feature.

However, Health Monitoring even though is a Reverse Monitoring feature, is not

licensed, as this is required to ensure the successful execution of Switchback

workflow.

IBM Resiliency Orchestration Recovery

Automation

Normal Management

DR Solutions

Supported by

IBM Resiliency

Orchestration

Replication

Start/Stop

NormalCopy Failover

MSSQL Logs with

PFR

Yes Prepackaged workflow Prepackaged

workflow

MSSQL Logs with Log Shipping

Yes Not Required Prepackaged workflow

MSSQL Logs with NetApp Snap Mirror

Yes Not Required Prepackaged workflow

Oracle Archive Logs with PFR

Yes Prepackaged xml workflow

Prepackaged xml workflow

Oracle Archive Logs with DataGuard

Yes Not Required Prepackaged xml workflow

Oracle Archive logs with NetApp Snap Mirror

Yes Not Required Prepackaged workflow

Oracle Archive Logs with Hitachi

Yes Sample workflow Sample workflow

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by

IBM Resiliency

Orchestration

Replication

Start/Stop

NormalCopy Failover

Replication

Oracle RAC Archive Logs with PFR

Yes Workflow not Prepackaged

Workflow not Prepackaged

Oracle RAC

Archive Logs with DataGuard

Yes Not Required Prepackaged xml

workflow

Oracle RAC Archive Logs with Hitachi Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Oracle Full Database with Hitachi

Replication

Yes Not Required Sample workflow

Sybase Logs with PFR

Yes Prepackaged workflow Prepackaged workflow

Sybase ASE with Sybase Replication Server

No Not Required Workflow not Prepackaged

Sybase Logs with Hitachi Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Application SubSystem with

PFR

Yes Prepackaged workflow Prepackaged workflow

Application SubSystem with NetApp Snap Mirror

Yes Prepackaged workflow Prepackaged workflow

Application SubSystem with Hitachi

Yes Not Required Workflow not Prepackaged

Interoperability Matrix

© Copyright IBM Corp. 2017

DR Solutions

Supported by

IBM Resiliency

Orchestration

Replication

Start/Stop

NormalCopy Failover

Replication

DR Solution with Other Replicator

Yes Workflow not Prepackaged

Workflow not Prepackaged

Sybase Logs with HP XP Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Application SubSystem with HP XP Replication

Yes Not Required Workflow not Prepackaged

Oracle Archive Logs with HP XP Replication

Yes Sample workflow Sample workflow

Oracle RAC Archive Logs with HP XP Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Oracle Full Database with HP XP Replication

Yes Not Required Sample workflow

Oracle RAC Full Database with HP XP Replication

Yes Not Required Sample workflow

Oracle Full Database with EMC SRDF Replication

Yes Not Required Prepackaged workflow

Oracle RAC Full Database with EMC SRDF Replication

Yes Not Required Prepackaged workflow

Application SubSystem with EMC SRDF Replication

Yes Not Required Workflow not prepackaged

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by

IBM Resiliency

Orchestration

Replication

Start/Stop

NormalCopy Failover

PostgreSQL with SR

No Not Required Prepackaged workflow

Oracle Full Database with IBM Global Mirror Replication

Yes Not Required Prepackaged workflow

Application SubSystem with IBM Global Mirror Replication

Yes Not Required Workflow not prepackaged

MySQL Solution using SR

Yes Not Required Prepackaged xml workflow

MS Exchange Solution

Yes Not Required Workflow not Prepackaged

MSSQL Mirroring Yes Not Required Workflow not Prepackaged

Terminology

1. Prepackaged workflow: Workflow is preloaded when the group is created.

Workflow is readily available for the user to execute/initiate.

2. Prepackaged xml workflow: Workflow is provided as XML and can be

imported into the group.

3. Sample workflow: Sample workflow is available in XML format and can be

imported into the group after doing necessary changes to the XML as the case

may be.

4. Not Required: No workflow is required.

5. Workflow not Prepackaged: Workflow is not available in the product.

Placeholder for the workflow is readily available. It is upto the user to

create/define the workflow either by using RAL library or XML import.

Interoperability Matrix

© Copyright IBM Corp. 2017

Reverse Management

DR Solutions

Supported by

IBM

Resiliency

Orchestration

Replication

Start/Stop

Reverse

NormalCopy

Failover

MSSQL Logs with PFR

Yes Prepackaged workflow Workflow not Prepackaged

MSSQL Logs with

Log Shipping Yes Not Required Workflow not

Prepackaged

MSSQL Logs with NetApp Snap Mirror

Yes Not Required Prepackaged workflow

Oracle Archive Logs with PFR

Yes Prepackaged xml workflow

Workflow not Prepackaged

Oracle Archive Logs with DataGuard

Yes Not Required Workflow not Prepackaged

Oracle Archive Logs with DataGuard

Yes Not Required Prepackaged xml workflow

Oracle Archive Logs with Hitachi Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Oracle RAC Archive Logs with PFR

Yes Workflow not Prepackaged

Workflow not Prepackaged

Oracle RAC Archive Logs with DataGuard

Yes Not Required Workflow not Prepackaged

Oracle RAC Archive Logs with Hitachi Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by

IBM

Resiliency

Orchestration

Replication

Start/Stop

Reverse

NormalCopy

Failover

Oracle Full Database with Hitachi Replication

Yes Not Required Workflow not Prepackaged

Sybase Logs with

PFR

Yes Workflow not

Prepackaged

Workflow not

Prepackaged

Sybase ASE with Sybase

Replication Server

No Workflow not Prepackaged

Workflow not Prepackaged

Sybase Logs with Hitachi Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Application SubSystem with

PFR

Yes Prepackaged workflow Workflow not Prepackaged

Application SubSystem with

Hitachi Replication

Yes Not Required Workflow not Prepackaged

DR Solution with Other Replicator

Yes Workflow not Prepackaged

Workflow not Prepackaged

Sybase Logs with

HP XP Replication

Yes Workflow not

Prepackaged

Workflow not

Prepackaged

Application SubSystem with HP XP Replication

Yes Not Required Workflow not Prepackaged

Oracle Archive Logs with HP XP Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Interoperability Matrix

© Copyright IBM Corp. 2017

DR Solutions

Supported by

IBM

Resiliency

Orchestration

Replication

Start/Stop

Reverse

NormalCopy

Failover

Oracle RAC Archive Logs with HP XP Replication

Yes Workflow not Prepackaged

Workflow not Prepackaged

Oracle Full Database with HP

XP Replication

Yes Not Required Workflow not Prepackaged

Oracle RAC Full Database with HP

XP Replication

Yes Not Required Workflow not Prepackaged

Oracle Full Database with

EMC SRDF Replication

Yes Not Required Prepackaged workflow

Oracle RAC Full Database with

EMC SRDF Replication

Yes Not Required Prepackaged workflow

Application SubSystem with EMC SRDF Replication

Yes Not Required Workflow not Prepackaged

PostgreSQL with SR

No Not Required Workflow not Prepackaged

Oracle Full Database with

IBM Global Mirror Replication

Yes Not Required Workflow not Prepackaged

Application SubSystem with IBM Global Mirror Replication

Yes Not Required Workflow not Prepackaged

MySQL Solution Yes Not Required Workflow not

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by

IBM

Resiliency

Orchestration

Replication

Start/Stop

Reverse

NormalCopy

Failover

using SR Prepackaged

MS Exchange Solution

Yes Not Required Workflow not Prepackaged

MSSQL Mirroring Yes Not Required Workflow not

Prepackaged

Terminology

1. Prepackaged workflow: Workflow is preloaded when the group is created.

Workflow is readily available for the user to execute/initiate.

