You are on page 1of 468

CONTROL-M/Server for

Unix
Administrator Guide

Version 6.0.03

September 16, 2001

Copyright 2001 BMC Software, Inc. All rights reserved.


BMC Software, the BMC Software logos, and all other BMC Software product or service names are registered
trademarks or trademarks of BMC Software, Inc. All other registered trademarks or trademarks belong to their
respective companies.
MM-6003G-A0107A-UNIX

Restricted Rights Legend


U.S. GOVERNMENT RESTRICTED RIGHTS. UNPUBLISHEDRIGHTS RESERVED UNDER THE
COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure by the U.S. Government is
subject to restrictions set forth in FAR Section 52.227-14 Alt. III (g)(3), FAR Section 52.227-19, DFARS
252.227-7014 (b), or DFARS 227.7202, as amended from time to time. Send any contract notices to
Contractor/Manufacturer:
BMC Software, Inc.
2101 CityWest Blvd.
Houston TX 77042-2827
USA

Contacting BMC Software


You can access the BMC Software Web site at http://www.bmc.com. From this Web site, you can
obtain general information about the company, its products, special events, and career opportunities.
For a complete list of all BMC Software offices and locations, go to
http://www.bmc.com/corporate/offices.html.

USA and Canada


Address

BMC Software, Inc.


2101 CityWest Blvd.
Houston TX 77042-2827

Telephone

713 918 8800 or


800 841 2031

Fax

713 918 8000

Outside USA and Canada


Telephone

(01) 713 918 8800

Fax

(01) 713 918 8000

BMC Software, Inc., Confidential and Proprietary Information

iii

Customer Support
You can obtain technical support by using Response Online (support from the Web) or Response On Demand.
To expedite your inquiry, please see Before Contacting BMC Software, below.

Response Online
You can obtain technical support from BMC Software 24 hours a day, seven days a week by accessing the
technical support Web site at http://www.bmc.com/support.html. From this site, you can

read overviews about support services and programs that BMC


Software offers
find the most current information about BMC Software products
search a database for problems similar to yours and possible
solutions
order or download product documentation
report a problem or ask a question
subscribe to receive e-mail notices when new product versions are
released
find worldwide BMC Software support center locations and contact
information, including e-mail addresses, fax numbers, and telephone
numbers

Response On Demand
In the USA and Canada, if you need technical support and do not have access to the Web, call 800 537 1813.
Outside the USA and Canada, please contact your local support center or your local sales office for assistance.

Before Contacting BMC Software


Before you contact BMC Software, have the following information available so that a technical support analyst
can begin working on your problem immediately:

product information
product name
product version (release number)
license number and password (trial or permanent)

operating-system and environment information


machine type

BMC Software, Inc., Confidential and Proprietary Information

iv

CONTROL-M/Server for Unix Administrator Guide

operating system type, version, and service pack or program


temporary fix (PTF)
system hardware configuration
serial numbers
related software (database, application, and communication)
including type, version, and service pack or PTF

sequence of events leading to the problem

commands and options that you used

messages received (and the time and date that you received them)
product error messages
messages from the operating system, such as file system
full
messages from related software

BMC Software, Inc., Confidential and Proprietary Information

BMC Software, Inc., Confidential and Proprietary Information

vi

CONTROL-M/Server for Unix Administrator Guide

Contents

Contents
About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix

Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi


Notational Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxii
Chapter 1

Overview

CONTROL-M Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4


Server-Agent Interaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-5
Identification of Agent Platforms . . . . . . . . . . . . . . . . . . . . . . . . 1-6
Communication Status of Agent Platforms . . . . . . . . . . . . . . . . 1-6
Interrupted Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Time-Related Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8
Authorized CONTROL-M Servers File . . . . . . . . . . . . . . . . . . . 1-9
Agent Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Load Balancing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9
Failover Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-10
Host Identification in the Agent Platform . . . . . . . . . . . . . . . . . . . . . 1-12
New Day Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-13
Scheduling Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-15
User Daily Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-18
Date Control Record (UDLAST) . . . . . . . . . . . . . . . . . . . . . . . . 1-21
Handling of Interruptions During a User Daily Job . . . . . . . . . . 1-23
Issuing a Job Order Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-23
Shout Destination Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-24
Shout Message Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-26
Runtime Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-28
CONTROL-M Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-31
Daylight Savings Time Considerations . . . . . . . . . . . . . . . . . . . . . . . 1-33
Advancing the Clock Forward . . . . . . . . . . . . . . . . . . . . . . . . . . 1-33
BMC Software, Inc., Confidential and Proprietary Information

Contents

vii

Moving the Clock Backwards . . . . . . . . . . . . . . . . . . . . . . . . . . .1-34


CONTROL-M Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-36
Heartbeat Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-37
Advanced Problem Detection Tools . . . . . . . . . . . . . . . . . . . . . . . . .1-38
Setting Event Logger Parameters . . . . . . . . . . . . . . . . . . . . . . . .1-39
Managing Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-41
Stack Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-42
Watchdog Facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-44
Watchdog User Exits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-47
Error Handlers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-48
User Exits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-50
Processing Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-50
Chapter 2

Utilities

Utility Reference Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-4


Reports Generated from Utilities . . . . . . . . . . . . . . . . . . . . . . . . .2-6
Directing Output From Utilities . . . . . . . . . . . . . . . . . . . . . . . . .2-7
Accessing Utilities From Other Unix Users . . . . . . . . . . . . . . . . . . .2-9
Define Variables in the Users Environment . . . . . . . . . . . . . . . .2-9
Add an Executable Library to the Users Path . . . . . . . . . . . . . .2-12
Assign Read/Write Permissions . . . . . . . . . . . . . . . . . . . . . . . . .2-14
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15
ctm_agstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-15
ctm_backup_bcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-17
ctm_restore_bcp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-19
ctmcontb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-21
ctmcreate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-25
ctmdbapasswd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-36
ctmdbbck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-37
ctmdbcheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-39
ctmdbrst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-44
ctmdbspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-45
ctmdbtrans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-46
ctmdefine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-47
ctmdiskspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-62
ctmexdef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-64
ctmfw . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-66
ctmgrpdef . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-75
ctmjsa . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-77
ctmkilljob . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-81
BMC Software, Inc., Confidential and Proprietary Information

viii

CONTROL-M/Server for Unix Administrator Guide

ctmldnrs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-82
ctmloadset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-86
ctmlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-91
ctmordck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-94
ctmorder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-96
ctmpasswd . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-102
ctmping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-103
ctmpsm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-106
ctmrpln . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-120
ctmruninf . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-124
ctmshout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-127
ctmshtb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-129
ctmstats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-130
ctmstvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-133
ctmsuspend . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-134
ctmsys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-135
ctmudchk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-145
ctmudlst . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-147
ctmudly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-149
ctmvar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-150
ctmwhy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-154
ctm2snmp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-155
ecactltb . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-157
ecaqrtab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-158
Chapter 3

Security

Level of Application Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2


CONTROL-M Security Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3
Scheduling Table Authorization . . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Active Jobs File Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Entities Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Agent Platform Security Checks . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Summary of Authorizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-9
Security Maintenance Utility (Interactive Mode) . . . . . . . . . . . . . . . 3-11
User Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
Group Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Scheduling Table Authorization . . . . . . . . . . . . . . . . . . . . . . . . . 3-21
Active Jobs File Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . 3-24
Entities Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-28
BMC Software, Inc., Confidential and Proprietary Information

Contents

ix

Security Maintenance Utility (Batch Mode) . . . . . . . . . . . . . . . . . . .3-32


User Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-32
Group Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-33
Scheduling Table Authorization . . . . . . . . . . . . . . . . . . . . . . . . .3-33
Active Jobs File Authorization . . . . . . . . . . . . . . . . . . . . . . . . . .3-34
Entities Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3-34
Exporting Security Definition Tables . . . . . . . . . . . . . . . . . . . . .3-35
Importing Security Definition Tables . . . . . . . . . . . . . . . . . . . . .3-36
Chapter 4

Maintenance

Starting/Stopping CONTROL-M Tasks . . . . . . . . . . . . . . . . . . . . . . .4-2


Periodic Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Checking Available Space in the CONTROL-M Database . . . .4-4
Cleaning Up the SQL Database Message Log . . . . . . . . . . . . . .4-4
Cleaning Up the Proclog Directory . . . . . . . . . . . . . . . . . . . . . . .4-5
CONTROL-M Menu System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
CONTROL-M Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-6
CONTROL-M Manager Menu . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
Database Creation Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10
Database Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . .4-12
Database Mirroring Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-27
Security Authorization Menu . . . . . . . . . . . . . . . . . . . . . . . . . . .4-29
Parameter Customization Menu . . . . . . . . . . . . . . . . . . . . . . . . .4-30
Node Group Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-36
Agent Status Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38
Troubleshooting Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-40
Chapter 5

Customization Parameters

Parameter Coordination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-2


Parameter Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-3
Communication Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-9
Operational Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-11
Parameters for Communicating With Agent Platforms . . . . . . . .5-13
Database Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-15
Mirroring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-20
Performance Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-21
Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5-22

BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

Chapter 6

User Exits

Configuring CONTROL-M Exits . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3


User Exit Workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-4
Job Order Exit (CTMUE101) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-5
Job Submission Exit (CTMUE102) . . . . . . . . . . . . . . . . . . . . . . . . . . 6-7
Before New Day Procedure Exit (CTMUE103) . . . . . . . . . . . . . . . . 6-9
After New Day Procedure Exit (CTMUE104) . . . . . . . . . . . . . . . . . 6-10
Before User Daily Exit (CTMUE105) . . . . . . . . . . . . . . . . . . . . . . . 6-11
After User Daily Exit (CTMUE106) . . . . . . . . . . . . . . . . . . . . . . . . . 6-11
Chapter 7

Mirroring and Failover

Failover Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1


Failover Administration Procedures . . . . . . . . . . . . . . . . . . . . . . 7-13
Synchronizing the Primary and Mirror Databases . . . . . . . . . . . 7-35
Appendix A

Messages and Codes

Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-2
Appendix B

Structure of CONTROL-M Log Entries

Glossary
Index

BMC Software, Inc., Confidential and Proprietary Information

Contents

xi

BMC Software, Inc., Confidential and Proprietary Information

xii

CONTROL-M/Server for Unix Administrator Guide

Figures

Figures
Figure 1-1
Figure 1-2
Figure 2-1
Figure 2-2
Figure 2-3
Figure 2-4
Figure 2-5
Figure 2-6
Figure 2-7
Figure 2-8
Figure 3-1
Figure 3-2
Figure 3-3
Figure 3-4
Figure 3-5
Figure 3-6
Figure 4-1
Figure 4-2
Figure 4-3
Figure 4-4
Figure 4-5
Figure 4-6
Figure 4-7
Figure 4-8
Figure 4-9
Figure 4-10
Figure 4-11
Figure 4-12

New Day Procedure and User Daily Jobs . . . . . . . . . . . . . . . . . . 1-16


Directing Shouts Via the Active Shout Destination Table . . . . . 1-25
ON_FILEWATCH Statements . . . . . . . . . . . . . . . . . . . . . . . . . . 2-71
ctmordck Sample Output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-95
ctmpsm Production Support Menu . . . . . . . . . . . . . . . . . . . . . 2-106
ctmpsm - Active Jobs File Menu Options . . . . . . . . . . . . . . . . . . 2-108
List of Scheduling Tables output by the ctmpsm utility . . . . . . . 2-111
List of Jobs output by the ctmpsm utility . . . . . . . . . . . . . . . . . . 2-113
CONTROL-M System Parameters (Page 1) . . . . . . . . . . . . . . . . 2-143
CONTROL-M System Parameters (Page 2) . . . . . . . . . . . . . . . . 2-144
Security Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-13
User Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-14
Group Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-18
Scheduling Table Authorization Menu . . . . . . . . . . . . . . . . . . . . 3-22
Active Jobs File Authorization Menu . . . . . . . . . . . . . . . . . . . . . 3-25
Entities Authorizations Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-29
CONTROL-M Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-6
CONTROL-M Manager Menu . . . . . . . . . . . . . . . . . . . . . . . . . . 4-8
Database Creation Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-10
Database Maintenance Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-13
Database Mirroring Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-27
Security Authorization Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
Parameter Customization Menu . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Communication Parameters Menu . . . . . . . . . . . . . . . . . . . . . . . 4-32
Operational Parameters Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32
Communication Parameters for Agent Platforms . . . . . . . . . . . . 4-35
Communication Parameters for Specific Agent Platforms . . . . . 4-36
Node Group Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-37

BMC Software, Inc., Confidential and Proprietary Information

Figures

xiii

Figure 4-13
Figure 4-14
Figure 4-15
Figure 7-1
Figure 7-2
Figure 7-3
Figure 7-4
Figure 7-5
Figure 7-6

Agent Status Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-38


Troubleshooting Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-40
Troubleshooting Report Information . . . . . . . . . . . . . . . . . . . . . .4-45
Database Mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-2
Server Platform Failover - Primary Environment and Mirror
Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-9
Mirroring Parameters for Database Copying - Sybase . . . . . . . .7-17
Mirroring Parameters for Database Build/Rebuild - Sybase . . . .7-18
Mirroring Parameters for Database Copying - Oracle . . . . . . . .7-21
Mirroring Parameters for Database Build/Rebuild - Oracle . . . .7-21

BMC Software, Inc., Confidential and Proprietary Information

xiv

CONTROL-M/Server for Unix Administrator Guide

Tables

Tables
Table 1-1
Table 1-2
Table 1-3
Table 1-4
Table 1-5
Table 1-6
Table 1-7
Table 1-8
Table 1-9
Table 1-10
Table 1-11
Table 1-12
Table 1-13
Table 1-14
Table 2-1
Table 2-2
Table 2-3
Table 2-4
Table 2-5
Table 2-6
Table 2-7
Table 2-8
Table 2-9
Table 2-10
Table 2-11
Table 2-12
Table 2-13
Table 2-14

Communication Statuses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7


Options for Issuing a Job Order Manually. . . . . . . . . . . . . . . . . 1-24
Shout Message Destinations . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-27
Heartbeat Monitor Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-37
Heartbeat Monitor Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 1-38
Advanced Problem Detection Tools . . . . . . . . . . . . . . . . . . . . . 1-39
Event Logger Severity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-40
Managing Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-42
General Watchdog Facility Parameters . . . . . . . . . . . . . . . . . . . 1-44
Heartbeat Monitor Exit Parameters . . . . . . . . . . . . . . . . . . . . . . 1-45
Parameters for Watchdog System User Exits . . . . . . . . . . . . . . 1-46
Parameters for Watchdog Facility User Exits . . . . . . . . . . . . . . 1-47
Watchdog Facility Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-48
Processing Overhead for Job Processing Features. . . . . . . . . . . 1-50
CONTROL-M Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
CONTROL-M Utility Reference . . . . . . . . . . . . . . . . . . . . . . . . . 2-4
Utility Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-6
Required Environment Variables . . . . . . . . . . . . . . . . . . . . . . . . 2-9
Shared Library Path for Sybase Variables . . . . . . . . . . . . . . . . . 2-10
Shared Library Path for Oracle Variables . . . . . . . . . . . . . . . . . 2-10
Read/Write Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-14
ctm_agstat Utility Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . 2-15
ctmcontb Listing Prerequisite Conditions. . . . . . . . . . . . . . . . 2-21
ctmcontb Adding Prerequisite Conditions . . . . . . . . . . . . . . . 2-22
ctmcontb Deleting Prerequisite Conditions . . . . . . . . . . . . . . 2-22
ctmcontb Deleting Conditions in a Date Range . . . . . . . . . . . 2-23
Parameter Name Cross Reference . . . . . . . . . . . . . . . . . . . . . . . . 2-27
SAP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-33

BMC Software, Inc., Confidential and Proprietary Information

Tables

xv

Table 2-15
Table 2-16
Table 2-17
Table 2-18
Table 2-19
Table 2-20
Table 2-21
Table 2-22
Table 2-23
Table 2-24
Table 2-25
Table 2-26
Table 2-27
Table 2-28
Table 2-29
Table 2-30
Table 2-31
Table 2-32
Table 2-33
Table 2-34
Table 2-35
Table 2-36
Table 2-37
Table 2-38
Table 2-39
Table 2-40
Table 2-41
Table 2-42
Table 2-43
Table 2-44
Table 2-45
Table 2-46
Table 2-47
Table 2-48
Table 2-49
Table 2-50
Table 2-51
Table 2-52
Table 2-53
Table 2-54

Oracle Applications Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 2-34


ctmdbcheck Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-40
ctmdbcheck Displayed Fields for Sybase . . . . . . . . . . . . . . . . 2-40
ctmdbcheck Displayed Fields for Oracle . . . . . . . . . . . . . . . . 2-41
ctmdefine Parameter Name Cross Reference . . . . . . . . . . . . . .2-50
SAP Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-58
Oracle Applications Parameters . . . . . . . . . . . . . . . . . . . . . . . . . 2-59
ctmdiskspace Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-62
ctmexdef Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-64
ctmfw Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-68
ctmfw Return Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-69
ON_FILEWATCH Statements Additional Parameters . . . . . . 2-70
ctmfw Valid Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-71
cmtgrpdef Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-76
ctmjsa Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-78
ctmkilljob Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-81
ctmldnrs Creating a Manual Conditions File. . . . . . . . . . . . . . 2-84
ctmldnrs Listing or Loading Manual Conditions . . . . . . . . . . 2-85
ctmloadset Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-87
ctmlog Valid Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-91
ctmlog Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-92
ctmordck Output Columns . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-94
ctmordck Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-95
ctmorder Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-97
ctmping Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-103
ctmpsm - Menu Options for Active Jobs File . . . . . . . . . . . . . . .2-107
ctmpsm - Active Jobs File Actions. . . . . . . . . . . . . . . . . . . . . . . .2-109
ctmpsm - Menu Options for the Resource Table . . . . . . . . . . . . .2-110
ctmpsm - Menu Options for Scheduling Functions . . . . . . . . . . .2-110
ctmpsm - Options for Scheduling Functions . . . . . . . . . . . . . . . .2-111
ctmpsm - Options in the Scheduling Table List Jobs Menu . . . . .2-113
ctmpsm - Mode Descriptions and Syntax. . . . . . . . . . . . . . . . . . .2-115
ctmrpln Report Formats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-120
ctmrpln Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-121
ctmruninf Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-124
ctmshout Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-127
ctmstats Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-130
ctmstvar Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-133
cmtsuspend Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-134
Fields of the Shout Destination Table . . . . . . . . . . . . . . . . . . . . 2-138
BMC Software, Inc., Confidential and Proprietary Information

xvi

CONTROL-M/Server for Unix Administrator Guide

Table 2-55
Table 2-56
Table 2-57
Table 2-58
Table 2-59
Table 2-60
Table 2-61
Table 3-1
Table 3-2
Table 3-3
Table 3-4
Table 3-5
Table 3-6
Table 3-7
Table 3-8
Table 3-9
Table 3-10
Table 4-1
Table 4-2
Table 4-3
Table 4-4
Table 4-5
Table 4-6
Table 4-7
Table 4-8
Table 4-9
Table 4-10
Table 4-11
Table 4-12
Table 4-13
Table 4-14
Table 4-15
Table 4-16
Table 5-1
Table 5-2
Table 5-3
Table 5-4
Table 5-5
Table 5-6

ctmudchk Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-145


ctmudlst Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-147
ctmvar Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-151
Fields of SNMP Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-155
ctm2snmp Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-155
ecaqrtab Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-158
ecaqrtab Resource Status Fields . . . . . . . . . . . . . . . . . . . . . . . 2-159
Security Levels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-2
Scheduling Table Authorization . . . . . . . . . . . . . . . . . . . . . . . . 3-4
Active Jobs File Authorization . . . . . . . . . . . . . . . . . . . . . . . . . 3-5
Entities Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7
Authorization job submission from a User Daily job . . . . . . . 3-9
Authorization job submission from the New Day procedure . 3-9
Authorization Order/Force a Scheduling Table from
ENTERPRISE/CS
3-9
Authorization Ordering/Forcing a job from ENTERPRISE/CS 3-10
Authorization Do Forcejob . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
Authorization Actions on a Job in the Active network. . . . . . 3-10
CONTROL-M Main Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-7
Options of the CONTROL-M Manager Menu . . . . . . . . . . . . . 4-9
Options of the Database Creation Menu . . . . . . . . . . . . . . . . . . 4-10
Logical Device Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-20
Menu Options for Modifying Database Size . . . . . . . . . . . . . . . 4-21
Options of the Database Mirroring Menu . . . . . . . . . . . . . . . . . 4-27
Security Authorization Menu. . . . . . . . . . . . . . . . . . . . . . . . . . . 4-29
Customization Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-31
Options of the Node Group Menu . . . . . . . . . . . . . . . . . . . . . . . 4-37
Options of the Agent Status Menu. . . . . . . . . . . . . . . . . . . . . . . 4-39
Options of the Troubleshooting Menu . . . . . . . . . . . . . . . . . . . . . 4-40
Two-Letter Codes for CONTROL-M Processes . . . . . . . . . . . . 4-43
Diagnostic Level Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-44
Columns of the Show Process Flags Table . . . . . . . . . . . . . . . . 4-47
CONTROL-M/Server Shut Down . . . . . . . . . . . . . . . . . . . . . . . 4-49
Sleep Time Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-50
Parameter Coordination With ENTERPRISE/CS . . . . . . . . . . . . 5-2
Parameter Coordination With Agent Platforms . . . . . . . . . . . . . . 5-2
System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-3
Communication Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
Operational Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-12
Parameters for Communicating with Agent Platforms . . . . . . . 5-14

BMC Software, Inc., Confidential and Proprietary Information

Tables

xvii

Table 5-7
Table 5-8
Table 5-9
Table 5-10
Table 5-11
Table 5-12
Table 5-13
Table 5-14
Table 5-15
Table 5-16
Table 5-17
Table 5-18
Table 5-19
Table 5-20
Table 6-1
Table 6-2
Table 7-1
Table 7-2
Table 7-3
Table 7-4
Table 7-5
Table 7-6
Table A-1
Table B-1

Sybase Database Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-15


Oracle Database Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18
Mirroring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-20
Performance Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-22
CONTROL-M/Server Parameters . . . . . . . . . . . . . . . . . . . . . . . 5-23
Performance Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
Communication Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-26
ENTERPRISE/CS Communication Parameters. . . . . . . . . . . . . 5-27
User Exit Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-27
CONTROL-M Server and Agent Parameters. . . . . . . . . . . . . . . 5-28
CONTROL-M/Agent Parameters. . . . . . . . . . . . . . . . . . . . . . . . 5-28
General Watchdog Process Parameters . . . . . . . . . . . . . . . . . . . 5-31
Watchdog Parameters for CONTROL-M System Exits. . . . . . . 5-32
Watchdog Parameters User Exit . . . . . . . . . . . . . . . . . . . . . . . . . 5-34
CONTROL-M General User Exits. . . . . . . . . . . . . . . . . . . . . . . 6-2
Exit Configuration Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . .6-3
Database Mirroring Functions . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3
Server Failover Functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Database Mirroring Menu Options. . . . . . . . . . . . . . . . . . . . . . . 7-14
Sybase Mirroring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-19
Oracle Mirroring Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-22
Utilities Affecting the Primary Database . . . . . . . . . . . . . . . . . . .7-36
Message Prefixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
Fields of the CONTROL-M Log . . . . . . . . . . . . . . . . . . . . . . . . B-1

BMC Software, Inc., Confidential and Proprietary Information

xviii

CONTROL-M/Server for Unix Administrator Guide

About . . .

About This Book


This book describes how to install, customize and maintain
CONTROL-M/Server on a Unix platform. The following Unix operating
systems are currently supported:

Solaris 2.6, 2.7, and 2.8

AIX 4.3.2, and 4.3.3 with 64-bit support

HP-UX 9000 10.2 (Sybase only), 11.0 and 11i with 64-bit support

Digital Unix (OSF) 4.0f with 64-bit support, and 5.0a, 5.0b and 5.1

CONTROL-M/Server is packaged with Sybase SQL Server 11.9.2.4 and


Oracle 8.1.6. This guide describes concepts relating to CONTROL-M
administration, and provides details regarding parameters and utilities
that the administrator will utilize in fulfilling his/her function.

BMC Software, Inc., Confidential and Proprietary Information

xix

This book is comprised of the following chapters:


Chapter 1

Overview
Introduces key features and concepts of CONTROL-M.

Chapter 2

Utilities
Provides a detailed description of CONTROL-M utilities.
Operating instructions and examples are included for each
utility.

Chapter 3

Security
Discusses security concepts of CONTROL-M and
ENTERPRISE/CS. Provides instructions for the security
utility included with CONTROL-M.

Chapter 4

Maintenance
Describes how to perform various functions related to
startup/shutdown of CONTROL-M/Server, maintenance of
the CONTROL-M database, setting CONTROL-M
parameters and troubleshooting.

Chapter 5

Customization Parameters
Describes parameters used to customize and configure the
CONTROL-M/Server installation.

Chapter 6

User Exits
Describes user-defined procedures that can be used to
modify certain information before it is processed.

Chapter 7

Mirroring and Failover


Describes how to implement a Mirror (backup) environment
for CONTROL-M/Server and the CONTROL-M database.

Appendix A

Messages and Codes

Appendix B

Structure of CONTROL-M Log Entries

Glossary
Index

BMC Software, Inc., Confidential and Proprietary Information

xx

CONTROL-M/Server for Unix Administrator Guide

Related Publications

CONTROL-M/Server for Unix Installation Guide describes


installation and configuration of CONTROL-M/Server for Unix.

CONTROL-M Quick Installation Guide describes a default


Unix-based installation of CONTROL-M Business Integrated
Scheduling solution. It is intended primarily for trial and
proof-of-concept implementations.

CONTROL-M/Agent Administrator Guides each describe


installation and maintenance of CONTROL-M/Agent on a supported
platform.

Enterprise Controlstation User Guide describes ENTERPRISE/CS


concepts, features, facilities and operating instructions.

Enterprise Controlstation Administrator Guide describes


administrator responsibilities, customization, maintenance and
security of ENTERPRISE/CS.

Enterprise Controlstation Installation Guide describes how to


install and configure ENTERPRISE/CS.

CONTROL-M/Desktop User Guide describes components used to


define and manage CONTROL-M job processing definitions,
Scheduling tables, and Calendars in Enterprise Controlstation.

BMC Software, Inc., Confidential and Proprietary Information

xxi

Notational Conventions
The following abbreviations and terms are used in this guide:
ENTERPRISE/CS = Enterprise Controlstation.
The following table describes conventions used in this guide.
<key>

When describing keystrokes, angle brackets are


used to enclose the name of a key (e.g., <F1>).
When two keys are joined with + as in
<Shift>+<F1>, hold down <Shift> while pressing
<F1>.

Menu => Option

This represents an option selection sequence. For


example:
Users and Groups=>Groups=>Add
means that you first select Users and Groups from
the menu bar; then select the Groups option from
the submenu. Finally, select the Add option from the
Groups submenu.

{Option A|Option B}

The vertical bar is used to separate choices. For


example:
{AND|OR}
means that you specify either AND or OR.

[Option]

Square brackets are used to enclose parameters


that are optional.

<variable>

In commands and parameters, angle brackets are


used to enclose variable information. For example, the
command:

cd

<controlm_path>

means that you specify cd followed by the path of


CONTROL-M.

BMC Software, Inc., Confidential and Proprietary Information

xxii

CONTROL-M/Server for Unix Administrator Guide

Wildcards or
Mask Characters

Certain CONTROL-M utilities and parameters


support wild cards. These are also sometimes
referred to as mask characters. A mask is a string
value containing wild cards.
The following wild card characters are supported:
?

Indicates any one character.

Indicates any number of characters.

Note: Values containing mask characters must be


enclosed in single or double quotes.

BMC Software, Inc., Confidential and Proprietary Information

xxiii

BMC Software, Inc., Confidential and Proprietary Information

xxiv

CONTROL-M/Server for Unix Administrator Guide

Overview

CONTROL-M/Server is a component of CONTROL-M for Business


Integrated Scheduling. This family of products handles production
control and schedules, submits and tracks jobs across your network. The
load-balancing feature of CONTROL-M/Server enables you to attain
maximum production throughput by ensuring that each job is submitted
on a machine with sufficient resources to execute the job efficiently.
This guide describes concepts and tools required by the administrator to
set up and manage CONTROL-M/Server on a Unix platform.
BMC Softwares Business Integrated Solution consists of the following
components:

Enterprise Controlstation
This component is the central point of control for production
operations. It provides the graphical user interface to the production
control and scheduling system. From this workstation (referred to as
the ENTERPRISE/CS workstation), you can view the status of
jobs in any part of the system. You can issue requests, modify job
parameters, and handle exceptions to ensure smooth production job
flow.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-1

CONTROL-M Data Center


Production component of the system. In for versions of
CONTROL-M earlier than version 2.2.x, the data center consisted of
a single platform which ran the CONTROL-M application in
addition to all production jobs. In the current version, the functions
of the data center have been distributed among various platforms,
each running one of the following CONTROL-M components:
CONTROL-M/Server
The central software component of CONTROL-M.
CONTROL-M/Server runs on a Unix workstation (referred to as
the Server platform). From this location, CONTROL-M/Server
exchanges data with ENTERPRISE/CS and with multiple
production machines, and maintains the CONTROL-M database.
CONTROL-M/Agent
This is the component of CONTROL-M that runs on each
production machine (referred to as the Agent platform) and
which executes job-handling requests received from
CONTROL-M/Server. Any number of Agent platforms with
different operating systems can be handled by a single Server
platform.
CONTROL-M/Agent is also installed on the Server platform.
This enables CONTROL-M/Server to utilize the Server platform
as an additional production machine.

In the above configuration, each instance of CONTROL-M/Server and


its associated CONTROL-M/Agents is viewed by Enterprise
Controlstation as a single data center. All processing definitions reside in
a database managed by CONTROL-M/Server. The active scheduling
environment is also managed by CONTROL-M/Server, including all
scheduling logic.
A typical job execution proceeds as follows:

BMC Software, Inc., Confidential and Proprietary Information

1-2

CONTROL-M/Server for Unix Administrator Guide

1. A job waiting to be submitted waits on the Server platform.


2. When all its prerequisite conditions, resource requirements and all
other scheduling constraints are satisfied, CONTROL-M/Server
instructs CONTROL-M/Agent to submit the job.
3. Upon receiving a request to submit the job, CONTROL-M/Agent
submits the job for execution locally according to the job definition.
4. CONTROL-M/Agent monitors the job and reports any exceptional
situation to CONTROL-M/Server.
5. Upon completion of the job, CONTROL-M/Agent performs the
postprocessing analysis. Job sysout is not transmitted over the
network, thus keeping network resource consumption at an absolute
minimum.
The CONTROL-M/Agent Administrator Guide describes how to install
and manage CONTROL-M/Agent on various Agent platforms.
An overall description of concepts relating to ENTERPRISE/CS and
CONTROL-M is provided in the first chapters of the Enterprise
Controlstation User Guide. It is highly recommended that you familiarize
yourself with the material contained there before proceeding with this
guide.
The overview in this chapter includes the following topics:
Topic

Description

CONTROL-M Database

Contents and functions of the CONTROL-M


Database.

Server-Agent Interaction

CONTROL-M mechanism for distributed


execution of production jobs.

Load Balancing

CONTROL-M mechanism for maximizing


throughput by automatic selection of the
platform to execute jobs, based on workload
considerations.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-3

Topic

Description

Failover Planning

Contingency planning for the possibility of


failure of the Server platform or CONTROL-M
database.

New Day Procedure

Daily scheduling and housekeeping


procedures which run on the Server platform.

Group Scheduling and


Processing

Handling jobs as a group.

Shout Destination Tables

Tables used to determine the recipients of


Shout messages.

Runtime Statistics

Job statistics used for planning and


forecasting.

CONTROL-M Log

Audit trail of all CONTROL-M events.

Automatic Problem
Detection Tools (APDT)

Tools to detect real or potential problems.

Daylight Savings Time

Considerations when moving the system clock


forward or backward.

CONTROL-M Administrator

CONTROL-M administration responsibilities.

Heartbeat Monitor

Special monitor which checks the status of


TCP/IP communication with ENTERPRISE/CS.

Watchdog Facility

Mechanism that automatically monitors


CONTROL-M processes and resources.

User Exits

Mechanism which enables the user to modify


CONTROL-M operations to suit site needs.

CONTROL-M Database
The CONTROL-M database is the repository of operational data relating
to the functioning of the CONTROL-M data center. One database exists
for each CONTROL-M data center. The database is maintained by
CONTROL-M/Server, using a dedicated or shared SQL server.
The CONTROL-M database contains the following information:

CONTROL-M log.
BMC Software, Inc., Confidential and Proprietary Information

1-4

CONTROL-M/Server for Unix Administrator Guide

Active Jobs file.


Job processing definitions.
CONTROL-M system, communication and operational parameters.
Security authorizations.
Shout Destination tables.
Node groups.
Agent Parameter table.
Status tables for Quantitative resources, Control resources and
prerequisite conditions.

Server-Agent Interaction
CONTROL-M/Agent handles requests from CONTROL-M/Server. A
request can consist of:

Instructions to submit a job on the Agent platform.


Requests for information regarding jobs on the Agent platform that
are currently executing or recently completed.
Requests to view/edit job script statements.
Requests to view job sysout or job documentation.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-5

In addition, CONTROL-M/Agent can perform the following functions as


instructed by job processing parameters supplied with the job submission
request:

Handling of job sysout.


Issuing Shout messages.

Each Agent platform requires a listener process to accept requests from


CONTROL-M/Server. Unix platforms accomplish this using operating
system services. On other platforms, CONTROL-M/Agent, as started at
boot-time, includes this listener process.

Identification of Agent Platforms


A discovery process must be run for each Agent before CONTROL-M/
Server can communicate with it. For more information about the
Discovery process, see Edit Node Group on page 4-37.
After discovery has been performed, the Agent platform is known to
CONTROL-M/Server by its node ID. This is generally the Agent
platforms host name. The job processing definition for each job should
include the node ID of the Agent platform on which the job should be
submitted by CONTROL-M/Server.
Note

If load balancing is used, the job processing definition includes a Node


group. For more information, see Load Balancing on page 1-9.

Communication Status of Agent Platforms


CONTROL-M/Server uses the TCP/IP protocol to communicate with all
Agent platforms. CONTROL-M/Server maintains a list of all Agent
platforms to which it submits requests and assigns a status to each
platform indicating the success or failure of communication with the
platform. Valid statuses for Agent platforms are described in Table 1-1.

BMC Software, Inc., Confidential and Proprietary Information

1-6

CONTROL-M/Server for Unix Administrator Guide

Table 1-1

Communication Statuses

Status

Description

Available

Communication to the Agent is checked periodically by the


ctmping utility. When the ctmping utility detects an Agent, the
Agent is assigned the status Available. Communication with
the Agent continues to be checked and if the check fails, the
Agents status is returned to Unavailable.

Unavailable

If an Agent does not successfully complete the discovery


process it is assigned a status of Unavailable.
This status is also assigned to an agent if communication to
the Agent ends with an error.
CONTROL-M periodically checks the status of all Agents.
When this check is successful for an Agent that is marked
Unavailable, the Agents status is changed to Available.

Disabled

You can manually assign this status to an Agent platform if you


want to temporarily prevent CONTROL-M/Server from
submitting jobs to that platform. CONTROL-M/Server will not
attempt to communicate with a disabled Agent platform until its
status is manually changed to Available. When an Agent
platforms status is changed to Disabled, any jobs that were
running on the platform at that moment are assigned the status
Disappeared.

The communication status of Agent platforms can be viewed or modified


via the Agent Status menu described in Chapter 4, Maintenance.
Depending upon the type of protocol used for communication, certain
user-defined communication parameters determine timeouts and the
number of retries attempted before the status of an Agent platform is
changed. Communication parameters are described in Chapter 5,
Customization Parameters.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-7

Interrupted Communication
If communication is interrupted between CONTROL-M/Server and one
or more Agent platforms, CONTROL-M/Server sends a special Shout
message to ENTERPRISE/CS. All jobs that were running on the affected
Agent platform(s) are reclassified in the Active Jobs file as Unknown.
The status of the Agent platform is changed to Unavailable.
If processing on the Agent platform was not interrupted, any job
submitted to a platform prior to the interruption continues executing.
When communication between CONTROL-M/Server and an Agent
platform is restored, CONTROL-M checks the status of any jobs that
were running on the Agent platform and updates the status in the Active
Jobs file. If a job completed execution during the period of interrupted
communication, CONTROL-M/Server retrieves its completion status
from the Agent platform.

Time-Related Functions
The time value used for any CONTROL-M function is determined by the
system time on the Server platform. This applies to the following:

The time window in which a job can be submitted (according to the


job processing parameters Time From and Time Until).

Time values recorded for operations in the CONTROL-M log.

Examples

The time value for SUBMITTED AT recorded for a job in the


CONTROL-M log is the time that CONTROL-M/Server issued the
job submission request to the Agent platform, not the time that the
request was received or the time that the job actually started
executing on the platform.

The time value recorded for ENDED is the time that


CONTROL-M/Server received notification that the job completed
execution.
BMC Software, Inc., Confidential and Proprietary Information

1-8

CONTROL-M/Server for Unix Administrator Guide

Authorized CONTROL-M Servers File


CONTROL-M contains a security mechanism to ensure that Agent
platforms process only legitimate job-handling requests.
To ensure that an Agent platform does not receive a request from any
unintended source, each Agent platform contains a file listing host names
of Server platforms that are authorized to issue requests to that platform.
A request from any Server platform not listed in this file is rejected by
CONTROL-M/Agent on the Agent platform.
The Authorized CONTROL-M Servers file for each Agent platform
typically contains the host name of the Server platform to which the
Agent platform is assigned and the host name of a backup
CONTROL-M/Server platform. For a Windows NT Agent platform, this
information resides in the Windows NT registry database.

Agent Configuration Parameters


Each Agent platform has a unique set of configuration parameters. These
parameters include specification of directories used by the Agent
platform when executing jobs and parameters required by
CONTROL-M/Agent for communicating with the Server platform (see
Communication Parameters on page 5-9).

Load Balancing
Under the Agent Technology implementation of CONTROL-M, you
have the additional option of scheduling jobs using the CONTROL-M
load-balancing feature. This feature enables you to submit a job to a
node group rather than to a specific Agent platform. This node group
represents a user-defined list of Agent platforms that are capable of
executing a given job. CONTROL-M/Server uses a load-balancing
algorithm to determine which of these Agent platforms is best able to
handle execution of the job at that moment and submits the job to that
node.
BMC Software, Inc., Confidential and Proprietary Information

Overview

1-9

This feature enables CONTROL-M to optimize utilization of available


resources and ensure maximum production throughput.
The following CONTROL-M facilities are used to administer load
balancing on the Server platform.

The Node Group menu (described in Chapter 4, Maintenance) is


used to define which Agent platforms are contained in each node
group.

The ctmloadset utility is used to report utilization of Quantitative


resources on an Agent platform by non-CONTROL-M jobs.

The Quantitative Resources window (in Enterprise Controlstation) is


used to view or define Quantitative resources available on the Server
platform or Agent platforms.

For an overview of the load balancing facility, refer to Load Balancing


in the CONTROL-M Concepts chapter of the Enterprise Controlstation
User Guide.

Failover Planning
As CONTROL-M is integrated in the production environment of the data
center, it becomes increasingly important to ensure that interruptions of
CONTROL-M functionality are as short as possible.
A properly designed and executed failover plan ensures that
CONTROL-M functions are resumed as soon as possible if a recovery is
necessary.
Failover planning for CONTROL-M should provide for the following
contingencies:

Loss of integrity in the CONTROL-M (primary) database due to a


failure of the SQL server which maintains the database.

BMC Software, Inc., Confidential and Proprietary Information

1-10

CONTROL-M/Server for Unix Administrator Guide

Failure of the platform on which CONTROL-M/Server runs (Server


platform).

