RDF System Management Manual for J-series and H-series RVUs (RDF 1.10)
Security Restrictions.....................................................................................................231
RDF State Requirement.................................................................................................231
Usage Guidelines.......................................................................................................231
Examples...................................................................................................................232
START UPDATE................................................................................................................232
Where Issued.............................................................................................................232
Security Restrictions.....................................................................................................232
RDF State Requirement.................................................................................................232
Usage Guidelines.......................................................................................................232
Example....................................................................................................................233
STATUS..........................................................................................................................233
Where Issued.............................................................................................................233
Security Restrictions.....................................................................................................234
RDF State Requirement.................................................................................................234
Usage Guidelines.......................................................................................................234
STATUS RDF Command Output Display..........................................................................234
RDF Process................................................................................................................235
Name........................................................................................................................236
RTD Time...................................................................................................................236
Pri.............................................................................................................................236
Volume and Seqnce....................................................................................................237
Cpus.........................................................................................................................237
Error..........................................................................................................................237
Special Messages.......................................................................................................238
Examples...................................................................................................................238
STOP RDF.......................................................................................................................239
Where Issued.............................................................................................................239
Security Restrictions.....................................................................................................239
RDF State Requirement.................................................................................................239
Usage Guidelines.......................................................................................................239
Examples...................................................................................................................241
STOP SYNCH..................................................................................................................241
Where Issued.............................................................................................................241
Security Restrictions.....................................................................................................241
RDF State Requirement.................................................................................................241
Usage Guidelines.......................................................................................................241
Example....................................................................................................................241
STOP UPDATE.................................................................................................................241
Where Issued.............................................................................................................242
Security Restrictions.....................................................................................................242
RDF State Requirement.................................................................................................242
Usage Guidelines.......................................................................................................242
Examples...................................................................................................................243
TAKEOVER......................................................................................................................243
Where Issued.............................................................................................................243
Security Restrictions.....................................................................................................243
Usage Guidelines.......................................................................................................244
Limitation...................................................................................................................245
Example....................................................................................................................245
UNPINAUDIT..................................................................................................................246
Where Issued.............................................................................................................246
Security Restrictions.....................................................................................................246
RDF State Requirement.................................................................................................246
Usage Guidelines.......................................................................................................246
Example....................................................................................................................246
Contents 13










