Escolar Documentos
Profissional Documentos
Cultura Documentos
Manager
Administrator Guide
Response Online
You can obtain technical support from BMC Software 24 hours a day, seven days a week by accessing the
technical support Web site at http://www.bmc.com/support.html. From this site, you can
• read overviews about support services and programs that BMC Software offers
• find the most current information about BMC Software products
• search a database for problems similar to yours and possible solutions
• order or download product documentation
• report a problem or ask a question
• subscribe to receive e-mail notices when new product versions are released
• find worldwide BMC Software support center locations and contact information, including e-mail addresses,
fax numbers, and telephone numbers
Response On Demand
In the USA and Canada, if you need technical support and do not have access to the Web, call 800 537 1813.
Outside the USA and Canada, please contact your local support center or your local sales office for assistance.
iii
BMC Software, Inc., Confidential and Proprietary Information
Contents
Chapter 1 Overview
Introducing CONTROL-M/EM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
CONTROL-M/EM Components Summary . . . . . . . . . . . . . . . . . . . 1-3
CONTROL-M/EM Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7
Administrator Responsibilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
CONTROL-M/EM Related Products . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Time Zone Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-11
Contents v
Administration Facility Window . . . . . . . . . . . . . . . . . . . . . . . . .4-7
Starting and Stopping Components . . . . . . . . . . . . . . . . . . . . . . .4-13
Registering Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-15
Updating Information about Registered Components . . . . . . . . .4-21
Selecting and Filtering Components . . . . . . . . . . . . . . . . . . . . . .4-21
Administration Facility Check Intervals . . . . . . . . . . . . . . . . . . .4-26
Using the Agents Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Filtering the Agents Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31
Truncating the Agents Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-31
Displaying and Modifying System Parameters . . . . . . . . . . . . . . . . .4-33
Database Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-43
Removing Old Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-43
Extending the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-44
Checking Available Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-47
SQL Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-47
Print Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-47
Chapter 6 Security
CONTROL-M/EM Workstation Security . . . . . . . . . . . . . . . . . .6-1
CONTROL-M Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
CONTROL-M/EM Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-4
User and Group Authorization Windows . . . . . . . . . . . . . . . . . . . . . .6-10
User Authorizations – General Panel . . . . . . . . . . . . . . . . . . . . .6-15
Group Authorizations – General Panel . . . . . . . . . . . . . . . . . . . .6-17
User/Group Authorizations – Jobs Panel . . . . . . . . . . . . . . . . . .6-19
User/Group Authorizations – Privileges Panel . . . . . . . . . . . . . .6-22
User/Group Authorizations – Scheduling Tables Panel . . . . . . .6-25
User/Group Authorizations – Resources and Calendars Panel . .6-27
Chapter 8 Customization
Defining CONTROL-M Installations . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Customizing System Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-2
Alert Data Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3
Defaults File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-4
SQL Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Sybase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8
Oracle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
Contents vii
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-8
Figures
Figures ix
BMC Software, Inc., Confidential and Proprietary Information
Tables
Tables xi
Table 6-5 Column Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-21
Table 6-6 Privileges Panel Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-22
Table 6-7 Field Descriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-26
Table 6-8 Resource Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-28
Table 6-9 Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-28
Table 6-10 Calendar Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-30
Table 6-11 Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-31
Table 7-1 Troubleshooting Menu Options . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Table 7-2 Database Troubleshooting Menu Options . . . . . . . . . . . . . . . . . 7-6
Table 7-3 Gateway Troubleshooting Menu Options. . . . . . . . . . . . . . . . . . 7-7
Table 7-4 Set Debug Parameters Menu Options. . . . . . . . . . . . . . . . . . . . . 7-9
Table 7-5 Gateway Log Filename Parameters . . . . . . . . . . . . . . . . . . . . . . 7-13
Table 7-6 Global Conditions Server Parameters G . . . . . . . . . . . . . . . . . . 7-16
Table 7-7 DIAG Initialization (.ini) File Parameters . . . . . . . . . . . . . . . . . 7-23
Table 7-8 DIAG Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-24
Table 8-1 Alert Data Processing Parameters . . . . . . . . . . . . . . . . . . . . . . . 8-3
Table 8-2 Parameters for the Global Conditions Distribution Facility. . . . 8-5
Table 8-3 Sybase Adaptive Server Parameters. . . . . . . . . . . . . . . . . . . . . . 8-8
Table 8-4 Oracle Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-9
Table A-1 SNMP Trap Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-3
Table A-2 CONTROL-M/EM Customization Parameters . . . . . . . . . . . . . A-5
Table A-3 SNMP Parameter Modification Command Terms . . . . . . . . . . . A-6
Table A-4 Trap Message Formatting Variables . . . . . . . . . . . . . . . . . . . . . . A-9
Table A-5 Severity Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-11
Table B-1 Root Menu Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-2
Table B-2 Activation Menu and Line Commands. . . . . . . . . . . . . . . . . . . . B-3
Table B-3 Database Creation Menu and Line Commands . . . . . . . . . . . . . B-5
Table B-4 Database Maintenance Menu and Line Commands . . . . . . . . . . B-5
Table B-5 Troubleshooting Menu and Line Commands . . . . . . . . . . . . . . . B-6
Table B-6 Database Troubleshooting Menu . . . . . . . . . . . . . . . . . . . . . . . . B-6
Table B-7 Gateway Troubleshooting Menu and Line Commands . . . . . . . B-7
Table B-8 CONTROL-M/EM Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-8
Table C-1 General Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
Table C-2 Gateway Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
Table C-3 Enterprise License Manager and Client Parameters. . . . . . . . . . C-7
Table C-4 Global Alerts Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . C-9
Table C-5 Maintenance Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-10
Table C-6 GUI Server Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-13
Table C-7 System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-14
Table C-8 Global Conditions Server Parameters . . . . . . . . . . . . . . . . . . . . C-14
Note
This book assumes that you are familiar with your host operating system.
xiii
How This Book Is Organized
This book describes the usage and maintenance of
CONTROL-M/Enterprise Manager. It also includes details for
customizing, managing, securing, and troubleshooting the product.
Chapter/Appendix Description
Chapter 1 Overview
Provides an overview of CONTROL-M/Enterprise
Manager components, administrator
responsibilities, and related products.
Chapter 2 Defining CONTROL-M Installations
Explains how to define CONTROL-M Installations.
Chapter 3 Maintaining CONTROL-M/EM
Provides information about various features and
functions required to maintain the CONTROL-M/EM
environment.
Chapter 4 Managing CONTROL-M/EM Using the
Administration Facility
Provides information about starting up and shutting
down CONTROL-M/Enterprise Manager
components and maintaining the database.
Chapter 5 Managing CONTROL-M/EM with the Root Menu
Explains how to manage CONTROL-M/Enterprise
Manager and the CONTROL-M/Enterprise
Manager database and database server from a
Unix command line.
Chapter 6 Security
Provides information about granting user
authorizations and how to maintaining a secure
environment.
Chapter 7 Troubleshooting
Describes the various problem-solving tools in the
Troubleshooting menu and the DIAG diagnostic
facility.
Chapter 8 Customization
Describes customization of
CONTROL-M/Enterprise Manager system defaults
and database server configuration settings.
xv
Related Documentation
The following BMC publications are also relevant to
CONTROL-M/EM.documentation:related publications
To view any online book that BMC Software offers, visit the support
page of the BMC Software Web site at http://www.bmc.com/support.html.
Log on and select a product to access the related documentation. (To log
on, first-time users can request a user name and password by registering
at the support page or by contacting a BMC Software sales
representative.)
BMC Software provides a core set of printed books with your product
order. To request additional books, go to
http://www.bmc.com/support.html.
xvii
Online Help
You can access Help for a product through the product’s Help menu. The
online Help provides information about the product’s graphical user
interface (GUI) and provides instructions for completing tasks.
Release Notes
The latest versions of the release notes are also available on the Web at
http://www.bmc.com/support.on-line support:release notes
documentation:conventionsdocument
conventionsConventions
The following abbreviations are used in this guide:
Abbreviationdocum
ent
conventions:abbrevi
ations Description
CONTROL-M/EM CONTROL-M/Enterprise Manager
Net CONTROL-M/EM Network
WS-GTW CONTROL-M/EM workstation gateway
DC-GTW Data center gateway (for MVS data centers, this is
referred to as ECSGATE or IOAGATE)
<home-directory> Directory in which CONTROL-M/EM is installed
{AND|OR}
xix
Ellipsis An ellipsis ( . . . ) indicates that you can repeat the
preceding item or items as many times as
necessary.
Option Symbol A vertical bar ( | ) separating items indicates that
you must choose one item. In the following
example, you would choose a, b, or c:
a|b|c
Overview 1
This guide addresses security. Administrators can refer to this book for
information on defining users and workstations and assigning them
access privileges.
Introducing CONTROL-M/EM
CONTROL-M/Enterprise Manager is a software product that runs
primarily on Windows and Unix workstations to provide centralized
control of the job scheduling production environment for the entire
enterprise. The CONTROL-M/EM advanced graphical user interface
(GUI) enables you to view production flows for the entire active
environment.
Overview 1-1
CONTROL-M/Enterprise Manager works together with CONTROL-M
Production Control Systems and the CONTROL-R Automated Job
Restart System (that is available on OS/390 platforms only).
Overview 1-3
Table 1-1 CONTROL-M/EM Components (Part 2 of 3)
Overview 1-5
Figure 1-2 Multi-Platform Enterprise
Note
Prior to CONTROL-M/EM version 6.1.00 Beta, CONTROL-M/EM
database functions were divided between two databases, the Server
database and the Users database. As of CONTROL-M/EM version 6.1.00
Beta, these functions are combined in a single database.
Overview 1-7
Administrator Responsibilities
CONTROL-M/EM has three areas of administrative responsibility. Each
area has certain privileges, functions, and responsibilities, and is
accessed by a specific user name (title). The CONTROL-M/Enterprise
Manager Administrator Guide describes the responsibilities of these
three administrator-users:
• CONTROL-M/EM Administrator
The CONTROL-M/EM administrator (also known as the Database
Owner or DBO) effectively “owns” all CONTROL-M/EM programs
and database files. In addition to being a regular user, the
CONTROL-M/EM administrator is responsible for:
• Windows Administrator
The Windows administrator’s responsibilities include defining
Windows users and performing various system security functions.
Overview 1-9
CONTROL-M/EM Related Products
The CONTROL-M/EM system includes the BMC Software products
listed below. Which of these products you should install depends on the
types of CONTROL-M installations at your site:
• CONTROL-M or CONTROL-M/SERVER
Production control and tracking product that runs in each
CONTROL-M installation.
• CONTROL-M/Agent
Production platform-based product used when CONTROL-M
Server/Agent Technology is implemented.
Note
You can also create and run jobs for specified applications (for example
SAP or Oracle Applications). For more information, see the User Guide
for the appropriate CONTROL-M Control Module.
Note
You can add a timezone to the predefined list. For more information, see
“Adding and Modifying Time Zone Definitions” on page 1-14.
This can result is a larger Active Jobs file and therefore slower
processing. To avoid this problem, see “Recommended Method for
Ordering Jobs with Specific Time Zones” on page 1-13.
Value Description
HAW Hawaii (GMT-10:00)
Overview 1-11
Table 1-2 Time Zone Values
Value Description
MST Mountain Standard Time (GMT-07:00)
• Newly defined jobs with specified time zones must be saved at least
48 hours before their intended execution dates (in order to ensure
that they are ordered automatically by the appropriate New Day
Procedure or User Daily).
• In addition to time zones, you can also order a job that is intended for
execution on a future date. For more information, see the odate and
odate_option parameters in any of the following
CONTROL-M/Server utilities:
— ctmudly
— ctmudchk
1. Create a separate scheduling table for each time zone that you will be
using and place the jobs definitions for that time zone in that table.
2. Define a User Daily job (using the ctmudly utility) for each
scheduling table that was created in Step 1.
• Specify a time for the User daily that corresponds to just after the
beginning of the working day in that time zone.
• In the -odate parameter, specify the working date for the time
zone (usually either the current CONTROL-M/Server working
date, or the next day).
Overview 1-13
• In the -odate_option parameter, specify run_date, to indicate
that the odate value should be used to determine the working day
on which the jobs should run.
3. List the User Daily jobs in the ctmorder section of the New Day
Procedure.
This method ensures that the appropriate jobs are ordered only when they
become necessary, thus resulting in a smaller Active Jobs file and faster
processing.
You can add or modify line in this file as long as you conform to the
following format:
xxx (GMT±hh:mm)
Example
To create a time zone for New York that is five hours earlier than
Greenwich Mean Time, specify:
NYC (GMT-05:00)
Overview 1-15
BMC Software, Inc., Confidential and Proprietary Information
Field Description
Enable Specifies whether the CONTROL-M/Enterprise
Manager GUI is connected to the gateway that is
defined for this CONTROL-M installation.
CONTROL-M Descriptive name for the CONTROL-M (maximum 20
characters; for example, HQ, PARIS, DIVISION-007).
The name should describe the specified
CONTROL-M installation and be easily recognized by
users.