CONTROL-M provides two levels of failover protection, which address


these two scenarios: database mirroring and server platform failover.
CONTROL-M Database Mirroring

Failover protection for the CONTROL-M database is provided using


database mirroring. In addition to the primary database installed on the
CONTROL-M platform, a backup database is defined on another SQL
server. All database updates from CONTROL-M are sent simultaneously
to both instances of the SQL database, each on its own server.
If the CONTROL-M primary database loses integrity, CONTROL-M can
continue to function using the secondary database. The primary database
is later restored from the secondary database.
Server Platform Failover

To handle an irrecoverable hardware or software failure on the


CONTROL-M/Server platform, failover capability can be provided by
preparing a backup installation of CONTROL-M/Server on a separate
workstation. This backup installation, or mirror environment, contains
a constantly updated mirrored database, and is connected to the same
agent platforms and ENTERPRISE/CS workstations as the primary
environment.
If the primary CONTROL-M installation fails, the mirror environments
CONTROL-M installation and its mirrored database are activated. The
backup CONTROL-M installation maintains communications with
Agents and ENTERPRISE/CS workstations. This ensures that active jobs
continue despite failure of the primary CONTROL-M platform.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-11

Host Identification in the Agent Platform


Each Agent platform has a unique set of configuration data. This data
includes the following items:

CONTROL-M/Server Host Name


This is the host interface name of the Server platform currently
issuing job-handling requests to the platform.

Authorized CONTROL-M Servers File


This file contains a list of the host names of Server platforms that are
authorized to issue job-handling requests to the platform. The current
Server platform host name appears in this list.

Each job submission or job tracking request from CONTROL-M/Server


contains the host name of the Server platform.
The CONTROL-M/Server Host Name is retained by the Agent
platform as a part of CONTROL-Ms failover mechanism. If the Agent
platform detects that the host name accompanying a request does not
match the current host name in the Agent Configuration file,
CONTROL-M/Agent performs the following actions:

CONTROL-M/Agent verifies that the new host name (contained in


the request) is listed in the Authorized CONTROL-M Servers file.
If the host name does not appear in the list, CONTROL-M/Agent
rejects the request.

If the new host name appears in the list, CONTROL-M/Agent


automatically modifies the current host name in the Agent
Configuration file and processes the request. This situation indicates
that a failover has occurred.

This mechanism enables a backup Server platform to take over job


submission and tracking functions in the event a failure occurs in the
primary Server platform. Its purpose is to prevent an Agent platform
from receiving job-handling requests from two or more Server platforms
concurrently. It is the administrators responsibility to ensure that
CONTROL-M/Server is not running simultaneously in the primary and
backup Server platforms.
BMC Software, Inc., Confidential and Proprietary Information

1-12

CONTROL-M/Server for Unix Administrator Guide

New Day Procedure


CONTROL-M processes execute as background processes on the Server
platform and remain active at all times. Once a day, at the time specified
by the CONTROL-M system parameter Day Time (starting time of
working day), CONTROL-M starts the New Day procedure (formerly
known as the General Daily procedure).
The New Day procedure performs automatic functions that start a new
day under CONTROL-M. This procedure is used as a master scheduler
for all CONTROL-M activities.
In this overview, Scheduling tables refers to both regular Scheduling
tables and Group Scheduling tables.
The New Day procedure performs the following sequence of operations:
1. A new Odate (CONTROL-M date) is calculated (based on the
system date and CONTROL-M system parameter Day Time).
Note

Odate is the scheduling date assigned to a job when the job is ordered.
See Date Definition Concepts in Chapter 2 of the Enterprise
Controlstation User Guide for more information regarding this date.
2. The message FORMATTING AJF is displayed in the
ENTERPRISE/CS Communication Status window for the data
center.
3. A selective cleanup of the Active Jobs file is performed. Jobs that
have already executed and ended OK, and jobs whose parameter
Max Wait has been exceeded (and are not Held), are erased from the
Active Jobs file.
Note

A job for which the Max Wait parameter is specified that ends with a
status of NOTOK is not deleted from the Active Jobs file until the Max
Wait parameter is exceeded.
BMC Software, Inc., Confidential and Proprietary Information

Overview

1-13

4. A selective cleanup of prerequisite conditions is performed.


Prerequisite conditions are deleted if their date reference (month and
day) is equal to the new CONTROL-M date. This prevents jobs from
being triggered by prerequisite conditions remaining from the
previous year.
You can partially or completely disable cleanup of prerequisite
conditions by using the CONTROL-M system parameter Ignore
New Day Conditions.
5. A partial cleanup of the statistics in the CONTROL-M database is
performed. For each job, CONTROL-M retains statistical
information regarding the last 20 successful executions. This value
can be changed by defining the RUNINF_PURGE_LIMIT in the
CONTROL-M config.dat file. CONTROL-M must be shut down
and restarted for this change to take effect.
6. A partial cleanup of the CONTROL-M log is performed, based on
system parameter Maximum Days Retained By CONTROL-M
Log. This parameter specifies the maximum number of days that
entries are retained in the CONTROL-M log before being deleted by
the cleanup procedure.
7. A partial cleanup of job sysout directories on Agent platforms is
performed, based on system parameter Maximum Days to Retain
Sysout Files. This parameter specifies the maximum number of days
that job sysout files are retained in the sysout directory before being
deleted by the cleanup procedure.
8. Job orders are placed in the Active Jobs file according to job
processing parameters contained in Scheduling tables (assigned to
User Daily SYSTEM). These job orders can include the
submission of User Daily jobs (see User Daily Jobs on page 1-18).
9. The end of a daily run is marked by updating the parameter
UDLAST in the Date Control record of User Daily SYSTEM. This
parameter represents the last date on which the New Day procedure
ordered jobs.

BMC Software, Inc., Confidential and Proprietary Information

1-14

CONTROL-M/Server for Unix Administrator Guide

10. CONTROL-M begins downloading the new Active Jobs file to the
ENTERPRISE/CS workstation.
Note

See Date Control Record (UDLAST) on page 1-21 for a description of


UDLAST and the Date Control record.

Scheduling Jobs
The New Day procedure is the master scheduler for production jobs.
It orders production jobs according to their job processing definitions,
and can also order User Daily jobs that, in turn, order regular production
jobs.
In a site with a relatively small number of production jobs, the simplest
and most straightforward method of scheduling jobs is to order them
directly via the New Day procedure.
It is preferable to order jobs using User Daily jobs if two or more of the
following conditions exist:

There are a large number of jobs.


Jobs can be clearly divided into separate categories.
Different jobs are managed by different people.

User Daily jobs can be defined according to function (e.g., by


department, project or factory).
The New Day procedure scans the Scheduling tables assigned to User
Daily SYSTEM and places relevant job orders in the Active Jobs file.
Some of these jobs may be regular production jobs, and some may be
User Daily jobs.
Each User Daily job is submitted and monitored by CONTROL-M and
will, in turn, place job orders in the Active Jobs file.
Figure 1-1 demonstrates how the association of Scheduling tables and
User Daily jobs affects the scheduling of jobs under CONTROL-M:
BMC Software, Inc., Confidential and Proprietary Information

Overview

1-15

Figure 1-1

New Day Procedure and User Daily Jobs


CONTROL-M
Database

User
Daily

Scheduling
Table Name

SYSTEM

UDAILIES

SYSTEM

TABLE1

UDAILY1
UDAILY1

PAYABLES
RECEIVABLES

UDAILY2

INVENTORY

New Day
Procedure
1

Active Jobs File

CONTROL-M
Monitor
4

UDAILY1

UDAILY2
6

Scheduling
Table Name

Job

UDAILIES

UDAILY1

UDAILIES

UDAILY2

TABLE1
TABLE1

PROD_JOB1

PAYABLES

PROD_JOB3

PAYABLES

PROD_JOB4

RECEIVABLES

PROD_JOB5

INVENTORY

PROD_JOB6

INVENTORY

PROD_JOB7

PROD_JOB2

1. As part of its daily routine, CONTROL-M activates the New Day


procedure.
2. The New Day procedure scans the CONTROL-M database for all
Scheduling tables assigned to User Daily SYSTEM (in this
example, UDAILIES and TABLE1). These Scheduling tables can
consist of regular production jobs and/or User Daily jobs. In this
example, UDAILIES consists of User Daily jobs and TABLE1
consists of production jobs.
3. The New Day procedure places the relevant job orders in the Active
Jobs file.
BMC Software, Inc., Confidential and Proprietary Information

1-16

CONTROL-M/Server for Unix Administrator Guide

4. As part of its regular processing of ordered jobs, CONTROL-M


scans the Active Jobs file for jobs to submit.
5. Upon determining that all requirements for User Daily jobs
UDAILY1 and UDAILY2 have been met, the CONTROL-M
submits them for execution.
6. The User Daily jobs then order the corresponding tables
(PAYABLES, RECEIVABLES, INVENTORY). The jobs in these
tables are added to the Active Jobs file if their scheduling criteria are
satisfied. All ordered jobs are submitted for execution when their
submission criteria are satisfied.
Group Scheduling tables are ordered only if the scheduling criteria of
at least one Schedule Tag in the table is satisfied. Individual jobs in
each Group Scheduling table will be ordered or not, depending on
the value of the Relationship parameter and on values specified for
job-specific basic scheduling parameters.
Note

A Group Scheduling table is ordered as a separate entity, and can be


ordered even if no jobs in the table are ordered. If this happens, the final
status of the group is set to OK, and post-processing for the group is
performed. (That is, setting prerequisite Out Conditions, Shouts and
ON_GROUP_END OK actions.)
Each User Daily job scans all the Scheduling tables assigned to it in the
CONTROL-M database, and orders the jobs based on their Scheduling
criteria, the date in the computer, and the Date Control record (see User
Daily Jobs in this chapter). For jobs in a Group Scheduling table, the
User Daily job also orders jobs according to Scheduling criteria of the
Schedule Tags in the Group Scheduling table. Each User Daily job scans
a different set of Scheduling tables and uses a different Date Control
record (see Date Control Record (UDLAST) on page 1-21).
Many variations of the method described can be used. For example,
additional User Daily jobs can be defined, each one executing at a
specific time.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-17

User Daily Jobs


For large installations, User Daily jobs are the most suitable mechanism
for adding new job orders under CONTROL-M.
A User Daily job is actually no different from any other regular job
handled by CONTROL-M. The User Daily job is defined via the
ENTERPRISE/CS Graphical User Interface, using the same procedure
and the same job processing parameters as any other job. User Daily jobs
run on the Server platform.
Note

User Daily jobs require CONTROL-M/Agent to be installed on the


Server platform.
A User Daily job must include in its script file (specified by its Mem
Name job parameter) the command to run the ctmudly utility. The
ctmudly utility accepts a parameter containing the name of a specific
User Daily job, and it orders Scheduling tables associated with that User
Daily job. (The name of the User Daily job can be stated explicitly in the
script file or it can be specified using AutoEdit Assignment statements.)
Each User Daily job scans the Scheduling tables assigned to it to
determine which jobs are potential job orders for this specific date.
An ordered job will not necessarily be executed by CONTROL-M
(e.g., a job is not executed if its prerequisite conditions are not met or if
resources required for the job are not available).
When a User Daily job determines that a specific job should be ordered,
it places the job order in the Active Jobs file.
The normal sequence of actions performed by a User Daily job is as
follows:

BMC Software, Inc., Confidential and Proprietary Information

1-18

CONTROL-M/Server for Unix Administrator Guide

1. If no Scheduling tables are assigned to the User Daily, an error is


generated and the User Daily job exits. Otherwise, the User Daily job
continues with the next step.
2. The date UDLAST of the User Daily Date Control record is
compared with Odate.

If UDLAST is earlier than Odate, the program updates the


starting date of this User Daily job and continues executing.

If UDLAST is later than or equal to Odate, the program writes a


message to the CONTROL-M log and terminates without
performing any further operations.

3. Each of the Scheduling tables assigned to the User Daily job is


scanned, and relevant job orders are placed in the Active Jobs file.
4. The successful completion of the User Daily job run is marked by
updating UDLAST on the Date Control record with the current value
of Odate.
Note

It is recommended that User Daily jobs be scheduled to run sequentially,


not concurrently. This can be accomplished using the standard scheduling
parameters in job processing definitions (e.g., assign the same Control
resource in exclusive mode to all the User Daily jobs, and sequence the
jobs for execution in a specific order using the priority mechanism).
Example

Assume that a set of jobs is defined in a Scheduling table named


ACCOUNTING assigned to User Daily UDAILY1. Another set of jobs
is defined in a Group Scheduling table named ACCGROUP.
The job processing definition below describes a job that could be used to
order the ACCOUNTING Scheduling table and the ACCGROUP
Group Scheduling table. This type of job is referred to as a User Daily
job.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-19

Job Processing Parameters

Script File

Job Name

ACCUDAILY1

Application

USER_DAILIES

Task Type

Job

Description

Accounting User Daily

Scheduling Table

ACCTDAILY

Author

michelle

Script file udaily (referred to


by the Job Processing
parameter Mem Name)
contains the following line:
ctmudly $1
The ctmudly utility used in
this file is described in
Chapter 2, Utilities.

Owner

bill

Mem Name

udaily

Mem Lib

/usr/bill/bin

AutoEdit
Assignments

%%PARM1 = UDAILY1

You can manually order the User Daily job ACCUDAILY1 whenever
you want to order the jobs in the ACCOUNTING Scheduling table and
the jobs in the ACCGROUP Group Scheduling table, or you can assign
Scheduling table ACCTDAILY to User Daily name SYSTEM, in which
case ACCUDAILY1 is ordered by the New Day procedure.
When ACCUDAILY1 submits the script file with the parameter $1 set to
UDAILY1, the command actually executed by the script is:
ctmudly

UDAILY1

This causes all Scheduling tables assigned to UDAILY1 to be ordered


(including Scheduling table ACCOUNTING and Group Scheduling
table ACCGROUP referred to above).
The script file UDAILY can also be used by other User Daily jobs. In
each job processing definition, assign the appropriate User Daily name to
the AutoEdit variable %%PARM1.

BMC Software, Inc., Confidential and Proprietary Information

1-20

CONTROL-M/Server for Unix Administrator Guide

Date Control Record (UDLAST)


User Daily jobs are used to place job orders in the Active Jobs file. Each
User Daily job usually runs once a day, scanning one or more user
Scheduling tables. As with any regular job, the User Daily job is ordered
according to its defined Scheduling criteria. This means that the User
Daily job is date-dependent. As a result, certain special situations must
be taken into account.
For example:

The computer has not been working for a day or more


(e.g., weekend, holidays or hardware failure).

The user wants to run a job or a group of jobs with an Odate


(original scheduling date) that is prior to the current working date.

Each User Daily job has its own Date Control record, enabling the User
Daily job to maintain control over its last running date. The last running
date of the User Daily job is recorded in the Date Control record in a
field called UDLAST. The Date Control record is analyzed to determine
the current running date, the last running date, and possible error
situations.
The ctmudlst utility can be used to change the UDLAST field in the Date
Control record. Changing this date field affects the scheduling of jobs as
described below.
Use of the Date Control Record by User Daily Jobs

When a User Daily is run, UDLAST (the last running date of the User
Daily job, recorded in the Date Control record) is compared to Odate
(the current installation working date).

If UDLAST is earlier than Odate (the normal situation), UDLAST


is updated automatically to the current installation working date. This
date is then used by the User Daily job as the current scheduling
date.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-21

If UDLAST and Odate are equal, it means that the User Daily job
has already run today. In that case, a message is issued to the
CONTROL-M log, and the User Daily job does not order any jobs.

If UDLAST is later than Odate, an exceptional situation has


occurred. The User Daily job writes a message to the CONTROL-M
log and stops executing. You can use the ctmudlst utility, if required,
to modify UDLAST.

If, for any reason (e.g., hardware problems), the New Day procedure
did not run for one or more days, it is not necessary to run it for days
missed. However, production jobs (including User Daily jobs) whose
job processing definition includes the parameter Retro will be
ordered automatically for all the dates on which they were supposed
to be ordered. Retroactive ordering of jobs is performed according to
each jobs scheduling criteria.
For example, if the computer did not operate from the 20th to
the 23rd, then a job which was originally scheduled to run on the
20th will not have run on that day. When it is finally run on the 24th,
the New Day procedure determines whether or not its associated jobs
should be retroactively scheduled to run using the logical date of
the 20th. For additional information, refer to the Retro parameter in
Chapter 5, Job Processing Parameters, of the Enterprise
Controlstation User Guide.
Note

There is no need to specify the Retro parameter in the job processing


definition of a User Daily job which is scheduled to run on a daily basis.
In the event that production days are missed (as described above), one
execution of the User Daily job will order retroactively all jobs defined
using the Retro parameter.
The Retro parameter can be used in the job processing definition of a
User Daily job that is not scheduled to run on a daily basis.

BMC Software, Inc., Confidential and Proprietary Information

1-22

CONTROL-M/Server for Unix Administrator Guide

Handling of Interruptions During a User Daily Job


CONTROL-M contains provisions for dealing with interruptions during
the execution of a User Daily job (i.e., when some of the job orders have
already been placed in the Active Jobs file and some have not).
If a User Daily job is interrupted for any reason (e.g., operating system
crashes, User Daily job errors or ordering is erroneously stopped for any
other reason), the entire daily process (starting from execution of the
New Day procedure) can be rerun manually. User Dailies ordered by the
first run of the New Day procedure are not reordered. Therefore, If a
User Daily other than SYSTEM was interrupted, you must run the
ctmudchk utility for that User Daily to order jobs that were not ordered
because of the interruption. The ctmudchk utility verifies that a job is not
already present in the Active Jobs file before ordering the job.

Issuing a Job Order Manually


Most job orders are handled automatically by the New Day procedure or
by User Daily jobs. However, it is sometimes necessary to issue job
orders manually (e.g., an ad hoc job) or to issue a job order for a different
working date.
The following options are available on the ENTERPRISE/CS
workstation for issuing a job order manually:

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-23

Table 1-2

Options for Issuing a Job Order Manually

Option

Description

Order

Requests that the specified job or Scheduling table be ordered.


Each job is placed in the Active Jobs file if its Scheduling
criteria are satisfied. Individual jobs in a Group Scheduling
table cannot be ordered. However, a Group Scheduling table
can be ordered.

Force

Forces the specified job or Scheduling table. Each job is placed


in the Active Jobs file regardless of its Scheduling criteria.
The Force option can also be used to order jobs in a Group
Scheduling table. These jobs can be ordered in any of the
following ways:
As additional jobs in an already ordered instance of the same
Group Scheduling table.
As jobs in a new instance of the Group Scheduling table.
As standalone jobs that are not part of a Group Scheduling
table.

For more information regarding the use of the Order and Force options,
see Ordering/Forcing Jobs in the Job Processing Definitions Chapter of
the Enterprise Controlstation User Guide.

Shout Destination Tables


The CONTROL-M Shout facility sends messages to specified recipients
(e.g., users, terminals, files, CONTROL-M log) based on a destination
specified by the parameters Shout and/or Do Shout in a job processing
definition.
The Shout Destination table contains a list of logical destinations and
the equivalent physical destination of each logical destination.
You can create any number of Shout Destination tables, but only one of
them is designated as the active Shout Destination table at any given
time. By changing the designation of the active table, you can change the
actual recipients of messages sent to specific logical recipients.

BMC Software, Inc., Confidential and Proprietary Information

1-24

CONTROL-M/Server for Unix Administrator Guide

Example

Figure 1-2

Directing Shouts Via the Active Shout Destination Table

The system administrator defined two Shout Destination tables,


labeled DAYSHIFT and NIGHTSHIFT. In DAYSHIFT, the logical
recipient SYS_MANAGER is equated to user Susan, who is the
daytime systems manager. In NIGHTSHIFT, the logical recipient
SYS_MANAGER is equated to user Robert, the night-time systems
manager.

When the DAYSHIFT Shout Destination table is active, Shout


messages addressed to SYS_MANAGER are sent to Susans
terminal. At 5 p.m., a job is run which changes the active Shout
Destination table to NIGHTSHIFT. From that point forward, Shout
messages addressed to SYS_MANAGER are sent to Roberts
terminal.

Shout Destination tables are created and maintained using the ctmsys
utility (described in Chapter 2, Utilities).
Designation of the active Shout Destination table can be performed using
one of the following methods:

Using the interactive utility ctmsys. In addition to creating and


maintaining Shout Destination tables, ctmsys can display the
currently-active table and allows you to change the active table by
selecting a different table from a list.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-25

Using utility ctmshtb. This utility accepts the name of the Shout
Destination table to make active.
This second method is especially useful. By defining CONTROL-M
jobs that execute the ctmshtb utility at specified times, the active
Shout Destination table designation can be changed automatically
according to the schedule that suits your requirements. ctmshtb is
described in Chapter 2, Utilities.

The ctmshout utility can also be used to issue a Shout message to an


indicated destination. ctmshout is described in Chapter 2, Utilities.

Shout Message Destinations


When defining logical and physical destinations in the Shout Destination
table (using the ctmsys utility), you are requested to supply the following
information for each recipient:

BMC Software, Inc., Confidential and Proprietary Information

1-26

CONTROL-M/Server for Unix Administrator Guide

Table 1-3

Shout Message Destinations

Logical Name

Name used in the Shout or Do Shout parameter to


identify the recipient of the Shout message.

Destination Type

One-letter code, indicating the type of recipient.


Possible values are:

Address Type

Destination is the user name of a


person logged onto the Server platform.
If the user is not logged on when a
message is sent, the message is placed
in the users mail.

Destination is a users mail.

Destination is a specific terminal or file.

Destination is the system console.

Destination is the CONTROL-M log.

Destination is the Alert window of


ENTERPRISE/CS.

Destination is a program, which


performs the Shout operation.

For Destination Types U, M, T, P or O, a one-letter


code indicating the location of the recipient relative to
the Server platform. Possible values are:
S

Recipient is a user on the Server


platform.

Recipient is located on the Agent


platform where the job that caused the
Shout message was executed.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-27

Table 1-3

Shout Message Destinations

Physical Name

A one-letter code indicating the address of the


recipient. Possible values are:
U and M

The user name of the recipient

The terminal ID or full path name of a


file. If the file exists, the message will be
appended to the end of the file

The full path name of the program to be


executed.
The recipient program must accept input
in the format:
<hostname> <severity> <message>

O, L, and E

No physical name is specified, as each


of these is a unique destination

Note

All Shout messages are recorded in the CONTROL-M log. You would
select the log as a destination only when you do not wish to send the
message to any additional destination.

Runtime Statistics
CONTROL-M includes an option for accumulating and collating runtime
statistics for each defined job. These statistics are used for the following
purposes:

The job processing parameter Shout can be specified to issue a


message if the execution time required by a job varies from its
average runtime by more than a stated interval. This can help
highlight possible errors. (The Shout parameter is described in
Chapter 5, Job Processing Parameters, of the Enterprise
Controlstation User Guide.)

BMC Software, Inc., Confidential and Proprietary Information

1-28

CONTROL-M/Server for Unix Administrator Guide

When a simulation is run using the ENTERPRISE/CS Simulation


facility, job statistics are used by the facility to determine how much
time to allow for the execution of each job.

When viewing information regarding a scheduled job (that is, a job


in the Active Jobs file) in ENTERPRISE/CS, you are provided with
the average runtime and the standard deviation in the Job Details
window. In addition, you can view the job statistics recorded in the
Statistical Details table by selecting the Statistics option from the
Job Node menu.

The ENTERPRISE/CS display for currently-running jobs includes a


real-time graphical indication of the percentage of the runtime
remaining for each job, based on the jobs runtime statistics.

CONTROL-M generates runtime statistics by compiling information


contained in the Statistical Details table of the CONTROL-M database
and storing this information in a summary table. Runtime statistics for a
given job are passed to the ENTERPRISE/CS workstation each time that
job is ordered.
The compilation and recording of statistical data depends upon the
following CONTROL-M components:

The CONTROL-M system parameter Statistics must be set to Y (the


default value). This notifies CONTROL-M that you want statistical
data from each successful job execution to be recorded in the
Statistical Details table of the CONTROL-M database. System
parameters are modified via the ctmsys utility.

The CONTROL-M operational parameter Statistics Mode indicates


the mode used by the ctmjsa utility to collect summary statistics:
JOBNAME compiles statistics for each CONTROL-M Job Name
and Node ID where the job was submitted; MEMNAME (default)
compiles statistics for each CONTROL-M Mem Name/Mem Lib
and Node ID. Operational parameters are modified via the Parameter
Customization menu in the CONTROL-M Menu system (see Figure
4-9 on page 4-32 and the bulleted item about changing Statistics
Mode on page 4-34).

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-29

The CONTROL-M ctmjsa utility is used to compile the data in the


Statistical Details table and store the results in a Statistical Summary
table in the CONTROL-M database. For additional information, see
the description of the ctmjsa utility on page 2-77.

It is recommended that you define a CONTROL-M job to run the ctmjsa


utility on a daily basis. This helps to ensure that the CONTROL-M
database contains current statistics on all jobs executed under
CONTROL-M. A partial cleanup of the Statistical Details table is
performed by the New Day procedure. See New Day Procedure in this
chapter for additional information.
The ctmruninf utility displays and deletes data from the Statistical
Details table. The ctmstats utility displays and deletes data from the
Statistical Summary table. Both utilities can be filtered according to date
and job information. For additional information, see the descriptions of
ctmruninf and ctmstats in Chapter 2, Utilities.

BMC Software, Inc., Confidential and Proprietary Information

1-30

CONTROL-M/Server for Unix Administrator Guide

CONTROL-M Log
The CONTROL-M log contains a complete audit trail of every event
occurring in the CONTROL-M production environment. CONTROL-M
logs every item of meaningful information about its operation and about
the jobs under its supervision. Notification of both routine procedures
and error occurrences are recorded in the log.
Among the types of entries recorded in the CONTROL-M log are
messages regarding the following:

Operation of the New Day procedure and User Daily jobs.

Changes in the availability of Control resources, Quantitative


resources and prerequisite conditions.

Job submissions and terminations, reruns, job log (Sysout) handling


and Shout performance.

User actions affecting jobs, whether performed via the


ENTERPRISE/CS workstation or via utilities on the Server platform.

Failures to adhere to security definitions on the Server platform.

All Shout messages issued by CONTROL-M.

On the ENTERPRISE/CS workstation, CONTROL-M Log entries


relating to a specific job displayed in the active network can be viewed
using the Log window.
On the Server platform, all CONTROL-M Log entries can be viewed
using the CONTROL-M the ctmlog utility (described in Chapter 2,
Utilities).

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-31

Entries are placed in the CONTROL-M log continually as long as


CONTROL-M is active. To prevent the log from becoming too large, the
CONTROL-M log is purged once a day by the New Day procedure. The
number of days that entries are retained in the CONTROL-M log before
deletion is determined by CONTROL-M system parameter Maximum
Days Retained by CONTROL-M Log (described in Chapter 5,
Customization Parameters).
A description of the structure of CONTROL-M log entries can be found
in Appendix B, Structure of CONTROL-M Log Entries.

BMC Software, Inc., Confidential and Proprietary Information

1-32

CONTROL-M/Server for Unix Administrator Guide

Daylight Savings Time Considerations


Daylight savings time considerations are described in the following
paragraphs. All examples assume 02:00 a.m. as the time of change.

Advancing the Clock Forward


The following examples assume that the clock is moved ahead at 2:00
a.m. (2:00 a.m. becomes 3:00 a.m.). If the computer is capable of
changing the clock without restarting the system, do not bring down the
CONTROL-M when the clock is being advanced.
New Day Procedure

No special action should be taken once the clock is advanced.

If the New Day procedure starts before you reset the clock, the New
Day procedure will start working before the clock is advanced, and
will continue normally (even if the clock is advanced while the New
Day procedure is in process). For more information about the New
Day procedure, see page 1-13.

If the New Day procedure is scheduled to begin at exactly 2:00 a.m.,


the same considerations apply. It is possible that the New Day
procedure will start execution before the clock is manually changed.
Otherwise, changing the clock will initiate New Day processing.

If the New Day procedure is scheduled to begin between 2:00 a.m.


and 3:00 a.m., after the computer clock is advanced, CONTROL-M
will start the normal New Day processing.

If the New Day procedure is scheduled to begin after 3:00 a.m., no


action is required. CONTROL-M will start the standard New Day
procedure.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-33

Time-Dependent Shouts

Shout messages scheduled before 2:00 a.m. do not require any


action.

Shout messages scheduled between 2:00 a.m. and 3:00 a.m. will be
issued, even though there may not be a delay in production since the
time frame for production is smaller.

The above also applies to jobs which have shout messages scheduled
at a later time (e.g., 6:00 a.m.). These jobs may be considered late
because of the tighter production time frame.

Time-Dependent Schedules (FROM UNTIL or Cyclic Jobs)

Jobs whose scheduled time overlaps the time gap created by the clock
shift may need manual intervention. For example, it is possible that a job
with a FROM value of 2:15 a.m. and an UNTIL value of 2:45 a.m. may
not be submitted at all. These jobs should be manually adjusted. A cyclic
job may have to be deleted and then resubmitted to continue the
processing cycle during the current day.
CONTROL-M Log File

The CONTROL-M Log file will not contain entries with timestamps
between 2:00 a.m. and 3:00 a.m. Any scripts and/or programs that rely
on log entry time should be checked for possible discrepancies as a result
of advancing the clock.

Moving the Clock Backwards


The following examples assume that the clock is moved back at 2:00
a.m. (2:00 a.m. becomes 1:00 a.m.).

BMC Software, Inc., Confidential and Proprietary Information

1-34

CONTROL-M/Server for Unix Administrator Guide

New Day Procedure

If the New Day procedure starts before 1:00 am, no special action
should be taken. The New Day procedure will run only once
(between 00:00 and 00:59).

If the New Day procedure starts exactly at 1:00 a.m., computer time
should not be turned back to 1:00 a.m. to avoid another New Day
process. A second New Day procedure requires manual intervention.
It is advisable to wait until 2:01 a.m., for example, and turn the clock
back to 1:01 a.m.

If the New Day procedure is scheduled to begin between 1:00 a.m.


and 2:00 a.m., do one of the following:
Wait at least a full hour after the daily run, and then turn the
clock back as needed; the New Day procedure will have ended.
Update the clock before New Day processing begins.
For example, if the New Day time is 1:45 a.m., the clock should be
moved back one hour no later than 1:44 a.m. If this was not done
by 1:44 a.m., the user should wait until 2:46 a.m. and then shift the
time back.

If the New Day procedure is scheduled to begin after 2:00 a.m., no


special action should be taken.

Time-Dependent Shouts

Shout messages scheduled between 1:00 a.m. and 2:00 a.m. may be issued
twice.
Time-Dependent Schedules (FROM-UNTIL or Cyclic Jobs)

No special action should be taken for jobs with FROM-UNTIL or cyclic


schedules. Jobs scheduled to start between 1:00 a.m. and 2:00 a.m. will
start at the first occurrence of the hour (provided that other conditions,
such as input conditions and resources are met). However, they can be
restarted after the clock is moved back.
BMC Software, Inc., Confidential and Proprietary Information

Overview

1-35

CONTROL-M Log File

The CONTROL-M Log file may contain entries with times earlier than
previous entries, due to the time shift. The same considerations that apply
to advancing the clock forward, should be applied to moving the clock
backwards.

CONTROL-M Administrator
The aim of the CONTROL-M administrator is to ensure the smooth and
efficient running of CONTROL-M with minimum interruptions and
optimal usage of available resources. To achieve this aim, the
responsibilities of the CONTROL-M administrator can be summarized as
follows:

Providing appropriate security authorizations to CONTROL-M users


via the CONTROL-M Security Maintenance Utility (ctmsec).

Backing up the CONTROL-M database, CONTROL-M home


directory files and CONTROL-M data directory on a periodic
basis to ensure complete recovery in case of system failure.

Planning CONTROL-M production schedules.

Performing troubleshooting functions, such as:


Performing basic CONTROL-M database maintenance functions
(e.g., increasing available space, dumping logs, increasing
locks).
Detecting common system problems by analyzing
CONTROL-M logs and APDT logs.
Detecting database problems by analyzing CONTROL-M
database logs.
Collecting and analyzing debug information.
Checking for enough disk space.
Monitoring the CONTROL-M production system; checking that
the database is not at full capacity; removing old prerequisite
conditions.
BMC Software, Inc., Confidential and Proprietary Information

1-36

CONTROL-M/Server for Unix Administrator Guide

Cleaning up old and unnecessary log files from the proclog


directory.
Installing all CONTROL-M releases and patches, as needed.

Heartbeat Monitor
CONTROL-M contains an integral Heartbeat monitor that verifies that
TCP/IP communication with ENTERPRISE/CS is functional and that
ENTERPRISE/CS is responsive to messages from CONTROL-M.
This feature complements the ENTERPRISE/CS Heartbeat monitor that
verifies that communication with CONTROL-M is functional and that
CONTROL-M is responsive to messages from ENTERPRISE/CS.
The CONTROL-M Heartbeat monitor can operate in either of two
modes. These modes are described in Table 1-4.
Table 1-4

Heartbeat Monitor Modes

Mode

Description

Active Mode

The CONTROL-M Heartbeat monitor periodically sends a


heartbeat check message through one TCP/IP
connection to ENTERPRISE/CS. ENTERPRISE/CS
repeats the message through the second TCP/IP
connection back to CONTROL-M. If CONTROL-M does
not receive a response to a heartbeat check message
within a limited time period, CONTROL-M assumes that
communication with ENTERPRISE/CS is temporarily
interrupted. CONTROL-M then initiates a procedure to
restore communication with ENTERPRISE/CS. In
addition, CONTROL-M issues a response to heartbeat
checks initiated by ENTERPRISE/CS.

Passive Mode

CONTROL-M does not initiate heartbeat checks, but


CONTROL-M does respond to the heartbeat checks
initiated by ENTERPRISE/CS. In this mode,
CONTROL-M does not automatically attempt to restore
communication with ENTERPRISE/CS if communication
is interrupted.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-37

The CONTROL-M Heartbeat monitor uses the following parameters that


are contained in file ~controlm/ctm/data/config.dat:
Table 1-5

Parameter

Heartbeat Monitor Parameters

Description

CTM_PRM_KPA_ACTIVE
Whether or not the CONTROL-M Heartbeat monitor
operates in active (Y) or passive (N) mode. Default: Y.
CTM_PRM_KPA_BETWEEN_MSGS
Amount of time (in seconds) to wait after receiving a
response to a heartbeat check before issuing the next
heartbeat check. Default: 300 seconds.
CTM_PRM_KPA_ROUNDTRIP_TIMEOUT
Time (in seconds) to wait for a response after issuing
a heartbeat check before declaring a communication
failure and initiating corrective actions. Default: 300
seconds.

Example
CTM_PRM_KPA_ACTIVE
CTM_PRM_KPA_BETWEEN_MSGS
CTM_PRM_KPA_ROUNDTRIP_TIMEOUT

Y
300
300

Advanced Problem Detection Tools


CONTROL-M/Server invokes Advanced Problem Detection Tools to
help you maintain software integrity and protect data. Use of these tools
enhances system monitoring to help avoid failures and provides multiple
methods for safeguarding data. In the event of a system or process crash
you may be asked to run one of these tools and submit their output to
Technical Support.
In addition to the tools mentioned below, also refer to:

BMC Software, Inc., Confidential and Proprietary Information

1-38

CONTROL-M/Server for Unix Administrator Guide

Contingency planning for the possibility of failure of the Server


platform or the CONTROL-M database. For more information, see
Failover Planning on page 1-10.
Writing diagnostic files when the diagnostic level setting is greater
than zero. For more information, see Set Diagnostics Level on
page 4-43.

Table 1-6

Advanced Problem Detection Tools

Tool

Description

Event logger

Generates log files for events that match the specified


severity and category. For more information, see
Setting Event Logger Parameters on page 1-39.

Log file size monitor

Monitor the size of log files. Save files that exceed a


specified size to a new version of the file. For more
information, see Managing Log Files on page 1-41.

Stack trace logger

A log of the functions called and the events leading


up to a process crash. For more information, see
Stack Trace on page 1-42.

Watchdog

Monitors CONTROL-M processes and resources and


sends an alert if a problem is detected. For more
information, seeWatchdog Facility on page 1-44.

ctmdbcheck

Checks database integrity, displays information about


database memory utilization and automatically
monitors database and transaction logs. For more
information, see ctmdbcheck on page 2-39.

ctmdbtrans

Lists active transactions in the database. For more


information, see ctmdbtrans on page 2-46.

ctmlog

Performs selective cleanup of the CONTROL-M log or


produces a report of CONTROL-M log entries. For
more information, see ctmlog on page 2-91.

Setting Event Logger Parameters


The Event logger records events that occur in CONTROL-M. The
following types of events can be recorded:

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-39

IOALOG events
These are analogous to ctmlog events and involve reading and
writing to the IOA database.

DBASE events
These are associated with database access and involve reading and
writing to the CONTROL-M database.

CONTROL-M generates log entries when an event matches the logger


parameters specified in the config.dat file relating to severity and
category. The keywords in the parameter related to severity refer to the
message types that are generated when the category they refer to is
matched, for example, informational messages concerning the database
are generated when events occur matching parameters that relate to the
severity keyword INFO and the category DBASE.
The log entries generated are saved in the following location:
<controlm_home>/ctm/proclog/logger.

Note

If not manually archived, these log files can occupy a large amount of
disk space. Careful selection of events to be logged will prevent
unnecessary large log files. For information about how to maintain the
log files, see Managing Log Files on page 1-41.
To configure the Event logger, insert the following commands in the
config.dat file (the text must be entered in uppercase):
CTM_LOGGER_SEVERITY {INFO|WARNING|ERROR}
CTM_LOGGER_CATEGORY {IOALOG|DBASE}
Table 1-7

Event Logger Severity

Keyword

Description

INFO

Informational messages for the specified category.

WARNING

Warning messages for the specified category.

ERROR

Error messages for the specified category.


BMC Software, Inc., Confidential and Proprietary Information

1-40

CONTROL-M/Server for Unix Administrator Guide

Example

To record IOALOG events with a severity of WARNING and ERROR,


include the following in the config.dat file:
CTM_LOGGER_SEVERITY WARNING ERROR
CTM_LOGGER_CATEGORY IOALOG

Managing Log Files


CONTROL-M saves information about its processes, operations, errors
and the jobs under its supervision in log files. If not periodically backed
up and cleaned, these files can occupy a large amount of disk space.
CONTROL-M/Server provides a mechanism for archiving log files over
a specified size and to assign a generation number for each archived log.
You can determine the size of the log files and the number of file
generations by using the parameters described below. CONTROL-M
monitors the size and version of log files utilizing configurable
parameters in the <controlm_home>/ctm/data/config.dat file.
These parameters specify the required size and number of generations of
the log file.
Note

If no values are specified, no limits are placed on the size of the log file.
If values are specified, the size of the log file is checked and when the
limit is reached, the file is renamed logger.1. Entries continue to be saved
in the default logger file, and when the file next reaches its limit, the file
is renamed logger.2, and so on, until the maximum number of specified
generations is reached. The oldest file is deleted when another log file
exceeds the limit.
To set size and generation limits, specify the following parameters in the
config.dat file:
LIMIT_LOG_FILE_SIZE <file-size>
LIMIT_LOG_VERSIONS <number>
BMC Software, Inc., Confidential and Proprietary Information

Overview

1-41

Table 1-8

Managing Log Files

Variable

Description

LIMIT_LOG_FILE_SIZE

File size, specified in megabytes.

LIMIT_LOG_VERSIONS

Number of generations of the log file that should


be kept. The valid number must be a positive
integer between 1 and 9.