2. Prepackaged xml workflow: Workflow is provided as XML and can be

imported into the group.

3. Sample workflow: Sample workflow is available in XML format and can be

imported into the group after doing necessary changes to the XML as the case

may be.

4. Not Required: No workflow is required.

5. Workflow not Prepackaged: Workflow is not available in the product.

Placeholder for the workflow is readily available. It is upto the user to

create/define the workflow either by using RAL library or XML import.

Interoperability Matrix

© Copyright IBM Corp. 2017

IBM Resiliency Orchestration Test Exercises

Switchover/Switchback

DR Solutions

Supported by IBM

Resiliency

Orchestration

Switchover Switchback

MSSQL Logs with PFR Prepackaged xml workflow

Prepackaged xml workflow

MSSQL Logs with Log Shipping

Prepackaged xml workflow

Prepackaged xml workflow

MSSQL Logs with NetApp Snap Mirror

Prepackaged xml workflow

Prepackaged xml workflow

Oracle Archive Logs with PFR

Prepackaged xml workflow

Prepackaged xml workflow

Oracle Archive Logs with DataGuard

Prepackaged xml workflow

Prepackaged xml workflow

Oracle Archive Logs with NetApp Snap Mirror

Prepackaged xml workflow

Prepackaged xml workflow

Oracle Archive Logs with Hitachi Replication

Sample workflow Sample workflow

Oracle RAC Archive Logs with PFR

Workflow not Prepackaged

Workflow not Prepackaged

Oracle RAC Archive Logs with DataGuard

Prepackaged xml workflow

Prepackaged xml workflow

Oracle RAC Archive Logs with Hitachi Replication

Workflow not Prepackaged

Workflow not Prepackaged

Oracle Full Database with Hitachi Replication

Sample workflow Sample workflow

Sybase Logs with PFR Sample workflow Sample workflow

IBM Resiliency Orchestration Administrator’s Guide

DR Solutions

Supported by IBM

Resiliency

Orchestration

Switchover Switchback

Sybase ASE with Sybase Replication Server

Workflow not Prepackaged

Workflow not Prepackaged

Sybase Logs with Hitachi Replication

Workflow not Prepackaged

Workflow not Prepackaged

Application SubSystem with

PFR

Prepackaged workflow Prepackaged workflow

Application SubSystem with NetApp SnapMirror

Prepackaged workflow Prepackaged workflow

Application SubSystem with Hitachi Replication

Workflow not Prepackaged

Workflow not Prepackaged

DR Solution with Other Replicator

Workflow not Prepackaged

Workflow not Prepackaged

Sybase Logs with HP XP

Replication

Workflow not

Prepackaged

Workflow not

Prepackaged

Application SubSystem with HP XP Replication

Workflow not Prepackaged

Workflow not Prepackaged

Oracle Archive Logs with HP XP Replication

Sample workflow Sample workflow

Oracle RAC Archive Logs with HP XP Replication

Workflow not Prepackaged

Workflow not Prepackaged

Oracle Full Database with

HP XP Replication

Sample workflow Sample workflow

Oracle RAC Full Database with HP XP Replication

Sample workflow Sample workflow

Oracle Full Database with EMC SRDF Replication

Prepackaged xml workflow

Prepackaged xml workflow

Oracle RAC Full Database Prepackaged xml Prepackaged xml

Interoperability Matrix

© Copyright IBM Corp. 2017

DR Solutions

Supported by IBM

Resiliency

Orchestration

Switchover Switchback

with EMC SRDF Replication workflow workflow

Application SubSystem with EMC SRDF Replication

Workflow not Prepackaged

Workflow not Prepackaged

PostgreSQL with SR Prepackaged workflow Prepackaged workflow

Oracle Full Database with IBM Global Mirror Replication

Prepackaged xml workflow

Prepackaged xml workflow

Application SubSystem with IBM Global Mirror Replication

Workflow not Prepackaged

Workflow not Prepackaged

MySQL Solution using SR Prepackaged xml workflow

Prepackaged xml workflow

MS Exchange Solution Workflow not

Prepackaged

Workflow not

Prepackaged

MSSQL Mirroring Workflow not Prepackaged

Workflow not Prepackaged

Terminology

1. Prepackaged workflow: Workflow is preloaded when the group is created.

Workflow is readily available for the user to execute/initiate.

2. Prepackaged xml workflow: Workflow is provided as XML and can be

imported into the group.

3. Sample workflow: Sample workflow is available in XML format and can be

imported into the group after doing necessary changes to the XML as the case

may be.

4. Not Required: No workflow is required.

5. Workflow not Prepackaged: Workflow is not available in the product.

Placeholder for the workflow is readily available. It is upto the user to

create/define the workflow either by using RAL library or XML import.

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corp. 2017

3rd Party Integration

3rd Party Integration

IBM can notify 3rd party applications using the following services:

Email Notification

Email Integrations allows you to send your data to third-party applications via Email.

To configure Email Notification click Configuring Email Server.

SMS Notification

SMS Integrations allows you to send your data to third-party applications via

SMS,refer to SMS Notification.

SNMP Notification

SNMP Integrations allows you to send your data to third-party applications via SNMP

trap through SNMP Notification. To configure SNMP Notification click Configuring

SNMP Trap Forwarder.

Web Service

Web service Integrations allow you to send your data to third-party applications via

Web service. Click Webservice.

3rd Party Integration

© Copyright IBM Corp. 2017

Web Service

Resiliency Orchestration–Web Service

ResiliencyOrchestration-WS is a RESTful web service module which provides a set of

APIs for third party applications to integrate with Resiliency Orchestration. After the

installation of the ResiliencyOrchestration-WS module the API can be accessed at

http//localhost:8080/cdrm-ws/. Following are the different types of APIs provided by

the Resiliency Orchestration-WS.

Subscriber Addition

This is used for adding a new subscriber into Resiliency Orchestration. Refer the API

<Link>

Subscriber Deletion

This WS API is used to remove a subscriber from Resiliency Orchestration. There are

different types of recursive & non-recursive removal available. Refer the API <Link>

Asset Creation

Asset creation API is used to create components in Resiliency Orchestration. Refer

the API <Link>

Asset Deletion

This is used for removing assets from Resiliency Orchestration. By providing the IP

address of the assets to be deleted this API can remove the assets from the

Resiliency Orchestration. Refer the API <Link>

CR Request

This API is used to intimate Resiliency Orchestration about a CR that is going to be

executed for a subscriber. The number of such CR requests can be fetched using the

usage API. Refer the API <Link>

Usage API

This can be used by the service provider for getting Resiliency Orchestration usage

information for a particular subscriber during a period of time. Refer the API <Link>.

IBM Resiliency Orchestration Administrator’s Guide

© Copyright IBM Corp. 2017

Glossary

This section maintains a glossary of all terms used by IBM Resiliency Orchestration

designers, developers, Quality Analyst and documentation. Please refer this section

for any clarifications regarding IBM Resiliency Orchestration related documentation.

Agent

It is a light weight IBM Resiliency Orchestration Software Component that runs on a

customer application server to manage a specific object (dataset, service, or

component).

Business Continuity Mode (BCM)

Represents the current state of an Availability Group whose data is protected. Typical

Modes are: Normal, Failover, and Fallback.