Field Description
TCP/IP Port Number TCP/IP port for communicating with CONTROL-M.
5. Click OK.
4. Click Update.
7. Click OK.
4. Click Enable/Disable.
-or-
4. Click Delete.
5. Click OK.
Maintaining CONTROL-M/EM 3
• Component Descriptions
• Starting and Stopping CONTROL-M/EM Components
• Cleanup of Old Global Conditions
• Gateway Log
• CONTROL-M/EM Administrator Password
• OS/390 Performance Analysis
• Configuring ENTERPRISE/CS for Use with a Firewall
• Hostname and Port Changes
Component Descriptions
Database Server (DB server)
A Sybase Adaptive Server, Oracle Server, or MSSQL Server that enables
the application to access the database. The database server is started as a
service on the computer on which it is installed. The database server
must be active before any of the other components is started.
CONTROL-M/EM Server
Process that handles communication between CONTROL-M/EM GUI
workstations and other CONTROL-M/EM components. The
CONTROL-M/EM Server can run only if the database server is running.
The CONTROL-M/EM Server must be started from the Administration
facility. For information, see Chapter 3, “Starting/Stopping
CONTROL-M/EM,” in the Enterprise Controlstation User Guide.
CONTROL-M/Desktop
Application that defines and manages job processing definitions,
Scheduling tables, and calendars. As a standalone application,
CONTROL-M/Desktop does not require the Database server to be
running. CONTROL-M/Desktop is started by choosing Start =>
Programs => Enterprise Controlstation => CONTROL-M/Desktop
or by choosing CONTROL-M/Desktop from the Tools menu in the
CONTROL-M/EM GUI. For information, see the CONTROL-M/Desktop
User Guide.
Note
When the EnablePriv utility is used, you can shut down any process
running on the computer. Therefore, use the EnablePriv utility with
caution to avoid interfering with crucial system activity or crashing the
computer.
2. Choose Start => Run to display the Run dialog box. Type
driveletter:\Ecsnt\MaintAgent\EnablePriv.exe taskmgr.exe in the
Open text box and click OK. The Task Manager is displayed.
4. Choose File => Exit Task Manager to close the Task Manager
window.
Note
The programs that can be started and stopped automatically are the
Administration agent, the database server, and the Orbix Server
(IT Naming and IT Locator services). These programs are compose the
basic infrastructure on which CONTROL-M/EM runs. Automating their
startup and shutdown provides greater system stability.
You must supply different parameters for each of the supported Unix
platforms. Instructions for AIX are on page 3-7. Instructions for HP-UX
are on page 3-9. Instructions for Solaris are on page 3-10.
Note
You need to specify a command only if the program that the command
affects is installed on the computer.
Start Programs
2. Create a text file and save it in \etc\ with the name inittab.
Note
If there already is an initab file in \etc\, add the commands in Step 3 on
page 3-7 to the existing file.
Stop Programs
2. Create a text file and save it in \etc\ with the name rc.shutdown.
Note
If there already is an rc.shutdown file in \etc\, add the commands in Step
3 on page 3-7 to the existing file.
Start Programs
2. Open a text editor and create a script with a name that conforms to
the following convention:
su -<ecs_account> -c "start_orbix2000_services"
su -<ecs_account> -c "start_server"
Stop Programs
2. Open a text editor and create a script with a name that conforms to
the following convention:
su -<ecs_account> -c "stop_orbix2000_services"
su -<ecs_account> -c "stop_server -U
<db_server_administrator_name> -P
<db_server_administrator_name>"
Start Programs
2. Open a text editor and create a script with a name that conforms to
the following convention:
S<number><name> (for example: S123start)
su -<ecs_account> -c "start_orbix2000_services"
su -<ecs_account> -c "start_server"
Stop Programs
2. Open a text editor and create a script with a name that conforms to
the following convention:
K<number><name> (for example: K123stop)
su -<ecs_account> -c "stop_orbix2000_services"
su -<ecs_account> -c "stop_server -U
<db_server_administrator_name> -P
<db_server_administrator_name>"
Note
This cleanup procedure is performed in CONTROL-M for OS/390 sites
using the IOACLRES utility. For more information, see the
INCONTROL for OS/390 Utility Guide.
To see the name of the current log file, open the Command Prompt
window running the gateway.
Note
If you change the CONTROL-M/EM administrator password, you must
stop and restart the gateway for the change to be effective.
-or-
2. Using the firewall interface to open the necessary ports for incoming
communication to ENTERPRISE/CS components.
The assign_ports script must be run on every computer that hosts the
components that you want to protect with firewall.
Note
The assign_ports script works on computers running Unix and on
computers running Microsoft Windows.
• GUI Server
• Global Alert Server
• CLI utility
• Orbix Naming Service
• Orbix Locator
• ENTERPRISE/CS GUI
• CONTROL-M/Desktop
Step 1 Ports can only be assigned for most components when they are not
active. Verify that components to be assigned ports are not active.
Note
Orbix components do not need to be stopped in order to assign ports for
them.
Step 2 On a computer that hosts one or more of the components in the above
bulleted list, enter the following command:
assign_ports
GUI Server
Global Alert Server
CLI utility
Orbix Naming Service
Orbix Locator
ENTERPRISE/CS GUI
CONTROL-M/Desktop
ENTERPRISE/CS components
-----------------------------
Using a comma-separated list, select the set
of services you wish to configure in this installation. (For example: 1,3):
[1] GUI Server
[2] Global Alert Server
[3] CLI utility
[4] Orbix Naming Service
[5] Orbix Locator
[6] ENTERPRISE/CS GUI
[7] CONTROL-M/Desktop
[8] No components, exit.
Note
The ENTERPRISE/CS GUI and CONTROL-M/Desktop are displayed in
the assign_ports script menu only when the script is run on computers
running Microsoft Windows.
Step 5 Specify the numbers of the components that you want to enable for use
with the firewall. Separate these numbers with commas.
Example
To configure the GUI Server, the Global Alert Server, and the Orbix
Naming Service, enter:
1,2,4
Step 6 Press <Enter>. The a message similar to the following is displayed for
each selected component:
Components [1]:
CLI utility communication port
-----------------------------------------------
CLI utility port [23077]:
Note
If you selected option 5 (Orbix Locator), a message is displayed
indicating the port that is already assigned to this component. You can
either keep the currently assigned port and open it in the firewall, or you
can assign a new port number for this component at this time.
Note
When assigning a port to an Orbix component, certain additional
information messages are displayed.
When you have specified ports for all selected components, the word
Done is displayed, and the regular command prompt is displayed.
For information about how to register port numbers in your firewall, see
the documentation provided with your firewall software.
Note
The ENTERPRISE/CS Administrator account is the only user account
that has permission to use the Administration facility.
Note
Administration Facility agents are implemented as services on Windows
and as daemons on Unix. Agents start automatically when Windows is
booted. Agent daemons on Unix must be restarted manually or by using a
script when the computer is rebooted. For information about manual
restart, see “Activation Menu” on page 5-3.
Example
The agent on computer Mktg5 writes to the ENTERPRISE/CS database
that gateway GTW10 is stopped. The Administration facility window
checks the database and updates the window with this information. The
administrator sees the state of the gateway and changes the desired state
of the gateway to Up. The window writes the desired state to the
database. The agent reads the update information from the database and
starts the gateway so that its current state is compatible with the desired
state. The agent updates the database that the gateway has been started.
The Administration Facility window polls the database and updates the
information in the display window to indicate that gateway GTW10 has
started.
-or-
-or-
Choose View => Tree View, and select the desired view option.
Note
The tree view of the Administration Facility window can be expanded
and contracted by clicking on the + and - signs at each level of the
hierarchy. Clicking on a + symbol expands a branch of the tree, exposing
the nodes underneath. Clicking a - symbol hides the nodes of the branch.
Note
To sort rows according to a column in the table, click on the column
header (title).
The following table describes the columns in the table view of the
Administration Facility window.
Component States
Current State
The current state is the state most recently reported for each registered
component by its Administration agent. Current states are displayed in
the Administration facility window. The possible states that can be
displayed for a component are:
State Description
Up The component is active (started).
Hanging The component is not functioning, but it has not shut down.
Desired State
State Description
Up The component should be active (started).
The Administration Facility window uses icons and colors to help you
quickly determine the states of the components on your network. These
are described in Figure 4-1 on page 4-8.
Tree View
In the tree view, the top two levels (computers and component types) are
marked by high-level status icons: green check marks or red
exclamation points .
• An exclamation point indicates that the current state does not match
the desired state of at least one component of the computer or
component type.
• A red arrow indicates that the current state and the desired state
of the component are not the same, and that the Administration
Facility agent for the component has not successfully started or
stopped the component to match the desired state. The direction of
the red arrow indicates the current state of the component.
Table View
Color Description
Green Current state and desired state are both UP.
Transparent Current state and desired state are both DOWN.
Red Current state and desired state do not match.
Yellow Current state of the component is WARNING.
Note
Select the Ignored option from the Desired State list in the Component
if you do not care whether the component is up or down.
After performing any of the above procedures, the new desired state is
displayed in the Desired State column in the table view, and the
CONTROL-M/EM database is updated to indicate the desired status. The
relevant Administration Facility agent detects the update request and
attempts to start or stop the component, as requested.
The agent attempts to change the component state until either the desired
state matches the current state, until Ignored is selected as the desired
state, or until it has performed the number of attempts determined by the
ActiveRetries parameter. For information on modifying the value of this
parameter, see Table C-5, “Maintenance Parameters,” on page C-10.
3. Click OK.
Registering Components
Note
To delete (unregister) a registered component, select the component in
the Administrator Facility window, and press <Delete>.
-or-
Select the component and then choose Delete Component from the
Component menu.
-or-
-or-
Note
The Build from Network automatically specifies attribute information
for each component in the network. This information can be altered
manually by selecting the component in the Administration facility
window and performing Update Component. For more information, see
“Updating Information about Registered Components” on page 4-21.
-or-
3. Click OK.
Field Description
Type Component type. Valid values:
gateway
GAS (Global Alert Server)
GCS (Global Condition Server)
GUI Server
Name Unique name for the component.
Field Description
Machine Type Type of platform on which the component is installed
(such as Unix).
Machine Name Unique name for the host computer of the component.
Field Description
Current Current state of the component. This setting cannot be modified
State by the user.
Desired Preferred state for the component. Valid values:
State Up (start)
Down (stop)
Ignored
Last Time when the Administration Facility agent last updated the
Update database with component information. This state cannot be
modified by the user.
Field Description
Text Message about the component, recorded in the database by the
Message Administration Facility agent. This value cannot be modified by
the user.
Check Time interval after which the Administration agent checks the
Interval component and reports its status to the CONTROL-M/EM
database. Default: 10 seconds.
This state applies only to this component and its agent. (It is not
automatically applied to other components of the same type.)
Field Description
Command Command line used for starting the component. This value is
entered automatically, based on the component type,
component name, and computer type. This value cannot
normally be modified by the user.
Override Allows the user to modify the Command line.
Manually
Additional Additional parameters added to the command line (for
Parameters example, debugging, trace).
-or-
-or-
-or-
• Click .
For more information about fields of the Component dialog box, see
“Component Dialog Box” on page 4-19.
2. Click New.
5. Fill in the desired criteria in the dialog box. For information about
the fields in this dialog box., see Table 4-7, “Fields of the Filter
Properties Dialog Box,” on page 4-25.
7. Select the name of the new filter. Click Set Filter to apply the
selected filter.
3. Click Set Filter to apply the filter. Components that match the filter
criteria are displayed in the Administration Facility window.
BMC Software, Inc., Confidential and Proprietary Information
4. Make the desired changes in the Filter Properties dialog box. For
information about the fields in this dialog box, see Table 4-7, “Fields
of the Filter Properties Dialog Box,” on page 4-25.
6. Select the filter name and click Set Filter in the dialog box to display
the modified filter.
-or-
All filter criteria are optional. If a variable is not necessary for a filter
definition, do not enter any information in the field for that variable.
Note
The All Components filter is the default filter. It displays all registered
components in the network. It cannot be deleted or modified. When the
All Components filter is selected, the Update and Delete buttons in the
Filter Manager dialog box are not available.
Field Description
Filter Name Name of the filter.
Machine Name or mask of the computer (or computers) whose
Name components are to be displayed. For example, Saturn%
specifies all computers whose names start with “Saturn.”
Component Component types to be displayed.
Type
Component Name or mask of the components to be displayed.
Name
Current Current component state. Valid values: Up, Down, Hanging,
State Ignored, and Warning.
Desired Desired component state. Valid values: Up, Down, and
State Ignored.
Note
Multiple components or computers can be specified using wildcards. The
wildcards recognized by the Filter Manager are % or ?, where %
represents any single-character or multi-character string, and ? represents
any single character. Wildcards can appear at any place in the text string.
» Choose Tools => Options. In the Options dialog box, enter a number
between 1 and 3600 (seconds) in the Database Polling Interval text
box. Click OK. The Options dialog box is displayed in Figure 4-2 on
page 4-15.