Example

To set a limit to the size of the log file to 10 MB and to limit the number
of generations of the log file to 3, specify the following parameters in the
config.dat file:
LIMIT_LOG_FILE_SIZE 10
LIMIT_LOG_VERSIONS 3

Stack Trace
A stack trace is a useful debugging aid in working out how program
control reached a specific point. The stack trace is a file containing a
record of the events leading up to a process that abends.
CONTROL-M records the progression of the invocations called by
functions. If a process crashes, CONTROL-M generates a stack trace
sequence of functions that were called, leading up to the unexpected
error.
The stack trace is output to a proclog file, providing information about
the process that aborted. The log file generated contains information
relevant to Technical Support and is located in the directory:
<controlm_path>/ctm/proclog/<process_name>.<proc_ID>

The variables in this command line are described in the following table:

BMC Software, Inc., Confidential and Proprietary Information

1-42

CONTROL-M/Server for Unix Administrator Guide

<controlm_path>

Home directory of CONTROL-M/Server account


owner.

<process-name>

Two-character code identifying the process.

<process-ID>

ID of the CONTROL-M/Server process.

Example
controlm/ctm/proclog/CS_LOG.6509

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-43

Watchdog Facility
CONTROL-M contains a special Watchdog (WD) facility which
automatically monitors various CONTROL-M processes and resources,
essential to the running of CONTROL-M, and sends an appropriate alert
when there is a problem. The Watchdog facility can also be used to
automatically execute user-defined scripts or CONTROL-M utilities.
(See Chapter 2, Utilities.)
If a Watchdog facility-monitoring check fails, appropriate error messages
can be sent to special error handlers such as CONTROL-O/Server and
ENTERPRISE/CS (see below). The Watchdog facility automatically sends
these messages to the CONTROL-M IOALOG and PROCLOG.
The Watchdog facility is enabled by configuration parameters defined in
the ~controlm/ctm/data/config.dat file. For additional information, see
Configuration Parameters on page 5-22.
Certain parameters in the config.dat file indicate general information
about the Watchdog facility. These parameters are listed in Table 1-9.

To disable the various Watchdog exits, set their parameters to 0.


To enable the various Watchdog exits specify the values described in
Table 1-9.

Table 1-9

General Watchdog Facility Parameters

Parameter

Description

WD_CTMEXIT_NUMBER

Indicates the number of predefined Watchdog


user exits to be enabled. There are two built-in
user exits. Valid values are: 0,1 and 2, where:
0 disables the built-in user exits.
1 invokes the first built-in user exit.
2 invokes both built-in user exits.

WD_USEREXIT_NUMBER

Indicates the number of Watchdog user exits to


be enabled. Specify the number of desired
user exits or specify 0 to disable all Watchdog
user exits.

BMC Software, Inc., Confidential and Proprietary Information

1-44

CONTROL-M/Server for Unix Administrator Guide

The following categories of user exits are described in detail below:

Heartbeat check (see below)


Predefined Watchdog user exits (see below)
Watchdog user exits (see page 1-47)

Heartbeat Check

A special heartbeat check runs automatically when the Watchdog facility


is enabled. This checks that all the primary CONTROL-M processes
(SU, CO, SL, TR, LG) are functioning. If any of the processes do not
respond to the check, a message is sent to the error handlers.
Table 1-10

Heartbeat Monitor Exit Parameters

Parameter

Description

WD_HEARTBEAT_INTERVAL

Amount of time (in seconds) to wait after


receiving a response to a heartbeat check
before issuing the next heartbeat check.

WD_HEARTBEAT_TIMEOUT

Time (in seconds) to wait for a response


after issuing a heartbeat check before
sending a message to the error handlers.

Predefined Watchdog User Exits

The Watchdog facility monitors CONTROL-M processes and resource


usage using two built-in CONTROL-M utilities. These utilities are
enabled via CONTROL-M System user exit parameters
(WD_CTMEXIT_<n>) in the config.dat file. All these exits reside in
the ~controlm/ctm/exe_<platform> directory and cannot be changed.
Two predefined built-in system user exits are included in the config.dat
file.

Exit 1
Runs a Disk Space utility to check the amount of free disk space on a
specified device and sends an error message if it is below a specified
amount. See ctmdiskspace in Chapter 2, Utilities, for a complete
description

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-45

Exit 2
Runs a Database Usage utility to check data and log usage in the
CONTROL-M database and sends an error message if it is above a
specified percentage. See ctmdbspace in Chapter 2, Utilities, for a
complete description.

The parameters for these two built-in Watchdog system user exits are
described in Table 1-11.
Note

Valid values for <n> in the parameters in Table 1-11 are either 1 or 2.

Table 1-11

Parameters for Watchdog System User Exits

Parameter

Description

WD_CTMEXIT_<n>_CMD_LINE

Contains parameters to be
passed to the exit script.

WD_CTMEXIT_<n>_ERROR_MSG

Indicates the message to be sent


if an exit script fails.

WD_CTMEXIT_<n>_INTERVAL

Indicates the number of time


units during which the exit script
should not be invoked.
Parameter WD_INTERVAL
defines the time units. For more
information, see Table 1-13.

WD_CTMEXIT_<n>_RUN_STATE

Indicates if the exit script should


be run when CONTROL-M is
running. Valid values are Y or N.

WD_CTMEXIT_<n>_SCRIPT_FILE

File name of the script or binary


that resides in the ctm/
exe_<platform> directory.

WD_CTMEXIT_<n>_SUSPEND_STATE

Indicates if the exit script should


be invoked when CONTROL-M is
suspended. Valid values are Y or
N.

WD_CTMEXIT_<n>_TIMEOUT

Time (number of minutes) which


should be allowed before the exit
script is terminated.

BMC Software, Inc., Confidential and Proprietary Information

1-46

CONTROL-M/Server for Unix Administrator Guide

Watchdog User Exits


The Watchdog facility can also be used to execute user-defined scripts or
CONTROL-M utilities automatically during different intervals of the
Watchdog facility. These scripts are enabled using user exit parameters
which are specified in the config.dat file. The full path name and arguments
for each script or utility are required to add these functions to the Watchdog
facility. If the user exit ends with a failed status, a specified error
message can be sent to the error handlers. For more information, see
Error Handlers on page 1-48.
Table 1-12 describes all parameters that can be defined for each user exit
of the Watchdog facility.
Table 1-12

Parameters for Watchdog Facility User Exits

Parameter

Description

WD_USEREXIT_<n>_CMD_LINE

Contains parameters to be
passed to the exit script.

WD_USEREXIT_<n>_ERROR_MSG

Indicates the message to be sent


if an exit script fails.

WD_USEREXIT_<n>_INTERVAL

Indicates the number of time


units during which the exit script
should not be invoked.
Parameter WD_INTERVAL
defines the time units. For more
information, see Table 1-13.

WD_USEREXIT_<n>_RUN_STATE

Indicates if the exit script should


be run when CONTROL-M is
running. Valid values are Y or N.

WD_USEREXIT_<n>_SCRIPT_FILE

Full path of the exit script.

WD_USEREXIT_<n>_SUSPEND_STATE

Indicates if the exit script should


be invoked when CONTROL-M is
suspended. Valid values are Y or
N.

WD_USEREXIT_<n>_TIMEOUT

Time (number of minutes) which


should be allowed before the exit
script is terminated.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-47

Example

CONTROL-M utility ctmping can be added to the Watchdog facility to


automatically test the communication link between
CONTROL-M/Server and Agent platforms and update the available
Agent list. Add the following parameters to the config.dat file:
WD_USEREXIT_1_CMD_LINE -file /ctm/ctmuser/agntlist
WD_USEREXIT_1_ERROR_MSG Agent not available
WD_USEREXIT_1_INTERVAL 5
WD_USEREXIT_1_RUN_STATE
Y
WD_USEREXIT_1_SCRIPT_ FILE $HOME/ctm/exe_AIX/ctmping
WD_USEREXIT_1_SUSPEND_STATE
N
WD_USEREXIT_1_TIMEOUT 5

Error Handlers
If a Watchdog facility check fails, the error message specified for that
check is sent to the defined error handler. Two other error-handling
options are available: CONTROL-O/Server and a user defined script.
These options are enabled via the parameters in the config.dat file
described in Table 1-13.
Note

Error messages are automatically sent to the CONTROL-M IOALOG and


PROCLOG.
For more information about error handlers, see Chapter 5,
Customization Parameters.
Table 1-13

Watchdog Facility Parameters

Parameter

Description

WD_ALIVE_MSG

Indicates the message to be sent in response to


successful heartbeat checks. Place a # character in
front of the parameter in the config.dat file to inhibit the
message.

WD_CTO_HOSTNAME

Host name or IP Address CONTROL-O/Server.

BMC Software, Inc., Confidential and Proprietary Information

1-48

CONTROL-M/Server for Unix Administrator Guide

Table 1-13

Watchdog Facility Parameters (continued)

Parameter

Description

WD_CTO_TIMEOUT

Maximum time for the Watchdog facility to send


messages to CONTROL-O/Server.

WD_ERROR_HANDLER_SCRIPT_FILE

Path name of the user-defined script called by the


Watchdog facility.

WD_ERROR_HANDLER_TIMEOUT

Maximum time for the Watchdog facility to wait for the


user defined script to run.

WD_INTERVAL

Defines the time unit interval, in minutes, when the next


exit must be checked.

Example

If you specify 5 minutes for parameter WD_INTERVAL and specify 2


time units for parameter WD_CTMEXIT_1_INTERVAL, the
Watchdog facility will run the system script for system user exit 1 once
every 10 minutes.

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-49

User Exits
A user exit is a user-defined procedure that can be used to modify certain
information before it is processed. At certain points in processing a flat
text file is produced describing information that is to be passed to next
step in a procedure. This text file can be modified by a user-defined exit
script before it is passed on for processing.
CONTROL-M user exits can be used to enforce site standards (for
example, file naming conventions or valid date formats), and to apply
security definitions to limit certain users actions. Exits can also be used
to trigger other actions prior or subsequent to execution of a
CONTROL-M job.
For more information, see Chapter 6, User Exits.

Processing Overhead
CONTROL-M provides a wide variety of mechanisms that can be used
to control job scheduling. When determining which mechanisms to use,
it helps to be aware of the different levels of processing overhead that
each mechanism requires.
Table 1-14 lists certain basic scheduling features and their relative levels
of processing overhead. By choosing the right features for your job
processing definitions, you can ensure that your CONTROL-M processes
are fast and efficient.
Table 1-14

Processing Overhead for Job Processing Features

Feature

Relative Processing
Overhead

Time window (Basic scheduling parameters)

Very low

In (prerequisite) conditions

Low

Control Resources

Medium

BMC Software, Inc., Confidential and Proprietary Information

1-50

CONTROL-M/Server for Unix Administrator Guide

Table 1-14

Processing Overhead for Job Processing Features

Feature

Relative Processing
Overhead

Quantitative Resources

High

Designation of a job as Critical

Very High

BMC Software, Inc., Confidential and Proprietary Information

Overview

1-51

BMC Software, Inc., Confidential and Proprietary Information

1-52

CONTROL-M/Server for Unix Administrator Guide

Utilities

2
General maintenance can be performed using the utilities described in
this chapter. Some of these utilities generate reports, which are useful for
managing the data center, and for planning job processing definitions and
calendars.
Note

Many of these utilities are intended for use only by the CONTROL-M
administrator. Because they require extensive authorization in the
CONTROL-M database, they may not work if submitted by a regular
user.
All utilities described in this chapter are included with CONTROL-M.
These utilities are run either from the system prompt or submitted as
batch jobs (except where noted).
Utilities that can be submitted as batch jobs can also be defined as
CONTROL-M jobs. This enables you to utilize the CONTROL-M job
handling features such as automatic scheduling and the use of AutoEdit
variables (see examples in this chapter). Refer to Accessing Utilities
From Other Unix Users in this chapter before using this feature.
Note

Refer to Table 2-2 to determine which subsystems must be active before


invoking a CONTROL-M utility.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-1

Table 2-1 lists the available utilities. Detailed information about each
utility is provided later in this chapter.
Table 2-1

CONTROL-M Utilities (Part 1 of 3)

Utility

Description

ctm_agstat

Lists or updates an Agents status.

ctm_backup_bcp

Exports data from a CONTROL-M database.

ctm_restore_bcp

Imports data to a CONTROL-M database.

ctmcontb

Performs operations on the Prerequisite Conditions


table.

ctmcreate

Creates a job in the Active Jobs file.

ctmdbapasswd

Changes the database password.

ctmdbbck

Backs up the CONTROL-M database.

ctmdbcheck

Checks database integrity and displays information


about database memory utilization.

ctmdbrst

Restores the CONTROL-M database.

ctmdbspace

Checks data and log usage in the CONTROL-M


database.

ctmdbtrans

List the active transactions in the database.

ctmdefine

Defines a job in the CONTROL-M database.

ctmdiskspace

Checks the amount of free disk space on a device.

ctmexdef

Exports job specifications from the job processing


Definitions table in the CONTROL-M database to an
ASCII file in either ctmcreate or ctmdefine format.

ctmfw

Detects the successful completion of a file transfer


activity.

ctmgrpdef

Creates a definition for a new Group Scheduling


table.

ctmjsa

Accumulates statistical data and records it in the


Statistics Summary table in the CONTROL-M
database.

ctmkilljob

Terminates a CONTROL-M job and its associated


processes.

ctmldnrs

Creates and loads the Manual Conditions file.

BMC Software, Inc., Confidential and Proprietary Information

2-2

CONTROL-M/Server for Unix Administrator Guide

Table 2-1

CONTROL-M Utilities (Part 2 of 3)

Utility

Description

ctmloadset

Updates a resource in the Quantitative Resources


table with regard to usage on an Agent platform.

ctmlog

Performs a selective cleanup of the CONTROL-M log


or produces a report of CONTROL-M log entries,
according to user-supplied parameters.

ctmordck

Lists a users job processing definitions which can be


ordered by a specific User Daily job.

ctmorder

Orders one or more jobs from a Scheduling table


contained in the CONTROL-M database.

ctmpasswd

Allows changing CONTROL-M users password into


the database.

ctmping

Collects configuration information about


CONTROL-M/Agents not in the CONTROL-M
database and performs a communication test.

ctmpsm

Interactive utility for performing functions affecting


jobs or conditions in the Active environment.

ctmrpln

Creates a report that lists all or a selection of jobs in a


specified Scheduling table, and indicates when the
jobs are scheduled to run. The report can be
requested for a specific date, month or a five-year
period.

ctmruninf

Lists and deletes runtime data from the Statistical


Details table of the CONTROL-M database.

ctmsec

Defines users in the CONTROL-M security database


and assigns them authorizations for working with
CONTROL-M. For more details, see Security
Maintenance Utility (Interactive Mode) on page 3-11.

ctmshout

Issues a Shout message to an indicated destination.

ctmshtb

Sets the active Shout Destination table.

ctmstats

Displays or deletes statistical data from the Statistical


Summary table in the CONTROL-M database.

ctmstvar

Displays the current value of an AutoEdit variable or


function.

ctmsuspend

Suspends CONTROL-M/Server scheduling processes


for mass batch uploads/downloads from
ENTERPRISE/CS.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-3

Table 2-1

CONTROL-M Utilities (Part 3 of 3)

Utility

Description

ctmsys

Maintains CONTROL-M system parameters and


Shout Destination tables.

ctmudchk

Allows recovery from interruption of a User Daily.

ctmudlst

Enables you to manually set the User Daily last run


date.

ctmudly

Orders jobs for a specific User Daily name.

ctmvar

Manipulates AutoEdit variables for data centers,


Group Scheduling tables, or jobs in Group Scheduling
tables.

ctmwhy

Displays a report stating why a job waiting in the


Active Jobs file is not being submitted for execution.

ctm2snmp

Sends messages to Network Management


applications via SNMP traps.

ecactltb

Lists the status of each resource in the Control


Resources table.

ecaqrtab

Performs operations on the Quantitative Resources


table.

Utility Reference Table


Table 2-2

CONTROL-M Utility Reference (Part 1 of 3)

Utility

Requires
CTM
Active

ctm_agstat

Requires
SQL
Active

Executable
By User
Other Than
CTM Admin

Executable
As Batch
Job

ctm_backup_bcp

ctm_restore_bcp

ctm_restore_aut

Supports
AutoEdit
Variables

Executable
From Agent
Platform
(Batch Jobs)

ctmcontb

ctmcreate

ctmdbapasswd

BMC Software, Inc., Confidential and Proprietary Information

2-4

CONTROL-M/Server for Unix Administrator Guide

Table 2-2

CONTROL-M Utility Reference (Part 2 of 3)

Utility

Requires
CTM
Active

Requires
SQL
Active

Executable
By User
Other Than
CTM Admin

Executable
As Batch
Job

ctmdbbck

ctmdbrst

ctmdbcheck

ctmdbspace

ctmdbtrans

ctmdefine

ctmdiskspace
ctmexdef

ctmfw
ctmgrpdef

ctmjsa

ctmkilljob

ctmlog

ctmordck

ctmldnrs
ctmloadset

ctmorder

ctmping

X
X

ctmrpln

ctmruninf

X
X

ctmstvar

ctmsys

ctmstats

ctmshtb

ctmsuspend

Executable
From Agent
Platform
(Batch Jobs)

ctmpsm

ctmshout

Supports
AutoEdit
Variables

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-5

Table 2-2
Utility

CONTROL-M Utility Reference (Part 3 of 3)


Requires
CTM
Active

Requires
SQL
Active

Executable
By User
Other Than
CTM Admin

Executable
As Batch
Job

ctmudchk

ctmudlst

ctmudly

ctmvar

ctmwhy

Supports
AutoEdit
Variables

Executable
From Agent
Platform
(Batch Jobs)

ctm2snmp
ecactltb

ecaqrtab

Reports Generated from Utilities


The following reports can be generated using utilities described in this
chapter:
Table 2-3

Utility Reports (Part 1 of 2)

Report

Description

Daily Job Order

Generates a projection of which jobs in a


Scheduling table will be ordered on a given
day using a specific calendar. See ctmrpln
on page 2-120.

Monthly Job Order

Generates a projection of which jobs in a


Scheduling table will be ordered in a given
month using a specific calendar. See ctmrpln
on page 2-120.

Yearly Job Order

Generates a projection of which jobs in a


Scheduling table will be ordered over a
five-year period using a specific calendar. See
ctmrpln on page 2-120.
BMC Software, Inc., Confidential and Proprietary Information

2-6

CONTROL-M/Server for Unix Administrator Guide

Table 2-3

Utility Reports (Part 2 of 2)

Report

Description

CONTROL-M Log

Lists entries in the CONTROL-M log for specified (or all) CONTROL-M/Server processes.
See ctmlog on page 2-91.

Active Jobs File

Lists jobs in the Active Jobs file according to


various criteria. See ctmpsm on page 2-106.

User Daily:
Associated Job
Processing Definitions

Lists all jobs associated with a specific User


Daily job and displays security parameters
regarding each job. See ctmordck on page
2-94.

Prerequisite Conditions

Displays existing prerequisite conditions. See


ctmcontb on page 2-21.

Control Resources
Status

Lists the status of Control resources. See


ecactltb on page 2-157.

Quantitative Resources
Status

Lists the status of Quantitative resources. See


ecaqrtab on page 2-158.

Summary Statistical
Data

Lists summarized runtime statistics. See


ctmjsa on page 2-77 and ctmstats on page
2-130.

Runtime Statistical Data

Lists runtime statistical data by timestamp.


See ctmruninf on page 2-124.

Global AutoEdit
Variables

Lists Global AutoEdit variables, See ctmvar


on page 2-150.

Directing Output From Utilities


Certain utilities described in this chapter generate reports that can be
directed to a file. Each such utility is identified by the inclusion of
<Output> among the utilitys parameters. If this parameter is not
specified, the output is routed to the default output device.
When directing output to a file, do one of the following:
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-7

Specify the full path name of the file (for example,


/ctm/user1/rprt.txt).
Specify the relative name of the file to be placed in the
<controlm_user_dir>/ directory.

BMC Software, Inc., Confidential and Proprietary Information

2-8

CONTROL-M/Server for Unix Administrator Guide

Accessing Utilities From Other Unix Users


To access CONTROL-M utilities from a Unix user other than the
CONTROL-M/Server account owner, the following modifications must
be made to the users environment:

Define variables in the users environment.


Add an executable library to the users path.
Assign Read/Write permissions.

Define Variables in the Users Environment


The following variables must be defined in the users environment:
CONTROLM
CONTROLM_USER
CONTROLM_DATABASE
LIBPATH or LD_LIBRARY_PATH
Table 2-4

Required Environment Variables

For SYBASE

For ORACLE

SYBASE

ORACLE_BASE

DSLISTEN

ORACLE_HOME

DSQUERY

ORACLE_SID

DSCONSOLE

NLS_LANG

MIRROR_DSLISTEN
MIRROR_DSQUERY

Use the following formats to define the shared library path variables in
the users environment, depending upon the Server platform type:

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-9

Table 2-5

Shared Library Path for Sybase Variables

Platform

Path Variable

AIX

LIBPATH <ctm_owner>/sybase/lib:<ctm_owner>/ctm/exe_AIX

HP-UX 10

SHLIB_PATH
<ctm_owner>/sybase/lib:<ctm_owner>/ctm/exe_HP-UX-10

Solaris

LD_LIBRARY_PATH
<ctm_owner>/sybase/lib:<ctm_owner>/ctm/exe_Solaris

Compaq
TRU64 Unix

LD_LIBRARY_PATH
<ctm_owner>/sybase/lib:<ctm_owner>/ctm/exe_OSF1

Table 2-6

Shared Library Path for Oracle Variables

Platform

Path Variable

AIX

LIBPATH
<ctm_owner>./oracle/product/8.1.5/lib:<ctm_owner>/ctm/exe_A
IX

HP-UX 10

LIBPATH
<ctm_owner>./oracle/product/8.1.5/lib:<ctm_owner>/ctm/exe_H
P-UX-10

Solaris

LD_LIBRARY_PATH
<ctm_owner>./oracle/product/8.1.5/lib:<ctm_owner>/ctm/exe_S
olaris

Compaq
TRU64 Unix

LD_LIBRARY_PATH
<ctm_owner>./oracle/product/8.1.5/lib:<ctm_owner>/ctm/exe_O
SF1

In both Table 2-5 and Table 2-6 above, <ctm_owner> refers to the Unix
user account under which CONTROL-M/Server is installed.
Setting environmental variables
Using csh or tcsh

When using csh or tcsh, specify the following command for each
variable:
setenv <variable-name> <value>

BMC Software, Inc., Confidential and Proprietary Information

2-10

CONTROL-M/Server for Unix Administrator Guide

Sybase Example
setenv CONTROLM /home/controlm/ctm
setenv SYBASE /home/controlm/sybase
setenv DSLISTEN CTRLM
setenv DSQUERY CTRLM
setenv DSCONSOLE CTRLM
setenv MIRROR_DSQUERY MIRROR
setenv MIRROR_DSLISTEN MIRROR
setenv CONTROLM_USER ctrlm
setenv CONTROLM_DATABASE ctrlm
setenv LD_LIBRARY_PATH /home/controlm/ctm/exe_Solaris:
/home/controlm/sybase/bin

Oracle Example
setenv CONTROLM /home/ora_ctm/ctm
setenv ORACLE_HOME /home/ora_ctm/oracle/product/8.1.5
setenv ORACLE_SID ctrlm
setenv ORACLE_BASE /home1/ora_ctm/oracle
setenv NLS_LANG AMERICAN_AMERICA.WE8ISO8859P1
setenv CONTROLM_USER ctrlm
setenv CONTROLM_DATABASE ctrlm
setenv LD_LIBRARY_PATH /home/controlm/ctm/exe_OSF1:
/home/controlm/oracle/product/8.1.5/lib

Using Other Shells

When using other shells (for example, sh, ksh), specify the following
command for each variable:
<variable-name>=<value>; export <variable-name>

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-11

Sybase Example
CONTROLM=/home/controlm/ctm; export CONTROLM
SYBASE=/home/controlm/sybase; export SYBASE
DSLISTEN=CTRLM; export DSLISTEN
DSQUERY=CTRLM; export DSQUERY
DSCONSOLE=ctrlm; export DSCONSOLE
MIRROR_DSQUERY=MIRROR; export MIRROR_DSQUERY
MIRROR_DSLISTEN=MIRROR; export MIRROR_DSLISTEN
CONTROLM_USER=ctrlm; export CONTROLM_USER
CONTROLM_DATABASE=ctrlm; export CONTROLM_DATABASE
LIBPATH=/home/controlm/ctm/exe_HP-UX-10; export
LIBPATH

Oracle Example
CONTROLM=/home/controlm/ctm; export CONTROLM
CONTROLM_USER=ctrlm; export CONTROLM_USER
CONTROLM_DATABASE=ctrlm; export CONTROLM_DATABASE
LIBPATH=/home/controlm/ctm/exe_HP-UX-10; export
LIBPATH

Determining the values to assign to variables

Specify the following command for each variable from user controlm:
echo $<variable-name>

Example
echo $SYBASE

Add an Executable Library to the Users Path


The executable directory of CONTROL-M/Server must be added to the
users path.

BMC Software, Inc., Confidential and Proprietary Information

2-12

CONTROL-M/Server for Unix Administrator Guide

Using csh or tcsh

Use the following command to modify the path when using csh or tcsh:
set path=($path ~<controlm_owner>/ctm/exe_<OS_ID>)

The following table describes the variables of this command.


Variable

Description

<controlm_owner>

Unix user account under which


CONTROL-M/Server is installed.

<OS_ID>

Identifier for the type of operating system on the


Server platform (AIX, HP-UX-10 or Solaris).

Example
set path=($path ~controlm/ctm/exe_Solaris)
Using Other Shells

Use the following command to modify the path when using other shells
(for example, sh, ksh):
PATH="$PATH: <controlm_path>/ctm/exe_<OS_ID>"

The following table describes the variables of this command.


Variable

Description

<controlm_path>

Home directory of the CONTROL-M/Server account


owner.

<OS_ID>

Identifier for the type of operating system on the Server


platform. Specify AIX, HP-UX-10 or Solaris.

Example
PATH="$PATH: controlm/ctm/exe_HP-UX-10"

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-13

Assign Read/Write Permissions


The user must have the following read/write permissions:
Table 2-7

Read/Write Permissions

Permission Type

Directory

Read permission for file:

<controlm-directory>/.controlm

Read and Write permission for all files in


directory:

prflag/

The recommended method for providing security access to these files is


as follows:

Group controlm should be provided with read permission for the


files.

All users who require access to CONTROL-M utilities should belong


to group controlm.

BMC Software, Inc., Confidential and Proprietary Information

2-14

CONTROL-M/Server for Unix Administrator Guide

Utilities
ctm_agstat
This utility enables you to list or update an Agents status, or to delete an
inactive Agent. (See Communication Status of Agent Platforms on
page 1-7.)
To invoke the ctm_agstat utility, specify the following command:
ctm_agstat ACTION( {LIST|LIST_INACT|UPDATE|DELETE} )
[AGTNAME(<agent name>)]
[STATUS( {*SAME | AVAILABLE | DISABLED} )]
[QUIET( {*YES | *NO} )] [DEBUG(<debug level>)]

The parameters of this command are described below in Table 2-8.


Table 2-8

ctm_agstat Utility Parameters

Parameter

Description

ACTION

Action to be performed by the utility:


LIST List the current status of the specified Agent.
LIST_INACT List all inactive (disabled or unavailable)
Agents and their status.
UPDATE Change the status of the specified Agent to the
value of the STATUS parameter.
DELETE Delete the specified inactive Agent from the list of
Agents.

<agent
name>

Host name of the Agent to be listed / updated. This parameter


must be specified for LIST, UPDATE, and DELETE actions but
is ignored for the LIST_INACT action.

STATUS

Current status of the specified Agent. Valid values: *SAME,


AVAILABLE, DISABLED. This parameter must be specified for
UPDATE action but is ignored for all other actions.

QUIET

To activate the utility without displays and interaction, specify


*YES. Default: *NO.

<debug
level>

Desired diagnostic level. Valid values: 0 (no diagnostics) to 5


(highest level of diagnostics), *DFT, *SYSVAL, *SAME.
Default: *SAME (or zero for first startup).

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-15

Examples

1. To show the current status of Agent CMAGENT, type:


ctm_agstat ACTION(LIST) AGTNAME(CMAGENT

2. To list all inactive Agents, type:


ctm_agstat ACTION(LIST_INACT

3. To change the status of Agent CMAGENT to DISABLED, type:


ctm_agstat ACTION(UPDATE) AGTNAME(CMAGENT)
STATUS(DISABLED)

4. To delete inactive Agent CMAGENT, type:


ctm_agstat ACTION(DELETE) AGTNAME(CMAGENT)

BMC Software, Inc., Confidential and Proprietary Information

2-16

CONTROL-M/Server for Unix Administrator Guide

ctm_backup_bcp
The ctm_backup_bcp utility exports data from the CONTROL-M
database to directory <controlm>/ctm/backup_db. Each database table
is backed up as a separate ASCII file.
To invoke the ctm_backup_bcp utility:

1. Shut down CONTROL-M using command shut-ctm.


2. Specify the command:
ctm_backup_bcp [-n]

where -n runs the utility in silent mode. In this mode, confirmation


prompt and backing up contents messages are not displayed.
Differences between the ctm_backup_bcp and ctmdbbck utilities:

You can only use the ctm_backup_bcp utility if


CONTROL-M/Server is down.

ctm_backup_bcp exports the data in the CONTROL-M database.


ctmdbbck backs up an image of the database for later restoration
using ctmdbrst.

When using ctm_backup_bcp, you cannot specify the backup


directory.

ctm_backup_bcp backs up each database table to a separate ASCII


file. ctmdbbck backs up the entire database to a single binary file.

When using ctmdbbck and ctmdbrst, the restored database must be


the same size as the original database. When using ctm_backup_bcp
and ctm_restore_bcp, the original and restored databases do not need
to be the same size.

Example 1
ctm_backup_bcp
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-17

Backing up contents of database


Please confirm [y/n] : Y

Messages similar to the following are displayed:


backing up contents of CMS_NODGRP
backing up contents of CMR_AGSTAT
backing up contents of CMS_AGCOMM
backing up contents of CMS_AGSRVTIM
backing up contents of CMR_AJF
backing up contents of CMS_JOBDEF
backing up contents of CMS_USERS

Database backup ended successfully.


Example 2
ctm_backup_bcp -n

In this case, CONTROL-M does not display the confirmation prompt and
does not issue messages. Only dots are displayed.

BMC Software, Inc., Confidential and Proprietary Information

2-18

CONTROL-M/Server for Unix Administrator Guide

ctm_restore_bcp
The ctm_restore_bcp utility imports the CONTROL-M database from the
bcp_backup directory. The content of this directory was created by the
ctm_backup_bcp utility.
To invoke the ctm_restore_bcp utility:

1. Shut down CONTROL-M using the shut-ctm command.


2. Specify the command:
ctm_restore_bcp [-n]

where -n runs the utility in silent mode. In silent mode, the


confirmation prompt and restoring contents messages are not
displayed.
The ctm_restore_bcp utility is similar to the ctmdbrst utility. The
following bullets describe the differences between these utilities:

The ctm_restore_bcp utility imports files created by the


ctm_backup_bcp utility. The ctmdbrst utility restores a backup
created by the ctmdbbck utility.

When using the ctm_restore_bcp utility, you cannot specify the


directory containing the exported files.

You can only use the ctm_restore_bcp utility if CONTROL-M/Server


is down.

The ctm_restore_bcp utility imports ASCII files. The ctmdbrst utility


restores from a binary file.

Example 1
ctm_restore_bcp
Restoring contents of database.
This procedure DELETES any information in main
database
Please confirm [y/n]: y
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-19

Messages similar to the following are displayed:


restoring contents of CMS_NODGRP
restoring contents of CMR_AGSTAT
restoring contents of CMS_AGCOMM
restoring contents of CMS_AGSRVTIM
restoring contents of CMR_AJF
restoring contents of CMS_JOBDEF
restoring contents of CMS_USERS

Database restore ended successfully.


Example 2
ctm_restore_bcp -n

In this case, CONTROL-M does not display the confirmation prompt and
the restoring contents messages. Only dots are displayed.

BMC Software, Inc., Confidential and Proprietary Information

2-20

CONTROL-M/Server for Unix Administrator Guide

ctmcontb
The ctmcontb utility performs operations on the Prerequisite Conditions
table. These operations include:

Listing existing prerequisite conditions.


Adding/deleting a prerequisite condition.
Deleting a range of conditions (from/to specified dates).

Use the following command to list existing prerequisite conditions:


ctmcontb -LIST <Condition Name> <Condition Date> [<Output>]

The parameters of this utility are described in Table 2-9.


Table 2-9

ctmcontb Listing Prerequisite Conditions

Variable

Description

<Condition Name>

Name of the prerequisite condition to include in


the report. The condition name can include the
mask character to match any character string
(including no characters). In this instance, the
condition name must be enclosed in quotation
marks (for example, LVL). Specify by itself
to include all existing conditions.

<Condition Date>

Date of the prerequisite condition. Must be


specified in mmdd format. The condition date
can include mask character to match any
character string (including no characters). In this
case, enclose the condition date in quotation
marks (for example, 12 ).
Specify by itself to include all dates.
Specify ODAT to accept the CONTROL-M
date.
Specify STAT to indicate that the date
reference of the condition is not relevant.

<Output>

Full path name to which the report should be


sent (optional). If this parameter is not specified,
the output is routed to the default output device.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-21

Use the following command to add prerequisite conditions:


ctmcontb -ADD <Condition Name> <Condition Date>

The parameters for this command are described in Table 2-10.


Table 2-10

ctmcontb Adding Prerequisite Conditions

Variable

Description

<Condition Name>

Name of prerequisite condition to add.

<Condition Date>

Date of the prerequisite condition. Must be


specified in mmdd format.
Specify ODAT to accept the CONTROL-M date.
Specify STAT to indicate that the date reference
of the condition is not relevant.

Use the following command to delete prerequisite conditions:


ctmcontb -DELETE

<Condition Name> <Condition Date>

The parameters for this command are described in Table 2-11.


Table 2-11

ctmcontb Deleting Prerequisite Conditions

Variable

Description

<Condition Name>

Name of prerequisite condition to delete.


The condition name can include the mask character
to match any character string (including no
characters). In this instance, the condition name
must be enclosed in quotation marks (for example,
LVL ). Specify by itself to include all existing
conditions.

<Condition Date>

Date of the prerequisite condition. Must be


specified in mmdd format. The condition date can
include the mask character to match any
character string (including no characters). In this
instance, the condition date must be enclosed in
quotation marks (for example, 12 ).
Specify by itself to include all dates.
Specify ODAT to accept the CONTROL-M date.
Specify STAT to indicate that the date reference
of the condition is not relevant.
BMC Software, Inc., Confidential and Proprietary Information

2-22

CONTROL-M/Server for Unix Administrator Guide

Use the following command to delete prerequisite conditions with


condition dates in a given range:
ctmcontb -DELETEFROM <Condition Name> <From Date> <To Date>

The parameters for this command are described in Table 2-12.


Table 2-12

ctmcontb Deleting Conditions in a Date Range

Variable

Description

<Condition Name>

Name of prerequisite conditions to delete.


The condition name can include the mask character
to match any character string (including no
characters). In this instance, the condition name
must be enclosed in quotation marks (for example,
LVL ). Specify by itself to include all existing
conditions.

<From Date>
<To Date>

Starting and ending dates for range of condition


dates of prerequisite conditions to delete. Each date
must be specified in mmdd format.
If the To Date is less than the From Date, the range
of condition dates will include the From Date up to
the end of the year (1231) plus the beginning of the
year (0101) up to the To Date.

Example 1

The following command specifies that the prerequisite condition


bckp_end with condition dates in December should be deleted:
ctmcontb -DELETE bckp_end "12"
Example 2

The following command specifies that all prerequisite conditions with


prefix a, whose condition dates are between December 1st and
December 15th should be deleted:
ctmcontb -DELETEFROM "a" 1201 1215

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-23

Example 3

The following command specifies that existing prerequisite conditions


should be listed:
ctmcontb -LIST "" ""

When this command is specified, a report similar to the following is


generated:
Date: 30-JUN-2000. Page 1
Conditions list
CONDNAME CONDDATE
APR1- L20 0629
APR1-L20 0630
ARD- L30K 0630
LVL11-LVL22 0628
LVL11-LVL22 0629
LVL11-LVL22 0630
PKR11-LVL01 0630

This example demonstrates the advantage of defining a CONTROL-M


job to run a utility. The following job processing definition causes
CONTROL-M to run ctmcontb each work day, each time deleting all
prerequisite conditions which are between five and ten days old:
Week Days 2,3,4,5,6
AutoEdit Assignment %%A=%%CALCDATE %%DATE 10
%%B=%%CALCDATE %%DATE 5
%%A=%%SUBSTR %%A 3 4
%%B=%%SUBSTR %%B 3 4
Command Line ctmcontb -DELETEFROM %%A %%B

BMC Software, Inc., Confidential and Proprietary Information

2-24

CONTROL-M/Server for Unix Administrator Guide

ctmcreate
ctmcreate is an API (Application Program Interface) utility that allows an
ad hoc job to be inserted directly into the Active Jobs file. The job does
not have to be defined in the CONTROL-M database. The function
performed by this utility is equivalent to the Force function in
ENTERPRISE/CS.
The ctmcreate utility can also be used to define jobs for specific
applications such as SAP and Oracle Applications. For more information,
see Creating Application-specific Jobs on page 2-31.
To invoke the ctmcreate utility, specify the following command:
ctmcreate-tasktype {JOB|DETACHED|COMMAND|DUMMY|GROUP} \
[-group <group name>] \
[-application <application name>] \
[ -group_ord <grp_orderno|ALONE|LAST>\
[ -adjust_cond {Y|N}\
[ -nodegrp <node ID/group> ] \
[ -memlib <directory name> ] \
[ -memname <file name> ] \
[ -cmdline <command line text> ] \
[ -jobname <name of job> ] \
[ -schedtab <name of scheduling table> ] \
[ -owner <user name of job owner> ] \
[ -author <user name of the job creator>] \
[ -odate <scheduling date>|ODAT ]\
[ -maxrerun <maximum reruns> ]\
[ -timefrom <earliest submission time> ]\
[ -timeuntil <latest submission time> ]\
[ -priority <job priority> ]\
[ -critical {Y|N} ]\
[ -cyclic {Y|N} ]\
[ -intervalfrom {START|END}]\
[ -confirm {Y|N} ]\
[ -taskclass {DISTRIBUTION|DECOLLATION}|SAP|OAP ]\
[ -interval <minutes> ]\
[ -overlib <alternate directory> ]\
[ -maxwait <days> ]\
[ -description <job description> ]\
[ -docmem <file name> ]\
[ -doclib <directory name> ]\
[ -incond (<condition1> <date1> {AND|OR}
-incond <condition2>) <date2> {AND|OR}
-incond <condition3>) <date3> {AND|OR}]\
[ -outcond <cond> <date> {ADD|DEL} ]\
[ -autoedit <variable name> <expression> ]\
[ -quantitative <quantitative resource> <quantity> ]\
[ -sysout {RELEASE|DELETE|COPY|MOVE} [<parameter>] ]\
[ -control <control resource> {E|S} ]\
[ -shout {OK|NOTOK|RERUN|LATESUB|LATETIME| EXECTIME} <destination> R|U|V}
<message> [<time>] ]\
[ -on <statement> <code>\
[ -dook ]\
[ -donotok ]\
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-25

[ -dorerun ]\
[ -doshout <destination> {R|U|V} <message> ]\
[ -dostopcylic]\
[ -domail <destination> <cc> <urgency> {R|U|V} <subject> <message>\
[ -docond <condition> <date> {ADD|DEL} ]\
[ -doautoedit <variable name> <expression> ]\
[ -doforcejob <table name> <job name> <odate> ]\
[ -dosysout {RELEASE|DELETE|COPY|MOVE}[<parameter>]]\
[ -debug <level> ] \
[ -quiet ]

Each of the parameters of this utility, except for group_ord, debug and
quiet, is described in detail in Chapter 5 of the Enterprise Controlstation
User Guide.
Parameter

Description

-group_ord

Specifies in which order of a Group Scheduling table to put the


job. Valid values are:
<order-no>

A specific order number of the Group


Scheduling table.
If the specified order number does not exist
the command is not executed and an error
message is displayed.