Business Continuity Solution (BCS)

A data management solution that provides the capability to protect the Production

Data of a Business Application at an Alternate Site (called DR site) during normal

conditions

In case of a disaster where the production site went down, provides the capability to

recover the application to as current data as possible on the Alternate Site within the

specified Recovery objectives.

BCS Module

It is a IBM Resiliency Orchestration Software Component that runs on the IBM

Resiliency Orchestration Master Server and provides Enterprise Continuity Solution

intelligence of different type of Solutions for a specific database or file-system.

Component

It is an infrastructure object such as a Windows Server that participates in a Disaster

Recovery Solution.

Current Primary Server

The database server functioning as a production server for time being is called

current primary or production server. The data gets replicated from this server to the

current DR server.

Current Primary Site

Glossary

© Copyright IBM Corp. 2017

The location of the current production server is called the current primary site.

Configured DR Server

The database server initially configured to store the backup of the data replicating

from the primary server is known as configured DR server. This server is located at a

different location and is also called as remote or secondary server.

Configured DR Site

The location of the configured DR server is called the configured DR site.

Current DR Server

The database server functioning as a DR server for time being is called current DR

server. This server backs up of the data replicated from the current primary server

and is located at a different location.

Current DR Site

The location of the current DR server is called the current DR site.

Recovery Group

Representation of a DR solution comprising of Datasets, Protection Scheme and

Components, inter-dependency of these along with other solution parameters of a

specified application (database). Typically Recovery Group is created for each

application whose data protection needs to be managed by IBM Resiliency

Orchestration.

Dataset

Indicates all related data that is the object of replication and/or management by IBM

Resiliency Orchestration. For example, for Oracle – data files, control files and

configuration files form the dataset.

Dependant Component object

A Component on which the Dataset associated to the Group under consideration is

based on is called dependant Component object.

Disaster Recovery Solution

A data management solution that provides the capability to protect the Production

Data of a Business Application at an Alternate Site (called DR site) during normal

conditions

In case of a disaster where the production site went down, provides the capability to

recover the application to as current data as possible from the data residing at the

Alternate Site, within a specified Recovery objectives.

DR (Remote) Site

A Site where a copy of the production data is transferred and maintained as a

backup copy is called DR site.

DR Server

The server residing on the remote site is called DR server. This server contains a

copy of the data (backup) of the production server. The DR server is referred as

remote server.

FIRST

IBM Resiliency Orchestration Administrator’s Guide

IBM Resiliency Orchestration provides the following feature, referred by an acronym

FIRST.

▪ F- Failover/Fallback (Continuity

▪ I - Event

▪ R – RPO/RTO

▪ S - Security (Data Protection)

▪ T - Test Exercises.

Failover operation

A BCM where the business is in the process of moving the Production to the DR site

or has moved to the DR site and executing production in the DR site. In this case,

the data protection no longer happens; only the DR site (current production) has the

latest data and the Primary site does not get updates. Starting BCM is ‘Normal’.

Fallback operation

A BCM where the business is in the process of moving Production from a DR site to

the Primary site. Starting BCM is “Failover”.

Group

Group constitutes Components, Datasets and Protection Schemes. In general group

refers to Recovery Group.

The group represents the data to the replicated (datasets), location of the data

(Component) and the mechanism used to replicate the data (Protection Scheme).

Event

A condition that leads to or causes disruption of continuous access to production

server, application or dataset.

Listener

When an instance starts, a network listener process establishes a communication

pathway to Oracle. When you process a request connection, the listener establishes

an appropriate connection.

Mounting

Associating the instance with a specific database is mounting a database

Oracle Instance

Combination of the memory called System Global Area and its associated Oracle

process is an Oracle Instance

IBM Resiliency Orchestration Master Server

It is a dedicated Server that runs the IBM Resiliency Orchestration Master software

and has the primary ownership of the entire DR infrastructure.

IBM Resiliency Orchestration Client

An end application or database server that runs one or multiple IBM Resiliency

Orchestration Agents.

Glossary

© Copyright IBM Corp. 2017

PFR

PFR - is an enterprise replication solution, embedded with EAMS product. This is used

to replicate data, make it available between nodes and protect against critical data

loss.

Primary Site

A location of the production database server.

Primary Server

The server with production database located on the primary site is called primary

server. This is also called as Production Server. The data replicates from the primary

server to the DR server.

Production Server

The server with production database is called the production server. This could be

either primary or DR server depending on BCO. During normal situations, the

production data resides at the primary server, hence the primary server is called the

production server.

Secondary Site

A location where a copy of the production data is transferred and maintained as a

backup copy is called Secondary Site.

Glossary

Asynchronous Replication

Under asynchronous replication, updates to the application on the Source server are

persistently queued to be forwarded to the Target server.

Archived Redo Log

Oracle allows you to save filled groups of online redo log files to one or more offline

destinations, known as the archived redo log.

Archiving

The process of turning online redo log files into archived redo log files is called

archiving. This process is only possible if the database is running in ARCHIVELOG

mode.

Configured Primary Server

The database server initially configured as primary (production) server. The data

volumes to be replicated reside on this server.

Configured Primary Site

The location of the configured primary server is called the configured primary site.

Current Primary Server

IBM Resiliency Orchestration Administrator’s Guide

The database server functioning as a production server for time being is called

current primary or production server. The data gets replicated from this server to the

current DR server.

Current Primary Site

The location of the current production server is called the current primary site.

Configured DR Server

The database server initially configured to store the backup of the data replicating

from the primary server is known as configured DR server. This server is located at a

different location and is also called as remote or secondary server.

Configured DR Site

The location of the configured DR server is called the configured DR site.

Current DR Server

The database server functioning as a DR server for time being is called current DR

server. This server backs up of the data replicated from the current primary server

and is located at a different location.

Current DR Site

The location of the current DR server is called the current DR site.

Cyclic Redundancy Check (CRC)

CRC is performed to check the consistency of data on two different machines,

especially used when transferring files from one location to another.

DR RVG

The Replicated Volume Group residing on the DR server is called DR RVG. This is also

referred as secondary RVG.

Online Redo Log

The online redo log file consists of two or more pre allocated files that store all

changes made to the database as they occur. Every instance of an Oracle database

has an associated online redo log to protect the database in case of an instance

failure.

Primary RVG

The Replicated Volume Group residing on the primary server is called primary RVG.

This is also referred as production RVG as primary server is known as production

server.

Source Server

The machine from which the data gets replicated is called source server. This is same

as the primary server. In replication tool (VVR) concept, the primary server is

referred as the source server

Synchronous Replication

Synchronous replication ensures that an update has been posted to the Target server

and acknowledged to the Source server before completing the update at the Source

server.

Glossary

© Copyright IBM Corp. 2017

For information on the following Oracle terms refer to the respective Oracle Guide.

▪ Control File

▪ Database Initialization File

▪ Data Volumes

▪ Password File

▪ Oracle SID

▪ Server Parameter File (SPFILE)

▪ Trace file

▪ udump

▪ cdump

▪ bdump

▪ Tablespace

Oracle’s auditing option

For information on the following VVR terms refer to the respective VERITAS Volume

Replicator Guide.

▪ Disk Group

▪ Storage Replicator Volume (SRL)

▪ Replicated Volume Group (RVG)

▪ RLINK

Target Server

The machine to which the data gets replicated from the source server is called target

server. The target server is placed at a different location and the data replicated is

maintained as a backup copy of the original data residing on the source server. The

target server is same as the DR server. In replication tool (VVR) concept, the DR

server is referred as the target server

Glossary

PIT data copy

IBM Resiliency Orchestration Administrator’s Guide

A fully usable copy of a dataset that contains an image of the data as it appeared at

a single point-in-time. The different types or implementations of Point-In-Time (PIT)

copy technology are Split Mirror, Changed Block, Concurrent, Clone, etc. The copy is

considered to have logically occurred at that point-in-time, but implementations may

perform part or all of the copy at other times as long as the result is a consistent

copy of the dataset as it appeared at that point-in-time.