Note
The default value for both intervals is 10 seconds. Setting an interval
shorter than this is not recommended.
Records in the Agents log contain the information listed in Table 4-8:
Heading Description
Agent Name of the component or computer.
Time Time when the event occurred.
Events A description of an event. The most common log messages are
described in Table 4-10.
Heading Description
<component> Variable that is replaced with the type of CONTROL-M/EM
component for the message. For a gateway, the logical
name of the gateway is also displayed.
PID process identification number of the component in the
CONTROL-M/EM database.
CTLPort Port number which the component uses to listen to the
CONTROL-M/EM environment.
Detail
Message Description Level
Starting checks for <component>. The agent has begun to check the state of the 2
specified component.
Checks for <component> The agent has finished checking the state of the 2
terminated. specified component.
No commreg details for The Administration agent can not find the specified 2
<component>. component in the table that enables communication
with the component. This may be because the
component was recently started and has not yet
attempted to establish communication with
CONTROL-M/EM.
<component> PID=<PID_number> The status of the component was successfully 3
CTLPort=<port_number> is OK. changed to the specified desired state.
<component> PID=<PID_number> The status of the component is Ignored. 3
CTLPort=<port_number> is
Ignored.
<component> PID=<PID_number> The Administration agent is attempting to stop the 2
CTLPort=<port_number> SHOULD process of the specified component. This attempt is
BE DOWN! Trying to stop. repeated until either a number of retries are
performed or the process is successfully stopped. If
the specified number is reached, as specified by
the StopTries parameter, the Agent attempts to kill
the process.
<component> PID=<PID_number> The Administration agent is attempting to kill the 2
CTLPort=<port_number> SHOULD process of the specified component. This continues
BE DOWN! Trying to terminate. until a number of unsuccessful retries are
performed. When the retries are exhausted, manual
intervention is required.
Detail
Message Description Level
<component> PID=<PID_number> The Administration agent has made five 2
CTLPort=<port_number> SHOULD unsuccessful attempts to kill the process. This
BE DOWN! All retries failed. Check value is not configurable.
manually.
<component> PID=<PID_number> The Administration agent is attempting to activate 2
CTLPort=<port_number> SHOULD the process of the specified component.
BE UP! Trying to activate.
<component> PID=<PID_number> The Administration agent is waiting for the time 2
CTLPort=<port_number> SHOULD interval to expire between an attempt to start a
BE UP! Waiting for restart interval component and the next attempt.
to expire.
<component> PID=<PID_number> The Administration agent has made the maximum 2
CTLPort=<port_number> SHOULD number of unsuccessful attempts to start the
BE UP! Activate retries exhausted. component. The administrator must identify and
correct the problem that is preventing the
component from working, change the component’s
desired state to Ignored for a brief period, and
again specify the desired state to Up.
Logon to database successful. The agent has logged on to the database. 1
No components found. The agent did not find any components. 3
MaintAgent stopped manually. The Administration agent was stopped by a user 1
using the ctl utility.
Shut down in progress. The Administration agent and the CONTROL-M/EM 1
components on the host machine are shutting
down. This is done using ctl -shutdown.
Filter
Option Description
Agent Component name or computer name for which to display log
records.
Note: A mask can be specified for this field using wildcards. The
wildcards recognized by the Agent Log filter are % and ?. Where:
% represents any number of alphanumeric characters, and ?
represents any single alphanumeric character. Wildcards can
appear at any place in the text string.
Entry An alphanumeric string that should appear in the Events column
Text of the displayed Agent log records. Wildcards can be used to
obtain a range of cases.
For example, %Start% would select all records that have the
string Start anywhere in the Activities column of the Agents log.
The filter is case-sensitive.
To change the number of days that entries are kept in the Agent log:
1. Choose Tools => Options. The Options dialog box is displayed. for
an illustration of the dialog box, see Figure 4-2 on page 4-15.
2. Specify a number (of days) in the Delete Log Entries Older Than n
days text box.
Heading Description
Type Name of the CONTROL-M/EM component that is configured
by the parameter. This value cannot be modified by the user.
Note
Multiple conditions can be specified for a single parameter.
The only exceptions are the Modify Value Only, Modify Condition,
and Add Condition options, which are explained in the following
steps.
3. Replace the value displayed in the Value text box with any valid
value for the selected parameter. None of the other fields can be
modified.
4. Specify a value in the Value text box. The Type and Name fields
cannot be modified.
Note
You cannot add a condition to the default row for the parameter that you
selected. To add a conditional setting, you must add a new row to the
table. As a result, both the default row and the conditional row are
displayed in the table.
Example
The Global Alerts Server (GAS) is installed on two different computers
in your network, CMPMAIN and CMPBKUP. Generally, only the GAS
on CMPMAIN is active.
The NumberOfLogFiles GAS parameter (which determines the number
of log files in use) is set to 3. This indicates that every GAS in the
network maintains three log files. However, the GAS on CMPBKUP is
used as a GAS host only for short periods when CMPMAIN is down for
maintenance. You want to indicate that only one log file is needed for the
GAS on CMPBKUP.
After displaying the Update/View Parameter window, add a new entry
to the system parameters table, with the Comp. Name CMPBKUP and
the Value 1. This indicates that, when active, the GAS on CMPBKUP
maintains one log file. Any other GAS on the system maintains the usual
three log files, when active.
4. Specify a value in the Value text box. The Type and Name fields
cannot be modified.
Example
The Global Alerts Server (GAS) is installed on two different computers
in your network, CMPMAIN and CMPBKUP. Generally, only the GAS
on CMPMAIN is active.
The NumberOfLogFiles GAS parameter (which determines the number
of log files in use) is set at 3. This indicates that every GAS in the
network maintains three log files. The GAS on CMPBKUP is used as a
GAS host only for short periods when CMPMAIN is down for
maintenance, and you have created a conditional parameter setting for
NumberOfLogFiles that maintains only one log file.
Recently, CMPBKUP was upgraded with a larger hard drive, and you
want the GAS to maintain two logs files, when active.
Click on the conditional parameter setting in the systems parameter table
to display the Update/View Parameter window, and modify the Value
to 2, without changing the value for Comp. Name, CMPBKUP. When
the GAS on CMPBKUP is active, it now maintains two log files. Any
other GAS on the system maintains the usual three log files, when active.
Note
Parameter entries that you added to the system parameters table in the
CONTROL-M/EM System Parameters window can be deleted by
4. Click OK.
All alerts posted prior to the specified date are deleted from the
CONTROL-M/EM database. If an alert was posted prior to the specified
date, but was updated after that date, it is not erased.
Note
When CONTROL-M/EM is connected to an MSSQL database, the
Extend Database function is not available.
Element Description
Data or Log Specifies either the Data or the Log segment to extend.
Size Specifies a size (in MB) for the database segment.
File Name Specifies the path and name for the segment that is being
modified.
Element Description
Table Space Type of the tablespace to extend or create.
Name
Extension Specifies the size (in MB) that the database segment will be
Size (MB) extended.
Extend Extends an existing database file.
Existing File
Add New File Creates a new database file.
Data File Specifies the path and name for the segment that is being
Name extended or created.
Note
You must specify the password for the DBA superuser to access this
window. This option can be selected while CONTROL-M/EM is active.
Note
When CONTROL-M/EM is connected to an MSSQL database, the
Check Space function is not available.
SQL Client
Starts an interactive SQL session so that you can issue direct SQL
commands and perform troubleshooting and fixes under special
circumstances.
Note
This option should only be used when specifically requested by BMC
Software Technical Support.
Note
The database server be running for the root menu and the root menu
submenus to be displayed.
root_menu
Root Menu
---------------
Select one of the following options:
1 - Activation Menu
2 - Troubleshooting Menu
3 - New Window
4 - Database Creation Menu
5 - Database Maintenance Menu
Option Description
Activation Menu Displays the Activation menu, described on page
5-3.
Troubleshooting Menu Displays the Troubleshooting menu, described in
Chapter 7, “Troubleshooting.”
New Window Opens an Xterm window.
Option Description
Database Creation Displays the Database Creation menu, described
Menu on page 5-6.
Database Maintenance Displays the Database Maintenance menu,
Menu described on page 5-27.
Activation Menu
The Activation menu starts and stops the CONTROL-M/EM
Administration agent, the Orbix Server (Naming and Locator services),
and the database server. It also performs the Check All function.
Activation Menu
---------------
Select one of the following options:
1 - Check All
2 - Start All
3 - Start Database Server
4 - Start Orbix Services
5 - Start Administration Agent
7 - Stop All
8 - Stop Database Server
9 - Stop Orbix Services
10 - Stop Administration Agent
p - Previous Menu
q - Quit
Note
Alternately, you can perform many of these management functions from
the Administration facility (a part of the CONTROL-M/EM GUI) that is
installed on Microsoft Windows. For more information about the
Administration facility, see Chapter 4, “Managing CONTROL-M/EM
Using the Administration Facility.”
Select Database Creation Menu from the root menu. The following menu
is displayed:
Note
Only the CONTROL-M/EM administrator can use Database Creation
Menu options.
1 - Build Database
2 - Delete Database
p - Previous Menu
q - Quit
One of the most crucial types of maintenance you may need to perform is
the restoration of a corrupted CONTROL-M/EM database. The database
can be reinstalled using one of the following methods:
Note
Lost CONTROL-M/EM data must be restored from a backup copy. It is
recommended that you frequently back up your data.
Note
This section applies only if the CONTROL-M/EM database and the
database server are hosted on a Unix computer.
Database Environment
Component Description
Database Server This process serves all users of the
(Sybase Adaptive CONTROL-M/EM application. The process reads
Server) and updates the data stored in the database files.
The same server can also serve databases and
applications other than CONTROL-M/EM. This
process is typically named dataserver.
Sybase System This file contains Sybase system procedures.
Procedures File
Master Database File This file contains Sybase system information such
as device names, user names, and pre-defined
Sybase data.
Data File This file is the CONTROL-M/EM database,
containing all job networks (active, old, simulation),
Scheduling tables, calendars, and so on. This file
also includes the database indexes.
Component Description
Log File (Sybase The database server uses this file to recover from
Transaction Log) failures and to ensure data integrity.
Database Devices These are the physical storage locations for the
database. They can be either Unix or Windows
operating system files, or raw devices (raw partition
in Solaris, HP, and Windows, or logical volume in
AIX).
For more information on allocating raw devices in your system, see the
appendix, “Creating a Raw Device for the CONTROL-M/EM Database”
in the Enterprise Controlstation Installation Guide.
6. Check that the following minimal values are defined for the database
server configuration parameters. If necessary, set them using
sp_configure or Alter Database:
User Connections 60
Open Objects 2000
Size of tempdb 50
Note
With this configuration, certain limitations apply when using the
CONTROL-M/EM root menu. Menu options such as Start Database
Server, Stop Database Server, and Delete Database are disabled
because the CONTROL-M/EM database is not under the exclusive
control of the CONTROL-M/EM administrator. Attempting to use these
menu options causes the message “This command can only be executed
with a dedicated CONTROL-M/EM database server” to be displayed.
Note
The default values for the parameters used in this procedure are defined
for the installation. If Build Database was run at least once, or if
parameter values were changed using Show Parameters, the displayed
values are based on the values you last assigned.
To Build a Database:
Note
You must be logged on as an CONTROL-M/EM Administrator user to
perform the following procedure.
• CONTROL-M/Desktop
• All open sql sessions
Note
If you have a distributed installation, you must also shut down
components that are installed on computers other than the local
computer.
root_menu
Note
Do not leave the root menu or any of its submenus (by choosing q to
quit) at any time before completing this procedure. Doing so can cause
damage to your data.
If you quit (pressed q) to leave the root menu or one of its submenus
before reaching Step 16, you must perform the workaround beginning
with Step 17 on page 5-15.
1 - Activation Menu
2 - Troubleshooting Menu
3 - New Window
4 - Database Creation Menu
5 - Database Maintenance Menu
1 - Build Database
2 - Delete Database
p - Previous Menu
q - Quit
Database Parameters
1) CONTROL-M/EM Database Owner (DBO):
2) DBO Password:
3) Database Administrator’s Password:
4) Database (Data Portion) Size:
5) Sybase Interface Directory:
6) Sybase Server Name:
7) CONTROL-M/EM Database Name:
8) CONTROL-M/EM Database Data Device Name:
9) CONTROL-M/EM Database Log Device Name:
1 - Export Database
2 - Import Database
3 - Custom Export/Import
4 - Extend Database Size
5 - Erase Alerts
6 - Modify Interfaces File
7 - Modify Database Name
p - Previous Menu
q - Quit
14. Press 2 to begin the Import procedure. You are prompted to locate
the <export_file_name> file you exported in Step 1 on page
5-11.
Note
The CONTROL-M/EM build procedure is complete. However, if you
quit the root menu or its submenus prematurely, you must perform the
workaround beginning with Step 17.
uncompress <export_file_name>
20. Import the databse data to the new database using the following
command:
Note
This section applies only if the CONTROL-M/EM database and the
database server are hosted on a Unix computer.