ALONE

The job is on its own (not in any table).

LAST

The last order of the specified Group


Scheduling table.

Note: When an order ID or LAST is specified for this


parameter, the -group and -schedtab parameters are
mandatory and must both contain the name of Group
Scheduling table that is currently in the Active Jobs file.
-debug

Level of debug messages, 0 to 5.


Default: 0 (no debug messages).

-quiet

If specified, no informational messages are displayed during


the execution of the command.

Table 2-13 lists each parameter available for the utility and the name by
which the parameter appears in the User Guide.

BMC Software, Inc., Confidential and Proprietary Information

2-26

CONTROL-M/Server for Unix Administrator Guide

Table 2-13

Parameter Name Cross Reference

Utility Parameter

ENTERPRISE/CS
Parameter

Utility Parameter

ENTERPRISE/CS
Parameter

adjust_cond

Adjust condition

interval

Interval

application

Application

intervalfrom

Interval (From field)

autoedit

AutoEdit
Assignments

jobname

Job Name

cmdline

Command Line

maxrerun

Max Rerun

confirm

Confirm Submission

maxwait

Max Wait

control

Control Resources

memlib

Mem Lib

critical

Critical

memname

Mem Name

cyclic

Cyclic

nodegrp

Node ID/Group

description

Description

odate

see note below

doautoedit

Do AutoEdit

on

On Statement/Code

doclib

Doc Lib

outcond

Out Conditions

docmem

Doc Mem

overlib

Over Lib

docond

Do Cond

owner

Owner

doforcejob

Do Forcejob

priority

Priority

domail

Do Mail

quantitative

Quantitative Resources

donotok

Do NOTOK

schedtab

Scheduling Table

dook

Do OK

shout

Shout

dorerun

Do Rerun

sysout

Sysout Handling

doshout

Do Shout

taskclass

Task Class

dostopcyclic

Do Stop Cyclic

tasktype

Task Type

dosysout

Do Sysout

timefrom

Time

group

Group

timeuntil

Time

incond

In Conditions

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-27

The following syntax rules apply when using this utility:

More than one parameter can be specified on a line.

Parameter odate specifies the date to use as the jobs scheduling


date. Specify a date in yyyymmdd format, or specify ODAT to
accept the CONTROL-M date.

The %%NEXT, %%$NEXT, %%PREV, and %%$PREV AutoEdit


variables cannot be specified for the ctmcreate utility. These
variables refer to the next or previous scheduling dates and are
therefore not relevant for this utility which places jobs directly in the
Active Jobs file.

The length of the command line, after decoding, must not exceed 999
characters.

Although most parameters are listed as optional, certain parameters


are required depending upon the option specified for the -tasktype
parameter.

All fields of each parameter (as specified in the syntax on page 2-25)
must contain values. If no value is desired for a parameter field, a
null string "" must be specified in the relevant position in the
parameter specification.
For example
The -domail parameter has the following syntax:
-domail <destination> <cc> <severity> <subject> <message>

To specify this command without a value for the cc field, include a


null string in the appropriate location. For example:
-domail johnsmith@bmc.com "" R "subject line" "My message"

All task types require parameters group and application. In


addition:
JOB and DETACHED require parameters memname and
memlib.
BMC Software, Inc., Confidential and Proprietary Information

2-28

CONTROL-M/Server for Unix Administrator Guide

COMMAND requires parameter cmdline.

Strings containing blanks must be enclosed in quotes (for example,


-cmdline ctmudlst list payroll).

A Unix metasymbol (which must be enclosed in quotation marks)


appearing in a command line string should be enclosed in single
quotes (for example, -cmdline ctmcontb list '*' ).

An AutoEdit variable that does not contain a $ sign can be enclosed


in single ( ) or double ( ) quote marks. An AutoEdit variable that
does contain a $ sign should be enclosed in single quote marks. An
AutoEdit variable containing a $ sign cannot be resolved if it is
enclosed in double quote marks.

Condition dates are specified in mmdd format. Time is specified in


hhmm format.

A parameter requiring more than one entry can be repeated as many


times as necessary (for example, if a job must wait for several
prerequisite conditions, specify a separate -incond parameter for each
prerequisite condition).

An -on parameter must be followed by at least one -do... parameter.

-do... parameters are dependent upon the last -on parameter


preceding them.

Normally, when a -dorerun parameter is implemented, the current run


of the job ends with a status of NOTOK. To ensure that the job will
have a status of OK even though it is rerun, specify a -dook
parameter immediately after the -dorerun parameter.

The order of the parameters does not affect the outcome of the job,
with the exception of -on and -do... parameters.

When using -doforcejob to force an entire table, <job name> must be


specified as a blank enclosed in quotes (that is, ).

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-29

When the ctmcreate utility is invoked from a script: To use the


option for a -incond date parameter, specify this parameter as
\\

If a single character is specified for the priority parameter, the first


character is assumed to be A. For example, priority 1 is interpreted
as priority A1.

A maximum of 99 prerequisite conditions can be specified for the Do


Cond parameter.

A maximum of 99 prerequisite conditions can be specified for the


Out Conditions parameter.

Example 1
-incond pk_oly_ok \"\"

When the Unix symbol ~ is used in parameter -memlib, -overlib, or


-doclib to represent the users home directory, the entire parameter
should be enclosed in double quotes. This ensures that the ~ will be
translated by the Agent before submission, and not by the Server before
transmission to the Agent platform.
-memlib "~/controlm/scripts/"
Example 2

The following command contains the minimum parameters required to


create a job in the Active Jobs file:
ctmcreate -tasktype comman -group ecs\
-application test -cmdline "ls -l /etc/passwd"
Example 3

The following command includes examples of most of the parameters


that can be used to create a job in the Active Jobs file:
ctmcreate -tasktype JOB \
-cyclic N \
-description "Daily Summary" \
BMC Software, Inc., Confidential and Proprietary Information

2-30

CONTROL-M/Server for Unix Administrator Guide

-group SUPPLY
-application SUPPLIES \
-memlib /users/ctm/ -memname PROLYPAR -nodegrp UNIXGRP \
-jobname PROLYPAR \
-owner suppman \
-odate 19981130 \
-timeuntil 1800 \
-priority AA -critical N \
-confirm Y \
-doclib /users/supply/doc/
-docmem prolypardoc \
-incond pk_oly_ok ODAT AND \
-incond pk_olp_ok ODAT AND \
-outcond pk_oly_ok ODAT DEL \
-outcond pk_olp_ok ODAT DEL \
-outcond pk_olypar ODAT ADD \
-autoedit %%PARM1 "%%CALCDATE %%ODATE -2" \
-quantitative tape 2 -quantitative cpu 50 \
-sysout MOVE /test/logs/ \
-control disk2 E \
-shout OK oper2 U "Daily summary completed" \
-on "COPY JWINFO_2507" "%COPY-E-OPENIN, error" \
-dosysout MOVE /oper/openerr

Creating Application-specific Jobs

The ctmcreate utility can be used to define jobs for specific applications
such as SAP and Oracle Applications. These jobs are defined by setting
the TASKCLASS parameter to SAP or OAP.

If TASKCLASS is set to SAP, the job will run under SAP.

If TASKCLASS is set to OAP, the job will run under Oracle


Applications.
Note

The program that is used to run an application-specific job resides in a


script directory in the agent platform. This program is located under
$HOME/ctm/script. SAP and the EXE directory is /r3/exe. is the name
for the SAP script. OAP. is the name for the Oracle Applications script.
Make sure that the path to the script directory is located in the users
environment path.
The following CONTROL-M system parameters must also be set in
order to allow support for application specific jobs:

The AUTOEDIT_INC_SEC parameter must be set to SYSTEM in


the $home/ctm/data/config.dat file of CONTROL-M/Server for
Unix.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-31

The AUTOEDIT_INLINE parameter must be set to Y in the


$home/ctm/data/agconfig.dat file of CONTROL-M/Agent for
Unix.

The following parameters must be specified for the utility:


MEMLIB
MEMNAME
TASKCLASS

In addition to these parameters, you can specify application-specific


parameters.
Table 2-14, SAP Parameters, on page 2-33 lists parameters for SAP
jobs. The parameters for SAP applications are described in detail in the
CONTROL-M Option for R/3 Administrator Guide version 3.0.04 or
later.
Table 2-15, Oracle Applications Parameters, on page 2-34 lists the
parameters for Oracle Applications. The parameters for Oracle
Applications are described in detail in the CONTROL-M Option for
Oracle Applications Administrator Guide version 2.0.01or later.
When the ctmcreate command line is processed, the application-specific
parameters are used to create special AutoEdit variables with the
specified values. These AutoEdit variables are used to pass information
to the CONTROL-M Option for the specified application. The
parameters are added as AutoEdit variables in the command line. For
more information, see the ERP Job Parameters appendix in the
CONTROL-M/Desktop User Guide.
In the tables below:

Type indicates whether a parameter value is a character string (c) or


an integer (n).

Minimum and Maximum determine


for characters: the number of characters that are allowed in a string.
for integers: the minimum and maximum values for the parameter.

BMC Software, Inc., Confidential and Proprietary Information

2-32

CONTROL-M/Server for Unix Administrator Guide

Table 2-14

SAP Parameters (Part 1 of 2)

SAP Parameters

Type

Minimum

Maximum

account

80

archive_info

archive_object

10

archive_sapobject

10

asap

host

80

job_mode

10

job_in_file

80

jobcount

language

print_archmode

print_authorization

68

print_banner

print_banner_page

print_copies

255

print_destination

print_expiration

print_immediately

print_numcolumns

255

print_numlines

130

print_recipient

32

print_release

program

80

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-33

Table 2-14

SAP Parameters (Part 2 of 2)

SAP Parameters

Type

Minimum

Maximum

polling_interval

80

spool

80

step_num

999

r3_owner

80

variant

80

waitonly

Table 2-15

Oracle Applications Parameters (Part 1 of 2)

OAP Parameters

Type

Minimum

Maximum

ioa_appl

30

-display_output

-notification_<n>
where n is 1 - 30

30

username

30

-ver

respname

30

respapp

50

tasktype

20

progname

30

appname

50

printername

100

printstyle

20

printcopies

profile_<n>

80

80

where n is 1 - 30

description

BMC Software, Inc., Confidential and Proprietary Information

2-34

CONTROL-M/Server for Unix Administrator Guide

Table 2-15

Oracle Applications Parameters (Part 2 of 2)

OAP Parameters

Type

Minimum

Maximum

waitchild

security_groupname

80

parm<n>

80

80

where n is 1-100

stageparm<n>
where n is 1-100

Sample of a Command Line


ctmcreate -tasktype job -memname MEMSAP -memlib
/home/ag6tst/ctm/scripts -jobname sap6 -job_mode
run_copy
-account ABC -taskclass SAP

The following messages are issued when this command-line is processed:


AUTOEDIT %%SAPR3_JOB_MODE added
AUTOEDIT %%SAPR3_ACCOUNT added
new ORDER created, orderid:00001b(47) for
JOBNAME=sap6.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-35

ctmdbapasswd
The ctmdbapasswd utility enables the administrator to change the
database password of a dedicated CONTROL-M/Server. Only an
administrator can change a database password.
Specify the following command to invoke the ctmdbapasswd utility:
ctmdbapasswd

The system will prompt you to enter the old password:


Please enter the old password for System Administrator
account:

1. Enter the old password for the System Administrator account. The
system will prompt you to enter the new password:
Please enter the new password for System
Administrator account:

2. Enter the new password for the System Administrator account. Make
sure that the password has at least 6 characters. You will not see your
entry on the screen. The system will then prompt you to reenter the
password:
Enter again to verify:

3. Reenter the new password for the System Administrator account.


The system will respond with the message that the password was
successfully changed:
Password was successfully changed

BMC Software, Inc., Confidential and Proprietary Information

2-36

CONTROL-M/Server for Unix Administrator Guide

ctmdbbck
The ctmdbbck utility backs up the CONTROL-M database.
Note

The ctmdbbck utility can be used only to back up a dedicated database


server. It should not be used if CONTROL-M was installed using an
existing database server.
To back up an existing database, use the ctm_backup_bcp utility
(described on page 2-17).
To invoke the ctmdbbck utility, specify the following command:
ctmdbbck [<Backup Device>]

where <Backup Device> is the device to be used for backup of the


existing database. A list of devices can be obtained using the option List
Backup Devices from the Database Maintenance menu. The device
specified for this parameter must be either:

a valid device defined in Sybase

-or

the full path name of a file to be created by the backup procedure for
Sybase or Oracle

The default backup device is tapedump2, which points to one of the


following devices:
Operating System

Device

AIX

/dev/rmt0

HP-UX

/dev/rmt/0m

Solaris

/dev/rmt/0mn

Compaq TRU64 Unix

/dev/nrmt0h

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-37

Example
ctmdbbck tapedump2

BMC Software, Inc., Confidential and Proprietary Information

2-38

CONTROL-M/Server for Unix Administrator Guide

ctmdbcheck
The ctmdbcheck utility displays information about the memory capacity
and the status of the CONTROL-M database. To invoke the ctmdbcheck
utility, specify the following command:
ctmdbcheck

The ctmdbcheck utility can also be used with the following syntax to
monitor the database and the transaction log:
ctmdbcheck [-d <db_threshold_%>] [-l <log_threshold_%>][-n]
ctmdbcheck [general_threshold_%]

These commands trigger a shout message to ENTERPRISE/CS if more


than the specified percentage of the database or the database transaction
log are full. This message can then be used to trigger actions that will
extend the appropriate CONTROL-M database component.
The ctmdbcheck utility can be run as a cyclic job.
Note

If the -n switch is specified in the ctmdbcheck command, only database


capacity information is returned, and database thresholds and integrity
are not checked.
For performance reasons, run the ctmdbcheck utility during non-peak
hours or when CONTROL-M is down. If you need to determine database
sizes frequently, use the ctmdbused command. This command displays
the size (in KB) of the data and log components of the database plus the
amount and percentage of space currently used in each component.
The parameters in these commands are described in Table 2-16.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-39

Table 2-16

ctmdbcheck Parameters

Parameter

Description

db_threshold
_%

Threshold for usage of the CONTROL-M database. If more


than the specified percentage of the database is full, a Shout
message is sent to ENTERPRISE/CS warning that the
database should be extended. This variable must be
preceded by the -d switch. For example, -d80 indicates that
a shout message should be issued if the database is more
than 80% full.

log_threshold
_%

Threshold for usage of the transaction log of the


CONTROL-M database. If more than the specified
percentage of the database is full, a Shout message is sent
to ENTERPRISE/CS warning that the transaction log
should be extended. This variable must be preceded by the
-l switch. For example, -l80 indicates that a shout message
should be issued if the transaction log is more than 80% full.

general_
threshold_%

Checks data and log partitions of the CONTROL-M


database by the same percentage (for example, if percent
usage of either the data area or the transaction log exceeds
80%, ctmdbcheck 80 triggers a Shout message).

ctmdbcheck Output

The ctmdbcheck utility returns information about the CONTROL-M


database. Table 2-17 describes the fields that are returned by this utility
for a Sybase database. Table 2-18 describes the fields that are returned by
this utility for an Oracle database.
Table 2-17

ctmdbcheck Displayed Fields for Sybase

Field

Description

db total

Total amount of memory (in KB) allocated for the database.

data

Total amount of memory (in KB) allocated to the Data


partition of the database.

log

Total amount of memory (in KB) allocated to the Log partition


of the database.

Data used

Total memory currently used in the Data partition.

Log used

Total memory currently used in the Log partition.

BMC Software, Inc., Confidential and Proprietary Information

2-40

CONTROL-M/Server for Unix Administrator Guide

Table 2-18

ctmdbcheck Displayed Fields for Oracle

Field

Description

Tablespace

Name of the Tablespace.

Size

Allocated size of the Tablespace in MB.

Percent Free

Percent of allocated Tablespace size that is not used.

In addition to the above fields, ctmdbcheck also returns one of the


following messages describing the current database status:

Database is OK.
WARNING: Database is more than half full.
ATTENTION: Database log segment is more than 90% full.
ATTENTION: Database is more than 80% full.

Example 1

This example uses the ctmdbcheck utility to check the status of a Sybase
database without specifying any parameters (that is, no shout messages
will be issued for this run on the utility, even if database is over the
desired threshold).
Utility Input
ctmdbcheck

Utility Output
db total = 25000.0 KB (data= 19500.00 , log= 5500.00)
data used = 3696 KB (18%).
log used = 0 KB (0%).
Checking database...
Database is OK.

Example 2

This example uses the ctmdbcheck utility to check the status of an Oracle
database without specifying any additional parameters.
Utility Input
ctmdbcheck
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-41

Utility Output
Tablespace
-------------------MADONA6A
MADONA6A_INDX
RBS

Size
----120M
40M
90M

% Free
------77%
99%
68%

Checking database...
Database is OK.

Example 3

Utility Input
ctmdbcheck -d80

Utility Output
Message Warning: DB is more than 80% full, urgency U NodeID
Shout to user 'ECS' 'SUCCESS'
db total = 25000.0 KB (data= 19500.00 , log= 5500.00)
data used = 21250 KB (85%).
log used = 0 KB (0%).
Checking database...
Database is OK.

linda

This example produces the same display as ctmdbcheck except that a


warning message is generated if the percent usage of the data area is
higher than the percentage specified in the command. In this example,
the message data used = 21250 KB (85%) was generated because 85%
exceeds the specified threshold of 80%. This message is also sent to the
ENTERPRISE/CS alert window.
Example 3

Utility Input
ctmdbcheck -l80

Utility Output
db total = 25000.0 KB (data= 19500.00 , log= 5500.00)
data used = 21250 KB (85%).
log used = 0 KB (0%).
Checking database...
Database is OK.

BMC Software, Inc., Confidential and Proprietary Information

2-42

CONTROL-M/Server for Unix Administrator Guide

This command is similar to the example above except that here the Log
partition is being checked. No warning message is generated because 0%
is less than the specified threshold of 80%.
Example 4

Utility Input
ctmdbcheck 50

The general threshold % option is used to specify the same percentage


for both the database and the log. In this example, if either the database
or log exceeds 50%, ctmdbcheck 50 will trigger a shout message.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-43

ctmdbrst
ctmdbrst restores the CONTROL-M database.
To invoke the ctmdbrst utility, specify the following command:
ctmdbrst [<Backup Device>]

where <Backup Device> is the device from which the database should
be restored. The device specified for this parameter must be either a valid
device defined in Sybase, or the full path name of a file to be used as
input for the ctmdbrst utility. A list of devices can be obtained using the
option List Backup Devices from the Database Maintenance menu.
Note

CONTROL-M must be shut down before invoking this utility. Make sure
that no other users or processes are connected to the SQL Server.
The default backup device is tapedump2, which points to one of the
following devices:
Operating System

Device

AIX

/dev/rmt0

HP-UX

/dev/rmt/0m

Solaris

/dev/rmt/0mn

Compaq TRU64 Unix

/dev/nrmt0h

Example

The following command causes the CONTROL-M database to be


restored from the default backup device:
ctmdbrst

BMC Software, Inc., Confidential and Proprietary Information

2-44

CONTROL-M/Server for Unix Administrator Guide

ctmdbspace
ctmdbspace checks the data and log usage in the CONTROL-M database
and displays the usage. The utility returns a failed status if the usage
exceeds the specified limit.
Note

ctmdbspace can be included in the CONTROL-M Watchdog process. See


Watchdog Facility on page 1-44 for more information.
To invoke the ctmdbspace utility, specify the following command:
ctmdbspace -limit <amount> [-quiet]

where <amount> is the maximum amount (percentage) of data and log


usage in the database. If the -quiet parameter is specified, no
informational messages are displayed during the execution of the
command.
Example

The following command returns a failed status if the CONTROL-M


database usage is more than 50%:
ctmdbspace -limit 50%

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-45

ctmdbtrans
The ctmdbtrans utility lists the active transactions in the database. A
transaction is defined as the unit of work performed by CONTROL-M in
the database. Each transaction is assigned a unique name identifying that
specific unit of work.
You may be asked by technical support to run this utility and to provide
them with the output for debugging purposes.
To see which transactions are active in the database, specify the
following command:
ctmdbtrans

-orSelect List Active Transactions from the Troubleshooting menu


(described on page 4-40).

BMC Software, Inc., Confidential and Proprietary Information

2-46

CONTROL-M/Server for Unix Administrator Guide

ctmdefine
ctmdefine is an API (Application Program Interface) utility that adds a
job processing definition to a Scheduling table, or creates a new Group
Scheduling table in the CONTROL-M database. This utility can be used
when converting job scheduling information from other job control
products to CONTROL-M. The function performed by this utility is
equivalent to the manual process of creating job processing definitions,
described in Chapter 7, Job Processing Definitions, in the Enterprise
Controlstation User Guide.
The ctmcreate utility can also be used to define jobs for specific
applications such as SAP and Oracle Applications. For more information,
see Defining Application-specific Jobs on page 2-57.
Note

Group Scheduling tables can also be defined using the ctmgrpdef utility
(described on page 2-75).
When creating new Scheduling tables or job processing definitions, the
following considerations are applicable:

If the job name specified when using this utility already exists in a
job processing definition in the Scheduling table, the new job
processing definition does not overwrite the existing one. Both job
processing definitions will appear in the table, each with a different
internal job number.

If the Scheduling table specified when using this utility does not
exist, the utility creates it.

After using this utility to create one or more job processing


definitions, the modified Scheduling tables should be downloaded to
the ENTERPRISE/CS database (see Table Synchronization in
Chapter 7, Job Processing Definitions, in the Enterprise
Controlstation User Guide).

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-47

A newly created Scheduling table can be assigned a User Daily


parameter via the ENTERPRISE/CS GUI after the Scheduling table
is downloaded to the ENTERPRISE/CS database or using the
ctmpsm utility.

Values for a creation/modification timestamp and the user ID of the


user who created or modified the job processing definition are
automatically added to the communication protocol between
Enterprise Controlstation and CONTROL-M and are stored in the
ENTERPRISE/CS database. These values are initialized by the
CTMDEFINE utility and are sent to Enterprise Controlstation when
the Scheduling table is downloaded. When the Scheduling Table is
uploaded, Enterprise Controlstation sends these values to
CONTROL-M.

Use the following command to invoke the ctmdefine utility:


ctmdefine -table <Scheduling table name> \
-jobname <job name> \
-group <group name> \
-application <application name> \
[-tasktype {JOB|DETACHED|COMMAND|DUMMY}] \
[-adjust_cond Y|N] \
[ -nodegrp <node ID/group> ] \
[ -memlib<directory name> ] \
[ -memname <file name> ] \
[ -cmdline <command line text> ] \
[ -owner <user name of job owner> ] \
[ -author <user name of the job creator>] \
[ -maxrerun <maximum reruns> ] \
[ -timefrom <earliest submission time> ] \
[ -timeuntil <latest submission time> \
[ -priority <job priority> ] \
[ -critical {Y|N} ] \
[ -cyclic {Y|N} ] \
[ -intervalfrom {START|END}]\
[ -confirm {Y|N} ] \
[ -taskclass {DISTRIBUTION|DECOLLATION|SAP|OAP}] \
[ -interval <minutes> ] \
[ -overlib <alternate directory> ] \
[ -maxwait <days> ] \
[ -description <job description> ] \
[ -docmem <file name> ] \
[ -doclib <directory name> ] \
[ -incond <condition> <date> {AND|OR} ] \
[ -outcond <condition> <date> {ADD|DEL} ] \
[ -autoedit <variable name> <expression> ] \
[ -quantitative <resource name> <quantity> ] \
[ -sysout {RELEASE|DELETE|COPY|MOVE} [<parameter>] ] \
[ -control <resource name> {E|S} ] \
[ -shout{OK|NOTOK|RERUN|LATESUB|LATETIME|EXECTIME}
<destination> {R|U|V} <message> [<time>] ] \
[ -on <statement> <code> \
[ -dook ] \
[ -donotok ] \
BMC Software, Inc., Confidential and Proprietary Information

2-48

CONTROL-M/Server for Unix Administrator Guide

[
[
[
[
[
[
[
[
[
[
[
[
[
[

[ -dorerun ] \
[ -doshout <destination {R|U|V} <message> ] \
[ -docond <condition> <date> {ADD|DEL} ] \
[ -doautoedit <variable name> <expression> ] \
[ -doforcejob <table name> <job name> <odate> ] \
[ -dosysout {RELEASE|DELETE|COPY|MOVE}[<parameter>]]] \
[ -domail <destination> <cc> {R|U|V} <subject> <message>]\
[ -dostopcyclic ] \
-days <days string> ] \
-weekdays <weekdays string> ] \
-month {ALL|JAN|FEB|MAR|APR|MAY|JUN|JUL|AUG|SEP|OCT|NOV|DEC} {Y|N}] \
-date <mmdd> ] \
-dayscal <calendar name> ] \
-weekcal <calendar name> ] \
-confcal <calendar name> ] \
-shift {<|>} ] \
-cal_andor {AND|OR} ] \
-retro {Y|N} ] \
-debug <level> ] \
-quiet ] \
-TAG <tagname>
]\
-RELATIONSHIP
AND|OR
]

Each parameter included in the above syntax, except debug and quiet, is
described in detail in Chapter 5, Job Processing Parameters, in the
Enterprise Controlstation User Guide.
Parameter

Description

debug

Level of debug messages, 0 to 5. Default: 0 (no


debug messages).

quiet

If specified, no information messages are displayed


during execution of the command.

Table 2-19 lists each parameter of the ctmdefine utility, and the name
under which the parameter appears in the Enterprise Controlstation User
Guide.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-49

Table 2-19

ctmdefine Parameter Name Cross Reference

Utility Parameter

ENTERPRISE/CS
Parameter

Utility Parameter

ENTERPRISE/CS
Parameter

adjust_cond

Adjust Condition

interval

Interval

application

Application

intervalfrom

Interval (From field)

autoedit

AutoEdit Assignments

jobname

Job Name

cal_andor

AND/OR

maxrerun

Max Rerun

cmdline

Command Line

maxwait

Max Wait

confcal

Conf Calendar

memlib

Mem Lib

confirm

Confirm Submission

memname

Mem Name

control

Control Resources

month

See below

critical

Critical

nodegrp

Node ID/Group

cyclic

Cyclic

on

On Statement/Code

date

Dates

outcond

Out Conditions

days

Days

overlib

Over Lib

dayscal

Days Calendar

owner

Owner

description

Description

priority

Priority

doautoedit

Do AutoEdit

quantitative

Quantitative Resources

doclib

Doc Lib

relationship

Relationship

docmem

Doc Mem

retro

Retro

docond

Do Cond

shift

Shift

doforcejob

Do Forcejob

shout

Shout

donotok

Do NOTOK

sysout

Sysout Handling

domail

Do Mail

table

Scheduling Table

dostopcyclic

Do Stopcyclic

tag

Schedule Tag

dook

Do OK

taskclass

Task Class

dorerun

Do Rerun

tasktype

Task Type

doshout

Do Shout

timefrom

Time

dosysout

Do Sysout

timeuntil

Time

group

Group

weekcal

Weekdays Calendar

incond

In Conditions

weekdays

Weekdays
BMC Software, Inc., Confidential and Proprietary Information

2-50

CONTROL-M/Server for Unix Administrator Guide

Note

For the -month parameter, specify the first three letters of a month (for
example, JAN) or ALL for all months (the default is none). To specify
two or more individual months, use a separate -month parameter for
each month. See Months parameter.
The following syntax rules apply for this utility:

More than one parameter can be specified on a line.

Keywords can be written in either uppercase or lowercase, but


parameter values are case-sensitive.
Example:
-GROUP ACCGROUP and -group ACCGROUP

specify the same group ACCGROUP.


-group accgroup

specifies a different group Accgroup.

If a single character is specified for the priority parameter, the first


character is assumed to be A. For example, priority 1 is interpreted
as priority A1.

The length of the command line, after decoding, must not exceed 999
characters.

The -taskclass parameter can accept either DECOLLATION or


DISTRIBUTION as a value. This attribute enables integration with
CONTROL-D.

Although most parameters are listed as optional, certain parameters


may be required, depending on the option specified for parameter
-tasktype.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-51

All task types require the group and application parameters. In


addition:
JOB and DETACHED require parameters memname and
memlib.
COMMAND requires parameter cmdline.
GROUP requires the tag parameters. Each tag definition is
followed by its scheduling parameters.
Example:
-tag
mytag1
-maxwait 1
-days 0,2,3
-dayscal cal1

Strings containing blanks must be enclosed in quotes


(for example, -cmdline ctmudlst list payroll).

A Unix metasymbol (which must be enclosed in quotation marks)


appearing in a command line string should be enclosed in single
quotes (for example, -cmdline ctmcontb list '*' ).

An AutoEdit variable that does not contain a $ sign can be enclosed


in single ( ) or double ( ) quote marks. An AutoEdit variable that
does contain a $ sign should be enclosed in single quote marks. An
AutoEdit variable containing a $ sign cannot be resolved if it is
enclosed in double quote marks.

Condition dates are specified in mmdd format. Time is specified in


hhmm format.

A parameter requiring more than one entry can be repeated as


needed:
If a job is dependent upon several prerequisite conditions,
specify a separate -incond parameter for each prerequisite
condition.
BMC Software, Inc., Confidential and Proprietary Information

2-52

CONTROL-M/Server for Unix Administrator Guide

If a job can run only in January and July, specify a separate


-month parameter for each month. (For example,
-month ALL N -month JAN Y -month JUL Y.)
If a job should run every month except July, specify
-month ALL Y and -month JUL N.
If a job is in a Group Scheduling table and is scheduled
according to tags FIRSTDAY and SALARY1, specify tag
FIRSTDAY tag SALARY1.

The default for the -month parameter is ALL Y. This means that if
you wish to define a job that should run only in one specific month,
you must first indicate that it should not run on any month. For
example:
-month ALL N -month NOV Y

An -on parameter must be followed by at least one -do... parameter.

-do... parameters are dependent upon the last -on parameter


preceding them.

The order of parameters does not affect the outcome of the job, with
the exception of -on and -do... parameters.

All fields of each parameter (as specified in the syntax on page 2-48)
must contain values. If no value is desired for a parameter field, a
null string "" must be specified in the relevant position in the
parameter specification.
For example
The -domail parameter has the following syntax:
-domail <destination> <cc> <severity> <subject> <message>

To specify this command without a value for the cc field, include a


null string in the appropriate location. For example:
-domail johnsmith@bmc.com "" R "subject line" "My message"

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-53

Normally, when a -dorerun parameter is implemented, the current run


of the job ends with a status of NOTOK. To ensure that the job will
have a status of OK even though it is rerun, specify a -dook
parameter immediately after the -dorerun parameter.

When using -doforcejob to force an entire table, <job name> must be


specified as a blank enclosed in quotes (that is, ).

IN condition statements using complex boolean logic can be


specified.
Example:
-incond (job_a ODAT OR -incond job_b) ODAT AND
-incond job_c) AND -incond job_d

For more information, see the description of the In Conditions


parameter in Chapter 5, Job Processing Parameters, in the
Enterprise Controlstation User Guide.

When ctmdefine is invoked from a script: To use the option for


a -incond date parameter, specify this parameter as \\
Example: -incond pk_oly_ok \"****\"

When the Unix symbol ~ is used in parameter -memlib, -overlib, or


-doclib to represent the users home directory, the entire parameter
should be enclosed in double quotes. This ensures that the ~ will be
translated by the Agent before submission, and not by the Server
before transmission to the Agent platform.
Example: -memlib "~/controlm/scripts/"

A maximum of 99 prerequisite conditions can be specified for the Do


Cond parameter.

A maximum of 99 prerequisite conditions can be specified for the


Out Conditions parameter.

BMC Software, Inc., Confidential and Proprietary Information

2-54

CONTROL-M/Server for Unix Administrator Guide

Example 1

The following command contains the minimum parameters required to


define a job:
ctmdefine -table cmmnds -jobname cmls13 \
-tasktype command -group ecs -application test \
-date 0101 -cmdline "ls -l /etc/passwd"

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-55

Example 2

The following command includes examples of most of the parameters


that can be used to define a job:
ctmdefine -tasktype JOB
-cyclic N\
-table djsales -jobname dj102\
-description "Daily Summary"\
-group SUPPLY
-application SUPPLIES\
-memlib /users/ctm/
-memname PROLYPAR -nodegrp
UNIXGRP\
-owner suppman\
-month ALL N\
-month MAR Y -month JUN Y -month SEP Y -month DEC Y\
-timeuntil 1800\
-priority AA -critical N\
-confirm Y\
-doclib /users/supply/doc/
-docmem prolypardoc\
-incond pk_oly_ok ODAT AND\
-incond pk_olp_ok ODAT AND\
-outcond pk_oly_ok ODAT DEL\
-outcond pk_olp_ok ODAT DEL\
-outcond pk_olypar ODAT ADD\
-autoedit %%PARM1 "%%CALCDATE %%ODATE -2"\
-quantitative tape 2 -quantitative cpu 50 \
-sysout MOVE /test/logs/\
-control disk2 E\
-shout OK oper2 U "Daily summary completed"\
-on "COPY JWINFO_2507" "%COPY-E-OPENIN, error"\
-dosysout MOVE /oper/openerr/\
-on "*" notok\
-dorerun\
-doshout ecs v "Daily summary failed. Attempting rerun"

BMC Software, Inc., Confidential and Proprietary Information

2-56

CONTROL-M/Server for Unix Administrator Guide

Defining Application-specific Jobs

The ctmdefine utility can be used to define jobs for specific applications
such as SAP and Oracle Applications. These jobs are defined by setting
the TASKCLASS parameter to SAP or OAP.

If TASKCLASS is set to SAP, the job will run under SAP.

If TASKCLASS is set to OAP, the job will run under Oracle


Applications.
Note

The program that is used to run an application-specific job resides in a


script directory in the agent platform. This program is located under
$HOME/ctm/script. SAP and the EXE directory is /r3/exe. is the name
for the SAP script. OAP. is the name for the Oracle Applications script.
Make sure that the path to the script directory is located in the users
environment path.
The following CONTROL-M system parameters must also be set in
order to allow support for application specific jobs:

The AUTOEDIT_INC_SEC parameter must be set to SYSTEM in


the $home/ctm/data/config.dat file of CONTROL-M/Server for
Unix.

The AUTOEDIT_INLINE parameter must be set to Y in the


$home/ctm/data/agconfig.dat file of CONTROL-M/Agent for
Unix.

The following parameters must be specified for the utility:


MEMLIB
MEMNAME
TASKCLASS

In addition to these parameters, you can specify application-specific


parameters.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-57

Table , , on page 2-58 lists the SAP parameters. The parameters for
SAP applications are described in detail in the
CONTROL-M Option for R/3 Administrator Guide version 3.0.04.
Table 2-21, Oracle Applications Parameters, on page 2-59 lists the
Oracle Applications parameters. The parameters for Oracle Applications
are described in detail in the CONTROL-M Option for Oracle
Applications Administrator Guide version 2.0.01 or later.
When the ctmcreate command line is processed, the application-specific
parameters are used to create special AutoEdit variables with the
specified values. These AutoEdit variables are used to pass information
to the CONTROL-M Option for the specified application. The
parameters are added as AutoEdit variables in the command line. For
more information, see the ERP Job Parameters appendix in the
CONTROL-M/Desktop User Guide.
In the tables below:

Type indicates whether a parameter value is a character string (c) or


an integer (n).

Minimum and Maximum determine


for characters: the number of characters that are allowed in a string.
for integers: the minimum and maximum values for the parameter.

Table 2-20

SAP Parameters

SAP Parameters

Type

Minimum

Maximum

account

80

archive_info

archive_object

10

archive_sapobject

10

asap

host

80

job_mode

10

job_in_file

80

BMC Software, Inc., Confidential and Proprietary Information

2-58

CONTROL-M/Server for Unix Administrator Guide

Table 2-20

SAP Parameters

SAP Parameters

Type

Minimum

Maximum

jobcount

language

print_archmode

print_authorization

68

print_banner

print_banner_page

print_copies

255

print_destination

print_expiration

print_immediately

print_numcolumns

255

print_numlines

130

print_recipient

32

print_release

program

80

polling_interval

80

r3_owner

80

spool

80

step_num

999

variant

80

waitonly

Table 2-21

Oracle Applications Parameters

OAP Parameters

Type

Minimum

Maximum

ioa_appl

30

-display_output

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-59

Table 2-21

Oracle Applications Parameters

OAP Parameters

Type

Minimum

Maximum

-notification_<n>
where n is 1 - 30

30

username

30

respname

30

respapp

50

tasktype

20

progname

30

appname

50

printername

100

printstyle

20

printcopies

profile_<n>

80

description

80

waitchild

security_groupname

80

parm<n>

80

80

where n is 1-30

where n is 1-100

stageparm<n>
where n is 1-100

Sample of a Command Line


ctmdefine -tasktype job -group SAP1 -application SAPA
-table SAPjobs -memname MEMSAP -memlib
/home/ag6tst/ctm/scripts -jobname sap6 -job_mode
run_copy -account ABC -taskclass SAP

The following messages are issued when this command-line is processed:


AUTOEDIT %%SAPR3_JOB_MODE added
BMC Software, Inc., Confidential and Proprietary Information

2-60

CONTROL-M/Server for Unix Administrator Guide

AUTOEDIT %%SAPR3_ACCOUNT added


new JOB defined, TABLE=SAPjobs, JOBNAME=sap6,
JOBNO = 00005p(205)ddx

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-61

ctmdiskspace
ctmdiskspace checks the amount of free disk space on a device and
displays the result. The utility returns a failed status if the current free
space is below the specified limit.
ctmdiskspace can be included in the CONTROL-M Watchdog process.
For more information, see Watchdog Facility on page 1-44.
Use the following command to invoke the ctmdiskspace utility:
ctmdiskspace -limit <amount> -path <path_name> [-quiet]

Table 2-22 describes the parameters of this command.


Table 2-22

ctmdiskspace Parameters

Parameter

Description

amount

Specifies the minimum amount (percentage, K, or M) of free


space on the device as a whole number (integer).

path_name

Specifies the full path name of the device. Multiple devices


can be specified on the command line.

-quiet

Suppresses informational messages from being displayed


during the execution of the command.

Note

More than one -path <path_name> statement can be specified for each
run of the ctmdiskspace utility.
Example 1

The following command returns a failed status if the amount of free


disk space in the CONTROL-M user directory is below 25%:
ctmdiskspace -limit 25% -path /ctm/ctmuser

BMC Software, Inc., Confidential and Proprietary Information

2-62

CONTROL-M/Server for Unix Administrator Guide

Example 2

The following command returns a failed status if the amount of free


disk in the CONTROL-M user directory is below 20M:
ctmdiskspace -limit 20M -path /ctm/ctmuser

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-63

ctmexdef
The ctmexdef utility exports job processing definitions from the
CONTROL-M database to a flat (ASCII) file. This file can then be used
as input for either the ctmcreate utility or the ctmdefine utility.
The ctmexdef utility can be used to:

Modify existing job processing definitions in batch mode (together


with the ctmdefine utility). The job processing definitions in the file
exported by ctmexdef can be edited offline and then returned to the
CONTROL-M database using ctmdefine. For more information, see
ctmdefine on page 2-47.

