GT.M Administration and Operations Guide

GT.M Administration and Operations Guide
Copyright 2011-2023 Fidelity National Information Services, Inc. and/or its subsidiaries. All rights reserved.
April09,2026
Table of Contents
- About This Manual
- Intended Audience
- 1. About GT.M
- Hardware/Operating System Environment
- 2. Installing GT.M
- Obtaining GT.M Distribution Media
- 3. Basic Operations
- Environment Variables
- 4. Global Directory Editor
- Global Directory
- GDE Overview
- Identifying the Current Global Directory
Creating a Default Global Directory
Mapping Global Variables in a Global Directory
Examining the Default Global Directory
- Using GDE
- Guidelines for Mapping
- Global Director Editor Commands
- Specifying File Names in Command Lines
- Name, Region, and Segment Qualifiers
- Name Qualifiers
- GDE Command Summary
- GDE Command Qualifier Summary
- 5. General Database Management
- MUPIP Command Summary
- 6. GT.M Journaling
- Introduction
- Journal Files
Journal Files Access Authorization
Choosing between BEFORE_IMAGE and NOBEFORE_IMAGE
Select database files for Journaling
- SET
- SET Object Identifying Qualifiers
- JOURNAL
- Journal Action Qualifiers
- 7. Database Replication
- Introduction
- LMS Group
- Implementing Replication and Recovery
- Application Architecture
- Procedures
- Download Replication Examples
Setting up an A→B replication configuration with empty databases
Setting up an A→B→C replication configuration with empty databases
Setting up an A→P replication configuration with empty databases
Replicating Instance Starts from Backup of Originating Instance (A→B and A→P )
Switchover possibilities in an A→B replication configuration
Switchover possibilities in a B←A→P replication configuration
Switchover possibilities in a B←A→P→Q replication configuration
Changing the global directory in an A→B replication configuration
Creating a new Replication Instance File
Setting up a secured TLS replication connection
Recovering from the replication WAS_ON state
Rollback data from crashed (idle) regions
Setting up a new replicating instance of an originating instance (A→B, P→Q, or A→P)
Replacing the replication instance file of a replicating instance (A→B and P→Q)
Replacing the replication instance file of a replicating instance (A→P)
Setting up a new replicating instance from a backup of the originating instance (A→P)
- Commands and Qualifiers
- Turning Replication On/Off
Creating the Replication Instance File
Displaying/Changing the attributes of Replication Instance File and Journal Pool
Shutting down the Source Server
Activating a Passive Source Server
Deactivating an Active Source Server
Enabling/Disabling Detailed Logging
Reporting the Current Backlog of Journal Records
Processing Lost Transactions File
Stopping the Receiver Server and/or the Update Process
Enabling/Disabling Detailed Logging
- 8. M Lock Utility (LKE)
- Summary
- 9. GT.M Database Structure(GDS)
- Local Bitmaps
- 10. Database Structure Editor
- Operating in DSE
- 11. Maintaining Database Integrity
- Verifying Database Integrity
- Regularly Scheduled Verification
Before or After Major Transfers
Immediately after Catastrophic Events
- Approaches to Database Recovery
- Recover from Journals
- Repairing the Database with DSE
- Using the Proper Database File
- Finding and Fixing Database Errors
- C1–Possible Cache Control Problems
MUPIP INTEG Error Classification Table
I5–More Database Access Problems
O4–Salvage of Data Blocks with Lost Indices
O5–Salvage of a damaged spanning node
Q1–Restricting Database Access
R2–Structural Database Integrity Errors
Run-Time Database Restart Codes
R3–Run-time Database Cache Problems
R6–GTMASSERT and GTMCHECK Errors
R7–Interlocked Queue Hardware Problems
- 12. Database Encryption
- Introduction
- Overview
Limitations of GT.M Database Encryption
- Theory of Operation
- Definition of Terms
- Examples of use
- Key Management
- Special note - GNU Privacy Guard and Agents
- Using the reference implementation’s custom pinentry program
- 13. GT.CM Client/Server
- Introduction
- A. GT.M’s IPC Resource Usage
- Examining GT.M’s IPC Resources
- B. Monitoring GT.M
- Monitoring GT.M Messages
- C. Building Encryption Libraries
- D. GT.M Security Philosophy
- gtmsecshr commands
- E. GTMPCAT - GT.M Process/Core Analysis Tool
- Overview
- F. Packaging GT.M Applications
- Invoking GT.M through a C main() program
- G. Creating a $gtmcrypt_config file
- OpenSSL Options
- H. V6 to V7 DB Upgrade
- Database Upgrade Matrix