Database Environment
Component Description
Database Server This process serves all users of the
(Oracle Server) CONTROL-M/EM application: the process reads
and updates the data stored in the database files.
The same server can also serve databases and
applications other than CONTROL-M/EM. This
process is typically named dataserver.
SYSTEM Tablespace The SYSTEM tablespace contains the data
dictionary tables for the entire database.
Component Description
Data Tablespace This database is the CONTROL-M/EM database,
containing all job networks (active, old, simulation),
Scheduling tables, calendars, and so on.
Index Tablespace This file contains the database indexes.
Redo Log File The database server uses this file to recover from
failures and assure data integrity.
Note
Tablespaces can be installed either as files or as raw devices.
For more information about allocating raw devices in your system, see
the appendix, entitled “Creating a Raw Device for the
CONTROL-M/EM Database,” in the Enterprise Controlstation
Installation Guide.
3. Obtain the file names for the CONTROL-M/EM Data and Index
tablespaces.
5. Check that the following minimal values are defined for the Oracle
Server configuration parameters. If necessary, set them using
sp_configure or Alter Database:
Note
With this configuration, certain limitations apply when using the
CONTROL-M/EM root menu. Menu options such as Start Database,
Stop Database, and Delete Database are disabled because the
CONTROL-M/EM database is not under the exclusive control of the
CONTROL-M/EM administrator. Attempting to use these menu options
causes the message, “This command can only be executed with a
dedicated CONTROL-M/EM database server,” to be displayed.
1 - Build Database
2 - Delete Database
p - Previous Menu
q - Quit
Enter option number --->
To select an option from the menu, press the number or letter appearing
to the left of the option. Each option in the Database Creation menu is
described below:
• Build Database
Builds (or rebuilds) the entire CONTROL-M/EM database
environment from scratch, including the SYSTEM tablespace,
the Data tablespace, the Index tablespace, Redo log files and file
names or raw device names.
-or-
• Delete Database
Deletes the CONTROL-M/EM database entirely and removes
the database files. After using this option, CONTROL-M/EM
cannot be run until after the Build Database option is run.
Note
The default values for the parameters used in this procedure are defined
for the installation. If Build Database was run at least once, or if
parameter values were changed using Show Parameters, the displayed
values are based on the values you last assigned.
To Build a Database:
Note
You must be logged on as an CONTROL-M/EM Administrator user to
perform the following procedure.
• CONTROL-M/Desktop
• All open sql sessions
Note
If you have a distributed installation, you must also shut down
components that are installed on computers other than the local
computer.
root_menu
Note
Do not leave the root menu or any of its submenus (by choosing q to
quit) at any time before completing this procedure. Doing so can cause
damage to your data.
If you quit (pressed q) to leave the root menu or one of its submenus
before reaching Step 16, you must perform the workaround beginning
with Step 17 on page 5-25.
Root Menu
---------------
Select one of the following options:
1 - Activation Menu
2 - Troubleshooting Menu
3 - New Window
4 - Database Creation Menu
5 - Database Maintenance Menu
1 - Build Database
2 - Delete Database
p - Previous Menu
q - Quit
1 - Export Database
2 - Import Database
3 - Custom Export/Import
4 - Extend Database Size
5 - Erase Alerts
6 - Modify Interfaces File
7 - Modify Database Name
p - Previous Menu
q - Quit
14. Press 2 to begin the Import procedure. You are prompted to locate
the <export_file_name> file you exported in Step 1 on page
5-21.
Note
The CONTROL-M/EM build procedure is complete. However, if you
quit the root menu or its submenus prematurely, you must perform the
workaround beginning with Step 17.
uncompress <export_file_name>
20. Import the databse data to the new database using the following
command:
Database Parameters
1 - Export Database
2 - Import Database
3 - Custom Export/Import
4 - Extend Database Size
5 - Erase Alerts
6 - Modify Interfaces File
7 - Modify Database Name
p - Previous Menu
q - Quit
To select an option from the menu, press the number or letter appearing
to the left of the option. Each option in the Database Maintenance menu
is described in Table 5-6.
The Import Database utility reads the data file created by the Export
Database utility and loads it into an existing CONTROL-M/EM
database, overwriting any existing data in the database.
Note
When the database is exported to a file, you are prompted for a filename.
The extension .Z is appended to the filename. When specifying the name
of the file to import, do not include the .Z extension.
The conditions described above must exist when the utility is run. The
utility takes the name of the file to which the database will be exported
from the Export/Import default parameters. Once started, the utility
prompts for the password of the database server administrator (if
required).
Note
All gateways and CONTROL-M/EM GUIs must be down when
exporting a database.
Import Database
The conditions described above must exist when the utility is run. Once
started, the utility prompts for the following:
• Name of the file or device from which the database will be imported.
Note
All gateways and CONTROL-M/EM GUIs must be down when
importing a database.
Note
When this option is used to import a file into a database other than the
database from which the file was exported, the original passwords are
preserved.
Use the Custom Export/Import menu to customize the import and export
features. options 1-7 indicate whether a specific type of
CONTROL-M/EM data is included (Y) or not included (N) in the export
or import.
1) Definition Tables.............. N
2) Calendars...................... Y
3) System Tables.................. N
4) Data Centers................... Y
5) Users Tables................... Y
6) Alert.......................... Y
7) Global Conditions.............. Y
8) Maint.......................... Y
9) Collections.................... Y
10) View.......................... Y
11) Filter........................ Y
12) Log........................... Y
13) Hierarchy..................... Y
14) User Views.................... Y
15) Net........................... N
16) Default Net Name.............. All
17) Default Export Media.......... File
18) Default Device................
{ECS_HOME}/ExportImportFile.txt
e) Export Now
i) Import Now
To select an option from the menu, press the number or letter appearing
to the left of the option. A prompt is displayed requesting the new value
of the parameter. Enter e or i to activate the Export Database or Import
Database utility. These menu options are described in Table 5-7.
BMC Software, Inc., Confidential and Proprietary Information
Selecting this option displays the dsedit utility menu. This menu enables
you to modify the Sybase Interfaces file. For information about using
dsedit, see your Sybase Adaptive Server documentation.
The db_check utility can also be used to provide automatic database and
transaction log monitoring. The following options are available:
Security 6
Security 6-1
Integral Workstation Security
• File Protection
The Unix super-user can limit access to Unix files (program and data
files) to specific users. This provides an additional level of protection
and security.
CONTROL-M/EM Security
Security 6-3
If the CONTROL-M security mechanism is implemented in a
CONTROL-M to which global condition actions will be repeated, a user
named GCSERV must be defined in the CONTROL-M security facility.
User GCSERV should have authorization to add and delete prerequisite
conditions.
CONTROL-M/EM Security
• Resources and conditions that the user can view or change in the
resource windows. This does not relate to resources and conditions
displayed in the Job Details window. For example, in the Job
Details window, the user can see that a job is waiting for a
prerequisite condition, but this user might not be authorized to create
this condition using the Prerequisite Condition window.
• Calendars and Scheduling tables that the user may view or modify.
Limiting access to Scheduling tables also determines which
Scheduling tables/jobs the user can order or force.
Security 6-5
The following rules apply when assigning authorizations to users:
Example
User JimA belongs to group Acct. Group Acct has Browse authority for
all Scheduling tables. User JimA is defined with Full authority for
CONTROL-M Figaro and Marius Scheduling tables. User JimA can
update and delete Scheduling tables for CONTROL-M Figaro and
Marius, but can only view Scheduling tables for other CONTROL-M
installations.
The user has the highest level of authorizations defined for any group
of which the user is a member (Default). Authorizations specified in
the User Authorization => Privileges window supercede any
Group authorizations for the specific user.
Example
User JimA also belongs to group Staff. Group Staff has Update
authority for all definitions (ViewPoints, Collections, Filter, and
Hierarchies) but only Browse authority for Authorization definitions and
Communication. User JimA is defined with Default authority for all
definitions and Update authority for Communication. User JimA can
create and modify ViewPoints and their components, as well as add,
modify, and delete CONTROL-M installations from the
CONTROL-M/EM database.
Security 6-7
• Jobs
The user has combined authorizations defined for all the groups of
which the user is a member. Authorizations specified in the User
Authorization => Job window are additional authorizations for the
specific user.
Example
User JimA belongs to group Acct. Group Acct has authorization for all
Browse and Control actions on jobs in the active environment. User
JimA is defined with authorization for Update actions. User JimA can
view jobs in the active environment in the CONTROL-M/Enterprise
Manager ViewPoint window and perform control actions (Hold, Free,
Confirm, and so forth) on these jobs. Additionally, he can edit both job
details and JCL for jobs in all CONTROL-M installations.
Security 6-9
User and Group Authorization Windows
CONTROL-M/EM security is defined for both single users and groups.
Generally, if you are a member of a group, you have the same authorizations
to view or modify entities that is assigned to the group. Authorizations
specifically defined for a user take precedence over group authorizations.
The User and Group Authorization windows are divided into separate
panels for defining each of the CONTROL-M/EM security entities.
These entity panels are described on the following pages.
Note
Only an CONTROL-M/EM administrator with Definition privileges can
add or modify User or Group authorizations. Only users with at least
Browse authorization can access the Authorization facility. For
information on modifying authorizations, see “User/Group
Authorizations – Privileges Panel” on page 6-22.
The Users and Groups window contains a list of system users and a list
of the groups that these users are members of for authorization purposes.
This window enables a properly authorized user to define new users and
groups, view or update the authorization levels of any user or group, and
to delete existing users or groups.
Field Description
User Name CONTROL-M/EM log on name of the user. This
specifies to whom the authorization refers.
User Full Name Full name of the user.
User Description Description of the user.
Group Name Identifying name for group.
Group Description Description of the group.
Security 6-11
To define a new user or group:
1. Click the New button in the appropriate section of the Users and
Groups window. The New Name window is displayed.
2. Specify a name for the user or group in the New Name window and
click OK. The User Authorizations window or Group
Authorizations window is displayed accordingly.
1. Select the user name or group name in the Users and Groups
window.
-or-
Security 6-13
The User Authorizations window or Group Authorizations window is
displayed.
1. Select the user name or group name in the Users and Groups
window.
3. Click OK.
Note
User authorizations take effect the next time the specified user logs on to
CONTROL-M/EM.
Click the appropriate tab to display the desired panel. After completing
all the panels, click OK to add the user or group to the
CONTROL-M/EM Security database. A description of each
Authorization panel is displayed below.
Security 6-15
Table 6-2 Field Descriptions
Field Description
User CONTROL-M/EM user name (required). Specifies to
whom the authorization refers.
Full Name Full name of the user.
Description Description of the user.
Password Password (minimum six characters) of the user. This
field is hidden or displayed as asterisks.
2. Click Add. The group name is added to the Member of list and
deleted from the Not Member of list.
1. While holding down the CTRL key, select each group from the Not
member of list.
2. Click Add. The selected group names are added to the Member of
list and deleted from the Not Member of list.
2. Click Remove. The selected group names are added to the Not
Member of list and deleted from the Member of list.
Security 6-17
Field Descriptions
Field Description
Group Name Identifying name for group.
Description Description of the group.
Member List List of names of users who are members of this group. This
field cannot be modified. To add or delete a user from the
group, use the General panel in the User Authorizations
window.
The Jobs panel is used to specify the jobs in the active environment that a
user can access and the actions that the user can perform on those jobs.
The Filter for Displayed Jobs and the Job actions are specified
independently.
Field Description
Filter Specifies the type of jobs the user can access.
Note: This field is not available in the Group
Authorizations window.
Browse actions Specifies the type of active job information the user is
authorized to view.
Control actions Specifies the Control actions the user can perform.
Update actions Specifies the Update actions the user can perform.
Security 6-19
To enable job actions
» Select the check box for each job action or feature that the user is
authorized to browse, control, or update.
-or-
To select all the actions and features in a category, click the Select All
button for that category.
Note
Descriptions of each job action can be found in Chapter 12, “Getting and
Updating Details,” in the CONTROL-M/Enterprise Manager User
Guide.
Column Description
Field Field to be checked in the job processing definition.
Each cell in the Field column is a list box. Click on the field to
display the window list box displayed in Figure 6-3.
Value Value of the parameter listed in the cell of the Field column that
determines whether the job selection criteria are satisfied.
Note
Use the Tab key to skip to the next field. Use the arrow keys or the
vertical scroll bar to move through the options in a list box.
Security 6-21
4. Click OK.
The Privileges panel is used to specify the actions that a user or group
can be perform on Collections, Hierarchies, Filters, ViewPoints, and
Alerts.
A description of each action and access level is given in the tables below.
Field Description
Collections Specifies the actions that can be performed on
Collections.
Hierarchies Specifies the actions that can be performed on
Hierarchies.
Field Description
Filters Specifies the actions that can be performed on Filters.
ViewPoints Specifies the actions that can be performed on
ViewPoints.
Alerts Specifies whether Alerts can be monitored and the actions
that can be performed on them.
Authorizations Specifies the actions that can be performed in the
Definitions CONTROL-M/EM authorizations windows.