Creating ad hoc jobs to be inserted in the Active Jobs file based on


previously defined jobs. Together with the ctmcreate utility, the
ctmexdef utility can copy and modify job processing definitions in
batch mode which can then be sent directly to the Active Jobs file
using ctmcreate. See ctmcreate in this chapter for a complete
description of the utility.

Use the following command to invoke the ctmexdef utility:


ctmexdef -TABLE <table_name> \
{-JOBNAME <jobname>|-MEMNAME <memname>} \
[-ACTION {CREATE|DEFINE}]
\
[-FILE <output_file>]
\
Table 2-23

ctmexdef Parameters

Parameter

Description

<table_name>

Scheduling table containing the job processing definition.

<jobname>

Name of the job. Either the JOBNAME or MEMNAME


parameter is required.

<memname>

Mem name of the job.

CREATE

The exported flat file will use the ctmcreate format.

BMC Software, Inc., Confidential and Proprietary Information

2-64

CONTROL-M/Server for Unix Administrator Guide

Table 2-23

ctmexdef Parameters

Parameter

Description

DEFINE

The exported flat file is in ctmdefine format. Default.

<output_file_
name>

Full path name of the file to contain the exported job


specifications. If this parameter is not specified, the output
is routed to the default output device.

The <jobname> and <memname> parameters can include mask characters as


follows:

Represents any number of characters (including no characters).


Any parameter including should be enclosed in quotation
marks (see example below).

Represents any single character.

Example

To export all job processing definitions from Scheduling table PROD to


file tabprod, specify the following command:
ctmexdef -FILE /tmp/tabprod -TABLE PROD -JOBNAME *

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-65

ctmfw
The CONTROL-M File Watcher utility (ctmfw) detects the following file
processes:

Successful completion of file transfer


Creation of a file
Deletion of a file

ctmfw can be used before activating a job or before performing a task


(for example, sending a shout message or adding/deleting conditions)
that is dependent upon creation or deletion of a file.
Note

The ctmfw utility cannot be used to monitor files larger than 4GB.
The ctmfw utility runs as a process on a client machine. The process
waits for the creation or deletion of specified file(s).

For a file transfer activity, when the file is detected, the job continues
to monitor the size of the file. When the file reaches a specified
minimum size and does not increase in size for a specified period of
time, the File Watcher utility either completes with a status of OK or
executes a specified DO action. DO actions can consist of adding or
deleting conditions or executing a command.

For file creation or deletion, if a wildcard is specified as part of the


filename, file size is ignored.

For file deletion, ctmfw must first detect the existence of the file
before it can detect its deletion.

The ctmfw utility can also be run from the command line.
The ctmfw utility can be invoked to detect either a single file or multiple
files.

BMC Software, Inc., Confidential and Proprietary Information

2-66

CONTROL-M/Server for Unix Administrator Guide

Specify the following command to invoke ctmfw for a single file:


ctmfw <filename> [mode] [min_size] [sleep_int]
[mon_int] [min_detect] [wait_time]

The parameters are described in Table 2-24, ctmfw Parameters, on


page 2-68.
The procedure for watching multiple files is described on page 2-69.
Note

The parameters in this command are identified by their sequence.


Although all parameters are optional, you cannot skip a parameter and
assign a value to a subsequent parameter. The first value is assumed to be
the desired mode, the second value is assumed to be the min_size, and so
forth.
If only five values are specified, the default value for wait_time is used.
If four parameters are specified, default values for min_detect and
wait_time are used, and so forth. For example:
ctmfw /tmp/temp1/ CREATE 100 10
is resolved using default values for mon_int, min_detect and wait-time
as follows:
ctmfw /tmp/temp1/ CREATE 100 10 10 3 0

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-67

Table 2-24

ctmfw Parameters

Param

Description

filename

Path of the file to be detected. The file name can include mask
character * to represent any number of characters (including no
characters). In this case, enclose the full path name in quotation
marks (for example, c:\ctm\a*.txt). When including an * as part
of a file name in a Rules file, (see page 2-70), the name should
not be enclosed in quotation marks. When a wildcard is used, the
ctmfw utility does not monitor the size of the file.

mode

CREATE

Detects creation of a file. If filename includes a


wildcard, the size of the file is ignored. Default.
Note: If a mask is specified for the filename, the
ctmfw utility will end successfully after detection of
the first file that matches the specified mask.

DELETE

Detects deletion of a file. When the ctmfw utility is


run in this mode, it first checks for files that match
the specified name. After a specified file is
detected, the ctmfw utility checks at the specified
interval for deletion of that file. Note: If a mask is
specified as the filename, the ctmfw utility will end
successfully only after all detected files that match
the specified mask have been deleted.

min_size

Minimum file size in bytes. This parameter is ignored when using


wildcards in filename or when using DELETE mode.
Default: 0 (any size detected).

sleep_int

Interval between successive attempts to detect the


existence/deletion of a file (in seconds). Default: 60 seconds.

mon_int

Interval between attempts to monitor the size of a file after it is


detected (in seconds). This parameter is ignored when using
wildcards in filename or when using DELETE mode. Default: 10.

min_detect

Number of attempts to monitor file size where the size remains


static and greater than or equal to min_size (indicating
successful creation of the file). This parameter is ignored when
using wildcards in filename or when using DELETE mode.
Default: 3.

wait_time

Maximum time (in minutes) to run the process without detecting


the file at its minimum size (CREATE) or detecting its deletion
(DELETE). If the file is not detected/deleted in this specified time
frame, the process terminates with an error return code, as
described in Table 2-25. Default: 0 (no time limit).

BMC Software, Inc., Confidential and Proprietary Information

2-68

CONTROL-M/Server for Unix Administrator Guide

Return Codes

The return codes listed in Table 2-25 are issued by the ctmfw utility after
detecting if a file is created or deleted in the specified time frame.
Table 2-25

ctmfw Return Codes

Return Code

Description

File successfully created (file arrived in the specified time


frame and file size is above or equal to the minimum
specified size) or deleted.

File was not created or deleted in the specified time frame.

Indicates that the ctmfw request timed-out.


Note: This return code will be issued only if the ctmfw utility
is executed in command line mode.

To watch multiple files:

Use the following command to invoke the ctmfw utility:


ctmfw -input <rules_filename>

where <rules_filename> is the complete path name of the file containing


the definitions for each file to be detected.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-69

The Rules file contains two sections:

ON_FILEWATCH statements identifying which files to detect,


specific criteria for each file, and the action to take upon detection or
non-detection. Any number of ON_FILEWATCH statements can
appear in a Rules file.

Default values to use for the ON_FILEWATCH statements. The


MIN-SIZE, MIN-DETECT, and WAIT-TIME parameters are the
same as for a single file, see Table 2-24. Two additional parameters
are available, as described in Table 2-26.
Note

All keywords must be entered in uppercase.

Table 2-26

ON_FILEWATCH Statements Additional Parameters

Parameter

Description

INTERVAL

Sleep interval between succeeding scans for all the files.


This parameter replaces the individual sleep_int and
mon_int parameters for each file. Default: 10 seconds.

FROM_TIME

Starting time for detecting all the files (default


FROM_TIME). Used with WAIT_TIME to identify the time
frame for detecting and monitoring the files. This
parameter is expressed in 24-hour, hhmm format.
Default: 0000.

If any mandatory parameter is omitted from a Rules file, the default


value for that parameter is used. Parameters entered for
ON_FILEWATCH statements override the default values. If entered,
they must appear in the order shown in Figure 2-1.
Note

In a Rules file, if a wildcard (*) is used in a filename in an


ON_FILEWATCH statement, the name and path must not be embedded
in quote marks.

BMC Software, Inc., Confidential and Proprietary Information

2-70

CONTROL-M/Server for Unix Administrator Guide

Figure 2-1

ON_FILEWATCH Statements

#******************************************************************
# Mandatory Parameters
INTERVAL <60>
# Sleep interval (seconds)
FROM_TIME <0000>
# Starting time for all files (hhmm)
MIN_SIZE <0>
# Minimum size for all files (bytes)
MIN_DETECT <3>
# Number of iterations for all files
WAIT_TIME <0>
# Time limit for all files (minutes)
# ON_FILEWATCH statements
ON_FILEWATCH <filename> [mode] [min_size] [min_detect] [wait_time]
[from_time] [cyclic_interval]
THEN
<action>
ELSE
<action>
END_ON
#******************************************************************

Figure 2-1 displays a sample Rules file. In this sample:

# indicates comments.
Default values are shown for all mandatory parameters.
from_time is the time from which to watch for the specified file
action.
cyclic_interval is the interval between multiple operations of
detecting the file (in minutes). This interval must be greater than the
value for wait_time. If the cyclic_interval is 0, only one attempt to
detect the file will be performed. Default: 0.
<action> refers to any of the actions described in Table 2-27.
Note

All key words must be entered in uppercase.

Table 2-27

ctmfw Valid Actions

Action

Description

DO_COND <condition name>


<condition date> <+|->

Add (+) or delete (-) a condition.

DO_CMD <command>

Execute a valid command under the


command interpreter. Full path names are
required for files.

DO_OK

Terminate ctmfw with status OK.

DO_NOTOK [exit code]

Terminate ctmfw with status NOTOK. Exit


code is optional and replaces the standard
return code, as described in Table 2-25.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-71

If the file is detected and the size remains static within the time
frame (CREATE) or the file has been deleted (DELETE), the DO
commands in the THEN block are executed.

If the file is not detected/deleted within the time frame, the


statements following the ELSE block are executed.

ctmfw terminates when either all the files in the Rules file have been
processed or a DO_OK/DO_NOTOK action is executed.
Note

If any ON_FILEWATCH statement contains a cyclic_interval parameter,


ctmfw will only terminate on a DO_OK/DO_NOTOK action.

BMC Software, Inc., Confidential and Proprietary Information

2-72

CONTROL-M/Server for Unix Administrator Guide

Example 1

The ctmfw utility is invoked to watch multiple conditions. A Rules file


contains the definitions that the ctmfw utility uses for watching each file.
The following instructions are defined in the Rules file:

The sleep interval between succeeding scans must be 10 seconds.


If the ctmfw utility detects that the file datafile.txt in directory
c:\controlm is created in the specified time interval, then:
condition datafile dated 1 January must be added.
The command interpreter must execute the command to move
the contents of the file c:\ctm\datafile.,txt to c:\ctm\workfile.txt.
If the ctmfw utility detects that the datafile.txt file in the
c:\controlm directory is not created in the specified time interval,
then condition datafile dated 1 January must be deleted.
When the ctmfw utility detects that the c:\ctm\tempfile.txt file is
deleted, condition tempfile dated 1 January must be deleted.

#******************************************************************
INTERVAL 10
ON_FILEWATCH /controlm/datafile.txt CREATE
THEN
DO_COND datafile 0101 +
DO_CMD move /ctm/datafile.txt /ctm/workfile.txt
ELSE
DO_COND datafile 0101 END_ON
ON_FILEWATCH /ctm/tempfile.txt DELETE
THEN
DO_COND tempfile 0101 END_ON
#*******************************************************************

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-73

Example 2

A job processing definition is created to implement a File Watcher job.


The file must arrive between 19:00 to 22:00, and be created in the \tmp
directory under the name trans.dat. The minimum file size is 100 bytes.
The detection process should be performed each minute. The file size
monitored every 10 seconds, and the number of intervals where the file
size remains static is 5. If the file is not detected by 22:00, an alert should
be sent to ENTERPRISE/CS.
Parameter

Value

Job Name

FileWatch

Mem Name

FileWatch

Owner

<control_m_user>

From Time

1900

Command line

ctmfw /tmp/trans.dat CREATE 100 60 10 5 180

On Statement/Code processing:
Stmt

Code

COMPSTAT=0

Do Cond

file_trans_dat_ok Date: ODAT Sign: +

Stmt

Code

COMPSTAT=1

Do Shout

To: ENTERPRISE/CS Text: File trans.dat did not arrive


on time

BMC Software, Inc., Confidential and Proprietary Information

2-74

CONTROL-M/Server for Unix Administrator Guide

ctmgrpdef
The ctmgrpdef utility creates a definition for a new Group Scheduling
table.
Group Scheduling tables are used for jobs whose processing should be
treated as a single unit. The definition created via this utility contains
values for parameters that affect handling of the entire group.
For more information about parameters of a group definition, see the
description of the Group Editing form in the CONTROL-M/Desktop User
Guide.
Use the following command to invoke ctmgrpdef:
ctmgrpdef
-GROUP
<group_name>
-APPLICATION
<appl_name>
-TAG <tagname>
[ -MAXWAIT
<maxwait>
]
[ -DAYS
<daystr>
]
[ -WEEKDAYS
<weekdaystr>
]
[ -MONTH
ALL|JAN|FEB|MAR|APR|MAY|JUN|JUL|AUG|SEP|OCT|NOV|DEC Y|N ]
[ -DATE
<MMDD>
]
[ -DAYSCAL
<days calendar> ]
[ -WEEKCAL
<week calendar> ]
[ -CONFCAL
<conf calendar> ]
[ -CAL_ANDOR
AND|OR
]
[ -SHIFT
>|<
]
[ -ADJUST_COND Y|N ]
[ -OWNER
<username> ]
[ -AUTHOR
<username> ]
[ -DEBUG
<level> ]
[ -QUIET ]
[ -TIMEFROM
<earliest submission time> ]
[ -TIMEUNTIL
<latest submission time> ]
[ -PRIORITY
<job priority> ]
[ -CONFIRM
Y|N ]
[ -DESCRIPTION <string> ]
[ -DOCMEM
<filename> ]
[ -DOCLIB
<directory name> ]
[ -INCOND
<condition> <dateref>|ODAT AND|OR ]
[ -OUTCOND
<condition> <dateref>|ODAT ADD|DEL ]
[ -AUTOEDIT
<varname> <expression> ]
[ -SHOUT
OK|NOTOK|LATESUB|LATETIME|EXECTIME
<destination> <urgency R|U|V> <message> [<time>] ]
[ -ONGROUPEND {OK|NOTOK}
[ -DOOK ]
[ -DONOTOK ]
[ -DOSHOUT
<destination> <urgency R|U|V> <message> ]
[ -DOCOND
<condname> <dateref>|ODAT ADD|DEL ]
[ -DOAUTOEDIT <varname> <expression> ]
[ -DOFORCEJOB <tablename> <jobname> <odate>|ODAT ]
[ -DOMAIL
<destination> <cc> {R|U|V} <subject> <message> ]

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-75

Most parameters in the command shown above are described in detail in


Chapter 5, Job Processing Parameters, in the Enterprise Controlstation
User Guide. See Table 2-19 for the names under which these parameters
are listed in the Enterprise Controlstation User Guide.
Note

At least one Schedule tag must be specified (using the -TAG parameter)
for each run of the ctmgrpdef utility. Definition of additional tags is
optional.
Parameters not in the user guide are described in Table 2-28.
Table 2-28

cmtgrpdef Parameters

Parameter

Description

debug

Level of debug messages, 1 to 5. The default value


is 0 (no debug messages.

quiet

If specified, no information messages are displayed


during execution of the command.

After the ctmgrpdef utility is used to create a Group Scheduling table,


you will need to create job processing definitions for the table. These
definitions can be created using the ctmdefine utility. See ctmdefine on
page 2-47.
When using AutoEdit variables in cmtgrpdef parameters, an AutoEdit
variable that does not contain a $ sign can be enclosed in single ( ) or
double ( ) quote marks. An AutoEdit variable that does contain a $ sign
should be enclosed in single quote marks. An AutoEdit variable
containing a $ sign cannot be resolved if it is enclosed in double quote
marks.

BMC Software, Inc., Confidential and Proprietary Information

2-76

CONTROL-M/Server for Unix Administrator Guide

ctmjsa
ctmjsa compiles runtime data from the Statistical Details table and
records it in the Statistics Summary table of the CONTROL-M database.
Each time it is run, this utility:

Scans the statistical data for jobs that terminated with a status of OK.
The jobs scanned can be limited to a range of dates as described
below.

Computes the average run time and standard deviation for each job
for which data was found.

Records the statistical data in a summary table in the CONTROL-M


database (from which the data is made available to
ENTERPRISE/CS).
Note

Statistical data is only accumulated when the CONTROL-M system


parameter Statistics is set to Y. Operational parameter Statistics Mode
determines the mode to be used to compile summary statistics:
JOBNAME or MEMNAME. The default is MEMNAME.
For more information regarding runtime statistical data, see Runtime
Statistics on page 1-28.
ctmjsa also includes an option to display the summary data filtered
according to specified parameters.
Specify one of the following commands to invoke the ctmjsa utility:
ctmjsa
ctmjsa
ctmjsa
ctmjsa

<From Date> <To Date>


-<Delta1> -<Delta2> <Date>
""
-list [<Filter>]

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-77

Table 2-29

ctmjsa Parameters

Parameter

Description

<From Date>

Starting date of statistical data to be compiled. The date is


specified in yyyymmdd or yymmdd format.

<To Date>

Ending date of statistical data to be compiled. The date is


specified in yyyymmdd or yymmdd format.

-<Delta1>

Unsigned number used to establish the starting date for


statistical data to be compiled. This date is determined by
subtracting <Delta1> from <Date> (for example, if <Delta1> is
10 and <Date> is 991220, the starting date is 991210).

-<Delta2>

Unsigned number used to establish the ending date for


statistical data to be compiled. This date is determined by
adding <Delta2> to <Date> (for example, if <Delta2> is 5 and
<Date> is 991220, the ending date is 991225).

<Date>

Date used together with <Delta1> and <Delta2> to determine


the range of dates used for compiling statistical data. The date
is expressed in yyyymmdd or yymmdd format.

Asterisk enclosed in quotation marks. Specifies that the utility


collects all statistical data available without regard to date.

-list

Display data from the Statistical Summary table filtered


according to specified subparameters. Use this option after
you have updated the summary table. This information is also
available from ENTERPRISE/CS in the Statistics window.

<Filter>

Specify one of the following options and its subparameter or


leave blank to display statistics for all jobs.
-JOBNAME <jobname>

Identify the job by its Job Name


parameter.

-MEMNAME <memname>

Identify the job by its Mem Name


parameter.

-MEMLIB <memlib>

Identify jobs by their Mem Lib


parameter.

-NODEID <nodeid>

Identify jobs by their node group


parameter (Agent platform).

BMC Software, Inc., Confidential and Proprietary Information

2-78

CONTROL-M/Server for Unix Administrator Guide

Note

If the Statistics Mode parameter is JOBNAME, Mem Name and Mem


Lib fields in the Statistical Summary table are blank. If the Statistics
Mode parameter is MEMNAME, the Job Name field is blank.
If the Statistics Summary table contains duplicate lines, see the bulleted
item about changing Statistics Mode on page 4-34.
Each <Filter> option subparameter can include these mask characters:
*

Represents any number of characters (including no characters).


Any parameter that includes a * should be enclosed in quotation
marks (see examples below).

Represents any single character.

Example 1

The following commands compile statistical data for the 5-day period
from June 21, 2000 through June 25, 2000 (assuming this data is
available). In the second command, the hyphens indicate the beginning
of unsigned parameter values; they are not minus signs.
ctmjsa 000621 000625
ctmjsa -3 -1 000624
Example 2

The following command compiles statistical data using all data currently
available:
ctmjsa ""

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-79

Example 3

This command displays summary data for all jobs whose Mem Name
parameter starts with pgmac: ctmjsa -list -MEMNAME "pgmac*"
A report similar to the following is displayed:

JOBNAME

NODEID

CPU [sec]

ELAPSED
(sec)

MEMNAME

MEMLIB

pgmacct1

prod.acct.pgm

diana

0.19

233.15

pgmacct2

prod.acct.pgm

verdi

0.12

6.12

pgmacct3

prod.acct.pgm

diana

0.05

170.45

pgmacct4

prod.acct.pgm

diana

0.34

145.23

BMC Software, Inc., Confidential and Proprietary Information

2-80

CONTROL-M/Server for Unix Administrator Guide

ctmkilljob
The ctmkilljob utility terminates a specified CONTROL-M job and all its
processes. ctmkilljob terminates only jobs that are currently executing.
Note

Only jobs running on CONTROL-M/Agent version 2.2.5 and later can be


terminated using ctmkilljob.
This utility can only be run interactively. Specify the following command
to invoke the ctmkilljob utility:
ctmkilljob {[-orderid <unique order ID>] |
[-nodeid <name>] | [-memlib <path>] |
[-memname <filename>] | [-jobname <name>]}
Table 2-30

ctmkilljob Parameters

Parameter

Description

orderid

CONTROL-M Order ID of the job to be terminated.

nodeid

Host name of an Agent platform, or name of a node group to


which the job should be submitted.

memlib

Name of the library/directory in which the job script resides.

memname

Name of the file that contains the job script statements.

jobname

Descriptive reference for a job processing definition.

If the action was successful, the utility responds with the statement:
Job was killed.

and the specified job is ended with a status of NOTOK.


Note

The parameters specified for ctmkilljob must indicate one unique job. If
more than one job fits the description specified in the command, you are
informed that a unique name must be entered to carry out the action.
Reenter the command with parameters that specify one unique job.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-81

ctmldnrs
ctmldnrs creates and loads the Manual Conditions file. This file contains
prerequisite conditions that are required by jobs in the Active Jobs file
but which will not be available (that is, added to the
Conditions/Resources table) unless there is some form of manual
intervention.
For example:

Conditions that are never added automatically by scheduled jobs


because manual confirmation is always desired.
Conditions that are normally added automatically by scheduled jobs
but the jobs which add them are not scheduled for the day.

How to View the Manual Conditions File

Use one of the following methods to make prerequisite conditions


contained in the Manual Conditions file available to the system:

ctmcontb utility (see page 2-21).


LOAD option of ctmldnrs (see page 2-85).
Prerequisite Conditions window (see Chapter 11, Resources and
Conditions, in the Enterprise Controlstation User Guide).
WHY option in the ENTERPRISE/CS job menu (see Chapter 10,
Viewing and Updating Details, in the Enterprise Controlstation
User Guide).

Identifying Conditions to be Placed in the Manual Conditions File

The ctmldnrs utility identifies conditions that should be placed in the


Manual Conditions file by first performing a search for all prerequisite
conditions required for submission of jobs on the particular day.
The search for prerequisite conditions is performed by checking the In
Conditions of the job processing definitions for all jobs in the Active
Jobs file.
Once these prerequisite conditions have been identified, the utility
eliminates any non-manual conditions from the list that satisfy either
of the following criteria:
BMC Software, Inc., Confidential and Proprietary Information

2-82

CONTROL-M/Server for Unix Administrator Guide

The prerequisite condition already exists in the Conditions/Resources


table.

The prerequisite condition is added to the Conditions/Resources


table by an Out Conditions or DO COND job processing parameter
in a job scheduled to run that day.

All prerequisite conditions in Conditions parameters that do not meet the


above criteria are assumed to be manual conditions and are placed in the
Manual Conditions file. These conditions can be limited further with the
use of IGNOREx parameters passed to the utility (see below).
The ADDMODE parameter determines if the Manual Conditions file
will be re-created with all previous conditions deleted from the file or
whether previous conditions will be retained in the new file.
The following options are available for using this utility:

Create the Manual Conditions file.

List prerequisite conditions from the Manual Conditions file.

Load prerequisite conditions from the Manual Conditions file to the


Conditions/Resources table.

Creating the Manual Conditions File

Specify the following to create the Manual Conditions file:


ctmldnrs -CALCCOND [ -ADDMODE {YES|NO}] \
[ -OUTPUT <Filename> ] \
[ -IGNOREIN <Condition Name> ] \
[ -IGNOREOUT <Condition Name> ] \
[ -IGNORECODES <Condition Name> ]

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-83

Table 2-31

ctmldnrs Creating a Manual Conditions File

Parameter

Description

ADDMODE

YES When the new Manual Conditions file is created,


conditions from the previous file are retained in the new
file.
NO The Manual Conditions file is recreated and all
previous conditions are deleted. Default.

OUTPUT

Output file to be created. If this parameter is not specified,


the default file is <controlm_user_dir>/ctmldnrs.dat.

<Filename>

Full path name of the output file to be created.

IGNOREIN

All conditions that satisfy the specified condition name are


ignored when the file is created.

IGNOREOUT

References to conditions that satisfy a condition name that


is specified in Out Conditions job processing parameters
are ignored by the algorithm that builds the file.

IGNORECODES

References to conditions that satisfy a condition name that


is specified in DO COND job processing parameters are
ignored by the algorithm that builds the file.

<Condition
Name>

Name of the prerequisite condition. The condition name


can include the mask character to represent any number
of characters (including no characters). In this instance,
the condition name must be enclosed in quotation marks
(for example, LVL ). Specify by itself to include all
existing conditions.

Note

Multiple IGNOREx parameters can be included in the command in any


order.
Listing Prerequisite Conditions

Specify the following command to list prerequisite conditions in the


Manual Conditions file:
ctmldnrs -LIST <Condition Name> [-INPUT <Filename>]

BMC Software, Inc., Confidential and Proprietary Information

2-84

CONTROL-M/Server for Unix Administrator Guide

Loading Prerequisite Conditions

Specify the following command to load prerequisite conditions from the


Manual Conditions file to the Conditions/Resources table:
ctmldnrs -LOAD <Condition Name> [-INPUT <Filename>]
Table 2-32

ctmldnrs Listing or Loading Manual Conditions

Parameter

Description

<Filename>

Path name of the input Manual Conditions file. If this


parameter is not specified, the default input file is
<controlm_user_dir>/ctmldnrs.dat.

<Condition Name>

All conditions in the input file which satisfy the


specified characters are loaded or listed. Specify by
itself to load/list all conditions.

Example 1

The following command re-creates the default Manual Conditions file in


the users directory:
ctmldnrs -CALCCOND -ADDMODE NO
Example 2

The following command creates a Manual Conditions file


/h/mcond/data/output.dat which ignores all conditions with prefix a:
ctmldnrs -CALCCOND -ADDMODE NO -OUTPUT
/h/mcond/data/output.dat \
-IGNOREIN a \
-IGNOREOUT cond

Example 3

The following command loads all conditions from the default input
Manual Conditions file to the Conditions/Resources table:
ctmldnrs -LOAD

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-85

ctmloadset
The ctmloadset utility is used to record current resource usage on an
Agent platform in the Quantitative Resources table. This utility is
typically invoked by a cyclic job that runs on the Agent platform and
measures usage of a certain resource on the platform. Usage data is then
used to update the Quantitative Resources table on the server platform.
ctmloadset is used when load balancing is implemented. The
load-balancing algorithm uses the data recorded in the Quantitative
Resources table to determine to which Agent platform a job should be
submitted.
CONTROL-M maintains the following information regarding usage of
each Quantitative resource:
Item

Description

Total Used

Units of the resource currently in use. This parameter


represents the sum of the values specified in the other
two columns of this table (described below).

Used by
CONTROL-M

Units of the resource currently in use by jobs submitted


by CONTROL-M/Server.

Used by Others

Units of the resource currently in use by


non-CONTROL-M jobs.

Update resource usage values in the Quantitative Resources table in


either of two ways:

Specify the value for Total Used for a resource. ctmloadset subtracts
the value for Used by CONTROL-M from the value you specify
and places the remainder in the field Used by Others.

Specify the value for Used by Others for a resource. This value is
added to the value Used by CONTROL-M to calculate the value
Total Used for the resource.

Values for the utility can be expressed as an absolute number of units or


as a percentage of the total number of units defined (Max value).

BMC Software, Inc., Confidential and Proprietary Information

2-86

CONTROL-M/Server for Unix Administrator Guide

The utilitys output is displayed as type Q rows in the Quantitative


Resources window. However, the field Mem Name remains blank since
this represents usage by one or more non-CONTROL-M jobs.
Specify the following command to invoke the ctmloadset utility:
ctmloadset {TOTAL|OTHERS} <QR name> <Load value>[%]
Table 2-33

ctmloadset Parameters

Parameter

Description

TOTAL

Indicates that the load value provided specifies the total usage
of the resource by all jobs (both CONTROL-M jobs and
non-CONTROL-M jobs).
When this option is specified, the utility calculates the usage of
the resource by non-CONTROL-M jobs and updates the table
accordingly.

OTHERS

Indicates that the load value provided specifies the units of the
resource used by one or more non-CONTROL-M jobs.

<QR name>

Name of the Quantitative resource to update.

<Load
value>

Number of units of the resource currently used.


-orWhen % is specified, the amount of the resource currently
used, expressed as a percentage of the maximum available
units defined for this Quantitative resource.

Example 1

A node group contains three Agent platforms: diana, jacklin and ruby.
Each platform is defined in the Quantitative Resource table as having
200 units of resource CPU_load, representing the load on the platforms
CPU.

Platform jacklin is used exclusively to run jobs submitted by


CONTROL-M. The platform is currently executing a job that uses
120 units of resource CPU_load.

Platform ruby is used exclusively to run jobs submitted by


CONTROL-M. The platform is currently executing a job that uses
150 units of resource CPU_load.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-87

Platform diana is used both for CONTROL-M and


non-CONTROL-M jobs. The platform is currently executing a job
submitted by CONTROL-M that uses 75 units of resource
CPU_load.

A cyclic job is defined to run periodically on diana to measure the total


load on the CPU. The job updates the Quantitative Resources table using
the ctmloadset utility to indicate to CONTROL-M exactly what the load
is on that platform. The last run of this job determined that the load on
the CPU is 80% of total capacity. The job invokes ctmloadset as follows:
ctmloadset TOTAL CPU@diana 80%

The Total Used for diana is set to 80% of 200, or 160. Since the usage by
CONTROL-M jobs is currently 75 units, ctmloadset calculates that the
Other (non-CONTROL-M usage) is 160 75, or 85.
As a result, the Quantitative Resources table now contains the following
values:

Resource

Max

Total Used by
CONTROL-M

Total Used by
Others

CPU@jacklin

200

120

80

CPU@ruby

200

150

50

CPU@diana

200

75

85

Free

40

The CONTROL-M load-balancing algorithm uses these values when


determining where to submit the next job.
Example 2

The following examples demonstrate the effect of ctmloadset on the


Quantitative Resources table, as represented by the display generated by
the ecaqrtab utility. All examples below are based on the following
premise:
For agent platform diana, 30 units of resource CPU@diana are
currently used by CONTROL-M jobs.

BMC Software, Inc., Confidential and Proprietary Information

2-88

CONTROL-M/Server for Unix Administrator Guide

The output from the ecaqrtab utility is as follows:


Resource Name

Type

Max-Avail

Reserved

Used

Free

CPU@diana

50

30

20

Example 3

The following command specifies that the current usage of the


Quantitative resource CPU@diana by non-CONTROL-M jobs is 12
units:
ctmloadset OTHERS CPU@diana 12

As a result, the output from the ecaqrtab utility is now as follows:


Resource Name

Type

Max-Avail

Reserved

Used

Free

CPU@diana

50

42

Example 4

The following command specifies that the current usage of the


Quantitative resource CPU@diana by non-CONTROL-M jobs is 12%:
ctmloadset OTHERS CPU@diana 12%

The non-CONTROL-M usage of the resource is calculated as 12% of 50,


or 6 units. As a result, the output from the ecaqrtab utility is now as
follows:
Resource Name

Type

Max-Avail

Reserved

Used

Free

CPU@diana

50

36

14

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-89

Example 5

The following command specifies that the current total usage of the
Quantitative resource CPU@diana by all jobs is 48 units:
ctmloadset TOTAL CPU@diana 48

As a result, the output from the ecaqrtab utility is now as follows:


Resource Name

Type

Max-Avail

Reserved

Used

Free

CPU@diana

50

48

BMC Software, Inc., Confidential and Proprietary Information

2-90

CONTROL-M/Server for Unix Administrator Guide

ctmlog
ctmlog is used to create a report from entries in the CONTROL-M log or
to delete entries in the CONTROL-M log.
Specify one of the following commands to invoke the ctmlog utility:
ctmlog <Action> <Action Option> \
<From date> <From Time> <To Date> <To Time>
[<Output> [<Report Width>] ]
ctmlog <Action> <Action Option> ""
[<Output> [<Report Width>] ]

Valid values for <Action> and <Action Option> are listed in Table 2-34.
All other parameters of this utility are described in Table 2-35.
Note

All actions are limited to log entries in the range specified using the time
and date parameters.

Table 2-34

ctmlog Valid Actions (Part 1 of 2)

Action

Action Option

listss

Prints a report for a specific


subsystem

<subsystem>

list

Prints a report of all entries.

None.

Subsystem to include in the report.


Specify one of the following:
SU Supervisor
TR Tracker
SL Selector
CD Download, Database
update
NS Communication with Agent
platforms
LG Agent utilities
UT Utilities
WD Watchdog

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-91

Table 2-34

ctmlog Valid Actions (Part 2 of 2)

Action

Action Option

listord

Prints a report of entries for a


specific Order ID.

<Order ID>

Order ID to include in the report.


Note: The Order ID as displayed in
the Job Details window of
ENTERPRISE/CS is a base 36
number. If you want to specify the
Order ID here as a base 10
number, precede the number with
an asterisk and enclose the result
in quotation marks (for example,
1234).

listjob

Prints a report including all


entries for a specific job
number.

<Job no.>

Job number to include in the


report.

listmsg

Prints a report of messages with


a specific message ID.

<msgid>

Message ID to include in the


report.

delete

Deletes entries in a specified


date and time range.

None

listjobname

Prints a report including all


entries for the specified job
name.

<jobname>

Table 2-35

The name of the job whose entries


should be printed in the report.

ctmlog Parameters

Parameter

Description

<From Date>
<From Time>
<To Date>
<To Time>

Starting and ending dates and times for the range of


entries to be scanned by the specified action. Date is
specified in yyyymmdd format. Time is specified in
hhmm format.

Asterisk enclosed in quotation marks. Scan all entries in


the CONTROL-M log (without regard to date or time).

<Output>

Full path name to which the report should be sent


(optional). If this parameter is not specified, the output
is routed to the default output device. This parameter is
not applicable for the delete action.

<Report Width>

Width (in columns) of the report to generate. Specify a


number in the range of 80 132 (default is 80). This
parameter can only be specified if the Output
parameter is specified.

BMC Software, Inc., Confidential and Proprietary Information

2-92

CONTROL-M/Server for Unix Administrator Guide

Example 1

The following command produces a report of all entries in the


CONTROL-M log between 10:00 A.M. March 12th, 1999 and 8:00 A.M.
March 14th, 1999. The report is output to file rprt.txt in 80-column
format:
ctmlog list 19990312 1000 19990314 0800
/ctm/user1/rprt.txt
Example 2

The following command produces a report of all entries in the


CONTROL-M log relating to downloads to the ENTERPRISE/CS
database and to CONTROL-M database updates, without regard to date
or time. The report is output to file gdrprt.txt in 132-column format:
ctmlog listss CD "" /ctm/user1/gdrprt.txt 132

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-93

ctmordck
The ctmordck utility lists job processing definitions associated with a
specific User Daily name and indicates the security status of each job
with regard to the owner of the User Daily job (that is, whether or not the
CONTROL-M security mechanism will allow jobs associated with a
User Daily name to run with the authorizations currently assigned to the
owner of the User Daily job).
This utility displays the following fields:

Name of the job.


Number of the job in the CONTROL-M database.
Author of the job processing definition.
Owner of the job processing definition.

The following information is displayed for each job processing


definition:
Table 2-36

ctmordck Output Columns

Column

Description

TB

Whether or not the owner of the User Daily job is authorized


to order the Scheduling table of the job listed.

FL

Whether or not the owner of the User Daily job is authorized


to execute the script file of the job listed.

UA

Whether or not the owner of the User Daily job is authorized


to order jobs for the owner of the job listed.

Note

This utility can be used non-interactively for non-terminal destinations


(see the description of the <Output> parameter below).
Specify the following command to invoke the ctmordck utility:
ctmordck <User Name> <User Daily> [<Output>]

BMC Software, Inc., Confidential and Proprietary Information

2-94

CONTROL-M/Server for Unix Administrator Guide

Table 2-37

ctmordck Parameters

Parameter

Description

<User Name>

Owner of the User Daily job.

<User Daily>

User Daily name.

<Output>

Full path name to which the report should be sent. If this


parameter is not specified, the output is routed to the
default output device.

Example

The following command generates a list for user SYSTEM and the User
Daily SYSTEM. The list is directed to the udlist file:
ctmordck SYSTEM SYSTEM /ctm/user1/udlist

The following is sample output from the above command:


Figure 2-2

ctmordck Sample Output

Date: 10-NOV-2000.
Page: 1
User SYSTEM , Daily SYSTEM Ordering list
JOBNAME
---------CTMLOG HAN
PURGE JOB
user3-DAIL
user2-DAIL
user1-DAIL
JEAN-UD
JOB-STATUS
GD-TEST1
GD-TEST2
GD-TEST3
GD-user4
GD-user5

No. AUTHOR
--- -----2066 root
2067 root
2033 BARRY
2032 STEVE
2031 STEVE
2000 jean
2068 root
20 jean
21 jean
22 jean
2008 jean
2009 jean

OWNER
----root
root
user3
user2
user1
jean
root
user1
user2
user3
user4
user5

TB
-Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y

FL
-N
N
N
N
N
N
N
N
N
N
N
N

UA
-Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-95

ctmorder
ctmorder orders or forces one or more jobs from a Scheduling table in the
CONTROL-M database.

Ordered jobs are placed in the Active Jobs file if their scheduling
criteria are met.

Forced jobs are placed in the Active Jobs file regardless of their
scheduling criteria.

If two jobs with the same name exist in a Scheduling table and you use
the ctmorder utility to force a job with that name, only the first job is
forced.
Note

If the ctmorder utility is running when the New Day procedure begins, it
is automatically suspended until New Day procedure is ended.
Syntax

The ctmorder utility can be invoked using either of two formats.

The first format includes a limited number of parameters in a specific


order:
ctmorder <scheduling table> <job name> <odate>
[{order|force}]

Note

This short format cannot be used on CONTROL-M/Agents. Use the


second, more explicit format described below.

BMC Software, Inc., Confidential and Proprietary Information

2-96

CONTROL-M/Server for Unix Administrator Guide

The second format allows specification of more details and requires


each parameter to be named. The parameters in this format can be
specified in any order. This format is as follows:
ctmorder -schedtab <scheduling_table> \
-jobname <job_name> \
-odate <odate> \
[-force {y|n>}] \
[-seqno <job_sequence_number>] \
[-ingrouporderid <group_order_id>|last|alone|newg]\
[-debug
<level>] \
[-quiet] \
[-noduplication] \
[-autoedit <variable> <expression>]
Note

As of CONTROL-M version 6.0.00, the ctmorder utility can be accessed


using a command line interface only. The interactive interface available
in earlier versions is no longer supported.
All parameters of the ctmorder utility are described in Table 2-38.
Table 2-38

ctmorder Parameters (Part 1 of 3)

Parameter

Description

-schedtab

Name of the Scheduling table containing the jobs.

-jobname

Job name (or mask) of the job(s) to order or force.


You can order a group scheduling table, but you cannot
order an individual job, or selection of jobs, from a Group
Scheduling table.
The specified job name can include mask characters as
follows:
* indicates any number of characters (or no characters at
all). Specify * by itself to include all jobs in the table. Note:
Any parameter including * must be enclosed in double
quotes (see the example provided below).
? Represents any single character.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-97

Table 2-38

ctmorder Parameters (Part 2 of 3)

Parameter

Description

-odate

Date to use as the jobs scheduling date. Specify a date in


yyyymmdd format, or specify the keyword ODAT to use the
current CONTROL-M date.

