EMS Manual
EMS Programs
EMS Manual—426909-005
13-14
EMSCCTRL—Control Collector Utility
REFRESH { ON | OFF }
if ON, tells a primary or alternate collector to update the end-of-file pointer
on disk for each block written. This is safer than REFRESH OFF, less
efficient because it involves more writes to disk.
ROTATEFILES { ON | OFF }
tells the collector what action to take if the creation of a new log file causes
the number of log files to exceed the MAXFILE limit by assigning the value
of the ROTATEFILES attribute. The primary and alternate collectors take
different actions when this condition occurs. The ROTATEFILES attribute is
ON if you have never explicitly set the ROTATEFILES option.
If ROTATEFILES is ON (TRUE):
The primary collector purges the oldest file.
The alternate collector checks the oldest file.
If this file is open to another process or is not a valid log file, the
alternate collector creates the next file in the sequence and continues
logging.
If the oldest file is a valid file and not open to another process, the
alternate collector either renames the file as the next in the sequence if
it has the correct number of extents, or purges and creates a new file if
it does not have the correct number of extents.
If ROTATEFILES is OFF (FALSE):
The primary collector sends the event message ZEMS-EVT-
LOGGING-STOPPED (521) and stops logging.
The alternate collector checks the oldest file.
If the file is not valid, the alternate collector creates the next file in the
sequence.
If the file is valid and not empty, logging stops and the collector
generates the ZEMS-EVT-LOGGING-STOPPED (521) event message.
If the file is valid and empty, the collector checks the extent size. If the
extent size is correct, the collector renames and reuses the file. If the
size is not correct, the collector purges the file and creates the next file
in the sequence.
SECURITY { rwep | “rwep” }
specifies the file security that the collector is to use when creating a log file.
See the security string for the FUP SECURE command in the File Utility
Program (FUP) Reference Manual.
Because distributors must have read-access to their log files, the value of
SECURITY limits which people (or processes) can use distributors to