RDF System Management Manual for H-Series RVUs (RDF 1.8)

9 Entering RDFSCAN Commands...............................................................................245
About the EMS Log.............................................................................................................................245
Elements of RDFSCAN Command Descriptions................................................................................245
RDFSCAN Commands.......................................................................................................................246
AT...................................................................................................................................................246
Usage Guidelines......................................................................................................................246
Examples..................................................................................................................................246
DISPLAY........................................................................................................................................246
Usage Guidelines......................................................................................................................247
Examples..................................................................................................................................247
EXIT...............................................................................................................................................247
Usage Guidelines......................................................................................................................247
Examples..................................................................................................................................248
FILE................................................................................................................................................248
Usage Guidelines......................................................................................................................248
Examples..................................................................................................................................248
HELP..............................................................................................................................................248
Usage Guidelines......................................................................................................................249
Examples..................................................................................................................................249
LIST................................................................................................................................................249
Usage Guidelines......................................................................................................................249
Output Displayed.....................................................................................................................250
Examples..................................................................................................................................250
LOG................................................................................................................................................250
Usage Guidelines......................................................................................................................250
Output Displayed.....................................................................................................................251
Examples..................................................................................................................................251
MATCH..........................................................................................................................................251
Usage Guidelines......................................................................................................................251
Examples..................................................................................................................................252
NOLOG..........................................................................................................................................252
Usage Guidelines......................................................................................................................252
Examples..................................................................................................................................252
SCAN.............................................................................................................................................253
Usage Guidelines......................................................................................................................253
Examples..................................................................................................................................253
10 Triple Contingency...................................................................................................255
Overview.............................................................................................................................................255
Requirements......................................................................................................................................255
How Triple Contingency Works.........................................................................................................255
Hardware Requirements.....................................................................................................................256
Software Requirements.......................................................................................................................256
The RETAINCOUNT Configuration Parameter.................................................................................257
The COPYAUDIT Command..............................................................................................................258
COPYAUDIT Restartability................................................................................................................259
Using ZLT to Achieve Triple Contingency Protection for Auxiliary Audit Trails.............................259
Triple Contingency Without ZLT..................................................................................................259
Using ZLT to Achieve the Same Protection...................................................................................260
Summary.............................................................................................................................................260
11 Subvolume-Level and File-Level Replication...........................................................261
INCLUDE Clauses..............................................................................................................................261
14 Table of Contents