-force

Add the specified jobs to the Active Jobs file regardless of


scheduling criteria. If -force is not specified, jobs are added
to the Active Jobs file only if their scheduling criteria are
satisfied (known as order).
Y

Force the specified jobs.

Order the specified jobs. Default.

-seqno

A counter identifying the row number of the job in the


Scheduling table. The first job in each Scheduling table is
numbered 1 and each subsequent job increments the
counter by one. If this parameter is not specified, the first job
in the specified table is ordered.

-ingrouporderid

Note: This parameter is relevant only for jobs in a Group


Scheduling table.
<group_order_ID>

Order ID of an existing Group


Scheduling table.

last

The specified jobs are added to the last


ordered instance of their Group
Scheduling table in the Active Jobs file.

alone

The specified jobs are ordered


individually. They are not associated
with any Group Scheduling table.

Note: group_order_ID, last and alone options can only be


used when -force parameter is set to Y.
newg

A new group is created and the


specified jobs are ordered to that Group
Scheduling table. Default.

-debug level

Activates a debug trace at the specified level.


Valid levels are 0 5. Default: 0
Performance is somewhat slower when operating in debug
mode. It is recommended that you activate debug mode only
when requested by Technical Support.

-quiet

Suppresses display of the utility output. If specified, no


information messages are displayed during execution of the
command.

BMC Software, Inc., Confidential and Proprietary Information

2-98

CONTROL-M/Server for Unix Administrator Guide

Table 2-38

ctmorder Parameters (Part 3 of 3)

Parameter

Description

-noduplication

Allow jobs to be ordered and added to an existing ordered


Group Scheduling table only if those jobs have not already
been ordered in that instance of the Group Scheduling table.
This parameter can be specified only if last or
<group_order_ID> is specified for the -ingrouporderid
parameter.
Note: This parameter is relevant only for jobs in a Group
Scheduling table.

-autoedit

Assigns an AutoEdit variable to a new Group Scheduling


table.
This parameter can be specified only if newg is specified for
the -ingrouporderid parameter.
For more information, see the description of AutoEdit Facility
in the Enterprise Controlstation User Guide. The following
information must be specified for each new AutoEdit
variable.
<variable>

Name of the variable.

<expression>

Value assigned to the variable.

Note

If neither ORDER nor FORCE is included in the command activating


this utility, the specified jobs are ordered.
Example 1

The following command orders all jobs contained in Scheduling table


ACCT100. Any jobs placed in the Active Jobs file will have the current
CONTROL-M date as their original scheduling date:
ctmorder -schedtab ACCT100 -jobname * -odate odat
Example 2

The following command orders all jobs contained in the Scheduling table
ACCT100 whose job name begins with ga. Any jobs placed in the
Active Jobs file will have the date March 15, 2000 as their original
scheduling date:

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-99

ctmorder -schedtab ACCT100 -jobname "ga*"


-odate 20000315 -force y

Example 3

The following command forces all jobs contained in the Scheduling table
ACCT100 whose job name is prodyjob. Any jobs placed in the Active
Jobs file will have the date December 31, 2000 as their original
scheduling date:
ctmorder -schedtab ACCT100 -jobname prodyjob
-odate 20001231 -force y

Example 4

The following command forces the third job contained in the Group
Scheduling table ACCT200 whose job name parameter consists of
prodyjob. This job is placed in the Active Jobs file and will have the
date December 31, 2000 as its original scheduling date. This job is
added to an active group whose orderid is B2.
ctmorder -schedtab ACCT200 -jobname prodyjob
\
-odate 20001231 -force y -seqno 3 -ingrouporderid B2
Example 5

The following command assigns the AutoEdit variable


%%PRDNDATE with the value of %%ODATE, and orders every job
in the PRODUCTION Group Scheduling table whose job name has a
prefix of PRDN. These jobs are placed in the Active Jobs file in a new
group and are assigned December 31, 2000 as their original scheduling
date.
ctmorder -schedtab PRODUCTION -jobname PRDN*
-odate 20001231 -force n -ingrouporderid newg
-autoedit %%PRDNDATE %%ODATE

\
\

BMC Software, Inc., Confidential and Proprietary Information

2-100

CONTROL-M/Server for Unix Administrator Guide

Example 6

The following command orders every job in the INVENTORY Group


Scheduling table whose job name has a prefix in the range BIN_A1 to
BIN_A9. These jobs are placed in the Active Jobs file in a new Group
Scheduling table, and are assigned December 31, 2001 as their original
scheduling date. The APPLICATION and OWNER parameters of these
jobs are modified to STOCK_COUNT and STOREMAN, respectively.
ctmorder -schedtab INVENTORY -jobname BIN_A?
-odate 20011231 -force n -ingrouporderid newg
-autoedit %%PRDNDATE %%ODATE
-autoedit %%APPLIC STOCK_COUNT
-autoedit %%OWNER STOREMAN

\
\
\
\

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-101

ctmpasswd
The ctmpasswd utility enables the administrator to change the
CONTROL-M Users password for accessing the database. Only an
administrator can change the password.
To invoke the ctmpasswd utility, specify the following command:
>ctmpasswd

The system will prompt you to enter the old password:


Please enter the old password for CONTROL-M account:

1. Enter the old password for the CONTROL-M account. The system
will prompt you to enter the new password:
Please enter the new password for CONTROL-M
account:

2. Enter the new password for the CONTROL-M account. Make sure
that the password consists of at least 6 characters. Note that you will
not see your entry on the screen. The system will then prompt you to
enter the password again:
Enter again to verify:

3. Re-enter the new password for the CONTROL-M account. The


system will respond with the message that the password was
successfully changed:
Password was successfully changed

BMC Software, Inc., Confidential and Proprietary Information

2-102

CONTROL-M/Server for Unix Administrator Guide

ctmping
The ctmping utility detects and collects configuration information about
CONTROL-M/Agents. This utility can also connect Agents that are
already in the database, and test communication between them and the
CONTROL-M/Server.
Note

ctmping can be included in the Watchdog process. See Watchdog


Facility on page 1-44 for details.
This utility can check if an Agent is down and, if necessary, register it in
the database as unavailable. When the Agent again becomes available,
the state of the Agent is changed and information about it is gathered by
a CONTROL-M process.
To invoke the ctmping utility, specify the following command:
ctmping -nodeid <agent_name> [-file <path_name>] \
[-discover {y|n}]
\
[-debug <level>]
\
[-quiet]

Table 2-39 contains descriptions of the parameters in this command.


Table 2-39

ctmping Parameters (Part 1 of 2)

Parameter

Description

-nodeid

Host name of the Agent platform to be pinged (tested).


At least one Node ID must be specified for each run of the
ctmping utility. Additional Node IDs can optionally be specified
to enable a single run of this utility to test communication with
more than one Agent platform.

-file

Full path name of a file containing a list of Agents to be pinged.


Each line in the specified file contains the hostname or IP
address of an Agent.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-103

Table 2-39

ctmping Parameters (Part 2 of 2)

Parameter

Description

-discover

Indicates whether to update the database.


Y Update the database with information gathered by the
utility.
N Do not update the database. Default.

-debug

Activates a debug trace at the specified level. Valid levels:


0 through 5. Default: 0. Performance is slower when operating
in debug mode. It is recommended that you activate debug
mode only when requested by Technical Support and use the
specified level.

-quiet

Suppresses display of utility output.

Example 1

To connect and perform a communication test with the Agent jacklin,


specify the following command:
ctmping -nodeid jacklin

The response is:


Agent: jacklin is alive
Example 2

To attempt to connect and test communication with the Agent diana


which is currently down, specify the following command:
ctmping -nodeid diana

The response is:


Agent: diana, Msg: Agent not available.
Add it to the database? y/n:

BMC Software, Inc., Confidential and Proprietary Information

2-104

CONTROL-M/Server for Unix Administrator Guide

Example 3

To connect and test communication with the Agent jacklin and collect
configuration information needed for the discovery process, specify the
following command:
ctmping -nodeid jacklin -discover y

The response is:


Agent: jacklin is alive
Example 4

To connect and test communication with the Agent jacklin and generate
a debug trace without displaying the results on screen, specify the
following command:
ctmping -nodeid jacklin -debug 1 -quiet

Only the return code of the utility will indicate if it was successful. The
debug trace information is saved to the following file:
ctm-home\ctm\proclog\ping<PID>.<PID>

where PID is the Process Identity number.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-105

ctmpsm
The ctmpsm utility can be invoked interactively to display the
CONTROL-M Production Support menu. This menu is used to perform
functions affecting jobs or conditions in the active environment of the
data center. It provides an alternative to using the ENTERPRISE/CS GUI
and enables you to perform many of the GUI functions directly in the
data center.
Note

The ctmpsm utility can also be invoked by the Command Line Interface,
as described in Command Line Invocation on page 2-115.
To invoke the ctmpsm utility interactively:

1. Log on to the Server platform as the CONTROL-M/Server owner


(for example, user controlm).
2. Specify the command: ctmpsm.
The following menu is displayed:
Figure 2-3

ctmpsm Production Support Menu

Active Jobs File


----------------

Resource Map
------------

1)
2)
3)
4)

List
List
List
List

All
All (Show Started/Ended)
All (Show Application)
All (Show Mem Name)

5)
6)
7)
8)
9)
10)

List
List
List
List
List
List

Jobs That Ended OK


Jobs That Ended NOTOK
Submitted/Executing Jobs
Cyclic Jobs
Jobs Waiting for Time Window
Jobs Waiting for Confirmation

40) List Application/Group Tree


41) List Scheduling Tables
42) List Group Entities

61)
62)
63)
64)
65)

Control Resources
Quantitative Resources
Prerequisite Conditions
Control Resources Usage
Quantitative Resources Usage

Scheduling Functions
-------------------71) Scheduling Tables
72) Order Tables/Jobs

Q) Quit
Enter Option:

BMC Software, Inc., Confidential and Proprietary Information

2-106

CONTROL-M/Server for Unix Administrator Guide

The functions in this menu are divided into three categories:

Active Jobs File functions provide various views of the Active Jobs
file. Each view displays information about the jobs and provides
options to perform such actions on the jobs as Hold, Free, Delete,
Rerun, Why, Confirm, View or modify job details, and view the
CONTROL-M log.

Resource Map functions enable you to view and modify Quantitative


resources, Control resources, and prerequisite conditions. The first
three of these functions activate the ecactltb, ecaqrtab, and ctmcontb
utilities respectively.

Scheduling Functions enable you to order or force Scheduling tables


or specific jobs in Scheduling tables. You can also generate monthly
or yearly scheduling plans using the ctmrpln utility.

Active Jobs File Options

Perform various tasks using information in the Active Jobs file. These
options are described in Table 2-40 below.
Table 2-40

ctmpsm - Menu Options for Active Jobs File (Part 1 of 2)

Code

Option

Description

List All

Lists all jobs in the Active Jobs file.

List All
(Show Started/Ended)

Lists all jobs in the Active Jobs file. Indicates which jobs have
started or ended execution.

List All
(Show Application)

Lists all jobs in the Active Jobs file. Indicates the application to
which each job belongs.

List All
(Show Mem Name)

Lists all jobs in the Active Jobs file. Indicates the Mem Name for
each job.

List Jobs That


Ended OK

Lists jobs in the Active Jobs file with a completion status of


Ended OK.

List Jobs That


Ended NOTOK

Lists jobs in the Active Jobs file that have a completion status of
Ended NOTOK.

List Submitted/
Executing Jobs

Lists jobs in the Active Jobs file that are currently executing.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-107

Table 2-40

ctmpsm - Menu Options for Active Jobs File (Part 2 of 2)

Code

Option

Description

List Cyclic Jobs

Lists jobs in the Active Jobs file that are cyclic.

List Jobs Waiting for


Time Window

Lists jobs in the Active Jobs file that are waiting to begin
executing based on the time specified in their Time From
parameter.

10

List Jobs Waiting for


Confirmation

Lists jobs in the Active Jobs file that are waiting for confirmation.

40

List Application/Group
Tree

Displays a summarized list of the applications and groups for all


jobs currently contained in the Active Jobs file.

41

List Scheduling Tables

Displays a list of all Scheduling tables in the Active Jobs file.

42

List Ordered Groups

Displays a list of all CONTROL-M groups in the Active Jobs file.

All Active Jobs file options display the following menu at the bottom of
the screen:
Figure 2-4

ctmpsm - Active Jobs File Menu Options

H) Hold, F) Free, D) Delete, U) Undelete, R) Rerun, W) Why, Z) Details


LO) LogOrd, LJ) LogJob, C) Confirm, Sx)Sort[x: 1.ORDERNO 2.JOBNAME]
J) Sysout A) Statistics V) View Script/JCL K) Force OK
I)Dependencies Jobs
Gx) Global action x [x: H(Hold), F(Free), D(Delete), U(Undelete), R(Rerun)]
Q)Quit
Enter Option:

These actions are described in Table 2-41:

BMC Software, Inc., Confidential and Proprietary Information

2-108

CONTROL-M/Server for Unix Administrator Guide

Table 2-41

ctmpsm - Active Jobs File Actions (Part 1 of 2)

Option

Action

Description

Hold

Hold a job.

Free

Free a previously held job.

Delete

Mark a job for deletion.

Rerun

Rerun a job.

Undelete

Undelete a job marked for deletion.

Why

Display why a job has not yet been submitted.

Details

View or modify a jobs parameters. This is also referred to as


zooming and saving a jobs parameters.
Note1: When a job is being viewed, it is automatically held.
After changes are made and saved, the job is freed.
Note2: If prerequisite conditions are added to or deleted
from a job in the Active Jobs File with the Z option, the
changes are automatically saved when you quit.

LO

LogOrd

List CONTROL-M log entries for a specific Order ID.

LJ

LogJob

List CONTROL-M log entries for a specific Job Name.

Confirm

Confirm submission of a job.

S1

Sort (by Order No.)

Sort jobs displayed by Order number.

S2

Sort (by Job Name)

Sort jobs displayed by Job Name.

Sysout

Display the jobs sysout.

Statistics

Display the job statistics (last 20 runs).

View script/JCL

View a jobs script or JCL.


Note: This option is not available if CONTROL-M/Server is
not active.

Force OK

Force a jobs status to be OK.

Dependencies Jobs

Displays all jobs that have conditions that depend on the


specified job.

GH

Global Action (Hold)

Hold all jobs in the displayed list.

GF

Global Action (Free)

Free all jobs in the displayed list.

GD

Global Action (Delete)

Mark all jobs in the displayed list for deletion.

GR

Global Action (Rerun)

Rerun all jobs in the displayed list.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-109

Table 2-41

ctmpsm - Active Jobs File Actions (Part 2 of 2)

Option

Action

Description

GU

Global Action (Undelete)

Undelete all jobs marked for deletion.

Note: The R (Rerun) option and the Global options (GH, GF, GD, GR, and GU) affect only
jobs and not group scheduling tables.
Resource Table Options
Table 2-42

ctmpsm - Menu Options for the Resource Table

Code

Option

Description

61

Control Resources

Lists Control resources currently used in the Active


environment. This option activates the ecactltb utility.

62

Quantitative Resources

Allows you to list, add, modify or delete Quantitative


resources in the Active environment. This option activates
the ecaqrtab utility.

63

Prerequisite Conditions

Allows you to view, add or delete prerequisite conditions in


the Active environment. This option activates the ctmcontb
utility.

64

Control Resources Usage

Shows current usage of Control resources by jobs in the


Active Jobs file.

65

Quantitative Resources
Usage

Shows current usage of Quantitative resources by jobs in


the Active Jobs file.

Scheduling Function Options


Table 2-43

ctmpsm - Menu Options for Scheduling Functions

Code

Option

Description

71

Scheduling Tables

Lists Scheduling tables and jobs defined in the


CONTROL-M database. Allows you to force Scheduling
tables or jobs, associate User Dailies with Scheduling
Tables, and generate scheduling reports.

72

Order Tables/Jobs

Allows you to order Scheduling tables or jobs. You are


prompted to specify the Scheduling table, Job Name
(optional) and Odate for the table or job to order.

BMC Software, Inc., Confidential and Proprietary Information

2-110

CONTROL-M/Server for Unix Administrator Guide

When the Scheduling Tables option is selected, output similar to the


following is displayed:
Figure 2-5

List of Scheduling Tables output by the ctmpsm utility

Scheduling Tables
----------------Table name
1) supply
2) temp
3) inventory
4) Payroll
5) inventory
6) RE_SYSOUT

Daily name
Quarterly
GROUP
Monthly
SYSTEM
vitaly

D#) Delete UserDaily Table #


F#) Force table
#
A) Add
R) Remove Table

Table type
GROUP
REGULAR
GROUP
GROUP
REGULAR
U#) Update table #
J#) List jobs
#
Q) Quit.

Option []:

The options in Table 2-44 are available from the above screen.
Note

If a table that is associated with more than one User daily is modified
using ENTERPRISE/CS and then uploaded to CONTROL-M, that table
is removed from all User dailies except the one that is associated with it
in ENTERPRISE/CS.

Table 2-44

ctmpsm - Options for Scheduling Functions

Code

Option

Description

Add

Associates a User Daily with a Scheduling Table. When selected,


you are prompted for the Table name and its associated User Daily
name. Both the Schedule Table and the User Daily should already
exist in the database.

Remove

Deletes a specific Scheduling table and all its associated jobs (for
example, specify R RE_SYSOUT to delete table RE_SYSOUT).

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-111

Table 2-44

ctmpsm - Options for Scheduling Functions

Code

Option

Description

D#

Delete #

Removes an instance of a scheduling table from the CONTROL-M


database.
If the specified instance is the only instance of the table (that is,
that table is ordered by only one user daily), the scheduling table
and all its associated jobs are deleted.
If the specified instance is not the only instance of the table, then
only the specified instance is removed from the CONTROL-M
database.

F#

Force table #

Forces a specific Scheduling table (for example, specify F6 to force


table RE_SYSOUT).
The following prompt is displayed:

Odate (YYYYMMDD/ODAT) [ODAT]:


Enter the odate for the job to be forced in YYYYMMDD format, or
enter the value ODAT to indicate that the job should use the current
working date as its odate.
If the specified table is a Group Scheduling table, the following
prompt is displayed:
Please choose one of the following:
A) Alone.
N) New group.
L) Last.
B) Bind to existing group Orderno.
These options are described below:
A Forces each job in the table separately as a non-group job.
N Forces the jobs in the table as a new group in the Active Jobs
file.
L Forces the jobs in the table, and adds them to the most
recently ordered group in the Active Jobs file.
B Forces the jobs in the table, and adds them to a specified
group in the Active Jobs file.
J#

List jobs #

Lists jobs in a Scheduling table and provides options to force a


specific job or generate a report (for example, specify J1 to list the
jobs in table supply).

U#

Update table #

Updates the User Daily name for a specific Scheduling table (for
example, specify U6 to update the User Daily name for table
RE_SYSOUT).

When the List Jobs # option is selected, output similar to the following
is displayed:

BMC Software, Inc., Confidential and Proprietary Information

2-112

CONTROL-M/Server for Unix Administrator Guide

Figure 2-6

List of Jobs output by the ctmpsm utility

Scheduling Table RE_SHED Jobs


----------------------------1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)

Jobname:DAYS_CAL_N,
Jobname:DAYS_30_FE,
Jobname:DAYS_28_29,
Jobname:NO_CALENDA,
Jobname:DATES_0101,
Jobname:DATES_2902,
Jobname:DAYS_CAL_M,
Jobname:DAYS_CAL_P,
Jobname:DAYS_CAL_W,
Jobname:CALENDAR_O,
Jobname:wdays_all ,
Jobname:wdays_1_2_,

Memname:DAYS_CAL_NONE
Memname:DAYS_30_FEB
Memname:DAYS_28_29_FEB
Memname:NO_CALENDAR
Memname:DATES_0101_0202
Memname:DATES_2902
Memname:DAYS_CAL_MINUS
Memname:DAYS_CAL_PLUS
Memname:DAYS_CAL_WITHOUT
Memname:CALENDAR_ONLY
Memname:WDAYS_ALL
Memname:WEEKDAYS_1_2_3

Q) Quit.
F#) Force job #
M#) Month Schedule Plan # Y#) Year Schedule Plan for job #
Option []:

The options in Table 2-45 are available from the above screen.
Table 2-45

ctmpsm - Options in the Scheduling Table List Jobs Menu

Code

Option

Description

F#

Force job #

Forces a specific job (for example, specify F2 to force job


DAYS_30_FEB).

M#

Month Schedule Plan

Generates a monthly Job Order report for the table. You


are prompted to enter the year and month in format
YYYYMM.

Y#

Year Schedule Plan for job #

Generates a yearly Job Order report for a specific job.


You are prompted to enter the year in format YYYY.

The ctmpsm utility can display the sysout for a specified order ID and
runcount.
To display the sysout for a given order ID and runcount, invoke the
following command:
ctmpsm -listsysout <order ID> [-sysoutnumber <number>]

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-113

Parameter

Description

<order ID>

The order ID of a job.

<number>

A counter incremented by one each time a job is run.


Default: the runcount number of the most recent run of the
specified job.

Examples

To display the most recent sysout of the job whose order ID is 1234,
specify the following command:
ctmpsm -listsysout 1234

To display the second sysout of the job whose order ID is 1234, specify
the following command:
ctmpsm -listsysout 1234 -sysoutnumber 2

The ctmpsm utility redirects the display of the sysout of a job to the
viewer defined by parameter CTMPSM_VIEWER. This parameter is
specified in the ctm/config.dat file. If no viewer is specified, the more
viewer opens in the active screen.
If the viewer opens in a new window, the DISPLAY environment
variable should be set to your host name. For more consult your Unix
Administrator.
To specify the CTMPSM_VIEWER parameter in the config.dat file,
type the following:
CTMPSM_VIEWER <viewer command>

where <viewer command> is the name of the viewer application


selected by the user for displaying the sysout.

BMC Software, Inc., Confidential and Proprietary Information

2-114

CONTROL-M/Server for Unix Administrator Guide

Example

To specify the CTMPSM_VIEWER parameter in the config.dat file,


opening a viewer in a new window and showing the sysout using the
switch more:
CTMPSM_VIEWER xterm -e more
Command Line Invocation

The format and valid values for each mode of the ctmpsm utility
command line interface are described in Table 2-46.
Table 2-46

ctmpsm - Mode Descriptions and Syntax

Mode

Description

CHILD

Lists dependent jobs with IN conditions that are created by the job whose order
ID is specified in this command.

Syntax:
ctmpsm -CHILD <order_ID> [<tasktype>]

IMPORT_CAL

LISTCAL

order_ID

Identifies the parent job.

tasktype

B=batch job
D=detached
C=command
U=dummy

Imports a calendar from the Enterprise Controlstation.


ctmpsm -IMPORT_CAL <file_name>
where file_name is the full pathname of the calendar file to be uploaded from
Enterprise Controlstation.
Lists available calendars. The list can be restricted by calendar name and year.

ctmpsm -LISTCAL [<Calen_name>][<Calen_year>]


Calen_name

Restricts the list to calendars with the specified name or


prefix (indicated by * at the end).

Calen_year

Restricts the list to calendars for the specified year.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-115

Mode

Description

LISTALL

Lists jobs in the Active Jobs file. The list can be filtered by time, application, and
member name. The list can be sorted by order ID or job name.

Syntax:
ctmpsm -LISTALL [TIME|APPLICATION|MEMNAME|ALL|ALLFIELDS] [SORT {ORDERID|JOBNAME}]
In addition to the order ID and the job name, one of the following fields can also
be included in the LISTALL output:
TIME _ Time execution started and ended.
APPLICATION _ Application to which the job belongs.
MEMNAME _ Member name for the job.
ALL Includes ODAT and TIME fields.
ALLFIELDS Includes ODAT, MEMNAME, and APPLICATION fields.
SORT indicates the order in which the jobs should be listed. Valid orders are:
ORDERID, and JOBNAME.
LISTJOB

List in Active Jobs file with a specified status. Jobs can be restricted by status:
OK, NOTOK, executing, cyclic, waiting for the end of a time interval, waiting for
confirmation.
ctmpsm -LISTJOB {OK|NOTOK|EXECUTING|CYCLIC|
WAITTIME|WAITCONFIRM} [-SORT {ORDERID|JOBNAME}]
OK _ Jobs with a completion status of Ended OK.
NOTOK _ Jobs with a completion status of Ended NOTOK.
EXECUTING _ Jobs that are currently executing.
CYCLIC _ Jobs that are cyclic.
WAITTIME _ Jobs waiting to begin executing based on the time specified in their
Time From parameter.
WAITCONFIRM _ Jobs waiting for confirmation.
SORT indicates the order in which the jobs should be listed. Valid orders are:
ORDERID, and JOBNAME.

LISTGROUP

Lists jobs in the specified group that are associated with the specified
application.
ctmpsm -LISTGROUP <application> <group>
Wildcards can used as part of the specified application or group names.
* represents any number of characters.
? represents any single character.

BMC Software, Inc., Confidential and Proprietary Information

2-116

CONTROL-M/Server for Unix Administrator Guide

Mode

Description

LISTAJFTAB

Lists jobs in the Active Jobs file that were ordered from the specified scheduling
table.
ctmpsm -LISTAJFTAB <table_name>
Wildcards can used as part of the specified table name.
* represents any number of characters.
? represents any single character.

SCHEDTAB

Lists Scheduling tables and jobs defined in the CONTROL-M database, and
allows you to add or delete Scheduling tables.

Syntax
ctmpsm -SCHEDTAB {-LISTTABLE <table_name>|-UPDATE <row_number>
<udaily_name>|-ADD <table_name> <udaily_name>|-DUDAILY <row_number>|REMOVE <table_name>|-LISTJOBS <row_number>}
The options in this command are described below:
-LISTTABLE

Lists all instances of scheduling tables that match the


specified name or mask. For example, if a scheduling table is
ordered by two different user dailies, that table will appear
twice in the output of this option.
Wildcards can used as part of the table name for this option.
* represents any number of characters.
? represents any single character.

-UPDATE

Updates the User Daily name for a specific Scheduling table.

-ADD

Adds a Scheduling table to the CONTROL-M database. The


Table name and User Daily name must be specified when
this option is used.

-DUDAILY

Removes an instance of a scheduling table from the


CONTROL-M database.
If the specified instance is the only instance of the table
(that is, that table is ordered by only one user daily), the
scheduling table and all its associated jobs are deleted.
If the specified instance is not the only instance of the
table, then only the specified instance is removed from the
CONTROL-M database.

-REMOVE

Deletes a specific Scheduling table and all its associated


jobs.

-LISTJOBS

Lists jobs in a Scheduling table.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-117

Mode

Description

LISTSYSOUT

List the sysouts for an order ID. The list can be restricted by runcount number.

Syntax:
ctmpsm -LISTSYSOUT <order_ID> [SYSOUTNUMBER {<number>|ALL}]
order_ID

Identifies the job whose sysouts are listed.

number

Restricts the list to the sysout whose runcount is specified.


If ALL is specified, the output will contain only a list of all
sysouts related to the specified order ID.

LISTDETAILS

Lists the details of the job associated with the specified order ID.
Valid syntax is:
LISTDETAILS <orderid>

UPDATEAJF

Performs a specified command or updates conditions for a job in the Active Jobs
that is associated with a specified order ID.

Syntax
ctmpsm -UPDATEAJF <order ID> <command>
Where command is one of the following:
HOLD _ Set a jobs status to HELD.
FREE _ Free a previously held job.
DELETE _ Mark a job for deletion.
UNDELETE _ Undelete a job marked for deletion.
RERUN _ Rerun a job.
CONFIRM _ Confirm submission of a job.
FORCEOK _ Force a jobs status to be OK.
CONDADDIN <cond> <date> <AND|OR> _ Add the specified IN condition with
the specified date reference. You can include one or more additional IN
conditions by using the AND or OR conjunctional parameter.
CONDADDOUT <cond> <date> <+|-> _ Add the specified OUT condition with
the specified date reference. Use + to indicate that the condition must be
present. Use - to indicate that the condition must not be present.
CONDDELIN <cond> _ Delete the specified IN condition.
CONDDELOUT <cond> _ Delete the specified OUT condition.
Note: Conditions specified using this mode are applied only to the specified
instance of the job in the Active Jobs file. Subsequent orders of that job are not
affected by these changes.

BMC Software, Inc., Confidential and Proprietary Information

2-118

CONTROL-M/Server for Unix Administrator Guide

Mode

Description

UPDATEGROUP

Applies a specified command to jobs in the specified group that are associated
with the specified application.

ctmpsm -UPDATEGROUP <application> <group> <command>


Where <command> is one of the following:
HOLD _ Set the jobs status to HELD.
FREE _ Free previously held jobs.
DELETE _ Mark the jobs for deletion.
UNDELETE _ Undelete the jobs marked for deletion.
RERUN _ Rerun the jobs.
CONFIRM _ Confirm submission of the jobs.
UPDATETABLE

Applies a specified command to jobs in the Active Jobs file that were ordered
from the specified table.

ctmpsm -UPDATETABLE <table> <command>


Where command is one of the following:
HOLD _ Set the jobs status to HELD.
FREE _ Free previously held jobs.
DELETE _ Mark the jobs for deletion.
UNDELETE _ Undelete the jobs marked for deletion.
RERUN _ Rerun the jobs.
CONFIRM _ Confirm submission of the jobs.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-119

ctmrpln
ctmrpln creates a report that lists all or a selection of jobs in a specified
Scheduling table, and indicates when the jobs are scheduled to run. In
addition, it enables you to test the effect of different calendars on the
scheduling of jobs in the table.
Each report can be created in one of three formats, as described in
Table 2-47:
Table 2-47

ctmrpln Report Formats

Format

Description

Daily Report

Displays jobs in the specified Scheduling table that are


scheduled to run on a specific day. Each jobs Mem Name
(or Job Name), Group and Description parameters are
also displayed.

Monthly Report

Displays a table of all days in a specified month and marks


(with an asterisk ) the days of the month on which jobs
in the specified Scheduling table are scheduled to run.
Jobs can be identified either by their Mem Name or Job
Name parameters.
NOTE: To print the monthly report, the <Output>
parameter (described below) must specify a printer that
can print 132-column reports.

Yearly Report

Displays five individual year-calendar tables and marks


each day with various characters (described below) which
indicate if jobs in the specified Scheduling table are
scheduled to run. The years displayed encompass the
period ranging from two years prior to the specified year
until two years following the specified year.

The following characters can appear in this report. The characters


indicate that a job is scheduled to run (that is, the job is placed in the
Active Jobs file.)
Char

Description

The days on which the job is scheduled is indicated by an asterisk

BMC Software, Inc., Confidential and Proprietary Information

2-120

CONTROL-M/Server for Unix Administrator Guide

Char

Description

Job is not scheduled; the day is not a calendar day.

Job is not scheduled because job processing parameter contains a


minus sign (-). Placing a minus in the job order overrides the other
characters * and ..

Specify the following command to invoke the ctmrpln utility:


ctmrpln <Report_type> <Calendar> <Schedtab> <Jobname> <Date> [<Output>]

Table 2-48 describes the parameters in the ctmrpln utility.


Table 2-48

ctmrpln Parameters (Part 1 of 2)

Parameter

Description

<Report_type>

Specify one of the following values:

<Calendar>

DM (or
D)

Creates a daily report, identifying each job by


its Mem Name parameter.

DJ

Creates a daily report, identifying each job by


its Job Name parameter.

MM (or
M)

Creates a monthly report, identifying each job


by its Mem Name parameter.

MJ

Creates a monthly report, identifying each job


by its Job Name parameter.

Creates a year report.

Specify one of the following values:


Y

Creates the report using the calendar


specified in the jobs scheduling parameters.

Creates the report ignoring the calendar


specified in the jobs scheduling parameters.

<Name>

Creates the report using a calendar whose


name you specify (ignores the calendar
specified in the jobs scheduling parameters, if
any). Use this option to see the effect another
calendar would have on the schedule.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-121

Table 2-48

ctmrpln Parameters (Part 2 of 2)

Parameter

Description

<Schedtab>

Name of the Scheduling table on which to base the report.


The Scheduling table name can include the following
mask characters:
*

Represents any number of characters


(including no characters). Specify * by itself to
include all Scheduling tables. Any parameter
including * should be enclosed in quotation
marks.

Represents any single character.

<Jobname>

Contents of the job processing parameter Job Name of


the job or jobs to include in the report. The Job Name can
include mask characters (see <Schedtab> above). Specify
* by itself to include all jobs in the Scheduling table.

<Date>

Date for the report:


For daily reports: A date in yyyymmdd format.
For monthly reports: A month in yyyymm format.
For yearly reports: A year in yyyy or yy format.
Note: The ctmrpln utility supports only years from 1972 to
2037.

<Output>

Full path name to which the report should be sent


(optional). If this parameter is not specified, the output is
routed to the default output device.

Example 1

The following command causes the utility to generate a report for


Scheduling table PROD1. The report will include all jobs whose Job
Name parameter begins with jn and that will run on Jan. 1, 2000 based
on the calendar work_days. The output is directed to the users display:
ctmrpln D work_days PROD1 "jn" 20000101

BMC Software, Inc., Confidential and Proprietary Information

2-122

CONTROL-M/Server for Unix Administrator Guide

Example 2

The following command causes the utility to generate a table of days on


which job PRDJ02 in Scheduling table PROD1 will run during the month
of April, 2000, based on the calendar work_days. The output is directed
to printer lp1:
ctmrpln M work_days PROD1 PRDJ02 200004 lp1
Example 3

The following command causes the utility to generate a five-year report


encompassing the period Jan. 1999 through Dec. 2003, indicating on
which days each job in Scheduling table PROD1 runs, based on the
calendar work_days. The output is directed to printer lp1:
ctmrpln Y work_days PROD1 "" 2001 lp1

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-123

ctmruninf
ctmruninf displays runtime data from the Statistical Details table of the
CONTROL-M database. An option is available to delete data from this
table. The jobs scanned for both options can be limited to a range of
dates as described below.
Note

Statistical data is only accumulated when the CONTROL-M system


parameter Statistics is set to Y.
For more information about runtime statistical data, see Runtime
Statistics on page 1-28.
Specify one of the following commands to invoke the ctmruninf utility:
ctmruninf -list <From Date> <To Date> [<Filter>] [-total]
ctmruninf -list "" [<Filter>] [-total]
ctmruninf -delete <From Date> <To Date>

The parameters for the above commands are described in Table 2-49.
Table 2-49

ctmruninf Parameters (Part 1 of 2)

Parameter

Description

-list

Displays data from the Statistical Summary table within the


dates specified by the From Date and To Date parameters.
The data listed can be limited with use of the Filter
subparameter (see below).

-delete

Deletes data from the Statistical Summary table in the


range specified by the From Date and To Date parameters.

<From Date>

Starting date of statistical data to be displayed/deleted.


The date is specified in yyyymmddhhmmss format.

<To Date>

Ending date of statistical data to be displayed/deleted. The


date is specified in yyyymmddhhmmss format.

Asterisk enclosed in quotation marks. Specifies that the


utility should list all statistical data currently available,
without regard to date.

BMC Software, Inc., Confidential and Proprietary Information

2-124

CONTROL-M/Server for Unix Administrator Guide

Table 2-49

ctmruninf Parameters (Part 2 of 2)

Parameter

Description

<Filter>

Specify one of the following options and its associated


subparameter or leave blank to display the statistics for all
jobs in the range.
-JOBNAME <jobname>
Identify the job by its Job Name parameter.
-MEMNAME <memname>
Identify the job by its Mem Name parameter.
-MEMLIB <memlib>
Identify jobs by their Me Lib parameter.
-NODEID <nodeid>
Identify jobs by their Node ID parameter (Agent platform).
Each of the subparameters in the filter can include the
following mask characters:
* Represents any number of characters (including no
characters). Any parameter including should be
enclosed in quotation marks (see example below).
? Represents any single character

-total

Displays a line that contains the total CPU and elapsed


times for the jobs selected.

Example 1

The following command displays runtime data for the period January 21,
2000 through January 25, 2000 (assuming that this data is available):
ctmruninf -list 20000121000000 20000125000000

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-125

Example 2

The following command causes the utility to display and total runtime
data for all jobs on Agent platform diana.
ctmruninf -list "" -NODEID "diana" -total

A report similar to the following is displayed:


TIMESTAMP
------------2000012160524
2000012161205
2000012162311
2000012164512
------------Total records

JOBNAME
ORDERID
---------- -------acct12
00000007
gen786
0000000b
acct14
00000011
acct15
00000012
---------- -------printed : 2

RUN#
---1
1
1
1
---0.50

NODEID
-----------diana
diana
diana
diana
-----------555.35

MEMNAME
---------pgmacct
genx
pgmacct
pgmacct
----------

MEMLIB
CPU
ELAPSED
-------------- ----- ------prod.acct.pgm
0.19 233.15
prod.general
0.12
6.12
prod.acct.pgm
0.05 170.45
prod.acct.pgm
0.14 145.23
-------------- ----- -------

Example 3

The following command deletes the statistical data for January 31, 2000
ctmruninf -delete 20000131000000 20000131235959

BMC Software, Inc., Confidential and Proprietary Information

2-126

CONTROL-M/Server for Unix Administrator Guide

ctmshout
ctmshout issues Shout messages to an indicated destination. It can be
entered directly or from a job script. See Shout Destination Tables on
page 1-24, for more information about Shout message destinations.
Specify the following command to invoke the ctmshout utility:
ctmshout [-ORDERID <Order_ID>] [-NODEID <Node_ID>]
-USER <Destination> [-USER <Destination>]\
-MESSAGE <Message_text> [-MESSAGE <Message_text>]
[-SEVERITY <{R|U|V}>]

Table 2-50

ctmshout Parameters

Parameter

Description

<Order_ID>a

Order ID of a job, as displayed in the Job Details window


in ENTERPRISE/CS. The Order ID associates the
message with a specific job in the Active Network.

<Node_ID>

Node ID of the agent platform. This parameter is used for


messages whose destination is either a user in the data
center or a user defined in the Shout Destination table. If
-ORDERID is also specified, this Node_ID will overwrite
the Node ID specified for the job with that Order ID.

<Destination>

Name of a user in the data center or a valid destination


name in the Shout Destination table. Shout messages can
be sent to multiple destinations in the same command.

<Message_text>

Free text to be sent to the destination. If the text is more


than one word, it must be enclosed in quotation marks.
Multiple messages can be sent in the same command.

<{R|U|V}>

One letter character indicating the urgency of the


message where:
R Regular (Default)
U Urgent
V Very urgent
If this parameter is not specified, the urgency of the
message is Regular.

a. This parameter is required for releases of ENTERPRISE/CS prior to Version


2.1.3 Level 9605.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-127

Each parameter name can be shortened to the minimum number of letters


required to identify the parameter. For example: -ORDERID can be
shortened to -O.
Example 1

The following command sends the message File not found to the
Alerts window in ENTERPRISE/CS and associates it with a job whose
Order ID is 1234:
ctmshout -ORDERID 1234 -USER ECS -MESSAGE "File not found" \
-SEVERITY V

Example 2

The following command sends the message The weekly paycheck


job has abended to user John on Agent platform diana:
ctmshout -NODEID diana -USER John -MESSAGE
"The weekly paycheck job\ has abended" -SEVERITY V

Example 3

The following illustrates the use of the ctmshout utility in a job script
command to send the Shout message Job started to the Alerts window
in ENTERPRISE/CS.
The job processing definition for a certain job contains the following
AutoEdit Assignment parameter:
%%PARM1 = %%ORDERID

The script used to execute the job contains the following command:
ctmshout -O $1 -USER ECS -MESSAGE "Job started" \
-SEVERITY R

BMC Software, Inc., Confidential and Proprietary Information

2-128

CONTROL-M/Server for Unix Administrator Guide

ctmshtb
ctmshtb sets the active Shout Destination table. The Shout Destination
table associates physical output destinations with logical destination
names specified in Shout and Do Shout statements in job processing
definitions. For more information, refer to Shout Destination Tables in
Chapter 1, Overview.
Activation of this utility changes the active Shout Destination table to the
table specified.
You can add, delete and modify Shout Destination tables using the
ctmsys utility, described earlier in this chapter. The ctmsys utility can
also be used to specify the active Shout Destination table interactively.
Specify the following command to invoke the ctmshtb utility:
ctmshtb <Table>

where <Table> is the new Shout Destination table name.


