RDF System Management Manual for H-Series RVUs (RDF 1.8)

8 Entering RDFCOM Commands
To manage, operate, and control RDF and its environment, you enter commands through the
RDFCOM online utility. This chapter, directed to system managers and operators, describes the
RDFCOM commands and their attributes. In this chapter, you will find:
“Elements of RDFCOM Command Descriptions”
“RDFCOM-Related Filenames and Process Identifiers” (page 176)
“RDFCOM Commands” (page 178)
Elements of RDFCOM Command Descriptions
In the description of each RDFCOM command, the following elements are covered:
Purpose, syntax, and parameters used with the command
Where issued (primary or backup system)
Security restrictions
RDF state requirement
Usage guidelines (where applicable)
Output displayed (where applicable)
Examples
Purpose, Syntax, and Parameters
For each command, the description begins by explaining the purpose or function of the command.
Then, a syntax diagram and complete parameter descriptions present what keywords and
variables make up the command: which are required, which are optional, and what the default
assignments for the optional items are. The meanings of the symbols used in the syntax diagrams
are described in .
For most RDFCOM commands, the parameters specify configuration values stored in either:
The RDF configuration memory table, which you access by using the SET, RESET, and
SHOW commands
The RDF configuration file, which you access through the ADD, ALTER, and DELETE
commands
Other parameters request display options or select systems, disk volumes, files, and other objects.
Many parameters are optional, but some are required.
Where Issued
Some RDFCOM commands can be issued only from the primary system, others only from the
backup system, and still others from either system. For each command, the allowed systems are
listed in “Where Issued.” For your convenience, they are also summarized in Table 8-1.
Security Restrictions
Although several RDFCOM commands are available to all users, other commands impact the
overall RDF environment and are, by default, restricted to members of the super-user group.
For each command, the default security requirements appear under the heading “Security
Restrictions.” In general, the default security restrictions for RDFCOM commands are:
The EXIT, FC, HELP, HISTORY, INFO, OBEY, OPEN, OUT, SHOW, and STATUS commands
can be used by all users.
The START RDF and TAKEOVER commands can only be used by the member of the
super-user group who initialized RDF.
The other RDFCOM commands can be used only by members of the super-user group.
Elements of RDFCOM Command Descriptions 173