Source Dataset

This is the dataset on the site that contains the Master or source image of the data.

This is the copy source for any of the PIT data copies that exist on the site.

Storage Volume

A storage volume is a LUN presented from a storage array. A storage volume is

based on physical media or a more complicated RAID configuration.

© Copyright IBM Corp. 2017

Pop-Ups

Operations Basic Advanced

Adding Drills Administrator and the Super Administrator have the privilege to create Drills.

Administrator and the Super Administrator have the privilege to create Drill. If Operator’s privilege is enhanced then, the Operator has the

privilege to create Drills.

Operations Basic Advanced

Adding Business Process

Administrator and the Super Administrator have the privilege to create Business Process.

Administrator and the Super Administrator have the privilege to create Business Process. If the

operator's role is enhanced then, operator has an additional privilege to create Business Process.

Operations Basic Advanced

Adding Management Service

Administrator and the Super Administrator have the privilege to add the management service.

Administrator and the Super Administrator

have the privilege to add the management

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

service.

Operations Basic Advanced

Adding Notification List

Administrator and the Super Administrator have the privilege to create Notification List.

Administrator and the Super Administrator has the privilege

to create Notification List.

Operations Basic Advanced

Adding Sites Administrator and the Super Administrator have the

privilege to create Sites.

Administrator and the Super

Administrator have the privilege to create Sites.

Operations Basic Advanced

Deleting Task Administrator and the Super Administrator have the privilege to delete a task.

Administrator and the Super Administrator have the

privilege to delete a task.

Operations Basic Advanced

Adding ADC Profile

Administrator and the Super Administrator have the privilege to add the adc profile.

Administrator and the Super Administrator have the privilege

to add the adc profile.

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Adding Users Super Administrator has the privilege to create Users.

NA.

Operations Basic Advanced

Adding UCS Director Administrator and the Super Administrator have the privilege to add UCS Director.

Administrator and the Super Administrator have the privilege to add UCS

Director.

Operations Basic Advanced

Adding UCS Director vDC Map

Administrator and the Super Administrator have the privilege to add UCS Director DR Map.

Administrator and the Super Administrator have the privilege to add UCS Director DR Map.

Operations Basic Advanced

Agent listing Operator, Administrator and Super Administrator have the privilege to read the details related to Agents.

Operator, Administrator and Super Administrator have the privilege to read the details related to Agents.

AWS agent

An AWS Agent helps in connecting AWS Server and is auto created when a management

service is created.

Below listed is the Event Configuration for an AWS agent:

Event ID Severity Description Impact

AWSAgentDownEvent CRITICAL AWS Agent is down

Resources Managed by AWS cannot be Managed/ Monitored

IBM Resiliency Orchestration Administrator’s Guide

Event ID Severity Description Impact

AWSAgentUPEvevnt CRITICAL AWS Agent is up Resources Managed by AWS are being Managed/ Monitored

AWSAuthFailEvent01 CRITICAL AWS Agent is inactive Cannot perform management/monitoring using Aws Agent

AWSAuthPassEvent INFO AWS Agent is active Can perform management/monitoring using Aws Agent

AWSAuthFailEvent INFO Authentication failed due to invalid/ incorrect password

Aws agent cannot monitor/ manage Server

AWSConnFailEvent CRITICAL Connection failed Aws agent cannot monitor/ manage Server

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Backup Manager Configuration

Administrator and the Super Administrator have the privilege to configure backup manager.

Administrator and the Super Administrator have the privilege to configure backup

manager.

Base workflow configuration

Field Description

GROUP NAME Displays the name of the Group

ACTIVE WORKFLOWS Displays the number of active workflows published

DRAFT

WORKFLOWS

Displays the number of workflows in save as a draft form.

Operations Basic Advanced

Changing Drills Mode

Administrator and the Super Administrator have

the privilege to create, read and edit, delete, execute and terminate Drills.

Administrator and the Super Administrator

have the privilege to create, read and edit, delete, execute and terminate Drills. If Operator’s role is enhanced then, Operator

has the privilege to create, read, edit and delete Drills.

Operations Basic Advanced

Configuration of Drills Administrator and the Super Administrator have the privilege to create, read and edit Drills.

Administrator and the Super Administrator have the privilege to create, read and edit

Drills. If the Operator’s role is enhanced then,

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Operator has the privilege to read, create and edit Drills.

Listing Organizations

Organizations are listed to bring contextual data published across all the IBM Resiliency

Orchestration pages. When an organization is selected, all the pages render only the groups

that belong to that particular Organization. By default, a 'Default' organization is created, any

group that will be created will belong to 'Default' Organization.

The Organization details are listed below:

NAME Description

ORGANIZATION ID Displays the Organization ID.

ORGANIZATION NAME Displays the Organization name configured with IBM Resiliency Orchestration.

DESCRIPTION Displays the description of the organization.

MANAGED GROUPS Displays the number of groups managed by the organization.

UNMANAGED GROUPS Displays the number of groups not managed by the organization.

CREATED SINCE Displays the Time stamp of the organization .

Operations Basic Advanced

Configuring Business process

Administrator and Super Administrator have the privilege to edit/update the Business Process.

Administrator and Super Administrator have the privilege to edit/update the Business Process. If the operator's role is enhanced then,

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

operator has an additional privilege to edit/update Business Process.

Operations Basic Advanced

Configuring

Event Policy

Administrator and Super

Administrator have the privilege update/edit and execute the event policy.

Administrator and

Super Administrator have the privilege update/edit and execute the event policy.

Operations Basic Advanced

Configuring Notification

Administrator and the Super Administrator have the privilege to update/edit the Notification.

Administrator and the Super Administrator have the privilege to update/edit the Notification List. If the

operator's role is enhanced then,

operator has an additional privilege to edit Notification.

Operations Basic Advanced

Configuring RPO/RTO

Administrator and Super Administrator have the privilege update/edit

RPO/RTO.

Administrator and Super Administrator

have the privilege update/edit

RPO/RTO. If the operator's role is enhanced then, operator has an additional

privilege to update/edit RPO/RTO.

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Configuring Notification

regarding Events

Administrator and the Super Administrator has the privilege to

update/edit the Notification .

Administrator and the Super Administrator has the

privilege to update/edit the Notification List. If the operator's role is enhanced then, operator has the additional privilege to edit Notification.

Operations Basic Advanced

Configuring WAN Agents

Administrator and the Super Administrator have the privilege to update/edit the

Agents.

Administrator and the Super Administrator have

the privilege to update/edit the Agents.

Flexi Functional Group

Flexi FG (Flexible Functional Group) is a feature with in Pumice which allows user to create

group without selecting any subsystem. Before the pumice version the user when creating

the group was asked to select all the subsystems (components, dataset & protection

scheme).

Currently the Flexi FG group are only supported for two Solution Signature and those are

1 VM Replication On Flexpod

2 Stateless application for AWS

As part of the feature only dataset masking has been provided were in when any of the

above solutions are selected the user need not select the dataset as part of group creation,

he will only have to provide components and protection scheme paring.