Note

By defining CONTROL-M jobs that execute the ctmshtb utility at


specified times, the active Shout Destination table designation can be
changed automatically according to the schedule that suits your
installation.
Example

The following command sets the current active Shout Destination table
designation to SHIFTMAN:
ctmshtb SHIFTMAN

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-129

ctmstats
ctmstats displays and deletes statistical data from the Statistical
Summary table of the CONTROL-M database. The data scanned for both
options can be limited to a range of dates. The Statistical Summary table
is created via the ctmjsa utility.
Note

Statistical data is only accumulated when the CONTROL-M system


parameter Statistics is set to Y. For more information, see System
Parameters on page 5-3.
Specify one of the following commands to invoke the ctmstats utility:
ctmstats -list <From Date> <To Date> [<Filter>] [-total]
ctmstats -list "" [<Filter>] [-total]
ctmstats -delete <From Date> <To Date>

Table 2-51

ctmstats Parameters (Part 1 of 2)

Parameter

Description

-list

Displays data from the Statistical Summary table


within the dates specified by the From Date and To
Date parameters. The data listed can be limited with
use of the Filter sub-parameter (see below).

-delete

Deletes data from the Statistical Summary table in the


range specified by the From Date and To Date
parameters.

<From Date>

Starting date of statistical data to be displayed/deleted. The date is specified in yyyymmddhhmmss format.

<To Date>

Ending date of statistical data to be displayed/deleted.


The date is specified in yyyymmddhhmmss format.

Asterisk enclosed in quotation marks. Specifies that


the utility should list all statistical data currently available, without regard to date.

BMC Software, Inc., Confidential and Proprietary Information

2-130

CONTROL-M/Server for Unix Administrator Guide

Table 2-51

ctmstats Parameters (Part 2 of 2)

Parameter

Description

<Filter>

Specify one of the following options and its associated


subparameter or leave blank to display the statistics
for all jobs in the range.
-JOBNAME <jobname>
Identify the job by its Job Name parameter.
-MEMNAME <memname>
Identify the job by its Mem Name parameter.
-MEMLIB <memlib>
Identify jobs by their Mem Lib parameter.
-NODEID <nodeid>
Identify jobs by their node id parameter (Agent platform).
Each of the subparameters in the filter can include the
following mask characters:
* Represents any number of characters (including
no characters). Any parameter including should be
enclosed in quotation marks (see example below).
? Represents any single character

-total

Displays a line that contains the total CPU and


elapsed times for the jobs selected.

Example 1

The following command displays statistical data for the period January
21, 1999 through January 25, 1999 (assuming that this data is available):
ctmstats -list 19990121000000 19990125000000

A report similar to the following is displayed:

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-131

TIMESTAMP
-------------19990122141214
19990122032025
19990121123111
19990121113512

JOBNAME
---------acct12
gen786
acct14
acct15

NODEID
-----------diana
diana
diana
diana

MEMNAME
---------pgmacct
genx
pgmacct
pgmacct

MEMLIB
AVG CPU AVG ELAPSED
-------------- ------- ----------prod.acct.pgm
0.19
233.15
prod.general
0.12
6.12
prod.acct.pgm
0.05
170.45
prod.acct.pgm
0.14
145.23

Example 2

The following command displays statistical data for all jobs on Agent
platform diana:
ctmstats -list "" -NODEID diana -total
Example 3

The following command deletes the statistical data for January 31, 1999:
ctmstats -delete 19990131000000 19990131235959

BMC Software, Inc., Confidential and Proprietary Information

2-132

CONTROL-M/Server for Unix Administrator Guide

ctmstvar
The ctmstvar utility displays the current value of an AutoEdit variable or
function. Specify the following command to invoke the ctmstvar utility:
ctmstvar <order id> <autoedit string>
Table 2-52

ctmstvar Parameters

Variable

Description

<order id>

The Order ID of a job waiting in the Active Jobs file (as


displayed in the Job Details window of ENTERPRISE/CS).
The Order ID displayed in ENTERPRISE/CS is a base 36
number. If you want to specify the Order ID here as a base
10 number, precede the number with an asterisk, and
enclose it in quotation marks (for example,1234).
Use 0 to indicate no specific Order ID.

<autoedit string>

The AutoEdit variable or string enclosed in quotes.

An AutoEdit variable that does not contain a $ sign can be enclosed in


single ( ) or double ( ) quote marks. An AutoEdit variable that does
contain a $ sign should be enclosed in single quote marks. An AutoEdit
variable containing a $ sign cannot be resolved if it is enclosed in double
quote marks.
Examples
ctmstvar a1 %%$CALCDATE %%ODATE -2
ctmstvar 0 "%%ODATE"

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-133

ctmsuspend
ctmsuspend suspends and restores CONTROL-M/Server
non-communication processes for mass batch uploads/downloads from
ENTERPRISE/CS. During suspension mode, CONTROL-M inactivates
its job processing functions by suspending the TR, SL, NS, and LG
processes. For more information, see CONTROL-M/Server Processes
on page 4-43. Requests for job processing during this mode are
suspended until execution of ctmsuspend restoration mode.
This utility should be invoked before executing the Mass Upload or
Mass Download features on the ENTERPRISE/CS Graphical User
Interface.
Specify the following command to invoke the ctmsuspend utility:
ctmsuspend {-s|-r}
Table 2-53

cmtsuspend Options

Var

Description

-s

Suspends CONTROL-M/Server scheduling processes.


Leaves the gateway to ENTERPRISE/CS open.

-r

Restores CONTROL-M/Server processes. Resumes normal


operating mode.

Example

The following command causes CONTROL-M/Server scheduling


processes to be restored.
ctmsuspend -r

BMC Software, Inc., Confidential and Proprietary Information

2-134

CONTROL-M/Server for Unix Administrator Guide

ctmsys
The ctmsys utility is an interactive utility for maintaining the following
CONTROL-M parameters:

Shout Destination tables (for directing Shout messages).


CONTROL-M system parameters.

To invoke the ctmsys utility:

1. Log on to the Server platform as the CONTROL-M/Server owner


(for example, user controlm).
2. Specify the command:
ctmsys

The following menu is displayed:


+------------------------------------------------+
|
CONTROL-M SYSTEM MAINTENANCE UTILITY
|
|
Main Menu
|
+------------------------------------------------+
1)
2)

Shout Destination Tables


System Parameters

q)

Quit

Enter option:

The options in this menu and in all other menus provided by this utility
can be selected by typing the option number or command letter and
pressing Enter.
Each option appearing in the main menu is described below.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-135

Shout Destination Tables

Shout Destination tables associate logical output destinations (specified


in Shout and Do Shout statements in job processing definitions) with
physical destination names. See Shout Destination Tables on page 124, for additional information.
To access the Shout Destination Tables menu:

Select Option 1 from the main menu.


The following menu is displayed:
Shout Destination Tables Menu
----------------------------Active Shout Destination Table: <table_name>
1)
2)
3)
4)

Create/Modify a Table
Set Active Table
List Tables
Delete Table

q)

Quit and return to main menu

Enter option:

The name of the currently-active Shout Destination table is displayed in


the <table_name> field on the menu.
To create or modify a Shout Destination table:
Step 1

Select Option 1 from the Shout Destination Tables menu.


A list of available tables, similar to the following, is displayed:

BMC Software, Inc., Confidential and Proprietary Information

2-136

CONTROL-M/Server for Unix Administrator Guide

Shout Destination Tables


-----------------------SYSTEM
NIGHT_SHIFT
Table to create/modify or q to quit [SYSTEM]:

Step 2

Specify the name of the table to be created or modified (or press


<Enter> to accept the default).
If the name you specify is not the name of an existing Shout Destination
table, a new table will be created with the specified name.
A display similar to the following is displayed. For an existing table, the
display lists the defined destinations.
Shout Destination Table SYSTEM
-------------------------------#
1
2

Destination Type Addr


---------------- ---E S ECS
T S Term_B $TTB.#B

q) Quit
entry #

e#) Edit entry #

Logical Name
------------

Physical Name
-------------

n) New entry

d#) Delete

Enter option:

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-137

The following fields in the table are displayed:


Table 2-54

Fields of the Shout Destination Table

Item

Description

Entry number in the table.

Destination Type

One-letter code indicating the type of recipient:


USpecific user. If the user is not logged onto the data
center when the Shout message is sent, the message is
placed in the users mail.
MUsers mail.
TSpecific terminal or file.
OSystem console.
LCONTROL-M log.
EAlert window of ENTERPRISE/CS.
PProgram which will perform the Shout operation.

Address Type

One-letter code indicating whether the destination is on


the Server (S) or Agent (A) platform.

Logical Name

Name used in the Shout or Do Shout parameter of the


job processing definition to identify the recipient of the
Shout message.

Physical Name

For Destination Types U and M, name of a user in the


data center.
For Destination Type T, terminal ID or full path name
(max. 96 characters) of a file. If the file exists, the
message will be appended to the end of the file.
For Destination Type P, the full path name of the program
file/script which will perform the Shout operation.
For Destination Types O, L and E, no physical name is
specified, as each of these is a unique destination.

To create a new entry in the table:

1. Specify n.
The following prompts appear:
Dest. Type: (U)ser (M)ail (T)erminal c(O)nsole
(L)og (P)rogram (E)NTERPRISE/CS:
BMC Software, Inc., Confidential and Proprietary Information

2-138

CONTROL-M/Server for Unix Administrator Guide

2. Specify the letter corresponding to the desired destination type.


The following prompt is displayed:
Address Type (S)erver or (A)gent:

3. For Destination types U, M, P, T or O, specify whether the


destination is on the Server (S) or Agent (A). For Destination type E,
specify S.
The following prompt is displayed:
Logical Name:

4. Specify the logical name for this destination.


The following prompt is displayed:
Physical Name:

5. For Destination types U, M, P or T, specify the physical name. For


Destination types O and E, leave this field blank.
The new entry is added to the table.
To modify an existing entry (physical name only) in the table:

1. Specify e<entry_number>. For example, to modify entry number 2,


specify e2.
The following prompt is displayed:
Dest Type:
Address Type:
Physical Name:

Note that this option cannot be used to modify a logical name.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-139

2. Specify a new physical name for the entry. The table is redisplayed
with the modified entry.
To delete an existing entry in the table:

1. Specify d<entry #>. For example, to delete entry # 2, specify d2.


The entry is deleted.
2. Specify q to return to the Shout Destination Tables menu.

To change the active Shout Destination table:

1. Select Option 2 from the Shout Destination Tables menu.


A list similar to the following is displayed:
Existing Shout Destination Tables
--------------------------------SYSTEM
NIGHT_SHIFT
Enter name of table to make active or q to quit
[SYSTEM]:

2. Specify the name of the table to set as the active Shout Destination
table.
The following message is displayed:
Table <table name> is now active.
Press ENTER to continue.

3. Press <Enter> to return to the Shout Destination Tables menu.

BMC Software, Inc., Confidential and Proprietary Information

2-140

CONTROL-M/Server for Unix Administrator Guide

The active Shout Destination table is changed immediately, affecting


Shout and Do Shout operations performed by CONTROL-M.
Note

To specify the active Shout Destination table via a batch job, run the
ctmshtb utility, described earlier in this chapter.
To list existing Shout Destination tables:

1. Select Option 3 from the Shout Destination Tables menu.


A list similar to the following is displayed:
Shout Destination Tables
-----------------------SYSTEM
NIGHT_SHIFT
Press ENTER to continue

2. Press <Enter> to return to the Shout Destination Tables menu.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-141

To delete an existing Shout Destination table by name:

1. Select Option 4 from the Shout Destination Tables menu.


A list of existing Shout Destination Tables is displayed.
2. Specify the name of the table to delete.
The following message is displayed:
Delete completed successfully.
Press ENTER to continue.

3. Press <Enter> to return to the Shout Destination Tables menu.


Note

It is not possible to delete the active Shout Destination table.

System Parameters

This option is used to view/modify CONTROL-M system parameters.


Note

These parameters are described in Chapter 5, Customization


Parameters.

BMC Software, Inc., Confidential and Proprietary Information

2-142

CONTROL-M/Server for Unix Administrator Guide

To view or modify CONTROL-M system parameters:


Step 1

Choose Option 2 from the Main menu.


The first group of parameters (and their current values) is displayed. See
Figure 2-7.
Figure 2-7

CONTROL-M System Parameters (Page 1)

CONTROL-M System Parameters (Page 1/2)


-------------------------------------Computer System
:sparc
Operating System
:Solaris
CONTROL-M Version
:6.0.0
Database Version/schema :6.0.0
Executable Path
:/home3/ctmssl/ctm/exe_Solaris
1) Day Time
:+0700
CONTROL-M Date
:20010219
2) Statistics
:Y
3) Maximum Retries
:50
4) Start Day of the Week
:2
Active Shout Table
:SYSTEM
5) Full Security
:N
n) Next Page
s) Save and Return to Main Menu
c) Cancel
Enter command, or item number you wish to change [n]:

When you specify n, the second page of parameters is displayed. See


Figure 2-8.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-143

Figure 2-8

CONTROL-M System Parameters (Page 2)

CONTROL-M System Parameters (Page 2/2)


-------------------------------------6)
7)
8)
9)

Maximum Days Retained by CONTROL-M Log :2


Maximum Days to Retain Sysout Files
:1
Ignore New Day Conditions
:N
Secure Socket Layer
:DISABLED

p) Previous Page
s) Save and Return to Main Menu
c) Cancel
Enter command, or item number you wish to change [p]:

Parameters that can be modified are preceded by a number.


Step 2

Modify or view parameters as follows:

To switch between the two pages of parameters, type n (next page) or


p (previous page) as required.
To modify a parameter, type the number preceding the parameter.
If the parameter has a Y/N value, typing the parameters option
number toggles the value between Y and N and redisplays the
page.
If the parameter requires any other value, you are prompted to
type the value. After you supply the value, the page is
redisplayed.

Step 3

When you want to exit:

Type s to save your changes and exit to the main menu.


Modifications are not saved until you perform this action.
Type c to cancel all changes and exit to the main menu.

BMC Software, Inc., Confidential and Proprietary Information

2-144

CONTROL-M/Server for Unix Administrator Guide

ctmudchk
ctmudchk checks whether all the jobs which should have been ordered by
a User Daily job are in the Active Jobs file. This utility facilitates
recovery from the interruption of a User Daily job.
When using the ctmudchk utility, the New Day procedure must not be
running (that is, the status of the data center in the Communication Status
window of ENTERPRISE/CS must not be Formatting AJF).
Use the following command to invoke the ctmudchk utility:
ctmudchk -DAILY <User Daily name> -ACTION {LIST|ORDER}
-FILE <File Name>

The parameters of this command are described in Table 2-55.


Table 2-55

ctmudchk Parameters

Parameter

Description

-DAILY

Name of the User Daily to be checked.

-ACTION

Indicates whether jobs that are missing from the


Active Jobs file should be listed or ordered.
The following values can be specified for this
parameter:

-FILE

LIST

Lists the job name and the name of


the scheduling table for each
missing job.

ORDER

Orders the missing jobs.

Indicates the path name for the output of the


ctmudchk utility. This parameter is required only if
LIST is specified for the ACTION parameter.

Example 1

Use the following command to check the Active Jobs file for jobs which
are ordered by the User Daily whose name is payroll. The Job Name and
Scheduling table are listed for each job that is not in the Active Jobs file.
ctmudchk -DAILY payroll -ACTION LIST
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-145

Example 2

Use the following command to check the Active Jobs file for jobs which
are ordered by the User Daily whose name is admin1. The utility orders
each job that is not in the Active Jobs file.
ctmudchk -DAILY admin1 -ACTION ORDER
Return Codes

The utility returns status code 1 (NOTOK) if it attempts to order a job,


but fails to do so. Otherwise, the utility returns status code 0 (OK).

BMC Software, Inc., Confidential and Proprietary Information

2-146

CONTROL-M/Server for Unix Administrator Guide

ctmudlst
The ctmudlst utility is used to display or modify UDLAST (the User
Daily last run date). See Date Control Record (UDLAST) on page 121, for more information.
When using the ctmudlst utility, the New Day procedure must not be
running (that is, the status of the data center in the Communication Status
window of ENTERPRISE/CS must not be Formatting AJF).
To invoke the ctmudlst utility, specify one of the following commands:
ctmudlst LIST <User Daily>
ctmudlst LIST ""
ctmudlst UPDATE <User Daily> <Date>

The parameters of these commands are described in Table 2-56.


Table 2-56

ctmudlst Parameters

Parameter

Description

LIST

Lists the User Daily last run date.

UPDATE

Updates the User Daily last run date.

<User Daily>

User Daily name.

Asterisk enclosed in quotation marks. Displays a list of all


User Daily names and corresponding last run dates.

<Date>

Requested value for the last running date in yyyymmdd


format.

Example 1

The following command lists the last run date for User Daily payroll:
ctmudlst LIST payroll

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-147

Example 2

The following command changes the last run date for User Daily
inventory to Aug. 10, 1998:
ctmudlst UPDATE inventory 19980810

BMC Software, Inc., Confidential and Proprietary Information

2-148

CONTROL-M/Server for Unix Administrator Guide

ctmudly
ctmudly orders jobs for a specific User Daily name.
The utility orders all Scheduling tables associated with a specific User
Daily name. Each job in the ordered Scheduling tables whose Scheduling
criteria are satisfied is placed in the Active Jobs file.
See User Daily Jobs on page 1-18, for more information and examples.
To invoke the ctmudly utility, specify the command:
ctmudly <User Daily>

where <User Daily> is a User Daily name associated with one or more
Scheduling tables. This parameter is case-sensitive.
Example

The following command orders all Scheduling tables whose User Daily
parameter is prod:
ctmudly prod

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-149

ctmvar
The ctmvar utility defines, deletes, modifies and displays AutoEdit
variables. This utility can be applied to variables that are:

In a specific job processing definition in a Group Scheduling table


Common to all jobs in a Group Scheduling table
Global for an entire data center (a CONTROL-M/Server and all
associated agents)

Special notes:

If a group scheduling table specified in the ctmvar utility has been


ordered more than once, the utility updates every instance of that
group scheduling table in the Active Jobs file.

AutoEdit variables in jobs that are not part of a group scheduling


table cannot be modified using the ctmvar utility.

A value specified for a Global AutoEdit variable is overridden if a


local variable with the same name is defined in a job processing
definition or for a group scheduling table.

Syntax

To invoke the ctmvar utility, specify the following command:


\
ctmvar -action <LOAD|SET|DELETE|LIST>
[-var %%[\<gptble>[\<jobname>]]\<varname>]\
[-varexpr <variable expression>]
\
[-filename <filename>]
\
[-quiet]
\
[-debug <level>]

BMC Software, Inc., Confidential and Proprietary Information

2-150

CONTROL-M/Server for Unix Administrator Guide

Table 2-57

ctmvar Parameters (Part 1 of 3)

Parameter

Description

-action

Indicates the action to be performed on the specified AutoEdit


variable. The possible actions are:
LOAD

Loads AutoEdit variables from a file. When this


option is used, parameter -filename is required.
The format for each variable in the specified file is:
%%[\<gptble>[\<job>]]\<varname>=<expression>
If the variable does not exist in the data center or
the specified group scheduling table or job, it is
created.
If the variable already exists, it is updated with
the specified value.

SET

Defines a new AutoEdit variable. When this option


is used, parameters -var and -varexpr are
required.
If the variable does not exist in the data center or
the specified group scheduling table or job, it is
created.
If the variable already exists, it is updated with
the specified value.

DELETE

Deletes an AutoEdit variable. When this option is


used, the -var parameter is mandatory.

LIST

Displays all Global AutoEdit variables for the data


center or all variables for the specified group
scheduling table specified in the -var parameter.
Example 1:
ctmvar -action LIST
Displays all Global AutoEdit variables for the data
center.
Example 2:
ctmvar -action LIST -var %%\PAYROLL
Displays all AutoEdit variables that are global for
the PAYROLL group scheduling table.
Variable values can also be displayed using the
ctmstvar utility. However, the ctmstvar utility
resolves the current value of only a specified
AutoEdit variable or function. The ctmvar utility
displays all AutoEdit variables in the data center or
the specified group scheduling table.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-151

Table 2-57

ctmvar Parameters (Part 2 of 3)

Parameter

Description

-var

Name and location of the AutoEdit variable that the specified


action should be applied to.
The valid format for this parameter depends on the type of
variable being handled.
For a variable that is global for an entire data center, valid
format is:
-var %%\<var_name>
For a variable that is global for all jobs in a Group
Scheduling table, valid format is:
-var %%\<group_table_name>\<var_name>
For variable in a specific job in a group scheduling table,
valid format is:
-var %%\<group_table_name>\<jobname>\<var_name>

Notes:
This parameter cannot be specified together with -action
LOAD.
For more information about AutoEdit variables, see the
AutoEdit chapter in the Enterprise Controlstation User Guide.
-varexpr

Value to be assigned to the specified AutoEdit variable. The


specified value can be:
a string (embedded in quotes)
an integer (a numeric value)
an AutoEdit expression (for example, with an AutoEdit
function)
another (existing) global variable.
This parameter cannot be specified together with
-action LOAD.
For more information, see the AutoEdit chapter in the
Enterprise Controlstation User Guide.

-filename

File containing the list of AutoEdit variables. The value


specified for this parameter must be a valid path and filename.
This parameter is only valid when specified together with action LOAD.
The syntax for each line in the specified file is
%%[\<gptble>[\<job>]]\<varname>=<expression>
Note: The entire pathname must be specified in this
parameter.

BMC Software, Inc., Confidential and Proprietary Information

2-152

CONTROL-M/Server for Unix Administrator Guide

Table 2-57

ctmvar Parameters (Part 3 of 3)

Parameter

Description

-quiet

Suppresses the display of the results.

-debug

Sets a debug level for the utility. This parameter is used for
maintenance and troubleshooting purposes. The level, a
numeric value from 0 to 5, must be used only if requested and
specified by Technical Support.
Note: Performance is somewhat slower and requires a larger
number of resources when operating in debug mode. It is
recommended that you activate debug mode only when
absolutely necessary and revert to normal mode as soon as
possible.

Examples

The following command assigns the value UP to AutoEdit variable


%%CTMSTATUS:
ctmvar -action set -var %%\CTMSTATUS -varexpr UP

The following command assigns the value 31 to AutoEdit variable


%%MONTHDAYS in the group scheduling table called PAYROLL:
ctmvar -action set -var %%\PAYROLL\MONTHDAYS
-varexpr 31

The following command assigns the current value of system variable


%%TIME to AutoEdit variable %%AAA:
ctmvar -action set -var %%\AAA -varexpr %%TIME

The format AutoEdit variable %%@varname indicates that the variable


should contain a value to be resolved by each job that uses it. In the
following example, the command assigns the value %%@TIME to
AutoEdit variable %%AAA:
ctmvar -action set -var %%\AAA -varexpr %%@TIME

For more information about AutoEdit variables that resolve at definition


or reference time, see the AutoEdit Facility chapter in the Enterprise
Controlstation User Guide.
BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-153

ctmwhy
ctmwhy displays a report stating why a job waiting in the Active Jobs
file is not being submitted for execution. This utility is equivalent to the
Why option available from the Job Node menu in the Enterprise
Controlstation window.
To invoke the ctmwhy utility, specify the command:
ctmwhy <Order ID>

where <Order ID> is the Order ID of a job waiting in the Active Jobs
file (as displayed in the Job Details window of ENTERPRISE/CS).
Note

The Order ID as displayed in the Job Details window is a base 36


number. If you wish to specify the Order ID here as a base 10 number,
precede the number with an asterisk, and enclose it in quotation marks
(for example, 1234).
Example 1

Specify the following command to determine why the job with Order ID
A4X is not being submitted for execution:
ctmwhy A4X

A typical response might be QR: TAPE4 : needed 2. None reserved,


which indicates that the job is not being submitted because it requires
two of the Quantitative resource TAPE4, and none is available.
Example 2

Specify the following command to determine why the job with Order
ID 11 is not being submitted for execution. The Order ID in this example
is expressed as a base 10 number:
ctmwhy "37"

BMC Software, Inc., Confidential and Proprietary Information

2-154

CONTROL-M/Server for Unix Administrator Guide

ctm2snmp
The ctm2snmp utility enables the user to send messages to various
Network Management applications (for example, HP-OpenView,
NetView for AIX, and Tivoli Management Environment Console) via
SNMP traps. See the SNMP Interface appendix in the Enterprise
Controlstation Administrator Guide for a description of SNMP traps.
SNMP traps issued via CONTROL-M consist of the fields described in
Table 2-58.
Table 2-58

Fields of SNMP Traps

Field

Description

SEVERITY

Severity of the alert. Possible values are:


R Regular
U Urgent
V Very urgent

SEND TIME

Time/date that the alert was issued (format


yyyymmddhhmmss).

USER NAME

Name of the CONTROL-M user who invoked the


utility.

MSG TEXT

Full text of the alert.

To invoke the ctm2snmp utility, specify the following command:


ctm2snmp -hostname <host_name> -severity <severity> -message <message>

Table 2-59

ctm2snmp Parameters

Parameter

Description

-host_name

Host name or IP address of the machine containing the


Network Management application.

-severity

Severity of the alert (R, U, V)

-message

Message to be sent.

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-155

Special customization is required to support SNMP traps issued by


CONTROL-M:

SNMP traps can be issued in either Single Variable format or


Multiple Variable format. The format is determined by the
CTM_SNMP_SEND_FORMAT parameter specified in the
~controlm/ctm/config.dat file. The default is Single Variable (S)
format. For more information, see Configuration Parameters on
page 5-22.
Single Variable Format
The trap is contained in one SNMP variable. This variable is a
string consisting of four trap fields separated by blanks. There
are three specific traps:
A. Specific-trap 1: Regular CONTROL-M alerts.
B. Specific-trap 2: Urgent CONTROL-M alerts.
C. Specific-trap 3: Very urgent CONTROL-M alerts.
Multiple Variable Format
The trap consists of 4 distinct SNMP variables. There is one
specific trap type:
A. Specific-trap 10: CONTROL-M alerts.

The following entry must be added to the /etc/services/ file (if not
already present):
snmp-trap 162/udp # snmp monitor trap port

The Network Management applications, HP-OpenView, NetView for


AIX, and Tivoli Management Environment Console, must be
customized so that they recognize the Enterprise ID of
CONTROL-M and the generated trap codes. Follow the procedure
for each application described in the SNMP Interface appendix in
the Enterprise Controlstation Administrator Guide.
Use CTMS_4D and 1.3.6.1.4.1.954.6 for the CONTROL-M
Enterprise name and MID. Edit all the described file entries
replacing ECS with CTMS.

BMC Software, Inc., Confidential and Proprietary Information

2-156

CONTROL-M/Server for Unix Administrator Guide

ecactltb
ecactltb displays a list of Control resources and the status of each
resource.
To invoke the ecactltb utility, specify the following command:
ecactltb [<Output>]

<Output> is the full path name to which the report should be sent
(optional). If this parameter is not specified, the output is routed to the
default output device.
Example

The following command generates a list of Control resources in the file


rprt.txt.
ecactltb /ctm/user1/rprt.txt

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-157

ecaqrtab
ecaqrtab performs operations on the Quantitative Resources table. These
operations include:

Listing Quantitative resources.


Adding/deleting a Quantitative resource.
Manually altering availability of a Quantitative resource.
Note

If the resource name is longer than 20 characters, the resource is not


created.
Use the following command to invoke the ecaqrtab utility:
ecaqrtab {LIST|ADD|DELETE|UPDATE}[<QR_Name>][<Max>][<Output>]

Table 2-60 describes the parameters for this utility.


Table 2-60

ecaqrtab Parameters

Parameter

Description

LIST

Displays the status of the specified Quantitative resources.


This information is also available from ENTERPRISE/CS in
the Quantitative Resources window.

ADD

Defines a new Quantitative resource and sets the maximum


availability for the resource.

DELETE

Deletes an existing Quantitative resource.

UPDATE

Changes the maximum availability for an existing Quantitative


resource.

<QR_Name>

Name of the Quantitative resource.


For the LIST option, the QR_Name can include mask
character to indicate any number of characters (including no
characters). If a mask character is specified, the name must
be enclosed in quotation marks (for example, LVL). You
can specify by itself to include all existing Quantitative
resources (default).

BMC Software, Inc., Confidential and Proprietary Information

2-158

CONTROL-M/Server for Unix Administrator Guide

Table 2-60

ecaqrtab Parameters

Parameter

Description

<Max>

Specifies the maximum availability for the specified resource.


This parameter should only be specified with the ADD and
UPDATE options

<Output>

This parameter can only be specified for the LIST option. It


indicates the full path name to which the report should be
sent (optional). If this parameter is not specified, the output is
routed to the default output device.

To list Quantitative resources:

Specify the following command:


ecaqrtab LIST[<QR_Name>][<Output>]

Table 2-61 describes the fields that are displayed for each Quantitative
resource that matches the specified resource name or mask.
Table 2-61

ecaqrtab Resource Status Fields

Parameter

Description

QR name

Quantitative resource name (with @<Node ID> where


applicable).

Type

For future use.

Max Avail

Maximum number of units of this resource in the platform.

Reserved

Number of units of the resource reserved for critical-path jobs.

Used

Number of units of the resource currently in use or reserved. If


the ctmloadset utility is used in the data center, this number
can include usage of the resource by non-CONTROL-M jobs.

Free

Number of units of the resource currently available for use.


This represents the difference between Max Avail and Used.

Example

The following command lists the current status of all Quantitative


resources contained in the Quantitative Resource table:

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-159

ecaqrtab LIST * or ecaqrtab LIST

A report similar to the following is displayed:


+--------------------------------------------------------------+
Resource Name Type Max-Avail Reserved Used Free
+--------------------------------------------------------------+
CPU@linda L 10 0 10 0
CPU@linda L 20 0 15 5
MEM@diana L 10 0 0 10
Tape2 L 12 2 2 10

To add a Quantitative resource:

Specify the following command:


ecaqrtab ADD <QR name> <Max>
Example

The following command specifies that the new Quantitative resource


tape2 is to be added to the Quantitative Resource table, with a maximum
availability of 12 units:
ecaqrtab ADD tape2 12
To delete a Quantitative resource:

Specify the following command:

ecaqrtab DELETE <QR name>


Example

The following command specifies that the Quantitative resource tape3 is


to be deleted from the table:
ecaqrtab DELETE tape3
To alter the availability of a Quantitative resource:

Specify the following command:


ecaqrtab UPDATE <QR name> <Max>
BMC Software, Inc., Confidential and Proprietary Information

2-160

CONTROL-M/Server for Unix Administrator Guide

Example

The following command specifies that the new maximum availability for
the existing Quantitative resource linerje2 on platform diana is 12 units:
ecaqrtab UPDATE linerje2@diana 12

BMC Software, Inc., Confidential and Proprietary Information

Utilities

2-161

BMC Software, Inc., Confidential and Proprietary Information

2-162

CONTROL-M/Server for Unix Administrator Guide

Security

3
CONTROL-M includes security features that protect CONTROL-M
against unauthorized usage or modification. These features enhance the
standard Unix security, and provide an additional application-level
security layer.
Using CONTROL-M security, you can specify actions that each
ENTERPRISE/CS user or CONTROL-M user is authorized to perform.
These authorizations used to perform security checks each time one of
the following actions is attempted:

Accessing a Scheduling table (to add, delete, or modify a job


definition).

Ordering a job.

Selecting and submitting a job.

Commands affecting jobs in the Active Jobs file (for example, Hold,
Confirm, Rerun).

Maintenance of CONTROL-M entities (for example, calendars,


prerequisite conditions).

Security verifications for the above actions are implemented according to


the specifications in a database of authorizations. This database can be
modified by the security officer or systems manager to meet the needs of
the enterprise. For more information, see Security Maintenance Utility
(Interactive Mode) on page 3-11.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-1

Level of Application Security


CONTROL-M provides the following levels of application security for
users not explicitly defined in the CONTROL-M security database:
Table 3-1

Security Levels

Security Level

Description

Restricted

A user not defined in the CONTROL-M security database


is regarded as having no authorizations and cannot
perform any function requiring security authorization.

Unrestricted

A user not defined in the CONTROL-M security database


is regarded as having all CONTROL-M application
authorizations.

Regardless of which level is implemented:

A user, for whom one or more authorizations have been assigned in


the security database, can only perform those actions for which the
user has authorization.

The owner of each job processing definition must be defined as a


user on the Agent platform. Otherwise, CONTROL-M will not order
or execute the job.

The security level is determined by the value of the CONTROL-M


system parameter Full Security (described in Chapter 5, Customization
Parameters).

BMC Software, Inc., Confidential and Proprietary Information

3-2

CONTROL-M/Server for Unix Administrator Guide

CONTROL-M Security Concepts


Overview
Every time a user or a job attempts to perform an action that requires
access to or updates any component of the CONTROL-M database,
CONTROL-M verifies that the user or job is authorized to perform the
attempted action. Tables that list authorizations are contained in a portion
of the CONTROL-M database referred to as the Security database. The
Security database is maintained using the Security Maintenance utility.
See Security Maintenance Utility (Interactive Mode) on page 3-11.
Authorizations in the CONTROL-M Security database are divided into
the following areas:

Scheduling Table Authorization


User actions performed on specific Scheduling tables.

Active Jobs File Authorization


User actions performed on jobs in the Active Jobs file.

Entities Authorization
User actions performed on various CONTROL-M entities (for
example, prerequisite conditions).

Each security check relates to one of the following:

Whether or not the current ENTERPRISE/CS user is authorized to


perform the action that he/she is attempting to perform.

Whether or not the owner of an executing job is authorized to order


or force additional jobs belonging to the same or different owners.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-3

Scheduling Table Authorization


Scheduling Table Authorization determines a users authorization to
perform actions on an entire Scheduling table. The actions are controlled
by this authorization are described in Table 3-2.
Table 3-2

Scheduling Table Authorization

Action

Description

Delete

Deletes an entire Scheduling table or a job contained in the


table.

Read

Downloads a Scheduling table from the Server platform to the


ENTERPRISE/CS workstation.

Update

Uploads a Scheduling table from the ENTERPRISE/CS


workstation to the Server platform.

OrderTable

Orders or forces an entire Scheduling table or a job in the


table. For more information about when this authorization is
checked, see Ordering a Scheduling Table below.

Delete

Deletes an entire Scheduling table or a job contained in the


table.

Ordering a Scheduling Table

Authorization for an OrderTable action for a Scheduling table is


checked in the following situations:

When a user of ENTERPRISE/CS attempts to order or force a


Scheduling table or a job in the table, CONTROL-M checks the
users authorization for the action.

When a job executing under CONTROL-M attempts to perform a Do


Forcejob action on a Scheduling table or a job in the table,
CONTROL-M checks the authorization of the jobs Owner.

When the Scheduling table is ordered by a User Daily job,


CONTROL-M checks the authorization of the User Daily jobs
Owner.

BMC Software, Inc., Confidential and Proprietary Information

3-4

CONTROL-M/Server for Unix Administrator Guide

When a Scheduling table is ordered by the New Day procedure,


CONTROL-M checks the authorization of the CONTROL-M
account owner.
Note

In addition to the security checks described above, CONTROL-M checks


authorization for each job in the Scheduling table, as described in
Active Jobs File Authorization below.

Active Jobs File Authorization


Active Jobs File Authorization determine a users authorization to
perform actions that affect jobs in the Active Jobs file, or that place jobs
in the Active Jobs file. Authorizations are assigned to a user for jobs
belonging to specific owners. (For example, user Robert is or is not
authorized to order a job whose owner is Michelle). For each
ENTERPRISE/CS user, the security facility enables you to specify what
action the user is authorized to perform on jobs owned by other users.
Note

CONTROL-M requires that a user be assigned authorization to perform


actions even if that user is specified in the jobs Owner parameter.
The actions that can be controlled are described in Table 3-3.
Table 3-3

Active Jobs File Authorization (Part 1 of 2)

Action

Authorization

Order

Order a job.

Force

Force a job.

Rerun

Select the Rerun option from the job Details menu.

Hold

Select the Hold/Free option from the job Details menu.

Confirm

Select the Confirm option from the job Details menu.

Delete

Select the Delete option from the job Details menu.

Why

Select the Why option from the job Details menu.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-5

Table 3-3

Active Jobs File Authorization (Part 2 of 2)

Action

Authorization

Sysout

Select the Sysout option from the job Details menu.

Log

Select the Log option from the job Details menu.

Statistics

Select the Statistics option from the job Details menu.

Zoom & Save

Select the Zoom & Save option from the job Details menu.

Terminate Job

Select the Kill job option from the job Details menu.

Authorization for the Order action is checked in the following


situations:

When a user of ENTERPRISE/CS attempts to order a job from the


Job List window, CONTROL-M checks the authorization of the user
with regard to the jobs owner.

When a job is ordered or forced (regardless of how), CONTROL-M


checks the authorization of the jobs author with regard to the jobs
owner.

Authorization for the Force action is checked in the following situations:

When a user of ENTERPRISE/CS attempts to force a job from the


Job List window, CONTROL-M checks the authorization of the user
with regard to the jobs owner.

When a job executing under CONTROL-M attempts to perform a Do


Forcejob action on an entire table or on a job, CONTROL-M checks
the authorization of the jobs Owner with regard to the owner of
each job contained in the Scheduling table or each job.
Note

When performing Order or Force actions on an entire table,


CONTROL-M checks Scheduling table authorizations, as described in
Scheduling Table Authorization on page 3-21, in addition to the
security checks described above.

BMC Software, Inc., Confidential and Proprietary Information

3-6

CONTROL-M/Server for Unix Administrator Guide

The ctmordck utility can be used to generate a report that indicates


whether or not the CONTROL-M security mechanism will allow jobs
associated with a given User Daily name to run with the authorizations
currently assigned to the owner of the User Daily job. See Chapter 2,
Utilities, for more information.
For the other actions listed above (Rerun, Hold, Confirm, Delete, Why,
Sysout, Log, Statistics, Zoom-and-Save, Kill job), CONTROL-M
checks that the ENTERPRISE/CS user performing the action is
authorized to perform the specific action with regard to the jobs owner.

Entities Authorization
Entities Authorization determines a users authorization to perform
actions on certain CONTROL-M entities. These entities are accessed
either directly from the ENTERPRISE/CS workstation or via utilities on
CONTROL-M Server or Agent platforms. Table 3-4 describes the
entities that are controlled by these authorizations.
Table 3-4

Entities Authorization

Entity

Authorization

Access

Condition

CONTROL-M prerequisite conditions,


(including global conditions)

ENTERPRISE/CS
ctmcontb

Control

Control resources

ENTERPRISE/CS

Resource

Quantitative resources

ENTERPRISE/CS
ecaqrtab

Calendar

Calendars used when specifying job


processing parameters

ENTERPRISE/CS

Log

CONTROL-M log

ctmlog

For each of the above entities, a user can be assigned authorization to


perform Add, Delete, and Change actions. No special authorization is
required to view any of these entities.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-7

Passing Global Conditions Between Data Centers

When a global condition is added or deleted in one data center,


ENTERPRISE/CS also performs that action in other data centers. In each
of these other data centers, the addition or deletion of the global
condition is attributed to a special user named GCSERV.
When the CONTROL-M security mechanism is implemented in a data
center to which actions on global conditions will be passed, user
GCSERV must be defined in the CONTROL-M security facility at that
data center. User GCSERV should be assigned authorization to add and
delete prerequisite conditions.

