Re: General mount/shadow command?
From: Peter 'EPLAN' LANGSTOEGER (peter_at_langstoeger.at)
Date: Wed, 26 Jan 2005 20:47:39 +0000 (UTC)
In article <firstname.lastname@example.org>, email@example.com writes:
>Up till now all my systems have had disks
>named DKA0 AND DKA100.
Not that bad.
But referring to the disks without logical names (except in the procedure
where the mount of these disks happen during startup) is bad.
You gain A LOT of flexibility with logical names. eg Virtual (Concealed) disks
>But we now have some systems with DKB0
>and DKB100, and I need to generalize
>my command procedures and written
>procedures. I prefer to have all
>the command procedures on all the
>systems to be the same, if possible.
Thats why there are logicalnames.
And all refer to the same logical names
(which are based on functionality not on physics).
>These are used to form a shadowset.
It is no different to a physical disk. The mount command is different.
You need a nonzero allocation class and a shadowing license. That's it.
>I was wondering if there is a generic
>way to refer to these disks in
>the MOUNT/SHADOW= command.
Do not use logicals in the MOUNT command.
Do use the MOUNT command to create logicals for the volumes (disks).
You need one single point with knowledge about the real hardware.
Better have it in SYCONFIG.COM than in SYLOGICALS.COM
>I know that
>mount dka0 sx
>will allow me to refer to disk$sx,
Yup. DISK$label is the default logical MOUNT assigns for the disk,
but you can specify the name of the logical yourself as the 3rd parameter
to the mount command.
>but I typically don't issue mount
>commands for these disks.
Then better change your method.
or in less aggressive words
WHO does issue mount commands then ?
>If there is no better way, I
>can check f$device(*dkb0:) to see
>if it returns a null string, and
>issued different commands based on
You could of course take F$DEVICE and F$GETDVI to get/check a list of device
names, but I think it is not worth the effort. A simple IF node .EQS. "node1"
in SYCONFIG.COM where you place the specific mount command for this node
(and you place all commands for all your nodes in the same file which you
distribute) is IMNSHO the least 'dangerous' method.
just my 0.02
-- Peter "EPLAN" LANGSTOEGER Network and OpenVMS system specialist E-mail firstname.lastname@example.org A-1030 VIENNA AUSTRIA I'm not a pessimist, I'm a realist