EMS Manual
EMS Programs
EMS Manual—426909-005
13-5
EMSACOLL—Alternate Collector Program
If the oldest file is a valid file and not open to another process, the alternate
collector either renames the file as the next in the sequence if it has the
correct number of extents, or it purges and creates a new file if it does not
have the correct number of extents.
If ROTATEFILES is OFF (FALSE):
The primary collector sends the event message ZEMS-EVT-LOGGING-
STOPPED (521) and stops logging.
The alternate collector checks the oldest file.
If the file is not valid, the alternate collector creates the next file in the
sequence.
If the file is valid and not empty, logging stops and the collector generates
the ZEMS-EVT-LOGGING-STOPPED (521) event message. If the file is
valid and empty, the collector checks the extent size. If the extent size is
correct, the collector renames and reuses the file. If the size is not correct,
the collector purges the file and creates the next file in the sequence.
MAXFILE nnnn
determines the maximum number of files the alternate collector retains in the
log subvolume. nnnn must be an integer in the range 2 through 1000.
EXT { ext | ( pri , sec ) }
selects the values (in pages) for the PRIMARYEXTENT and
SECONDARYEXTENT attributes. If ext is specified, that value is used for
both attributes. Otherwise, pri specifies the value of PRIMARYEXTENT and
sec specifies the value of SECONDARYEXTENT. ext, pri, and sec must be
even integers in the range 2 through 65534.
BUFFERED { ON | OFF }
selects the value of the WRITETHRUCACHE attribute. BUFFERED ON sets
the attribute to FALSE. BUFFERED OFF sets it to TRUE.
REFRESH { ON | OFF }
selects the value of the EOFREFRESH attribute.
SECURITY { rwep | ”rwep” }
selects the value of the PROTECTION attribute and specifies the file security
that the collector is to use when creating a log file. For the security string for
the FUP SECURE command, see the File Utility Program (FUP) Reference
Manual.
Because distributors must have read-access to their log files, the value of
SECURITY limits which people (or processes) can use distributors to retrieve
event messages. The system supplies “COOO” if you have not specified