Administering IBM Spectrum LSF RTM
Learn about IBM Spectrum LSF RTM, configure, and manage RTM to monitor clusters and applications.
Tip: When
using RTM,
the log and event files can contain personal information (for example, UNIX usernames and email
addresses). OS-level access control is one level of protecting this persona data; for further
protection, you can use encryption software tools to encrypt the disk partition or volume used to
store the log and events files. RTM log and event
files are located at RTM_TOP/log.