Communication Specifies the actions that can be performed in the
Communication Administration window. The
Communication Administration window is used to
define CONTROL-M installations.
CLI Grants authorization for using the Command Line
Interface (CLI) utility. For more information, see the
CONTROL-M Job Parameters and Variables Reference
Guide.
To set access levels for ViewPoints, Collections, Hierarchies, Filters, and Alerts:
» Select an access level from the list box for each ViewPoint component or
for Alerts as follows:
Access
Level Description
None • Denies access to the ViewPoint component.
• Does not display alerts in the Alerts window.
Browse • Permits viewing the ViewPoint component in the ViewPoint
Manager only.
• Enables user to see Alerts in the Alerts window.
Update • Permits defining the ViewPoint component using the ViewPoint
Manager and the ViewPoint Wizard.
• Permits the user to update Alert status and delete Alerts.
Security 6-23
Access
Level Description
Full • Permits defining and deleting the ViewPoint component.
• Permits the user to update Alert status and delete Alerts.
Default (User only) User authorization level is equal to the highest
authorization level granted to any of the groups the user in which
the user is a member. (Default)
Example: The user, BOB1, has an user authorization of Default
for Alerts. He belongs to the ACCT accounting group. The
members of ACCT have Update authorization for Alerts.
Therefore, BOB1 has Update authorization.
The Scheduling Tables panel is used to specify the Scheduling tables that
a user can access and the authorization levels for using the tables.
Authorization can be granted at CONTROL-M level (for all tables
belonging to the specified CONTROL-M site), library level for OS/390
sites only, and individual Scheduling table level.
Security 6-25
Table 6-7 Field Descriptions
Field Description
Access Level Defines the authorization level for the Scheduling Tables
specified in the fields below.
CONTROL-M Specifies prefixes for CONTROL-M installations from
which the user can access Scheduling tables.
Library [OS/390] Specifies prefixes for libraries from which the
user can access Scheduling tables.
Access
Level Description
Browse Permits viewing the specified Scheduling tables in
CONTROL-M/Desktop only.
Update Permits modifying the specified Scheduling tables in
CONTROL-M/Desktop and adding new ones.
Full Permits modifying and deleting the specified Scheduling tables
and adding new ones.
3. Specify all the libraries for the Scheduling tables that will have the
indicated Access Level. Use “*” to denote all Libraries.
Note
If any field is specified for an Access Level, all fields for that Access
Level must contain a value. Use an “*” to denote all CONTROL-M
installations, libraries, or Scheduling table prefixes.
Security 6-27
The Resources and Calendars panel is used to specify which resources,
conditions, and calendars a user can access. See the chapter, “Getting and
Updating Details,” in the CONTROL-M/Enterprise Manager User Guide
for information about resources and conditions. For information about
Calendars, see the chapter, “Job Processing Definitions,” in the
CONTROL-M/Enterprise Manager User Guide.
Field Description
Access Defines the authorization level for the resources specified in
level the field below.
Type Specifies the type of resource specified in the field below.
Resource Specifies prefixes for resources the user can access.
List
2. Select an access level from the list box. Access levels are described
in Table 6-9.
Access
Level Description
Browse Permits viewing the specified resources only.
Update Permits modifying the specified resources and adding new ones.
Full Permits modifying and deleting the specified resources and
adding new ones.
3. Specify all the resources that will have the indicated Access Level.
• Click the Add button to add a resource prefix to the list. Specify
the prefix in the New Resource Prefix window, and click OK.
Use “*” to denote all resources.
Example
To set the access level of prerequisite conditions beginning with the letter
C or D as “Update”:
3. Click Add.
7. Click OK.
Security 6-29
Table 6-10 Calendar Fields
Field Description
Access Defines the authorization level for the Calendars specified in the
level field below.
Calendar Specifies prefixes for Calendars the user can access.
List
1. Select an access level from the list box. Access Levels are described
in Table 6-11.
2. Specify all the Calendars that will have the indicated Access Level.
• Click the Add button to add a prefix to the list. Specify the
prefix in the New Calendar Prefix window and click OK. Use
“*” to denote all Calendars.
• Select the prefix and click the Delete button to delete a Calendar
prefix from the list.
Security 6-31
BMC Software, Inc., Confidential and Proprietary Information
Troubleshooting 7
• Troubleshooting Menu
• DIAG Diagnostics Facility
Troubleshooting 7-1
Troubleshooting Menu
The Troubleshooting Menu option, accessed from the
CONTROL-M/EM root menu, can be used to perform a variety of
diagnostic functions. Most of the functions are available only to the
CONTROL-M/EM administrator.
Note
Troubleshooting for all currently-active Gateways and for the Global
Conditions Server(s) (GCS) on the network can be performed from a
single workstation. However, if a gateway is not currently running, you
must start it from its host computer.
Troubleshooting Menu
--------------------
Select one of the following options:
1 - Database Troubleshooting
2 - Gateway Troubleshooting
3 - Show Environment
4 - Global Conditions Server Parameters
5 - Configure Orbix2000 Parameters
p - Previous Menu
q - Quit
Troubleshooting 7-3
Table 7-1 Troubleshooting Menu Options (Part 2 of 2)
Database Troubleshooting
------------------------
p - Previous Menu
q - Quit
Troubleshooting 7-5
Table 7-2 Database Troubleshooting Menu Options
Gateway Troubleshooting
------------------------
p - Previous Menu
q - Quit
Troubleshooting 7-7
Debug Mode
Note
CONTROL-M/EM performance is somewhat slower and requires more
resources when operating in debug mode. It is recommended that the
user activate debug mode only when absolutely necessary and revert to
normal mode as soon as possible.
a) Apply to Gateway
c) Clear Flags From Screen
Troubleshooting 7-9
Table 7-4 Set Debug Parameters Menu Options (Part 2 of 2)
Communication Tracing
Note
Communication tracing should be used with caution because it slows
down communication between WS-GTWS and DC-GTWs.
• Set the Set Debug Mode (GUI) or Set Debug Mode (Host)
parameter to Y with Troubleshoot Menu => Gateway
Troubleshooting => Set Debug Parameters from the
CONTROL-M/EM root menu, described in “CONTROL-M/EM
Root Menu” on page 5-1. Message tracing takes effect immediately.
It is not necessary to stop and restart the WS-GTW. Messages are
written to the Gateway Log file, described in “Gateway Log” on
page 7-12.
Troubleshooting 7-11
• Use the ctl utility, described in “Gateway Verification Utility
(check_gtw)” on page 7-11. Messages are written to the Gateway
Log file, described in “Gateway Log” on page 7-12. When enabled
using this method, tracing is not automatically continued the next
time the gateway is restarted. Debug parameters set with Gateway
Troubleshooting => Set Debug Parameters are ignored when using
this method: These debug parameters can be added to the trace by
selecting and applying them after the trace is active.
• Turn off (set to N) the Set Debug Mode (GUI) or Set Debug Mode
(Host) parameter with Gateway Troubleshooting => Set Debug
Parameters from the CONTROL-M/EM root menu. Tracing is
disabled immediately. Tracing is not enabled when the WS-GTW is
restarted.
Gateway Log
where:
Parameter Description
<data_center> Name of the data center.
yyyymmdd Current date.
n Sequential number for the day. Default: 0.
Core File
TRACE=122
Troubleshooting 7-13
» Specify the following modify command:
F <CTMASID>,TRACE=122
S CTMAS.CTMAS601
S ECSGATE,DEBUG=122
-or-
F ECSGATE,DEBUG=122
Troubleshooting 7-15
s) Restore Default Parameters
r) Run Global Conditions Server
h) Help
p) Return to Previous Menu
q) Quit
Parameter Description
Communication Level of GCS communication diagnostic messages.
Diagnostic These messages are written to log file gcs_log.###.
Message Level Diagnostic messages are written for both conditions
received (In) and conditions sent (Out). The following
levels are available:
0 – No diagnostic messages (Default)
1 – Both In and Out messages
2 – In messages only
3 – Out messages only
Database Diagnostic Level of GCS database diagnostic messages. These
Message Level messages are written to log file gcs_log.###. The
following levels are available:
0 – No diagnostic messages (Default)
1 – Database messages
Gateway Interval (in seconds) between attempts to
Connectivity Interval communicate with a gateway. Default: 10.
Refresh Interval (in seconds) between readings of the
Communication Communication Table in the CONTROL-M/EM
Table Interval database for new data centers. Default: 600.
Send Condition Interval (in seconds) between attempts to send
Interval conditions to a data center that had previously
returned a temporary error. Default: 180.
Maximum Send Maximum number of retries to send conditions to a
Condition Retries data center that had previously returned a temporary
error. Default: 5.
Parameter Description
Delete Time for Sent Minimum time (in seconds) global conditions wait in
Conditions memory, after they have been sent to all connected
data centers, before they are removed. This “waiting
period” prevents conditions from being broadcast
again. Default: 120.
Delete Time for Time (in seconds) unsent global conditions wait in
Unsent Conditions memory before they are removed. Default: 36000 (10
hours).
Send Condition Interval (in seconds) between sending groups of
Group Interval conditions to a reconnecting data center.
Default 60.
Maximum Maximum number of messages to send in a group to
Conditions in a a reconnected data center.
Group Default: 100.
Delete Time for Maximum time (in seconds) unused conditions wait in
Unused Conditions the database before they are removed. These
conditions may have had no data center destinations.
Default: 86400 (24 hours).
Restore Default Restore the parameters to their default settings
Parameters
Run Global Start the GCS. The GCS can also be started using
Conditions Server the Activation Menu => Start Global Conditions
Server option from the CONTROL-M/EM root menu.
Destination Status Interval (in seconds) between checks of the status of
Interval conditions distribution to their respective destinations.
Default: 30. Increase for this value large systems.
Method for Handling A conflicting condition is a request to add or delete a
Conflicting condition when the opposite action is currently in
Conditions process for a request for a condition with the same
name and date.
• 0 – Stop distribution of the current condition and
start the distribution of the new condition.
• 1 – The first conflicting condition is processed
(same as 0) but all subsequent conflicting
conditions are ignored. Default.
• 2 – All conflicting conditions are ignored.
Troubleshooting 7-17
Configuring Orbix2000 Parameters
When selected, Configure Orbix2000 Parameters enables you to
modify the hostname and port number parameters for the Orbix Server or
the Orbix client. You are prompted with the following question:
Note
Modifying other Orbix 2000 Server parameters requires considerable
knowledge of Orbix. Modifying these parameters only after consulting
BMC Software Technical Support.
Note
Use the DIAG diagnostics facility only when you are instructed to do so
by a representative of the BMC Software Customer Support staff. Only
members of the support staff are qualified to use the data collected by the
DIAG facility. However, a Support Staff employee may request that you
run this facility and send the output to BMC Software for analysis.
Log messages are recorded in either a single log file of unlimited length
or a series of cyclical log files. DIAG creates log files automatically.
They are stored in the \$Homology directory of the local computer. The
environment variable for the logs is $ECS_LOG_PATH. You determine
the number and length of the cyclical log files using parameters in an
initialization file for the monitored component. For more information,
see “Initialization Files” on page 7-20. When the last cyclical log file is
full, DIAG begins to overwrite the messages in the first log file.
Troubleshooting 7-19
Log files have a special naming convention that enables you to identify
them readily:
<prefix>_diag.<component_hostname>.txt
<prefix>_diag.<component_hostname>.<date>.
<serial_number>.txt
• The serial number for each file is four digits long, and is incremented
for successive files (0001, 0002, and so on).
Initialization Files
Note
The DIAG facility for the GUI server is activated and deactivated from
the command line. However, the .ini file is still needed to configure the
facility. For more information about using DIAG with a GUI server, see
“Using DIAG with a GUI Server” on page 7-23.
• The level of message detail written to the output file (debug level)
• Whether to use a cyclic log file or a fixed log file
• The size of the cyclic log file (fixed log files are of unlimited size)
• The component program file that is monitored. The name of this file
is supplied by BMC Software Technical Support.
Separate .ini files can be created for each component that must be
monitored. In addition, you can create a default file that contains a
default debug level value that applies to all components on the computer.
Note
When both a default .ini file and a separate component .ini files are used,
the values in the .ini component file override the default .ini file values.
To create a file:
3. Name the file according to the conventions described below and save
it to the \$HOME\Ini directory.
Troubleshooting 7-21
Naming Conventions
.ini files are text files using the following naming conventions:
Syntax Rules
.ini file attributes are described in Table 7-7. A sample .ini file is
displayed in the example following Table 7-7.
Parameter Description
IsCyclic Indicates whether the file is cyclic. The default value is 0
(non-cyclic). Optional. If you do not include this variable
in the file, the file is not cyclic.
Valid Values:
• 0 (Default)
• 1
NumOfFiles Maximum number of cyclic files to create. Mandatory
only if IsCyclic=1.
NumOfMessages Maximum messages in each cyclical file. Mandatory
only if IsCyclic=1.
*default Minimum debug level of the DIAG debug trace for the
component. Default: 0.
Valid values: 0-7.