Operations Basic Advanced

Creating Groups

Administrator and the Super Administrator have the privilege to create

Groups.

Administrator and the Super Administrator

have the privilege to create Groups. If the operator's role is enhanced then, operator

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

has an additional privilege to create Groups.

Operations Basic Advanced

Creating Task Administrator and the Super Administrator have the privilege to

customize a task.

Administrator and the Super Administrator have the privilege to customize a task.

Operations Basic Advanced

Creating Credentials

Administrator and the Super Administrator has the

privilege to create credentials.

Administrator and the Super

Administrator has the privilege to create credentials.

Modifying Credentials

Administrator and the Super Administrator has the privilege to update/edit and execute the credentials.

Administrator and the Super Administrator has the privilege to update/edit and execute the credentials.

Deleting Credentials

Administrator and Super Administrator have the privilege to delete

credentials.

Administrator and Super Administrator have the privilege to

delete credentials.

View Credentials

Operator, Administrator and Super Administrator have

the privilege to view the Credentials.

Operator, Administrator and

Super Administrator have the privilege to view the Credentials.

Operations Basic Advanced

Deleting a Report Schedule

Administrator and the Super Administrator have the privilege to

Administrator and the Super Administrator have the privilege to delete Report

IBM Resiliency Orchestration Administrator’s Guide

delete Report Schedule. Schedule.

Operations Basic Advanced

Deleting Business Process

Administrator and the Super Administrator have the privilege to delete Business Process.

Administrator and the Super Administrator have the privilege to delete Business Process. If the operator's role is enhanced then,

operator has an

additional privilege to delete Business Process.

Operations Basic Advanced

Deleting Groups

Administrator and Super Administrator have the privilege to

delete Groups.

Administrator and Super Administrator have the privilege to

delete Groups. If the operator's role is enhanced then, operator has an

additional privilege to delete Groups.

Operations Basic Advanced

Deleting Management Service

Administrator and the Super Administrator have the privilege to delete the management service.

Administrator and the Super Administrator have the privilege to delete the management service.

Operations Basic Advanced

Deleting Notification List

Operator, Administrator and Super Administrator have the privilege to terminate the Notification List.

Operator, Administrator and Super Administrator have the privilege to terminate the Notification List.

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Deleting Sites

Administrator and Super Administrator have the privilege

to delete Sites.

Administrator and Super Administrator have the

privilege to delete Sites.

Operations Basic Advanced

Deleting Subsystems

Administrator and Super Administrator have the privilege to delete subsystems.

Administrator and Super Administrator have the privilege to delete subsystems.

Operations Basic Advanced

Deleting ADC Profile

Administrator and the Super Administrator have the privilege to delete the adc profile.

Administrator and the Super Administrator have the privilege to delete the adc profile.

IBM Resiliency Orchestration Administrator’s Guide

Discovering AWS Component

Component is an infrastructure object such as a Windows Server or WAN that participates in

a Disaster Recovery.

Click IBM Resiliency Orchestration Server User Role Management to see the .

To discover a new Component:

1. Click DISCOVER > Management Service on the navigation bar. The Management

Service page appears.

2. Click the Discover Details link.

a. From the Discover Instance tab > Select the AWS instance and click on Save VM

Details.

b. From the Discover Image tab> Provide the AWS image name, id and IP of the image and

click on Save Images.

3. Click DISCOVER > Subsystem on the navigation bar. The Subsystem page with the list

appears.

Operations Basic Advanced

Deleting Users Super Administrator has the privilege to delete Users.

NA

Operations Basic Advanced

Deleting UCS Director vDC Map for DR

Administrator and the Super Administrator have the privilege to delete the UCS Director vDC Map for DR.

Administrator and the Super Administrator have the privilege to delete theUCS Director vDC Map for DR.

Operations Basic Advanced

Deleting UCS Director DR Map

Administrator and the Super Administrator have the privilege to delete the

UCS Director DR Map.

Administrator and the Super Administrator have

the privilege to delete the UCS

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Director DR Map.

Operations Basic Advanced

Discovering Subsystems

Administrator and the Super Administrator have the privilege to create and update/edit the subsystem page.

Administrator and the Super Administrator have the privilege to create and

update/edit the

subsystem page.

Operations Basic Advanced

Deleting Task Administrator and the Super Administrator have the privilege to delete a task.

Administrator and the Super Administrator have the

privilege to delete a task.

Operations Basic Advanced

DR Manager Dashboard

Operator, Administrator and Super Administrator have the privilege to View the DR Manager Dashboard.

Operator, Administrator and Super Administrator have the privilege to View the DR Manager

Dashboard

Operations Basic Advanced

Editing the User

Preferences

Super Administrator has the

privilege to update/edit the Users.

Super Administrator

has the privilege to update/edit the Users.

Operations Basic Advanced

Editing Groups Administrator and the Super Administrator have

Administrator and the Super

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

the privilege to update/edit the Groups.

Administrator have the privilege to update/edit the Groups. If the operator's role is enhanced then,

operator has an additional privilege to update/edit Groups.

Operations Basic Advanced

Enabling / disabling for a Group

Administrator and Super Administrator has the privilege to enable/disable

group license.

Administrator and Super Administrator has the privilege to enable/disable

group license.

Operations Basic Advanced

Executing Business Continuity Operations:

• NormalFullCopy

• NormalCopy

• Reverse Copy

• Fallback

• Failover

• FallbackResync

Administrator and Super Administrator

have the privilege to read,

edit execute and terminate BCOs

Administrator and Super Administrator

have the privilege to read, edit

execute and terminate BCOs. If the Operator’s role is enhanced then, Operator has the privilege to read, create, edit,

delete, execute and terminate BCOs.

Operations Basic Advanced

Executing Drills Administrator and the Super Administrator have the privilege to execute

and terminate Drills.

Administrator and the Super Administrator has the privilege to

execute and terminate Drills.

Operations Basic Advanced

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Executing BCOs:

Switchover

Switchback

Administrator and Super Administrator have the

privilege to execute and terminate BCOs

Administrator and Super Administrator

have the privilege to execute and terminate BCOs. If the Operator role is enhanced then, Operator has the privilege to execute and terminate BCOs.

Operations Basic Advanced

Failover Administrator and Super Administrator has the privilege to read, edit execute and terminate BCOs

Administrator and Super Administrator has the privilege to read, edit execute and terminate BCOs. If the Operator role is enhanced then,

Operator has the privilege to read, create, edit, delete, execute and terminate BCOs.

Operations Basic Advanced

FallbackResync Administrator and Super Administrator has the privilege to read, edit execute and terminate BCOs

Administrator and Super Administrator has the privilege to read, edit execute and terminate

BCOs. If the Operator role is enhanced then, Operator has the privilege to read,

create, edit, delete, execute and

terminate BCOs.

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Generate User Reports Super Administrator has the privilege to generate user

reports.

Super Administrator has the privilege to generate user

reports.

Operations Basic Advanced

Group Dashboard Overview. Operator, Administrator and the Super Administrator have the privilege to view Group Dashboard.

Operator, Administrator and the Super Administrator have the privilege to view Group Dashboard.

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Group Maintenance Administrator and the Super Administrator have the privilege to maintain the Groups.

Administrator and the Super Administrator have the privilege to maintain the Groups. If the operator's role is enhanced then,

operator has an additional privilege to update/edit Groups.

Group Level configuration

Group levels are configured and listed based on the users priority.

