Administering IBM Spectrum LSF RTM
Learn about IBM Spectrum LSF RTM, configure, and manage RTM to monitor clusters and applications.
Tip: When using RTM, the log and event files can contain personal information (for example, UNIX usernames and email addresses). OS-level access control is one level of protecting this persona data; for further protection, you can use encryption software tools to encrypt the disk partition or volume used to store the log and events files. RTM log and event files are located at RTM_TOP/log.