<filename> A debug level is specified for a component with the
<debug_level> following syntax: <filename> <debug_level>.
Note: <filename> is supplied by Technical Support.
Example
IsCyclic 0
NumOfFiles 3
NumOfMessages 5000
gas_srv 7
gas_impl 7
*default 3
Troubleshooting 7-23
DIAG is controlled with three commands (described in Table 7-8).
Command Description
DIAGON Starts DIAG.
DIAGOFF Stops DIAG.
DIAGL Determines the debug level.
Syntax:
DIAGL <filename> <debug_level>
Where <filename> is the name of a file supplied by BMC
Software Technical Support and <debug_level> is a
number from 0-7.
Example:
DIAGL main 4
DIAGON
DIAGOFF
RSI <GUI_server_hostname>
DIAGON
DIAGOFF
Troubleshooting 7-25
BMC Software, Inc., Confidential and Proprietary Information
Customization 8
— Sybase
— Oracle
Customization 8-1
Not all aspects of CONTROL-M/EM customization are covered in this
chapter. For a description of administrator-modifiable system parameters,
see Appendix C, “System Parameters.” These parameters are modified
using the System Parameters window of the Administration facility. For
more information, see “Displaying and Modifying System Parameters”
on page 4-33.
When Alert data is sent as input to a script, the parameters are sent in the
following format:
Parameter Description
SendAlarmToScript Full path name of the script that receives the Alert
data. If the file does not exist, an appropriate
message is displayed on the gateway trace. If the
gateway is started with Trace Level 3 (most detailed),
an appropriate message is displayed when the data is
sent to the script.
Customization 8-3
Audio Support for Alerts
Defaults File
With the Global Conditions Distribution facility, the user can indicate
whether to limit the distribution of global conditions, specify a range of
days for which global conditions can be distributed, and provide a list of
condition dates that should be excluded from the limitation process (so
that global conditions with these dates have no distribution limitation).
Parameter Description
limit_gcs_distrib_ Range of days for which conditions can be
max_days distributed. Default: 7.
limit_gcs_distrib Enable/Disable Global Conditions Distribution
_activate facility. Valid values:
• 1 Enable distribution facility. Default.
• 0 Disable distribution facility. No limitations.
limit_gcs_distrib Dates to exclude from the distribution facility. Dates
_disable_dates are specified in MMDD format and separated with
commas. Default: STAT, 0101.
Example 1
Example 2
To disable the Global Conditions Distribution facility and remove all date
limitations on the distribution of global conditions:
namevalue * limit_gcs_distrib_activate 0
Customization 8-5
Example 3
namevalue * continue_with_dup 0
namevalue * use_all_ip_address 0
To restrict this mode to only viewing the entities and not performing any
actions on jobs in the active environment, set parameter
act_view_only_option to 1 in the Defaults.rsc file. The default is 0.
namevalue * act_view_only_option 1
Customization 8-7
SQL Server Configuration
Certain parameters of the database servers used with CONTROL-M/EM
are modified during CONTROL-M/EM installation. The modifications
improve the performance of the database servers when they are used in
conjunction with CONTROL-M/EM.
Sybase
Parameter Description
recovery interval Changing this parameter changes the overhead of the
in minutes recovery checkpoint in Sybase. The value is 10.
procedure cache This parameter defines the memory allocated to cache
percent procedures. If you use the import_def_table or
export_def_table utilities or you need more memory for
some other utility, increase this value. When the
CONTROL-M/EM database is 200 MB or less in size,
the value is 20. The value is 5 when the
CONTROL-M/EM database exceeds 200 MB in size.
number of This parameter specifies the number of extents
pre-allocated allocated in a single trip to a page manager. By
extents increasing this number, the download takes less time.
The default value is not changed. When the database is
smaller than 80 MB. When the database is 80 - 200 MB,
the value is 8. When the database is larger than 200
MB, the value is 16.
Parameter Description
log_checkpoint Number of information blocks modified between the log
_interval file checkpoint procedures.
Setting changed to 0. The procedure is performed only
when the log is full.
log_checkpoint Time, in seconds, between log file checkpoint
_timeout procedures.
Setting changed to 0. The procedure is performed only
when the log is full.
db_block_size Number of bytes per block, partially determining the size
of the buffer cache. Setting changed to 4096.
db_block_buffers Number of blocks in the buffer, partially determining the
size of the buffer cache. Setting depends on the size of
the database installed.
shared_pool_size Size of the shared pool in bytes. Setting depends on the
size of the database installed.
log_buffer Size of the log buffer, in bytes. Setting depends on the
size of the database installed.
sort_area_size Amount of memory (in bytes) used for a sort. Setting
depends on the size of the database installed.
Customization 8-9
BMC Software, Inc., Confidential and Proprietary Information
SNMP Interface A
• CONTROL-O/Server.
• PATROL Enterprise Manager
• HP-OpenView.
• NetView for AIX.
• Tivoli Management Environment Console.
• CONTROL-M Links for Distributed Systems
SNMP messages specify that the server should either retrieve values
from variables or store values in variables. The server translates the
requests to equivalent operations using local data structures. In addition
to the fetch-store protocol, a separate standard for a Management
Information Base (MIB) defines the set of variables that SNMP servers
maintain, as well as the semantics for each variable.
A special SNMP message type, called a trap message, is the only type
that is initiated by a server. A trap message informs the client about an
event that has occurred at the server’s machine, usually a failure event
(hardware or software, permanent or temporary). Customization at the
client’s site determines, according to the trap codes, whether an Alert
message should appear on the manager’s screen or whether the recording
of an event log message is sufficient. The trap message can carry
additional MIB variables, thereby providing additional information to the
client application.
The generated SNMP traps are Enterprise-specific traps (that is, field
generic-trap is set to 6).
# Field Description
0 CALL TYPE Single character indicating the type of event that
triggered the alert:
• I A new alert was issued.
• U An existing alert by an CONTROL-M/EM user
was updated.
1 ALERT ID Numeric value used as a key (index) to identify the
alert.
2 DATA CENTER Name of the data center to which the job belongs.
3 MEMNAME Mem Name of the job.
4 ORDER ID Order ID of the job.
5 SEVERITY Severity of the alert:
• V Very urgent.
• U Urgent.
• R Regular.
6 STATUS Values: Not noticed, Noticed, or Handled.
7 SEND TIME Time/date that the alert was issued. Format:
YYYYMMDDHHMMSS.
SNMP traps can be issued using either or both of the following formats:
• Single Variable
Note
This was the only format available in previous releases of
CONTROL-M/EM.
• Multiple Variables
Parameter Description
SnmpSendActive Set this parameter to 1 to enable or 0 to disable sending
Alert traps from CONTROL-M/EM while in active
(production) mode.
SnmpHost Change the string “host_name” to the name of the
network node manager host.
SendSnmp Set this parameter as follows:
0 – Send data to SNMP only. Default.
1 – Send data to script only.
2 – Send data to both script and SNMP.
SnmpSendFormat Set this parameter as follows:
0 – Single Variable format.
1 – Multiple Variables format.
2 – Both formats. Two traps are generated, one in each
format.
Term Description
<user id> CONTROL-M/EM database user name (for
example, cemuser).
<password> CONTROL-M/EM database user password.
Example
db_sys_params -U<CONTROL-M/EM_username>
-P<password> -NSendSnmp -V1
Customizing CONTROL-O/Server
This file can be edited using the Options Event Configuration =>
SNMP option of HP OpenView Network Node Manager, or you can edit
this file with a text editor.
ECS_4D 1.3.6.1.4.1.954.1
<trap_name>, <enterprise_obj-id>,
<generic_trap_num>, <specific_trap_num>,
<source_id>, <category>, <severity>
• normal (1)
• warning (2)
• minor (3)
• major (4)
• critical severity (5)
Example 1
Example 2
Statement Syntax
• Format statement
Cmd Description
$n Print the value of the nth variable.
$E Print the enterprise as a text string.
$A Print the name of the source of the trap.
$G Print the generic trap.
$S Print the specific trap.
$T Print the time-stamp.
$* Print the variable-bindings supplied by the trap as “name-type:value”
strings. Standard C language formatting symbols are also allowed.
Example 1
Example 2
Alternatively, you can invoke any other script or program that can
analyze the input variables and take appropriate action based on the
variables’ values.
A. Click the Add New Trap button. The Add New Trap
window is opened.
D. Using the bottom bar, you can insert a string that will appear in
the alert window itself, using an xecho command.
Example 1
Example 2
2. Check the output of netstat -an for any other registered use of UDP
socket 162. If another product is using this socket, the Tivoli SNMP
Event Adapter cannot be configured.
3. Verify that the Tivoli SNMP Event Adapter software has been
installed on the CONTROL-M/EM workstation.
Note
Step 3 should be performed by the Tivoli systems administrator.
Location Format
Non-TME, non-secure <hostname>
TME @<EventServer>
TME in connected TMR @<EventServer>#<RegionName>
5. Edit the tecad_snmp.cds file to include the lines in Figure A-1. The
file tecad_snmp.cds is in the same directory as the file
tecad_snmp.conf.
#####################################################################
# Enterprise Controlstation Traps
#
# kag Apr 25, 1999
#
# ENTERPRISE 1.3.6.1.4.1.954.1
# GENERIC TYPE 6
# SPECIFIC TYPES: 1 - Informational Alarm
# 2 - Minor Alarm
# 3 - Major Alarm
#
####################################################################
CLASS ECSAlert_Info
SELECT
1: ATTR(=,$ENTERPRISE), VALUE(PREFIX, "1.3.6.1.4.1.954.1") ;
2: $TYPE = 6 ;
3: $SPECIFIC = 1 ;
MAP
reason = $V3 ;
END
CLASS ECSAlert_Mnr
SELECT
1: ATTR(=,$ENTERPRISE), VALUE(PREFIX, "1.3.6.1.4.1.954.1") ;
2: $TYPE = 6 ;
3: $SPECIFIC = 2 ;
MAP
reason = $V3 ;
END
CLASS ECSAlert_Mjr
SELECT
1: ATTR(=,$ENTERPRISE), VALUE(PREFIX, "1.3.6.1.4.1.954.1") ;
2: $TYPE = 6 ;
3: $SPECIFIC = 3 ;
MAP
reason = $V3 ;
END
##########################################################
#
# Enterprise Controlstation SNMP TRAPS
# kag Apr 25 ’99
#
##########################################################
TEC_CLASS :
ECSAlert_Trap ISA Specific_SNMP_Trap
DEFINES {
enterprise: default = "ECSAlert";
};
END
TEC_CLASS :
ECSAlert_Info ISA ECSAlert_Trap
DEFINES {
severity: default = MINOR;
reason: STRING;
};
END
TEC_CLASS :
ECSAlert_Mnr ISA ECSAlert_Trap
DEFINES {
severity: default = WARNING;
reason: STRING;
};
END
TEC_CLASS :
ECSAlert_Mjr ISA ECSAlert_Trap
DEFINES {
severity: default = CRITICAL;
reason: STRING;
};
END
The easiest method is to warm start the event adapter using this
syntax:
Additional line commands and utilities are described at the end of this
chapter.
CONTROL-M/EM
Root Menu Description
Activation Menu Displays the CONTROL-M/EM Activation menu. See
Chapter 5, “Managing CONTROL-M/EM with the
Root Menu,” for more information about the root
menu.
Troubleshooting Displays the CONTROL-M/EM Troubleshooting menu.
Menu See Chapter 5, “Managing CONTROL-M/EM
with the Root Menu,” for more information about the
root menu.
New Window Opens an Xterm window with CONTROL-M/EM
environment variables. For more information, see
Chapter 5, “Managing CONTROL-M/EM with the
Root Menu.”
Database Creation Displays CONTROL-M/EM database creation options.
For more information, see Chapter 5, “Managing
CONTROL-M/EM with the Root Menu.”
Database Displays the Database Maintenance menu. For more
Maintenance information, see Chapter 5, “Managing
CONTROL-M/EM with the Root Menu.”
Activation Line
Menu Command Description
Check All check_all Checks and displays the status of all
CONTROL-M/EM core components
(including the database server, Global
Conditions Server, WS-GTW, Orbix
Locator and Naming processes,
Global Alerts Server, GUI server,
License Client, and the maintenance
agents).
Start All start_ all Starts the database server, the Orbix
Locator and Naming processes, the
administration agent on the local
computer.
Start Database start_server Starts the database server, if it is
Server located on the local computer.
Start start_orbix Starts the Orbix Locator and Naming
Orbix Services _daemon processes on the local computer. This
menu item appears only if the
start_orbix2000 CONTROL-M/EM GUI Server is
_services installed on the same computer.
Start start_admin Starts the administration agent that is
Administration _agent located on the local computer.
Agent
Stop All stop_all Stops the database server, the Orbix
Locator and Naming processes, the
administration agent on the local
computer.
Activation Line
Menu Command Description
Stop Orbix stop_orbix Stops the Orbix Locator and Naming
Services _daemon processes on the local computer. This
option appears only if the
stop_orbix2000_ CONTROL-M/EM GUI Server is
services installed on the same computer.