Default Group Labels are listed as below:

ID LABEL

1 TYPE I

2 TYPE II

3 TYPE III

4 TYPE IV

1. Click Save, to save the lD and its group label.

Operations Basic Advanced

Listing Business Process schedule

Operator, Administrator and the Super Administrator have the privilege to view the details related to Business Process.

Operator, Administrator and the Super Administrator have the privilege to view the details related to Business Process.

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Listing Log Files Administrator and the Super Administrator have the privilege to read the log files.

Administrator and the Super Administrator have the privilege to read the log files.

Operations Basic Advanced

Listing Management Service Administrator and the Super

Administrator have the

privilege to read the details related to management service.

Administrator and the Super

Administrator have the

privilege to read the details related to management service.

Operations Basic Advanced

Listing Task Tthe Super Administrator, Administrator and the operator have the privilege to read a task.

Tthe Super Administrator, Administrator and the operator have the privilege to read a task.

Operations Basic Advanced

Listing ADC Profile Administrator and the Super Administrator have the privilege to read the details related to an adc profile.

Administrator and the Super Administrator have the privilege to read the details related to an adc profile.

Operations Basic Advanced

Listing Subsystem Operator, Administrator and Super Administrator have

the privilege to read details

related to Subsystem.

Operator, Administrator and Super Administrator have

the privilege to read details

related to Subsystem.

Operations Basic Advanced

Listing UCS Director Administrator and the Super Administrator have the privilege to read the details related to UCS Director.

Administrator and the Super Administrator have the privilege to read the details related to UCS Director.

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Listing UCS Director DR Map

Administrator and the Super Administrator have the privilege to read the UCS Director DR Map.

Administrator and the Super Administrator have the privilege to read the UCS Director DR Map.

Operations Basic Advanced

Listing Task Administrator and the Super Administrator have the

privilege to read a task.

Administrator and the Super Administrator have the

privilege to read a task..

Operations Basic Advanced

Managing Business Process Administrator and Super Administrator have the privilege to edit/update the Business Process.

Administrator and Super Administrator have the privilege to edit/update the Business Process. If the operator's role is enhanced then, operator has an additional privilege to edit/update the Business

Process.

Operations Basic Advanced

Modifying Management Service

Administrator and the Super Administrator have the privilege to update/edit the management service.

Administrator and the Super Administrator have the privilege to update/edit the management service .

Operations Basic Advanced

Modifying ADC Profile Administrator and the Super Administrator have the privilege to update/edit an

adc profile.

Administrator and the Super Administrator have the privilege to update/edit an

adc profile.

Operations Basic Advanced

Modifying Report Schedule Administrator and the Super Administrator has the privilege to Report

Administrator and the Super Administrator has the privilege to Report

IBM Resiliency Orchestration Administrator’s Guide

Schedule. Schedule.

Operations Basic Advanced

Modifying Notification List Administrator and the Super Administrator have the privilege to update/edit the Notification List.

Administrator and the Super Administrator have the privilege to update/edit the Notification List. If the

operator's role is enhanced

then, operator has an additional privilege to edit Notification.

Operations Basic Advanced

Modifying Sites Administrator and the Super Administrator have the

privilege to update/edit the Sites.

Administrator and the Super Administrator have the

privilege to update/edit the Sites.

Operations Basic Advanced

Modifying Subsystems Administrator and Super Administrator have the privilege to update/edit subsystems.

Administrator and Super Administrator have the privilege to update/edit subsystems.

Operations Basic Advanced

Modifying Users Super Administrator has the privilege to update/edit the Users.

NA

Operations Basic Advanced

Modifying UCS Director Privilege

Administrator and the Super Administrator have the privilege to update/edit the

Administrator and the Super Administrator have the privilege to update/edit the

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

UCS Director. UCS Director.

Operations Basic Advanced

Modifying Task Administrator and the Super Administrator have the privilege to edit/update a task.

Administrator and the Super Administrator have the privilege to edit/update a task.

Operations Basic Advanced

Monitoring Groups Operator, Administrator and the Super Administrator have the privilege to Monitor

Groups

Operator, Administrator and the Super Administrator have the privilege to Monitor

Groups

Operations Basic Advanced

NormalFullCopy Administrator and Super Administrator has the privilege to read, edit

execute and terminate BCOs

Administrator and Super Administrator has the privilege to read, edit

execute and terminate BCOs. If the Operator role is enhanced then, Operator has the privilege to read, create, edit, delete, execute and terminate BCOs.

Operations Basic Advanced

Operational Dashboard Operator, Administrator and Super Administrator have the privilege to View the Operational Dashboard.

Operator, Administrator and Super Administrator have the privilege to View the Operational Dashboard.

Operations Basic Advanced

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Group Details

Operator has the privilege to Read all the pages

including Admin tab. Administrator and the Super Administrator has the privilege to read, create, update/edit and delete group details.

Operator has the privilege to Read all the pages

including Admin tab. Administrator and the Super Administrator has the privilege to read, create, update/edit and delete group details. If the operator's role is enhanced

then, operator has the additional privilege to Start/Stop,

Create/Edit/Delete the group details.

Solution Details Operator has the privilege to Read all the pages including Admin tab. Administrator and the Super Administrator has the

privilege to read, update/edit solution details.

Operator has the Read privilege for all the pages including Admin tab. Administrator and the Super Administrator has the

privilege to read, update/edit solution details.

Configure RPO/RTO/Data Lag Objective

Operator has the privilege to Read all the pages including Admin tab. Administrator and the Super

Administrator has the privilege to read, update/edit, execute and terminate RPO/RTO/Data

Lag Objective.

Operator has the Read privilege for all the pages including Admin tab. Administrator and the Super

Administrator has the privilege to read, update/edit, execute and terminate RPO/RTO/Data

Lag Objective.

Configure the Continuity Operations

Operator has the privilege to Read all the pages

including Admin tab. Administrator and the Super Administrator has the privilege to read, update/edit, execute and terminate Continuity Operations.

Operator has the privilege to Read all the pages

including Admin tab. Administrator and the Super Administrator has the privilege to read, update/edit, execute and terminate Continuity Operations. If the

operator's role is enhanced then, operator has the additional privilege to Start/Stop, Create/Edit/Delete the continuity operations.

Configure Events Operator has the privilege to Read all the pages including Admin tab. Administrator and Super

Administrator has the

Operator has the privilege to Read all the pages including Admin tab. Administrator and Super

Administrator has the

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

privilege to read and update/edit the Events.

privilege to read and update/edit the Events.

Configure drills Administrator and Super Administrator has the privilege to read, create, update/edit, delete, execute and terminate the drills.

Administrator and Super Administrator has the privilege to read, create, update/edit, delete, execute and terminate the Tests. If the operator's role is enhanced then, operator has the additional privilege

to Start/Stop,

Create/Edit/Delete the drills.

Configure Notifications Operator has the privilege to Read all the pages including Admin tab. Administrator and the Super Administrator has the privilege to read, create, update/edit and delete

Notifications.

Operator has the privilege to Read all the pages including Admin tab. Administrator and the Super Administrator has the privilege to read, create, update/edit and delete

Notifications.

Configure SNMP Operator has the privilege to Read all the pages

including Admin tab.

Administrator and the Super Administrator has the privilege to read, create, update/edit and delete SNMP.

Operator has the privilege to Read all the pages

including Admin tab.

Administrator and the Super Administrator has the privilege to read, create, update/edit and delete SNMP.

Configure Business Process Operator has the privilege to Read all the pages including Admin tab. Administrator and Super

Administrator has the privilege to read, create, update/edit, delete, execute and terminate the Business Process.

