RDF System Management Manual for J-series and H-series RVUs (RDF 1.10)

9 Entering RDFSCAN Commands
All RDF messages are directed to an EMS event log (collector). To examine that log without looking
at all events for the entire system, you first use the standard EMS filter RDFFLTO to create an
intermediate entry-sequenced file copy of the RDF log, and then enter commands through the
RDFSCAN online utility.
This chapter, which is written for system managers and operators, describes the RDFSCAN
commands and their attributes. In this chapter, you will find:
About the EMS Log” (page 250)
“Elements of RDFSCAN Command Descriptions” (page 250)
“RDFSCAN Commands” (page 251)
File names entered as parameters in RDFSCAN commands are subject to the same syntax rules as
those used in RDFCOM commands. For these rules, see File Names and Process Identifiers in
Chapter 8 (page 176).
About the EMS Log
The EMS log receives all messages from RDF, including those dealing with RDF startup and
shutdown, RDF events, errors, and informative data. In an RDF configuration, an EMS log exists,
and is assigned the same name, on both the primary and backup nodes.
The EMS log is specified as the global RDF parameter LOGFILE in the RDF configuration file. At
configuration time, you can either
Supply the name of the desired collector in a SET RDF LOGFILE command, and add it to the
configuration file with an ADD RDF command
Let RDF use $0 by default
At any later time, you can change the collector specified in the configuration file by entering an
ALTER RDF LOGFILE command.
You can use RDFSCAN to examine the RDF messages in the EMS log by way of an intermediate
entry-sequenced file produced by the RDFFLTO filter. You must specify the name of the intermediate
file in the RDFSCAN command that begins your session.
For more information about EMS event log content, format, and scanning methods, see:
“Scanning the EMS Event Log” (page 33)
“Running RDFSCAN” (page 101)
“Performing Routine Operational Tasks” (page 104)
Elements of RDFSCAN Command Descriptions
The RDFSCAN command descriptions include the same elements as the RDFCOM command
descriptions in Chapter 8 (page 176), except for these items, which are not included because they
are the same in all cases:
Where Issued: All RDFSCAN commands can be issued at either the primary or backup node.
Security Restrictions: All RDFSCAN commands are unrestricted; they can be entered by anyone
who can log on to the node.
RDF State Requirement: All RDFSCAN commands can be entered at any time, whether or nor
RDF is initialized or running.
250 Entering RDFSCAN Commands