Stop stop_admin Stops the administration agent that is
Administration _agent located on the local computer.
Agent
Database
Creation Menu Description
Show Database Displays CONTROL-M/EM database parameters.
Parameters
Build Database Builds the CONTROL-M/EM database and server.
Delete Database Deletes the CONTROL-M/EM database.
Database
Maintenance
Menu Description
Export Database Copies the CONTROL-M/EM database to a flat file.
Import Database Restores the CONTROL-M/EM database from a file
created by Export Database or another export utility.
Custom Displays the Import/Export Parameters menu.
Export/Import
Extend Database Extends the data portion of the CONTROL-M/EM
Size database.
Erase Alerts Erases all alerts earlier than a given date/time.
Erase Old Nets Erases an old network.
Modify Interfaces Modifies the Sybase Interfaces file on the current
File computer.
Modify Database Modifies the CONTROL-M/EM database name.
Name
Troubleshooting
Menu Description
Database Displays the Database Troubleshooting menu. For more
Troubleshooting information, see “Database Troubleshooting” on
page 7-5.
Gateway Displays the Gateway Troubleshooting menu. For more
Troubleshooting information, see “Gateway Troubleshooting” on
page 7-7.
Show Displays details about the CONTROL-M/EM
Environment environment.
Global Conditions Displays the Global Conditions Parameters Menu. For
Server Parameters more information, see “Global Conditions Server
Parameters” on page 7-15.
Database
Troubleshooting Description
Interactive SQL Starts an interactive SQL session.
Commands
Check Available Checks available space for Sybase devices.
Space
View Server Displays parameters used by the Sybase Adaptive
Settings Server.
Truncate Database Truncates the CONTROL-M/EM database log file. This
Log option appears only when the CONTROL-M/EM
database is installed on a Sybase Adaptive Server.
Gateway
Troubleshooting Description
Set Debug Displays the Gateway Set Debug Parameters menu and
Parameters begins a debug trace when the Set Debug Parameters
menu is closed.
Utilities
System Parameters C
Parameter Description
HandleAlertsOnRerun CONTROL-M/EM automatically generates an Alert
for each Restart or Rerun job. Valid values: 1 (yes),
0 (no).
Default: 0
HostPort Hostname and port number for a specified
component. Values are specified using the
Update/View Parameter window, described on
page 4-37. There can be multiple values for this
parameter, each related to a different component or
a different host computer.
The format for the parameter value is:
<host name>:<port number>. For example:
CTMhost1:1530
Parameter Description
SendAlarmToScript Full path name of the script that is activated when
an alert is generated. This script is activated only if
the value of SendSnmp is either 1 or 2
Default: script_name
SendSnmp Indicates where Alert data is to be sent.
• SNMP only (0)
• User defined script only (1)
• SNMP and user defined script (2).
Default: 0
SnmpHost Hostname for SNMP alerts.
Default: no_host
SnmpSendActive Generates SNMP messages for Active Alerts (1) or
doesn’t generate SNMP messages for Active Alerts
(0).
Default: 0
SnmpSendDemo Generates SNMP messages for Demo Alerts (1) or
does not generate SNMP messages for Demo
Alerts (0).
Default: 0
SnmpSendFormat Determines the SNMP message format.
• 0 - Single Variable format
• 1 - Multiple Variable format
• 2 - Both formats
Default: 2
Parameter Description
AlertOnAbend Flag indicates whether to (1) send alerts for jobs
that end NOTOK. Alerts are not sent when the
value is 0.
Default: 1
DeltaMaxActMinutes Age, in minutes, for a net to be considered valid for
distribution of Global Conditions.
Default: 2160
DownCreAlerts Flag that indicates whether to send alerts for
downloaded jobs that ended NOTOK when they
are run.
• 0 - Alerts are not sent.
• 1 - Alerts are sent.
The AlertOnAbend parameter must be set to 1 for
DownCreAlert to be operational.
Default: 1
GtwCondDispatchErr For Technical Support use only.
Default: CTM5050 CTM5301 CTM5311 CTM5312
CTM5323
GtwLogDestFileType Log file destination type.
Valid values:
0=Sequetial
1=Cyclic
Default: 1
GtwLoggerOn Toggles the Logger facility on or off.
0=Logger off
1=Logger on
Default: 1
GtwLogMsgFile Name of the log file.
Default: ECSMessages.txt
GtwLogNofFiles Number of log files in use.
Default: 5
GtwLogNofMsgs Number of messages in a log file.
Default: 1000
Parameter Description
GtwLogQSize Number of messages in the Messages queue.
Default: 300
GtwLogRefreshInter Refresh interval, in seconds, for the Logger
component to read its database tables.
Default: 500
GtwLogThrowMsgs Flag indicates whether to delete log messages
when the log file queue is full.
0=not deleted
1=delete
Default: 1
HostPortList List of CONTROL-M/EM GUIs that are connected
to the gateway. List format:
datacenter1=<host>:<port>;datacenter2=
<host>:<port>
Default: null
InsertAlertTries Number of times that the gateway attempts to insert
an alert into CONTROL-M/EM. The number
includes the initial attempt and can be any whole
number equal to or greater than 1.
Default: 1
MaxDownHistDays Number of days that the list of downloads is saved.
This list contains abbreviated information about
each download, such as the date and time, net
name, and number of jobs and resources in the
download.
Default: 100
MaxOldDay Downloads are kept in the CONTROL-M/EM
database for not more than the number of days
specified in this parameter.
Parameter Description
MaxOldTotal Total number of downloads that can be stored in
the CONTROL-M/EM database.
If this number is exceeded, the oldest download is
deleted.
Default: 1
MaxUploadBufferMPM For Technical Support use only.
Default: 18000
MaxUploadBufferMVS For Technical Support use only.
Default: 18000
SSLPassword Password for the Key database file that holds SSL
encryption keys.
Default: password
SSLRetries The number of times that CONTROL-M/EM
attempts to establish communication with the
gateway before turning SSL on or off. SSL can
either be enabled or disabled when
CONTROL-M/EM initially tries to connect to the
gateway. After making the specified number of
attempts, SSL is toggled on (if it was off) or off (if it
was on) during the previous series of attempts.
This parameter is relevant only when SSL or SSL
Enabled communication is selected. It does not
work when only TCP/IP is selected.
Default: 2
SSLSyncTime Replaces the value of the Sync_Timeout parameter
(in the Defaults.rsc file) that determines the period
of time between attempts to establish
communication with the gateway when changing
communication protocols to SSL or SSL Enabled.
Default: 90
Parameter Description
LMGUIServerCTLTimeSev For Technical Support use only.
Default: 1
LMGUIServerUpdTimeout For Technical Support use only.
Default: 1800
LMGUI_Communication Encrypted host name and port number that
_Cfg CONTROL-M uses to contact the Enterprise
License Manager server. This encrypted
information is passed to the CONTROL-M
installations that are connected to the
Enterprise License Manager.
Default: null
LMGUI_LastReportTime Clock time that the License Client last reported
to the Enterprise License Manager.
Default: null
LMGUI_LicenseHost Host name of the Enterprise License Manager
computer.
Default: AAAAAAA
LMGUI_LicensePort Port number of the Enterprise License
Manager computer.
Default: 1613
LMGUI_MaxGui Total number of CONTROL-M/EM GUIs
connected to the CONTROL-M/EM GUI
servers on the network. This parameter
receives its value from the License Client. This
value is recalculated each time the License
Client reports.
Default: 0
LMGUI_PollingInterval Frequency, in minutes, at which the License
Client determines the number of
CONTROL-M/EM GUIs on the network. The
result provides a value for the LMGUI_MaxGui
parameter.
Default: 5
Parameter Description
LMGUI_ReportInterval Frequency, in minutes, at which the License
Client reports the value of the LMGUI_MaxGui
parameter to the Enterprise License Manager.
Default: 1440
LMGUI_Severity_1_List For Technical Support use only.
Default: 2,3,6
LMGUI_Severity_2_List For Technical Support use only.
Default: 4,5
LMGUI_Severity_3_List For Technical Support use only.
Default: 1,7,8,9
Parameter Description
AlertsMapRefreshInterval Frequency, in seconds, at which the GAS
updates its database about which Alerts were
deleted and why. The update occurs only when
both the specified time has passed and one or
more alerts have been deleted.
Default: 60
LogTablesRefreshInterval Log facility refresh rate, in minutes. Changing
this parameter refreshes the Logger at the
specified interval while the GAS is operating.
Default: 120
NumberOfLogFileMessage Number of Alert messages that are stored in
each log file. When the last log file is full,
entries in the first log file are overwritten by
new messages. Successive log files are
overwritten, as necessary.
Default: 500
NumberOfLogFiles Number of log files that are maintained by the
GAS.
Default: 3
Parameter Description
ActivateRetries Number of times that the Administration agent
tries to start an inactive component. Minimum
setting: 3.
Parameter Description
LifeCheckRetries Number of life checks the Administration agent
performs before the component is considered
to be malfunctioning. Minimum: 1
Default: 5
LifeCheckRetryTime Interval, in seconds, before a prior life check is
performed after a life check to which there was
no response.
Default: 15
LogCleanInterval Interval, in minutes, between the LogReg log
cleaning operations performed by the
administration agent.
Note: The administration agent cleans the
LogReg log every time that it is activated.
Default: 360
LogCleanLevel Indicates the amount of detail the clean
operation erases from the LogReg log.
• 0=no deletion
• 1=cleans only the agent’s own log messages
• 2=cleans all log messages
Default: 1
LogHistoryDays Number of days that log entries are retained
before they can be cleaned from the log.
Minimum: 0
Default: 1
LogInfoLevel Level of detail in LogReg log entries recorded
by the Administration agent.
• 0=no entry
• 1=administration agent-related messages
• 2=brief component and agent related
messages
• 3=detailed component and agent related
messages
Default: 2
Parameter Description
StdoutLogInfoLevel Level of detail of standard output messages
reported by the administration agent.
• 0=no entry
• 1=administration agent-related messages
• 2=brief component and agent related
messages
• 3=detailed component and agent related
messages
Default: 2
StopGracePeriodSec Time, in seconds, that a component is given to
shut down following a Stop command. When
this time is exceeded, the administration agent
again tries to stop the component. If the
number of retries specified by the StopTries
parameter is exceeded, the agent kills the
component.
Default: 45
StopTries Number of times that the agent tries to stop the
component using the Stop command before
performing a kill operation to stop it. Minimum:
1
Default: 2
Parameter Description
MaxUserTimeoutSec Time, in seconds, that a CONTROL-M/EM API
client user token is valid. After this time, the
GUI Server can invalidate the token.
Default: 10800
NumberOfLogFileMessage Maximum number of messages stored in each
log file. When the last log file is full, entries in
the first log file are overwritten by new
messages. Successive log files are
overwritten, as necessary.
Default: 500
NumberOfLogFiles Number of log files that are maintained for
each component by the Logger.
Default: 3
LogTablesRefreshInterval Frequency, in seconds, at which the GUI
Server retrieves component context updates
from the CONTROL-M/EM database.
Component contexts are used by
CONTROL-M/EM to determine whether a
component event is inserted in the log file and
how it would be presented.
Default: 120
NumberOfMyWorldJobs Total number of job nodes that are displayed
when Local View is used. Valid range:
2-30,000. For more information about Local
View, see the Alerts chapter in the
CONTROL-M/Enterprise Manager User Guide.
Default: 100
Parameter Description
SysInit1 For Technical Support use only.
Default: 283862c273524c18
Parameter Description
GcsLogDestFileType Log file destination type.
0=Sequetial
1=Cyclic
Default: 1
GcsLoggerOn Activates the Logger facility.
0=Logger off
1=Logger on
Default: 1
GcsLogMsgFile Name of the log file.
Default: ECSMessages.txt
GcsLogNofFiles Number of log files in use.
Default: 5
GcsLogNofMsgs Number of messages in a log file.
Default: 1000
GcsLogQSize Number of messages in the Messages queue.
Default: 300
GcsLogRefreshInter Refresh interval, in seconds, for the Logger
component to read its database tables.
Default: 500
GcsLogThrowMsgs Flag that indicates whether to delete log
messages when the log file queue is full.
