9 Entering RDFSCAN Commands
All RDF messages are directed to an EMS event log (collector). To examine that log without
looking at all events for the entire system, you first use the standard EMS filter RDFFLTO to
create an intermediate entry-sequenced file copy of the RDF log, and then enter commands
through the RDFSCAN online utility.
This chapter, which is written for system managers and operators, describes the RDFSCAN
commands and their attributes. In this chapter, you will find:
•
“About the EMS Log” (page 261)
•
“Elements of RDFSCAN Command Descriptions” (page 261)
•
“RDFSCAN Commands” (page 262)
File names entered as parameters in RDFSCAN commands are subject to the same syntax rules
as those used in RDFCOM commands. For these rules, see File Names and Process Identifiers
in
Chapter 8 (page 187)
.
About the EMS Log
The EMS log receives all messages from RDF, including those dealing with RDF startup and
shutdown, RDF events, errors, and informative data. In an RDF configuration, an EMS log exists,
and is assigned the same name, on both the primary and backup nodes.
The EMS log is specified as the global RDF parameter LOGFILE in the RDF configuration file.
At configuration time, you can either
•
Supply the name of the desired collector in a SET RDF LOGFILE command, and add it to
the configuration file with an ADD RDF command
•
Let RDF use $0 by default
At any later time, you can change the collector specified in the configuration file by entering an
ALTER RDF LOGFILE command.
You can use RDFSCAN to examine the RDF messages in the EMS log by way of an intermediate
entry-sequenced file produced by the RDFFLTO filter. You must specify the name of the
intermediate file in the RDFSCAN command that begins your session.
For more information about EMS event log content, format, and scanning methods, see:
•
“Scanning the EMS Event Log” (page 38)
•
“Running RDFSCAN” (page 109)
•
“Performing Routine Operational Tasks” (page 112)
Elements of RDFSCAN Command Descriptions
The RDFSCAN command descriptions include the same elements as the RDFCOM command
descriptions in
Chapter 8 (page 187)
, except for these items, which are not included because they
are the same in all cases:
•
Where Issued: All RDFSCAN commands can be issued at either the primary or backup node.
•
Security Restrictions: All RDFSCAN commands are unrestricted; they can be entered by
anyone who can log on to the node.
•
RDF State Requirement: All RDFSCAN commands can be entered at any time, whether or
nor RDF is initialized or running.
About the EMS Log
261
Содержание NonStop RDF
Страница 68: ...68 ...
Страница 186: ...186 ...
Страница 260: ...260 ...
Страница 278: ...278 ...
Страница 284: ...284 ...
Страница 290: ...290 ...
Страница 308: ...308 ...
Страница 322: ...322 ...
Страница 336: ...336 ...
Страница 348: ...348 ...
Страница 464: ...464 ...
Страница 478: ......