Operator has the privilege to Read all the pages including Admin tab. Administrator and Super

Administrator has the privilege to read, create, update/edit, delete, execute and terminate the Business Process. If the

operator's role is enhanced, then the operator has the

additional privilege to Start/Stop, Create/Edit/Delete the drills.

Configure Group license Operator has the privilege to Read all the pages including Admin tab. Administrator and Super Administrator has the

Operator has the privilege to Read all the pages including Admin tab. Administrator and Super Administrator has the

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

privilege to read and update /edit the group license.

privilege to read and update /edit the group license.

Operations Basic Advanced

Purge Logs Now Operator, Administrator and the Super Administrator

have the privilege to edit / Update log details.

Operator, Administrator and the Super Administrator

have the privilege to edit / Update log details.

Operations Basic Advanced

Retaining Log Administrator and the Super Administrator have the privilege to edit/update Logs.

Administrator and the Super Administrator have the privilege to edit/update Logs

Pop-Ups

© Copyright IBM Corp. 2017

Re-Discovering MySQL Dataset

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name

MySQL.

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

IBM Resiliency Orchestration Administrator’s Guide

Re-Discovering SRDF Protection Scheme

Rediscovery is a capability by which user can rediscover component/dataset/protection

schema which are already discovered and added in group. CLI to rediscover the dataset are

available under $EAMSROOT/IBMUtil/AG/AGTestClient.sh

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name

SRDF

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

Re-Discovering DB2 Dataset

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name DB2.

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

Pop-Ups

© Copyright IBM Corp. 2017

Re-Discovering MSSQL Dataset

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name

MSSQL.

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

Re-Discovering Sybase Dataset

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name

Sybase

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

IBM Resiliency Orchestration Administrator’s Guide

Re-discovering Oracle Dataset

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name

Oracle.

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

Operations Basic Advanced

Removing Test Exercise Administrator and the Super Administrator have the privilege to remove the Test Exercise.

Administrator and the Super Administrator have the privilege to remove the Test Exercise. If Operator’s

privilege is enhanced then, the Operator has the

privilege to create Test Exercise.

Pop-Ups

© Copyright IBM Corp. 2017

Re-discovering PostgreSQL Dataset

Rediscovery is a capability by which user can rediscover component/dataset/protection

schema which are already discovered and added in group. CLI to rediscover the dataset are

available under $EAMSROOT/IBMUtil/AG/AGTestClient.sh

1. Execute AGTestClient.sh script and type “rediscover”.

2. It prompt you to subsystem that you want to rediscover .i.e. Enter Sub system name

PostgresSQL

3. Enter dataset or protection schema name to be rediscovered

4. It shows the re-discovered items in output.

4. Also CLI shows the differences in the protection schema properties after rediscovery

5. It prompts whether you want to save the re-discovered details. Option are y/n.

6. If choice is y, then re-discovered data will be saved and refreshing of the dataset page

shows the updated details.

Discovering HP 3PAR Protection Scheme

Refer to Discovering Protection Scheme to navigate and to configure the generic details for

discovering protection scheme.

A Protection Scheme is any protection mechanism that protects data. You should discover

the component and dataset before proceeding with the protection scheme discovery.

Note

If these subsystems are discovered, but their associated agents are not connected, the

subsystems status would be shown as Unknown. When agents will be connected, the status

will be updated with status of underlying system.

To discover a new Protection Scheme, perform following steps:

1. Click DISCOVER > Subsystems on the navigation bar. The Subsystems

page appears.

2. Select HP 3PAR from the Create New drop-down list at the top right corner

of the Subsystems page. The drop-down list displays all the Protection

Schemes that can be created.

3. Click Go. The Protection Scheme Discovery page appears and the

Subsystems side bar page displays list of all the Protection Schemes

discovered.

Provide necessary information on the following fields to configure Protection Scheme.

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Type Displays the type of protection scheme.

The protection scheme is displayed only if its agent is connected to the IBM Resiliency Orchestration

server. This is applicable for all protection schemes except for the one that requires manual discovery.

Name

Enter a unique name for protection scheme.

This field accepts alphanumeric characters, and underscores and the name must start with an

alphabet. It should not have a space.

This field is mandatory.

Management Host Select DR Solution specific Component from the

drop-down list to be associated to the

protection scheme.

If no components are present, abort Protection Scheme discovery and initiate Component discovery.

Fileset Name If Fileset Name is provided then it should start with an alphabet, can contain alpha numeric, underscore and maximum of 64 chars.

Fileset Name is auto-generated (if not provided) during group creation).

4. Click Save to save the entered details to complete protection scheme setup.

Pop-Ups

© Copyright IBM Corp. 2017

Re-Discovering Netapp Protection Scheme

Perform the following steps to re-discover the advanced details for the Netapp protection

scheme.

a. To discover the new agent, register and configure the agent and then click Re-

Discover Now button.

or

Select the Management Host to discover already registered and configured agents.

Under Select Netapp Subsystem section, all the devices, groups and its RDFs & BCVs

will be listed.

b. Click Advanced Configuration. The Netapp Details pop-up appears.

The following details are shown for RDF devices.

Field Description

SRDF Details

Group Name Displays the Device Group

Type Displays the device type

Possible values are RDF1, RDF2 or BCV

SID SID of the local Symmetrix

Remote SID SID of the remote Symmetrix

Pair State Displays the current pair state

It can be one of the following:

▪ Sync In Progress

▪ Synchronized

▪ Consistent

▪ Split

▪ Failed Over

IBM Resiliency Orchestration Administrator’s Guide

Field Description

▪ R1 Updated

▪ R1 Update In Progress

▪ Suspended

▪ Partitioned

▪ Mixed

▪ Invalid

▪ TransIdle

Replication Mode Displays the replication mode.

The possible values are Synchronous or

Asynchronous.

Device Domino Display whether domino is Enabled or Disabled

Applicable only if the replication mode is

Synchronous.

Consistency Display whether consistency is Enabled or Disabled

Applicable only if the replication mode is

Asynchronous

RDF Device Details: The following is shown for each RDF device

Logical Device

Name

Displays the logical name of the device

Symmetrix Device Displays the symmetrix device name/id

Remote device The remote Symmetrix device to which this logical

device is paired

Device Size Size in MB

Device State The device state

Pop-Ups

© Copyright IBM Corp. 2017

Field Description

The possible values are:

▪ RW

▪ WD

▪ NR

Config Information

Service Name Displays the auto generated protection scheme

service name.

Enter a new service name if required

R1 Invalid Tracks

high threshold

Displays the default invalid

tracks threshold (250 MB). Events will be raised if

invalid tracks reaches/exceeds this value.

Enter a positive integer based on the business

goals.

Note: Recommended value is around 10% to 20%

of the device size.

The following is shown for BCV devices

Field Description

SRDF Details

Group Name Displays the Device Group

Type Displays the device type (BCV)

SID SID of the local Symmetrix

BCV Device Details: The following is shown for each BCV device

Logical Device Displays the logical name of the device

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Name

Symmetrix Device Displays the symmetrix device name/id

Attached to RDF

Logical Device

The RDF logical device to which this BCV device is

attached

Device Size Size in MB

Device State The device state

The possible values are:

▪ RW

▪ WD

▪ NR

Config Information

Service Name Displays the auto generated protection scheme

service name.

Enter a new service name if required

c. Click Save in the Device Group Information page.

d. Click Finish.

Note

1. Auto Discovery would return only those Device Group for which have atleast

one device. The Device Group that do not have any devices configured, cannot

be auto discovered.