0=no deletion
1=delete
Default: 1
Index
Index 1
database polling interval 4-26 truncating 4-31
deleting a registered component 4-16 window contents 4-27
description 4-1 AIX
desired state 4-3 starting programs automatically 3-7
display filter criteria 4-25 stopping programs automatically 3-7
filter definition wildcards 4-25 ALERT ID
filter manager 4-21 SNMP trap A-3
Filter Properties 4-23, 4-25 alert processing
filtering components 4-21 audio support 8-4
functions 4-1 description 8-3
gateway administration 4-6 gateway check errors 7-11
Global Alerts Server 4-6 removing from database 4-43
Global Conditions Server 4-6 SendAlarmToScript 8-3
GUI 4-5, 4-12 SendSnmp 8-3
icons 4-12 SNMP interface A-1
ignored state 4-14 SNMP trap or script 8-3
logging on to CONTROL-M/EM AlertOnAbend C-4
database 4-3 alerts
logon requirements 4-4 See also messages
modifying a filter 4-24 Alerts window
modifying defaults settings 4-26 DIAG component prefix 7-22
modifying polling intervals 4-26 AlertsMapRefreshInterval C-9
modifying the display 4-7 Application
options dialog box 4-15, 4-26 SNMP trap A-4
registering components 4-15, 4-21 assign_ports 3-14
responsibility 1-8 authorization
selecting a filter 4-23 See also License Manager
selecting components 4-21 authorization. See security
starting 4-4
table view 4-10
tree view 4-7 B
window 4-5, 4-10
administrator responsibilities batch utilities
customization 8-1 listed B-8
agents log build database menu
clearing 4-28 Sybase Server 5-11, 5-21
deleting 4-28
displaying 4-27
filtering 4-31 C
messages 4-28
calendars
BMC Software, Inc., Confidential and Proprietary Information
Index 3
stopping components 3-4 starting/stopping 3-2
workstation gateways 1-4 CONTROL-M/EM server
CONTROL-M/EM administrator description 1-3
changing the password 3-12 starting 3-2
responsibilities 1-8, 6-2 CONTROL-M/Enterprise Manager. See
CONTROL-M/EM components CONTROL-M/EM
administration facility 4-15 CONTROL-M/Links
automatic start 3-4 SNMP customization A-17
manual start 3-4 CONTROL-O/Server
manual stop 3-4 SNMP traps A-6
starting 3-4, 4-13 CONTROL-R
states of operation 4-11 in a CONTROL-M definition 2-3
stopping 4-13 with CONTROL-M/EM 1-2
CONTROL-M/EM database copydefcal utility B-8
administering 4-43 copydefjob utility B-8
administration facility logging 4-3 creating
administration facility polling interval See also defining
4-26 ENTERPRISE/CS database 5-7
alerts 4-43 CST time zone 1-12
checking available space 4-44, 4-47 ctl
contents 1-7 DIAG component prefix 7-22
data segment 4-44 CTMAS 7-13
database troubleshooting 7-3 custom import/export
description 1-4, 1-7 database maintenance menu 5-32
duplicate index entries facility 8-6 options 5-33
extending 4-44 customizing
isql queries 4-47 Defaults.rsc file 8-4
log segment extension 4-44 security 8-1
maintenance with the GUI 4-43 system defaults 8-2
removing alerts 4-43
show environment 7-3
CONTROL-M/EM GUI D
description 1-3
DIAG component prefix 7-22 data centers
starting 3-2 defining 8-2
CONTROL-M/EM GUI Server. See GUI database administration 4-43
Server administrator responsibilities 5-1
CONTROL-M/EM processes checking available space 4-47
stopping with EnablePriv 3-5 extending 4-44
CONTROL-M/EM Server performing queries with isql 4-47
database creation menu
BMC Software, Inc., Confidential and Proprietary Information
Index 5
time zones 1-14 DIAGL command 7-24
defjob utility B-8 Diagnostic Message Level
defjobconvert utility B-8 Global Conditions Server parameter
deftable utility B-8 7-16
deldefjob utility B-8 DIAGOFF command 7-24
Delete Time for Sent Conditions DIAGON command 7-24
Global Conditions Server parameter displaying
7-17 See also viewing
Delete Time for Unsent Conditions DownCreAlerts parameter C-4
Global Conditions Server parameter dsedit
7-17 modifying Interfaces file 5-35
Delete Time for Unused Conditions opening 5-35
Global Conditions Server parameter duplicate index entries facility 8-6
7-17 duplicate out conditions
DeltaMaxActMinutes C-4 customizing 8-7
dependencies
See also In conditions
See also job dependencies E
See also Out conditions
Desktop. See CONTROL-M/Desktop Eastern European Time 1-12
Destination Status Interval Eastern Standard Time 1-12
Global Conditions Server parameter ECSGATE 1-10
7-17 EET time zone 1-12
DIAG diagnostics facility EnablePriv utility 3-5
commands 7-24 ENTERPRISE/CS
component ini file 7-21, 7-22 custom export 5-28
customer support 7-19 custom import 5-28
debugging 7-19 Unix platform 5-1
default ini file 7-21, 7-22 ENTERPRISE/CS administrator
description 7-19 responsibilities 5-1, 5-3
DIAGL command 7-24 ENTERPRISE/CS components
DIAGOFF command 7-24 using with firewall 3-14
DIAGON command 7-24 ENTERPRISE/CS database
ini file naming conventions 7-22 corruption 5-7
initialization file contents 7-21 creating 5-7
line commands 7-24 database file 5-18
log files 7-20 erase alerts option 5-28
logging 7-19 exporting 5-30
running 7-19 extending 5-28
using with GUI server 7-23 importing 5-28, 5-29, 5-30
restoring 5-7
BMC Software, Inc., Confidential and Proprietary Information
Index 7
distribution parameters 7-16, 7-17
groups 7-17
H
handling conflicts 7-17 Handling Conflicting Conditions
modifying 8-4 Global Conditions Server parameter
security 6-3 7-17
Global Conditions server HAW time zone 1-11
configuring 7-15 Hawaii time zone 1-11
description 1-4 HKG time zone 1-12
hostname 3-19 Hong Kong time zone 1-12
parameters 7-4, 7-16 host debugging 7-10
Parameters menu 7-15, 7-16 hostname
port number 3-19 changing 3-19
starting 3-2 changing in Defaults.rsc 3-19
troubleshooting 7-15 changing in the Sybase Interfaces file
GMT time zone 1-12 3-19
Greenwich Mean Time 1-12 HostPort C-2
GROUP HostPortList
SNMP trap A-4 description C-5
Group Authorizations modifying 3-20
description 6-10 hours
General panel 6-17 time zone support 1-11
Jobs panel 6-19 HP-UX
Privileges panel 6-22 starting programs automatically 3-9
Resources and Calendars panel 6-28 stopping programs automatically 3-9
Scheduling Tables panel 6-25
groups
See also node ID I
GtwCondDispatchErr C-4
GtwLogDestFileType C-4 ID.Seeuser ID
GtwLoggerOn C-4 importing
GtwLogMsgFile C-4 database maintenance menu 5-29
GtwLogNofFiles C-4 In conditions
GtwLogNofMsgs C-4 See also prerequisite conditions
GtwLogQSize C-5 index entries
GtwLogRefreshInter C-5 modifying 8-4
GtwLogThrowMsgs C-5 initialization files
GUI server DIAG 7-20
administration 4-6 DIAG file syntax rules 7-22
DIAG component prefix 7-22 DIAG ini file 7-21
DIAG usage 7-23 syntax rules for DIAG ini files 7-22
Index 9
modifying 4-29 See also alerts
logon See also logging xiii
security 6-2 See also shout messages
logs modifying
See also messages xiii See also changing
cyclical files 7-19 See also creating
DIAG messages 7-19 See also editing
gcs_log.### log file 7-16 See also updating
monitoring with db_check 5-36 Global Conditions distribution 8-4
single-file 7-19 index entries 8-4
transaction log 5-36 IP addresses 8-4
logs. See output network view security 8-4
LogTablesRefreshInterval C-9, C-13 time zones 1-14
low-level node. See job node Mountain Standard Time 1-12
MSG TEXT
SNMP trap A-4
M MST time zone 1-12
MVS. See OS/390
maintenance mySAP. See SAP
See also Administration facility
See also database maintenance
global conditions 3-11 N
prerequisite conditions 3-11
maintenance agent. See administration agent naming conventions
MaxDownHistDays C-5 DIAG ini file 7-22
Maximum Conditions in a Group DIAG log files 7-20
Global Conditions Server parameter NetView for AIX
7-17 SNMP traps A-10
Maximum Send Condition Retries Network Management applications
Global Conditions Server parameter HP-OpenView A-7
7-16 interfacing with CONTROL-M/EM A-1
MaxOldDay C-5 NetView for AIX A-10
MaxOldTotal C-6 Tivoli Management Environment
MaxUploadBufferMPM C-6 Console A-13
MaxUploadBufferMVS C-6 Network View Authorization window
MaxUserTimeoutSec C-13 Read Only mode 8-7
MEL time zone 1-12 New Day procedure
Melbourne time zone 1-12 time zone support 1-13
MEMNAME Node ID
SNMP trap A-3 SNMP trap A-4
messages nodes
BMC Software, Inc., Confidential and Proprietary Information
Index 11
RACF 6-3 Scheduling tables
raw device See also Group Scheduling tables
Oracle Server 5-18 authorization to access 6-25
Sybase Server 5-9 security 6-26
reading script 3-14
See also copying security
See also downloading authorization definitions 6-24
See also uploading authorization facility 6-4
Refresh Communication Interval Table calendars 6-31
Global Conditions Server parameter changing password 3-12
7-16 collections 6-23
removing. See deleting communication 6-24
resolution. See zooming CONTROL-M 6-3
resources CONTROL-M/EM 6-1
See also Control resources CONTROL-M/EM customization 8-1
See also quantitative resources CONTROL-M/EM data protection 6-2
security 6-28 CONTROL-M/EM log on protection
Restore Default Parameters 6-2
Global Conditions Server parameter CONTROL-M/EM user operations 6-3
7-17 data center 6-3
root menu database server customization 8-1
activation option 5-2 define authorizations selection window
database creation option 5-3 6-21
database maintenance option 5-3 description 6-24
description 5-1 enabling job actions 6-20
ENTERPRISE/CS administration 5-1 file protection 6-2
menu options B-2 filters 6-23
new window option 5-2 firewall configuration 3-14
starting 5-2 gateway 6-3
troubleshooting menu 5-2, 7-2 hierarchies 6-23
Run Global Conditions Server Integral Workstation Security 6-1
Global Conditions Server parameter job access 6-20
7-17 logon 6-2
network view authorizations 8-4
operating system 6-1
S passwords 3-12
privileges panel 6-22
SAP resources 6-28
application support 1-10 Resources and Calendars panel 6-28
scheduling security mechanisms 6-1
time zone support 1-11
BMC Software, Inc., Confidential and Proprietary Information
Index 13
Sybase 8-8 database server 3-1, 3-6, 5-3
sql.ini DIAG for GUI server 7-20, 7-24
modifying 3-19 EnablePriv utility 3-5
SSLPassword C-6 gateway 7-9
SSLRetries C-6 gateway debug mode 7-9
SSLSyncTime C-6 Global Alerts Server 3-3
starting maintenance agent 3-5
administration agent 3-6, 5-3 Orbix Server 3-6
administration facility 4-4 StopTries C-12
automatically 3-6 agent log 4-29
communication tracing 7-11 Sybase Server
CONTROL-M/EM components 3-4, configuration parameters 8-8
4-13 creating on Unix 5-8, 5-17
CONTROL-M/EM server 3-2 data file description 5-8
CTMAS 7-13 database corruption 5-8, 5-17
database debug mode 7-9 database creation menu 5-11, 5-21
database server 3-1, 3-6 database devices 5-9
DIAG diagnostics 7-20 dataserver process 5-8
DIAG for GUI server 7-24 default file names 5-9
Global Alerts Server 3-3 hostname modification 3-19
GUI debugging 7-9 Interfaces file 5-10
host debugging 7-10 log file description 5-9
Orbix Server 3-6 master database file 5-8
root menu 5-2 master.dat 5-9
troubleshooting menu 7-2 open objects parameter 5-10
STATUS port number modification 3-19
SNMP trap A-3 printer configuration 4-47
StdoutLogInfoLevel C-12 raw device 5-9
stepping in and out raw file 5-9
See also collapsing sharing 5-9
See also expanding size of tempdb parameter 5-10
StopGracePeriodSec C-12 sql.ini file 5-10
stopping Sybase system procedures file 5-8
administration agent 3-6, 5-3 systemprocs.dat 5-9
automatically 3-6 user connections parameter 5-10
communication tracing 7-12 SYBASE.cfg file 8-8
CONTROL-M/EM components 3-4, syntax
4-13 rules for DIAG ini files 7-22
CONTROL-M/EM Server 3-2 SysInit1 C-14
CTMAS 7-13 sysout
Index 15
user connections parameter TCP/IP port number 2-4
Sybase Server 5-10 workstation security
user ID Unix 6-2
See also owner Windows 6-2
util utility B-9 WS-GTW. See gateways
utilities
check_gtw 7-11
time zone support 1-12 X
util B-9
Xterm window
opening 5-2
V
variables. See AutoEdit variables
verify user
DIAG component prefix 7-22
viewing
See also display
ViewPoint
collection security 6-23
filter security 6-23
hierarchy security 6-23
security 6-23
ViewPoint window
security 6-5
VMS. See OpenVMS
W
Western European Time 1-12
WET time zone 1-12
wildcard characters
filters 4-25
Windows administrator
responsibilities 1-9, 6-2
workstation gateway
communication tracing 7-11
description 1-4
log 3-12
TCP/IP host name 2-4
BMC Software, Inc., Confidential and Proprietary Information