where to look for the information you need, based upon the responsibility you have or the kind
of tasks you perform at your site:
Chapter/AppendixResponsibility
AllSystem manager
1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 14, 15, 16, 17, A, C, D, ESystem operator
1, 2, 3, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, A, B, C, D, EDatabase
administrator
1, 2, 3, 10, 11, 12, 13, 14, 15, 16, 17System analyst
1, 2, 10, 11, 12, 14, 15, 17, A, B, C, DApplication designer
The chapters and appendixes contain this information:
• Chapter 1 (page 31) introduces RDF and its goals, features, and capabilities; describes the
main RDF processes and their functions; introduces the RDFCOM and RDFSCAN command
interfaces used to communicate with the subsystem; and presents an overview of RDF
operation.
• Chapter 2 (page 57) describes how to configure hardware and prepare software for RDF
installation and operation.
• Chapter 3 (page 69) explains how to install and configure RDF, including how to copy
databases and files from the primary system to the backup system before starting RDF.
• Chapter 4 (page 99) discusses how to operate RDF, including how to issue RDFCOM and
RDFSCAN commands and how to display RDF configuration parameters and operating
statistics, change configuration parameters, and interpret log files.
• Chapter 5 (page 121)explains how to manage the RDF environment, including how to recover
from file-system errors, respond to failures, stop and restart the RDF product, direct the
backup system to take over application processing when a disaster occurs at the primary
system site, and perform other specialized tasks.
• Chapter 6 (page 157)details how to back up altered database structures and how to
resynchronize the primary and backup databases.
• Chapter 7 (page 167)describes how to synchronize entire databases or selected database
volumes online.
• Chapter 8 (page 187) and Chapter 9 (page 261) present the syntax of all RDFCOM and
RDFSCAN commands, respectively, and give examples of these commands.
• Chapter 10 (page 271) describes the triple contingency feature.
• Chapter 11 (page 279) describes subvolume-level and file-level replication.
• Chapter 12 (page 285) describes how to use the mapfile, maplog, and updater configuration
record to support mapping between primary system and backup system subvolumes.
• Chapter 13 (page 291) describes support for auxiliary audit trails.
• Chapter 14 (page 295) describes support for network transactions.
• Chapter 15 (page 309) describes lockstep operation.
• Chapter 16 (page 323) describes SQL/MX database setup for RDF.
• Chapter 17 (page 337) describes the Zero Lost Transactions (ZLT) functional capability.
• Appendix A (page 349) summarizes the syntax of all RDFCOM and RDFSCAN commands.
• Appendix B (page 359) provides additional information about RDF, including reserved
words, default values for configuration parameters, and system file descriptions.
• Appendix C (page 365) lists all messagesthat can be generated by the lockstep gateway, RDF
processes, RDFCOM, and RDFSCAN, and their probable causes, effects, and recovery actions.
• Appendix D (page 463) lists all the operational limits that apply to the RDF/IMP, IMPX, and
ZLT products.
• Appendix E (page 465) describes how to monitor RDF entities using ASAP.
Document Organization 25