2. The agent should be configured properly for auto discovery.

Pop-Ups

© Copyright IBM Corp. 2017

Setting System Options for Users

Super Administrator has the to set default settings for users.

Click IBM Resiliency Orchestration Server User Role Management to see the .

To establish settings for default users:

a. Click Admin on the navigation bar. The IBM Resiliency Orchestration Administration

page appears. Scroll down to the User Summary and click Go to Users. The IBM

Resiliency Orchestration Users page appears.

b. Click the Set System Options for Users link at the top right corner of the page. The

Set System Options for Users page appears.

Field Description

Preferences

Home Page Select the landing page for all users that is displayed after logging on to IBM Resiliency Orchestration.

Edit Options

User Details Select users who could be allowed to edit their own details.

Password

All User Passwords expire in Select the duration for the expiry of passwords.

a. Enter the numeral in the text box, and

b. Select the unit of time from the drop

down. The available options are: Never,

Days, Weeks, and Months.

Note

Select "Never" if you do not want the password to

expire.

Notify User on Password expiry

(Days before)

Enter the number of days before expiry you want to notify the user regarding expiration of password.

Professional Details

IBM Resiliency Orchestration Administrator’s Guide

Field Description

Company Name Enter name of your company.

Note

This field accepts maximum 255 characters.

Working hours in Select the hour and minute when you start work.

The time format is HH:MM:AM/PM.

Working hours out Select the hour and minute when you finish work.

The time format is HH:MM:AM/PM.

Mode of Communication

Preferred Mode of Communication(s)

Select the mode of communication. The available choices are:

▪ Email

▪ Mobile

▪ Telephone

▪ Pager

Note

Based on your selection of above mentioned choices, make sure that appropriate values are specified in the

associated fields.

c. Click Save to save the changes, or Cancel to close the window without saving the

changes.

d. In Default User Settings window:

▪ Click Users List at the top right corner of the window, to see list of all users.

▪ Click Create New User at the top right corner of the window, to create a new

user.

Adding Users

Modifying Users

Deleting Users

Pop-Ups

© Copyright IBM Corp. 2017

Editing User Preferences

Operations Basic Advanced

ReverseCopy Administrator and Super Administrator has the privilege to read, edit execute and terminate BCOs

Administrator and Super Administrator has the privilege to read, edit execute and terminate BCOs. If the Operator role

is enhanced then, Operator has the privilege to read, create, edit, delete, execute and terminate BCOs.

Operations Basic Advanced

Monitor RPO/RTO Operator, Administrator and the Super Administrator

have the privilege to view details of RPO/RTO Monitor.

Operator, Administrator and the Super Administrator

have the privilege to view details of RPO/RTO Monitor.

Operations Basic Advanced

Scheduling Reports

Administrator and the Super Administrator have the privilege to Schedule Reports.

Administrator and the Super Administrator have the privilege to Schedule Reports.

Operations Basic Advanced

Server Failover

Administrator and the Super Administrator have the privilege to monitor the Server Failover and Server Recovery.

Administrator and the Super Administrator have the privilege to monitor the Server Failover and Server Recovery.

Operations Basic Advanced

Server Failover Administrator has the privilege to monitor the Server Failover and Server

Recovery.

Administrator has the privilege to monitor the Server Failover and Server

Recovery.

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Setting Debug Level Administrator and Super Administrator have the

privilege to set the debug levels of IBM Resiliency Orchestration logs

Administrator and Super Administrator have the

privilege to set the debug levels of IBM Resiliency Orchestration logs

Operations Basic Advanced

Setting Log File Size Super Administrator has the privilege to update/edit the

log file size.

Super Administrator has the privilege to update/edit the

log file size.

Operations Basic Advanced

Setting Log File Size Administrator and the Super Administrator have the privilege to edit/update Logs.

Administrator and the Super Administrator have the privilege to edit/update Logs.

Operations Basic Advanced

Setting System Options for Users

Super Administrator has the privilege to update/edit

the Users.

Super Administrator has the privilege to update/edit

the Users.

Operations Basic Advanced

Site Listing Operator, Administrator and Super Administrator have the privilege to read the details related to Sites.

Operator, Administrator and Super Administrator have the privilege to read the details related to Sites.

Operations Basic Advanced

Starting Agents Administrator and the Super Administrator have the privilege to read, update/edit and execute Agents.

Administrator and the Super Administrator have the privilege to read, update/edit and execute Agents.

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Start and Stop Replication Administrator and Super Administrator have the

privilege to execute and terminate

BCOs

Administrator and Super Administrator have the

privilege to execute and terminate

BCOs If the Operator’s role is enhanced then, Operator

has the privilege to execute

and terminate BCOs.

Operations Basic Advanced

Stopping Agents Administrator and the Super Administrator have the privilege to terminate

the Agents.

Administrator and the Super Administrator have the privilege to terminate

the Agents.

Operations Basic Advanced

Tracking Test Exercise

Administrator and Super Administrator has the privilege to track the Test

Exercise.

Administrator and Super Administrator has the privilege to track the Test

Exercise. Operator's role is enhanced then, Operator

has the privilege to track the Test Exercise.

Operations Basic Advanced

Verifying Agents Administrator and the Super Administrator have the privilege to read, update/edit and execute

the Agents.

Administrator and the Super Administrator have the privilege to read, update/edit and execute

the Agents.

Operations Basic Advanced

View Events Operator, Administrator and the Super Administrator have the privilege to view Events.

Operator, Administrator and the Super Administrator have the privilege to view Events.

IBM Resiliency Orchestration Administrator’s Guide

Operations Basic Advanced

Viewing Group Events Operator, Administrator and the Super Administrator have the privilege to view Group Events.

Operator, Administrator and the Super Administrator have the privilege to view Group Events.

Operations Basic Advanced

Viewing Group Relationship Operator, Administrator and the Super Administrator have the privilege to View Group Relationship

Operator, Administrator and the Super Administrator have the privilege to View Group Relationship.

Operations Basic Advanced

Viewing Group Snapshot Operator, Administrator and the Super Administrator have the

privilege to view Group Snapshot

Operator, Administrator and the Super Administrator have the

privilege to view Group Snapshot

Operations Basic Advanced

Viewing License Information Procured/ Updated license.

Operator, Administrator and Super Administrator has the privilege to view License information

procured/Updated license.

Operator, Administrator and Super Administrator has the privilege to view License information

procured/Updated license.

Operations Basic Advanced

Viewing Reports Operator, Administrator and the Super Administrator have the privilege to View Reports.

Operator, Administrator and the Super Administrator have the privilege to View Reports.

Operations Basic Advanced

Viewing Test Exercise Operator, Administrator and the Super

Operator, Administrator and the Super

Pop-Ups

© Copyright IBM Corp. 2017

Operations Basic Advanced

Administrator have the privilege to View Test Exercise.

Administrator have the privilege to View Test Exercise.

Base workflow configuration

Field Description

GROUP NAME Displays the name of the Group

ACTIVE WORKFLOWS Displays the number of active workflows published

DRAFT

WORKFLOWS

Displays the number of workflows in save as a draft form.

Group Level configuration

Group levels are configured and listed based on the users’ priority.

Default Group Labels are listed as below:

ID LABEL

1 TYPE I

2 TYPE II

3 TYPE III

IBM Resiliency Orchestration Administrator’s Guide

ID LABEL

4 TYPE IV

1. Click Save, to save the lD and its group label.


Recommended