Agent Platform Security Checks


In addition to the security checks detailed above, CONTROL-M utilizes
checks provided by the Agent platform operating system to further
enhance data center security. These security checks are applied regardless
of the security mode (restricted or unrestricted) implemented in the data
center.
Agent platform operating system authorization is verified by
CONTROL-M in the following instances:

Before a job is selected or submitted, the operating system security


mechanism on the relevant Agent platform is called to verify that the
jobs Owner is authorized to execute the job script file. Actions not
authorized by the operating system are rejected.
Note

The owner of each job processing definition must be defined as a user on


the Agent platform. Otherwise, CONTROL-M will not order or execute
the job.

When an ENTERPRISE/CS user attempts to perform the Edit JCL/


Script action, CONTROL-M/Agent verifies that the user is defined
on the Agent platform and that the user has write permission to
update the relevant files.
BMC Software, Inc., Confidential and Proprietary Information

3-8

CONTROL-M/Server for Unix Administrator Guide

Summary of Authorizations
The following tables summarize the authorizations required to perform
various actions under CONTROL-M.
Table 3-5

Authorization job submission from a User Daily job

Who

Authorization

User Daily jobs owner

Scheduling Table authorization: OrderTable for


the Scheduling table containing the jobs.

Owner of each job ordered


by the User Daily job

Agent platform operating system authorization


to execute the job script file.

Author of each job ordered

Active Jobs File authorization: Order for the


owner of the job.

Table 3-6

Authorization job submission from the New Day procedure

Who

Authorization

CONTROL-M account
owner

Scheduling Table authorization: OrderTable for


the Scheduling table containing the jobs.

Owner of each job ordered


by the User Daily job

Agent platform operating system authorization


to execute the job script file.

Author of each job ordered

Active Jobs File authorization: Order for the


owner of the job.

Table 3-7

Authorization Order/Force a Scheduling Table from


ENTERPRISE/CS

Who

Authorization

ENTERPRISE/CS user

Scheduling Table authorization: OrderTable for


the Scheduling table containing the jobs.

Owner of each job ordered


or forced

Agent platform operating system authorization


to execute the job script file.

Author of each job ordered


or forced

Active Jobs File authorization to order/force:


Order/Force for the owner of the job.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-9

Table 3-8

Authorization Ordering/Forcing a job from ENTERPRISE/CS

Who

Authorization

ENTERPRISE/CS user

Scheduling Table authorization: OrderTable for


the Scheduling table containing the job.
Active Jobs File authorization to order/force a
job: Order/Force for the owner of the job.
Agent platform operating system authorization
to execute the job script file.

Owner of each job ordered


or forced

Agent platform operating system authorization


to execute the job script file.

Author of each job ordered


or forced

Active Jobs File authorization: Order for the


owner of the job.

Table 3-9

Authorization Do Forcejob

Who

Authorization

Owner of the job performing


the Do Forcejob action

Scheduling Table authorization: OrderTable for


Scheduling table containing the job(s) to be
forced.
Active Jobs File authorization: Force for the
owner of the job(s) being forced.

Owner of each job forced

Agent platform operating system authorization


to execute the job script file.

Author of each job forced

Active Jobs File authorization: Order for the


owner of the job.

Table 3-10

Authorization Actions on a Job in the Active network

Who

Action

Authorization

ENTERPRISE/CS
user

All actions

A user on the Agent


platform.

Rerun, Hold, Confirm,


Delete, Why, Sysout,
Log, Statistics, Kill Job,
Zoom-and-Save

Separate Active Jobs File


authorization for each
specified action.

Edit JCL/Script

Operating system write


permission for the script files
on the Agent platform.

BMC Software, Inc., Confidential and Proprietary Information

3-10

CONTROL-M/Server for Unix Administrator Guide

Security Maintenance Utility (Interactive Mode)


The ctmsec CONTROL-M Security Maintenance utility defines users in
the CONTROL-M Security database, assigns authorization types for
various action relevant to working with CONTROL-M using an
ENTERPRISE/CS workstation. The ctmsec utility is run on the Server
platform.
Note

Modifications to authorizations by this utility are implemented only after


the utility is exited.
Users can also be defined as part of a group. Authorizations can be
specified for a specific user, for a group, or for both. See User
Authorization on page 3-32.
When assigning a user to a group, the following rules apply:

If there are no authorizations defined for the specific user, the user
inherits the authorizations specified for the group.

If there are authorizations defined for a specific user, these


authorizations take precedence.

When defining an authorization for a user (for example, Scheduling


Table), use of the (D)efault setting enables the specific authorization
(for example, Read) defined for the group.

If all authorizations for a specific CONTROL-M element (for


example, Scheduling Table) for a user are defined with a (D)efault
setting, it is more efficient to delete the authorizations for that
element for the user.

Authorizations not specifically defined for a group or for a user not


belonging to a group revert to the Full Security parameter setting.
See System Parameters on page 5-3.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-11

Certain functions of the ctmsec utility can be activated in batch mode


from the command line. For more information, see Security
Maintenance Utility (Batch Mode) on page 3-32.
Note

When working with CONTROL-M via the ENTERPRISE/CS


workstation, mask characters are available for all options. Mask
characters * and $ that are used when assigning authorizations in the
CONTROL-M Security database, are translated as mask characters
during runtime security checking. (For example, if User1 is granted full
Scheduling Table authorization for table ACC*, CONTROL-M allows
User1 to update and/or order any table whose name starts with ACC).
Valid mask characters are:
* represents any number of characters (including no characters).
$ represents a single character.
Mask character authorizations do not override full name authorizations.
(For example, if User1 from the example above is also defined to have
only Read privileges for ACC999, CONTROL-M will not allow User1
to update and/or order table ACC999).
To invoke the CONTROL-M Security Maintenance utility, log on to the
Server platform as the CONTROL-M/Server owner (for example, user
controlm) and specify the command:

ctmsec
-or-

Select Security Authorization => Security Maintenance Utility


from the CONTROL-M Main Menu. See CONTROL-M Main
Menu on page 4-6.

The CONTROL-M Security Maintenance Utility Main menu is


displayed.

BMC Software, Inc., Confidential and Proprietary Information

3-12

CONTROL-M/Server for Unix Administrator Guide

Figure 3-1

Security Maintenance Menu

+-----------------------------------------------+
|
CONTROL-M SECURITY MAINTENANCE UTILITY
|
|
Main Menu
|
+-----------------------------------------------+

1)
2)
3)
4)
5)
q)

User Maintenance
Group Maintenance
Scheduling Table Authorization
Active Jobs File Authorization
Entities Authorization
Quit

Enter option:

Each of the options appearing in the Main menu is described below.

User Maintenance
The User Maintenance option of the ctmsec utility is used to add,
delete, or modify specific users in the CONTROL-M Security database.
Note

Each ENTERPRISE/CS user who performs actions affecting the


CONTROL-M database or jobs in the Active Jobs file must be defined in
the CONTROL-M Security database when full security is on. In addition,
all other users who invoke CONTROL-M Security utilities must be
defined in the Security database and assigned appropriate privileges.
Select Option 1 from the Security Maintenance Main menu. The User
Maintenance menu is displayed.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-13

Figure 3-2

User Maintenance Menu

User Maintenance Menu


1) List Users
2) Add User
3) Delete User
4) Modify User Information
5) Copy User
q) Quit
Enter option:

To list existing users in the CONTROL-M Security database:

Select Option 1 from the User Maintenance menu.


A list similar to the following is displayed:
Name
GCSERV
User1

Description
For passing Global conds.

Group
Group1
Group2

Press ENTER to continue:

Press <Enter> to return to the User Maintenance menu.


To add a new user to the CONTROL-M Security database:

1. Select Option 2 from the User Maintenance menu.


A prompt similar to the following is displayed:
User []:

2. Specify the user name of the ENTERPRISE/CS user (maximum 30


characters, case-sensitive).

BMC Software, Inc., Confidential and Proprietary Information

3-14

CONTROL-M/Server for Unix Administrator Guide

A prompt similar to the following is displayed:


User User2 is not defined in the CONTROL-M
Security database.
Add this user now [Y/N]?

3. Enter Y to add the new user.


The following prompts are displayed:
Description []:
Group []:

4. Specify a value for Description (maximum length: 50 characters) or


press <Enter>.
This field is optional and is for documentation purposes only.
5. Specify a value for Group (maximum length: 32 characters) or press
<Enter>.
This field is optional. If specified, the user inherits all authorizations
defined for the group that are not specifically defined for the user.
6. Press <Enter> to return to the User Maintenance menu.
To delete an existing user from the CONTROL-M Security database:

1. Select Option 3 from the User Maintenance menu.


A prompt similar to the following is displayed:
User [User1]:

2. Specify the user name of the ENTERPRISE/CS user to delete. After


confirmation, the user is deleted from the Security database, and the
User Maintenance menu is displayed.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-15

To modify the Description or Group fields for an existing user:

1. Select Option 4 from the User Maintenance menu.


A prompt similar to the following is displayed:
User/Group [User1]:

2. Specify the user name of the ENTERPRISE/CS user to modify.


A user definition similar to the following is displayed:
User: User1
----------------------Modify User Information
1) Description :
2) Group
:
s) Save and return to menu
c) Cancel and return to menu
Enter command, or specify item number to modify:

3. To modify a field, type the number preceding the field.


You are prompted to supply a value for the field.

Maximum length for Description is 50 characters. The


Description field is for documentation purposes only

Maximum length for Group is 32 characters.

4. Type s to save your changes and return to the previous menu.


Modifications are not saved until you perform this action.
-orType c to cancel all changes and return to the previous menu.

BMC Software, Inc., Confidential and Proprietary Information

3-16

CONTROL-M/Server for Unix Administrator Guide

To copy an existing user:

1. Select Option 5 from the User Maintenance menu.


The following prompt is displayed:
FROM user:

2. Specify the exact name of the user to be copied.


The following prompt is displayed:
TO user:

3. Specify a new user name for the ENTERPRISE/CS user (maximum


30 characters, case-sensitive).
A prompt similar to the following is displayed:
User User2 is not defined in the CONTROL-M
Security database.
Add this user now [Y/N]?

4. Enter Y to add the new user. The following prompt is displayed:


Description []:

5. Specify a value for Description (maximum length 50 characters).


This field is optional and is for documentation purposes only.
The following prompt is displayed:
Group []:

6. Specify a value for Group (maximum length 32 characters).


This field is optional. If specified, the user inherits all authorizations
defined for the group that are not specifically defined for the user.
7. Press <Enter> to return to the User Maintenance menu.
BMC Software, Inc., Confidential and Proprietary Information

Security

3-17

Group Maintenance
Each ENTERPRISE/CS user with a user account on the Server platform,
who is defined in the CONTROL-M Security database, can be defined as
part of a group. Belonging to a group is optional. All users belonging to a
group inherit the authorizations defined for the group.
Select Option 2 from the Security Maintenance Main menu to display the
Group Maintenance menu.
Figure 3-3

Group Maintenance Menu

Group Maintenance Menu


----------------------1)
List
Groups
2)
Add
Group
3)
Delete Group
4)
Modify Group Information
q)
Quit
Enter option:

To list existing groups in the CONTROL-M Security database:

1. Select Option 1 from the Group Maintenance menu.


A list similar to the following is displayed:
Group
Description
Group1 CONTROL-M Group
Group2
Press ENTER to continue:

2. Press <Enter> to return to the Group Maintenance menu.

BMC Software, Inc., Confidential and Proprietary Information

3-18

CONTROL-M/Server for Unix Administrator Guide

To add a new group to the CONTROL-M Security database:

1. Select Option 2 from the Group Maintenance menu. The


following prompt is displayed:
Groupname []:

2. Specify the Group name (maximum length 32 characters).


This name must be unique. It cannot be an existing user or group
name. The following prompt is displayed:
Description []:

3. Specify a Description (maximum length 50 characters) or press


<Enter>. The Description field is optional and is for documentation
purposes only. The group is added to the Security database, and the
Group Maintenance menu is displayed.
To delete an existing group from the CONTROL-M Security database:

1. Select Option 3 from the Group Maintenance menu. A prompt


similar to the following is displayed:
Group [Group1]:

2. Specify the name of the group to delete. After confirmation, the


group is deleted from the Security database, and the Group
Maintenance menu is displayed.
To modify the Description field for an existing group:

1. Select Option 4 from the Group Maintenance menu. A prompt


similar to the following is displayed:
Group [Group1]:

2. Specify the name of the group to modify.


A group definition similar to the following is displayed:
BMC Software, Inc., Confidential and Proprietary Information

Security

3-19

Group: Group1
Modify Group Information
----------------------1) Description :
s) Save
and return to menu
c) Cancel and return to menu
Enter command, or specify item number to modify:

3. To modify the Description field, type 1.


You are prompted to supply a value for the field (maximum length 50
characters). This field is optional and is for documentation purposes
only.
4. Type s to save your changes and return to the previous menu.
Modifications are not saved until you perform this action.
-orType c to cancel all changes and return to the previous menu.

BMC Software, Inc., Confidential and Proprietary Information

3-20

CONTROL-M/Server for Unix Administrator Guide

Scheduling Table Authorization


This option is used to assign authorizations to a user or group to perform
actions on a Scheduling table.
For more information about the types of authorization that can be granted
using this option, see Scheduling Table Authorization on page 3-4.
To maintain Scheduling Table authorizations:

1. Select Option 3 from the Main menu. A prompt similar to the


following is displayed:
+--------------------------------------+
|
SCHEDULING TABLE AUTHORIZATION
|
+--------------------------------------+
User/Group [User1]:

2. Specify the user or group for whom you are defining authorizations.
If the user or group is not defined in the CONTROL-M/Server
database, the following message is displayed:
User/Group name is not defined in the CONTROL-M
Security database.

Press ENTER to continue:


3. Press <Enter> to return to the Main menu. The Scheduling Table
Authorization menu is displayed:

BMC Software, Inc., Confidential and Proprietary Information

Security

3-21

Figure 3-4

Scheduling Table Authorization Menu

Scheduling Table Authorization Menu


----------------------------------1) List Tables
2) Create/Modify Table Authorization
3) Delete Table Authorization
q)

Quit

Enter option:

To list existing Scheduling Table authorizations for the specified user/group:

Select Option 1 from the Scheduling Table Authorization menu.


A list similar to the following is displayed:
List for user: User1
Table Delete Read Update OrderTable
Sched1
N
N
N
N
Sched2
N
Y
Y
Y
Press ENTER to continue:

Press <Enter> to return to the Scheduling Table Authorization menu.


To create or modify Scheduling Table authorizations for the specified user:

1. Select Option 2 from the Scheduling Table Authorization menu.


The following prompt is displayed:
Table Name:

2. Specify the name of a Scheduling table (maximum 20 characters,


case-sensitive). The Scheduling table does not have to exist at the
time you specify authorizations for it.

BMC Software, Inc., Confidential and Proprietary Information

3-22

CONTROL-M/Server for Unix Administrator Guide

A table definition similar to the following is displayed:


Scheduling Table Name: Sched1, User/Group: User1
Create/Modify Table Authorization
--------------------------------1) Delete
:N
2) Read
:N
3) Update
:N
4) OrderTable :N
s)
c)

Save
and return to menu
Cancel and return to menu

Enter command, or specify item number to toggle Y/


N/D:

The Y setting enables authorization for the action (for example, Read), N
disables the authorization, and (D)efault uses the authorization defined
for the users group. If the user was previously authorized for this
scheduling table, the users current authorizations are displayed;
otherwise, all authorizations are set to N.
3. To modify an authorization, type the number preceding the
authorization. Press <Enter> to toggle the authorization between N,
Y and D.
Type s to save your changes and return to the previous menu.
Modifications are not saved until you perform this action.
-orType c to cancel all changes and return to the previous menu.
To delete Scheduling Table authorizations for the specified user/group:

1. Select Option 3 from the Scheduling Table Authorization menu.


The following prompt is displayed:
Table Name:
BMC Software, Inc., Confidential and Proprietary Information

Security

3-23

2. Specify the name of the Scheduling table whose authorizations you


want to delete for this user or group (or press <Enter> to return to
the menu).
The users authorizations for this table are deleted from the Security
database, and the Scheduling Table Authorizations menu is
displayed. If the user belongs to a group, authorizations for the
Scheduling Table revert to the authorizations defined for the group.

Active Jobs File Authorization


This option is used to assign authorizations to a user or group for actions on
jobs in the Active Jobs file. The authorizations assigned are with regard to
specific job owners (the user appearing in the Owner parameter for each
job).
For more information about the types of authorization that can be granted
using this option, see Active Jobs File Authorization on page 3-5.
To maintain Active Jobs File authorizations:

1. Select Option 4 from the Main menu.


A prompt similar to the following is displayed:
+--------------------------------------+
|
ACTIVE JOBS FILE AUTHORIZATION
|
+--------------------------------------+
User/Group[]:

Specify the user or group for whom you are defining authorizations.
If the user or group is not defined in the CONTROL-M/Server
database, the following message is displayed:
User/Group name is not defined in the CONTROL-M
Security database.
Press ENTER to continue:
BMC Software, Inc., Confidential and Proprietary Information

3-24

CONTROL-M/Server for Unix Administrator Guide

2. Press <Enter> to return to the Main menu. The Active Jobs File
Authorization menu is displayed:
Figure 3-5

Active Jobs File Authorization Menu

Active Jobs File Authorization Menu


----------------------------------1) List Owner Names
2) Create/Modify AJF Authorization
3) Delete AJF Authorization
q)

Quit

Enter option:

To list owners for whom the user has Active Jobs File authorizations:

Select Option 1 from the Active Jobs File Authorization menu.


A list similar to the following is displayed:
List for user: User1
Owner Node Group Hold Force Del Rerun Log Why Statist Sysout Order Conf Z&S Kill
----- ---------- ---- ----- --- ----- --- --- ------- ------ ----- ---- --- ---Owner1

Node1

Owner2

Node2

Press ENTER to continue:

To create or modify Active Jobs File authorizations for the specified user:

1. Select Option 2 from the Active Jobs File Authorization menu.The


following prompt is displayed:
Owner:

2. Specify the name of a job owner.


BMC Software, Inc., Confidential and Proprietary Information

Security

3-25

The following prompt is displayed:


Node Group:

3. Specify the node group of the Agents where the job can be scheduled
to run (maximum 30 characters, case-sensitive).
Note

A value must be specified for the Node Group prompt. (Null is not a
valid value.) To indicate all node groups, specify an asterisk (*) for this
prompt.
A list similar to the following is displayed:
Owner: Owner1, Node Group: Node1 User/Group: User1
Create/Modify Active Jobs File Authorization
-------------------------------------------1)
2)
3)
4)
5)
6)
7)
8)
9)
10)
11)
12)
s)
c)

Order
:Y
Force
:Y
Rerun
:Y
Hold
:N
Confirm
:N
Delete
:Y
Why
:N
Sysout
:N
Log
:N
Statistics
:N
Zoom & Save
:N
Kill job
:N
Save
and return to menu
Cancel and return to menu

Enter command, or specify item number to toggle Y/N/D:

BMC Software, Inc., Confidential and Proprietary Information

3-26

CONTROL-M/Server for Unix Administrator Guide

The Y setting enables authorization for the action (for example, Read), N
disables the authorization, and (D)efault uses the authorization defined
for the users group. If the user was previous authorized for this
owner and node, the users current authorizations are displayed;
otherwise, all authorizations are set to N.
4. To modify an authorization, type the number preceding the
authorization. Press <Enter> to toggle the authorization between N,
Y and D.
5. Type s to save your changes and return to the previous menu.
-orType c to cancel all changes and return to the previous menu.
To delete Active Jobs File authorizations for the specified user:

1. Select Option 3 from the Active Jobs File Authorization menu.


The following prompt is displayed:
Owner:

2. Specify the name of the Job owner for whom authorizations should
be deleted (or press <Enter> to return to the menu).
The following prompt is displayed
Node Group:

3. Specify the name of the Node group of the Job owner for whom
authorizations should be deleted (or press <Enter> to return to the
menu).
The user authorizations for this owner on the Node group are deleted
from the Security database, and the Active Jobs File Authorization
menu is displayed.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-27

Entities Authorization
This option is used to assign authorizations to a user or group to perform
actions relating to CONTROL-M entities.
For more information about the types of authorization that can be granted
using this option, see Entities Authorization on page 3-7.
To maintain Entities authorizations:

1. Select Option 5 from the Main menu.


A prompt similar to the following is displayed:
+----------------------------------------+
|
CONTROL-M ENTITIES AUTHORIZATION
|
+----------------------------------------+
User/Group [User1]:

2. Specify the user or group for whom you are defining authorizations.

If the user or group name is not defined on the Server platform, a


message similar to the following is displayed:
User name is not defined in the CONTROL-M
Security database
Press ENTER to continue:

Press <Enter> to return to the Main menu.

If the user or group name is defined the Entities Authorizations


menu is displayed:

BMC Software, Inc., Confidential and Proprietary Information

3-28

CONTROL-M/Server for Unix Administrator Guide

Figure 3-6

Entities Authorizations Menu

Entities Authorizations Menu


---------------------------1) List Entity Categories
2) Create/Modify Entity Authorizations
3) Delete Entity Category
q)

Quit

Enter option:

To list Entity categories for which the user or group has authorizations:

1. Select Option 1 from the Entities Authorizations menu.


A list similar to the following is displayed:
List for user: User1
Category
Add Delete Change
CALENDAR
Y
N
Y
QUANTITATIVE RESOURCE Y
N
N
CONTROL RESOURCE
Y
N
N
Press ENTER to continue:

2. Press <Enter> to return to the Entities Authorizations menu.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-29

To create or modify Entity authorizations for the specified user or group:

1. Select Option 2 from the Entities Authorizations menu. The


following menu is displayed:
Categories
---------1) CALENDAR
2) LOG
3) QUANTITATIVE RESOURCE
4) CONDITION
5) CONTROL RESOURCE
q) Quit
Category number:

2. Specify the number of the category for which to create or modify


authorizations. For example, if you specify 1, a list similar to the
following is displayed:
Category: CALENDAR, User: User1
Create/Change Entity Authorizations
----------------------------------1) Add
:Y
2) Delete :N
3) Change :N
s) Save
and return to menu
c) Cancel and return to menu
Enter command, or specify item number to toggle Y/N/D:

The Y setting enables the specific authorization (for example, Read), N


disables the authorization, and (D)efault uses the authorization defined for
the group with which the user is associated. If the user was previous
authorized for this category, the users current authorizations are
displayed; otherwise, all authorizations are set to N.

BMC Software, Inc., Confidential and Proprietary Information

3-30

CONTROL-M/Server for Unix Administrator Guide

3. To modify an authorization, type the number preceding the


authorization. Press <Enter> to toggle the authorization between N,
Y and D.
4. Type s to save your changes and return to the previous menu.
Modifications are not saved until you perform this action.
-orType c to cancel all changes and return to the previous menu.
To delete Entity authorizations for the specified user or group:

1. Select Option 3 from the Entities Authorizations menu. The


following menu is displayed:
Categories
---------1) CALENDAR
2) LOG
3) QUANTITATIVE RESOURCE
4) CONDITION
5) CONTROL RESOURCE
q) Quit
Category number:

2. Specify the number of the category for which to delete authorizations


and press <Enter>.
The user or groups authorizations for this category are deleted from
the Security database and the Entities Authorizations menu is
displayed.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-31

Security Maintenance Utility (Batch Mode)


Certain ctmsec Security Maintenance utility functions can be activated in
batch mode. These functions include listing, updating, and deleting
entries in the CONTROL-M Security database. These functions are
described in Security Maintenance Utility (Interactive Mode) on page
3-11.

User Authorization
The user authorization options of the ctmsec command are used to list,
update, delete, and copy users in the CONTROL-M Security database.

Use the following command to list user authorizations:


ctmsec -USER_LIST <user>

Use the following command to update user authorizations:


ctmsec -USER_UPDATE <user> <description> <group>

Use the following command to delete user authorizations:


ctmsec -USER_DELETE <user>

Use the following command to copy user authorizations from one


user to another:
ctmsec -USER_COPY <from_user> <to_user>
Note

If the user in the commands listed above is a CONTROL-M/Agent user,


then the <user> format is <username@node_id>.

BMC Software, Inc., Confidential and Proprietary Information

3-32

CONTROL-M/Server for Unix Administrator Guide

Group Authorization
Group authorization options of the ctmsec command are used to copy,
list, modify, and delete groups in the CONTROL-M Security database.

Use the following command to list group authorizations:


ctmsec -GROUP_LIST <group>

Use the following command to update group authorizations:


ctmsec -GROUP_UPDATE <group> <description>

Use the following command to delete group authorizations:


ctmsec

-GROUP_DELETE <group>

Scheduling Table Authorization


The Scheduling table authorization options of the ctmsec command are
used to assign authorizations to users and groups to perform actions on
Scheduling tables.

Use the following command to list Scheduling table authorizations:


ctmsec -SCHED_LIST {<user>|<group>}

Use the following command to update Scheduling table


authorizations:
ctmsec -SCHED_UPDATE {<user>|<group>}
[-DELETE {Y|N|D}] [ -READ {Y|N|D}]
[ -ORDER {Y|N|D}] [ -UPDATE {Y|N|D}]

<table>

Use the following command to delete Scheduling table


authorizations:
ctmsec -SCHED_DELETE {<user>|<group>}

<table>

Note

If the user in the commands listed above is a CONTROL-M/Agent user,


then the <user> format is <username@node_id>.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-33

Active Jobs File Authorization


The Active Jobs File authorization options of the ctmsec command are
used to assign authorizations to users and groups to perform actions on
jobs in the Active Jobs file.

Use the following command to list Active Jobs File authorizations:


ctmsec -ACT_LIST {<user>|<group>}

Use the following command to update Active Jobs File


authorizations:

ctmsec -ACT_UPDATE {<user>|<group>} <owner> <node>


[-HOLD
[-FORCE
[-ORD
[-CONFIRM
[-DELETE
[-WHY
[-RERUN
[-SYSOUT
[-LOG
[-STATISTICS
[-ZOOM_AND_SAVE
[-KILL_JOB

{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]
{Y|N|D}]

Use the following command to delete Active Jobs File


authorizations:
ctmsec -ACT_DELETE {<user>|<group>} <owner>
Note

If the user in the commands listed above is a CONTROL-M/Agent user,


then the <user> format is <username@node_id>.

Entities Authorization
The entity authorization options of the ctmsec command are used to
assign authorizations to users and groups to perform actions relating to
CONTROL-M entities.

Use the following command to list entity authorizations:


ctmsec -ENTITY_LIST {<user>|<group>}

BMC Software, Inc., Confidential and Proprietary Information

3-34

CONTROL-M/Server for Unix Administrator Guide

Use the following command to update entity authorizations:


ctmsec -ENTITY_UPDATE
{<user>|<group>}
{LOG|QR|CONTROL|CALENDAR|CONDITION}
[-ADD {Y|N|D}] [-DELETE {Y|N|D}] [-CHANGE {Y|N|D}]

Use the following command to delete entity authorizations:


ctmsec -ENTITY_DELETE
{<user>|<group>}
{LOG|QR|CONTROL|CALENDAR|CONDITION}
Note

If the user in the commands listed above is a CONTROL-M/Agent user,


then the <user> format is <username@node_id>.

Exporting Security Definition Tables


The EXPORT option of the ctmsec command is used to export
CONTROL-M Security Definition tables. The file that is generated by
the ctmsec command is an executable file containing API functions that
will redefine all the security entries when the script is run. The generated
file can be modified, and imported to any CONTROL-M installation.
Note

The file created using the EXPORT option of the ctmsec utility, can be
modified before security definitions are imported either back to the same
installation, or to a different CONTROL-M installation. This is different
from the file that is created using the Backup Security Definition Tables
option of the Security Authorization Menu (which cannot be modified).
For more information about exporting CONTROL-M Security Definition
tables, see Security Authorization Menu on page 4-29.
Use the following command to export CONTROL-M Security Definition
tables:
ctmsec -EXPORT <filename>

where <filename> is the full path name of the file to be exported.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-35

Example
ctmsec -EXPORT /home/controlm/securedata

Importing Security Definition Tables


The file created using the -EXPORT option of the ctmsec utility contains
multiple ctmsec commands that describe the various security definitions
in your CONTROL-M installation. If necessary, these ctmsec commands
can be modified before the security definitions are imported either back
to the same installation, or to a different CONTROL-M installation.
To import security definitions execute the script file that was created
using the ctmsec utility.
For Example:
/home/controlm/securedata
Note

This procedure will work only with a file that was created using the
-EXPORT option of the ctmsec utility. If your input is a file created using
the Backup Security Definition Tables option of the Security
Authorization menu, then you must import using the Restore option in
that same menu. for more information, see Table 4-7, Security
Authorization Menu, on page 4-29.

BMC Software, Inc., Confidential and Proprietary Information

3-36

CONTROL-M/Server for Unix Administrator Guide

Importing Security Definitions from CONTROL-M version 2.2.5

Use the following steps to import security definitions from an installation


of CONTROL-M version 2.2.5:
1. Creating a security definitions export file: in the version 2.2.5
installation, choose the Export Security Definition Tables option
from the Security Authorization menu.
2. Importing the security definitions export file: in the version 6.0.03
installation, use the following command to import the security
definitions:
ctm_restore_aut <filename>

where <filename> is the full path name of the file created by the
option chosen in step 1.
Note

The security definitions cannot be modified before they are imported to


the version 6.0.03 installation.

BMC Software, Inc., Confidential and Proprietary Information

Security

3-37

BMC Software, Inc., Confidential and Proprietary Information

3-38

CONTROL-M/Server for Unix Administrator Guide

Maintenance

This chapter describes how to maintain the CONTROL-M installation


and database. The following topics are covered:

Starting/stopping CONTROL-M Tasks.


Periodic Maintenance.
CONTROL-M Menu System.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-1

Starting/Stopping CONTROL-M Tasks


To start CONTROL-M functions in the data center, the following tasks
must be running on the Server platform:

SQL Database Server.


CONTROL-M/Server.

The SQL Database Server must be started before CONTROL-M/Server


and must be active as long as CONTROL-M/Server is active.
Note

If CONTROL-M is implemented using an existing SQL Database Server,


starting and stopping the server is the responsibility of the database
administrator and is beyond the scope of this document.
CONTROL-M tasks can be started or stopped on the Server platform
using one of the following methods:

Automatic startup/shutdown (as part of the Server platform boot


and shutdown processes).
The installation procedure for CONTROL-M/Server includes
directions for adding startup of SQL Database Server and
CONTROL-M/Server to the boot procedure and shutdown procedure
of the Server platform. For more information see the
CONTROL-M/Server for Unix Installation Guide.

Using the CONTROL-M Menu system.


The CONTROL-M Menu system provides the necessary options for
easily starting/stopping CONTROL-M/Server and the SQL Database
Server. For more information, see CONTROL-M Manager Menu
on page 4-8.

BMC Software, Inc., Confidential and Proprietary Information

4-2

CONTROL-M/Server for Unix Administrator Guide

Using supplied scripts.


CONTROL-M is supplied with scripts for starting up and shutting
down CONTROL-M/Server and the SQL Database Server. You can
invoke these scripts directly (as described below) or incorporate
them into your own scripts.
To start up the SQL Database Server and CONTROL-M/Server
manually:
1. Log in as the CONTROL-M/Server account owner.
2. For the SQL server, specify the command: startdb
3. For CONTROL-M/Server, specify the command: start-ctm
To shut down CONTROL-M/Server and the SQL Database
Server manually:
1. Log in as the CONTROL-M/Server account owner.
2. For CONTROL-M/Server, specify the command: shut-ctm
3. For the SQL database server, specify the command: shutdb

Periodic Maintenance
The following procedures should be performed on a regular basis:

Check available space in the CONTROL-M database.


Clean up the SQL database message log.
Clean up the proclog directory.

Each of these topics is discussed below.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-3

Checking Available Space in the CONTROL-M Database


It is recommended that the amount of available space in the
CONTROL-M database be checked on a regular basis. If the available
space falls below 20%, the database should be extended (see Extending
the Size of the CONTROL-M Database later in this chapter).
You can check the available space in the CONTROL-M database using
the option Check Database in the Database Creation menu (described on
page 4-10).
You can also define a CONTROL-M job that automatically checks the
database on a regular basis and issues a Shout message if a problem is
detected. Such a job would call the script:
<controlm_home>/ctm/scripts/ctmdbcheck

This is the same script used by the Check Database option. Possible
messages generated by this script relating to the amount of available
space in the CONTROL-M database are:
WARNING: Database is more than half full
ATTENTION: Database is more than 80% full
ATTENTION: Database log segment is more than 90% full

These messages can be detected in a CONTROL-M job using the


On Statement/Code parameter. Appropriate Shout messages could then
be issued as required.

Cleaning Up the SQL Database Message Log


The SQL database server writes a message to a log file when the server is
started or shut down, and when a database error occurs. This file is not
automatically truncated. If not manually truncated, the file will utilize a
large amount of disk space.
The responsibility of maintaining the log file depends on whether
CONTROL-M/Server uses the dedicated SQL database server provided
with the installation, or an existing SQL database server.
BMC Software, Inc., Confidential and Proprietary Information

4-4

CONTROL-M/Server for Unix Administrator Guide

When CONTROL-M/Server uses a dedicated SQL database Server


provided during installation, it is the responsibility of the
CONTROL-M administrator to truncate this file on a regular basis.
The location of this file depends on the database type:
For Sybase:
<controlm_path>/sybase/data/errorlog

For Oracle:
<controlm_path>/oracle/admin/<$CONTROLM_DATABASE>/b
dump/alert_<$CONTROLM_DATABASE>.log

If CONTROL-M/Server is configured to use an existing SQL


Database Server, it is the responsibility of the database administrator
to truncate this file on a regular basis.
Note

In both the above mentioned paths, <controlm_path> is the home


directory of the CONTROL-M account owner.

Cleaning Up the Proclog Directory


When CONTROL-M/Server is using a diagnostic level greater than zero,
diagnostics log files are written to the following directory:
<controlm_path>/ctm/proclog/

where <controlm_path> is the home directory of the


CONTROL-M/Server account owner. For more information, see Set
Diagnostics Level on page 4-43.
Note

If CONTROL-M/Server is operated in this manner for long time, these


log files will utilize a large amount of disk space. The CONTROL-M
administrator should delete these files when they are no longer needed.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-5

CONTROL-M Menu System


The CONTROL-M Menu system enables you to access a variety of
functions and utilities used to maintain CONTROL-M.
The functions accessible from these menus are organized according to
function group, enabling you to easily locate the desired option. These
menus can only be accessed from the account of the
CONTROL-M/Server owner.

CONTROL-M Main Menu


The CONTROL-M Main menu is the entry point for accessing the
CONTROL-M Menu system.
To open the CONTROL-M Main menu:

1. Log into the Server platform as the CONTROL-M/Server owner (for


example, user controlm).
2. Enter the following command:
ctm_menu

The following menu is displayed:


Figure 4-1

CONTROL-M Main Menu

CONTROL-M Main Menu: Select one of the following menus:


1 - CONTROL-M Manager
2 - Database Creation
3 - Database Maintenance
4 - Database Mirroring
5 - Security Authorization
6 - Parameter Customization
7 - Node Group
8 - Agent Status
9 - Troubleshooting
q - Quit

3. Enter the corresponding number and press Enter. Each menu is


described in this chapter.
BMC Software, Inc., Confidential and Proprietary Information

4-6

CONTROL-M/Server for Unix Administrator Guide

The following menus are available:


Table 4-1

CONTROL-M Main Menu

Menu Item

Description

CONTROL-M Manager

Start up and shut down CONTROL-M and the SQL


database server.

Database Creation

Create or delete the CONTROL-M database.

Database Maintenance

Perform various CONTROL-M database


maintenance functions.

Database Mirroring

Perform various CONTROL-M mirror database


functions.

Security Authorization

Export or import Security Definition tables and


invoke the CONTROL-M Security Maintenance
utility (ctmsec) to define user authorizations.

Parameter
Customization

View and update parameters for customizing


CONTROL-M/Server.

Node Group

Maintain Node Groups for load balancing.

Agent Status

View and update the communication status of


Agent platforms.

Troubleshooting

Perform various troubleshooting functions.

Quit

Exit to the shell prompt.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-7

CONTROL-M Manager Menu


The CONTROL-M Manager menu is used to start and stop the SQL
database server and CONTROL-M/Server. Selecting CONTROL-M
Main Menu => CONTROL-M Manager displays the following:
Figure 4-2

CONTROL-M Manager Menu

CONTROL-M Manager Menu: Select one of the following options:


1 - Check All
2 - Start All
3 - Start Database
4 - Start CONTROL-M/Server
5 - Stop All
6 - Stop Database
7 - Stop CONTROL-M/Server
q - Quit

All references below to starting and stopping the SQL database


server are applicable only when CONTROL-M/Server uses a
dedicated instance of the SQL database server.

If CONTROL-M/Server uses a shared instance of the SQL database


server to maintain the CONTROL-M database, the database
administrator is responsible for starting and stopping the server.

Similarly, if mirroring of the CONTROL-M database is


implemented, the database administrator is responsible for starting
and stopping the mirroring server.

BMC Software, Inc., Confidential and Proprietary Information

4-8

CONTROL-M/Server for Unix Administrator Guide

Table 4-2

Options of the CONTROL-M Manager Menu

Menu Item

Description

Check All

Determines whether the SQL database server task


and the CONTROL-M/Server task are currently
running, and reports the status of each task.

Start All

Starts any tasks required for CONTROL-M that are


not already running. The SQL database server is
started first, followed by CONTROL-M/Server.

Start Database

Starts the SQL database server (only if dedicated to


the CONTROL-M database).

Start
CONTROL-M/Server

Starts CONTROL-M/Server. The SQL database


server must be running when this option is selected.

Stop All

Stops all CONTROL-M tasks. CONTROL-M/Server is


stopped first, followed by the SQL database server.

Stop Database

Stops the SQL database server (only if dedicated to


the CONTROL-M database). CONTROL-M/Server
should not be running when this option is selected.

Stop
CONTROL-M/Server

Stops CONTROL-M/Server.

Quit

Quits the CONTROL-M Manager menu and returns to


the CONTROL-M Main menu.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-9

Database Creation Menu


The Database Creation menu is used to perform functions related to
creating and deleting the CONTROL-M database. Selecting
CONTROL-M Main Menu => Database Creation displays the
following:
Figure 4-3

Database Creation Menu

Database Creation Menu


----------------------------Select one of the following options:
1
2
3
4
5

Show Database Parameters


Build Database
Delete Database
Erase Database Contents
Check Database

q - Quit

Table 4-3

Options of the Database Creation Menu

Menu Item

Description

Show Database
Parameters

Displays the CONTROL-M database parameters. To


choose this option, select 1 from the Database Creation
menu. Information similar to the following is displayed:

SQL Server/<SQL version number>/...


SYBASE=/home/ctm/sybase
CONTROLM_USER=ctrlm
CONTROLM_DATABASE=ctrlm
DSQUERY=CTRLM
DSLISTEN=CTRLM
Build Database

Builds a new CONTROL-M database.


CONTROL-M/Server must be shut down before selecting
this option. For a detailed description of the database build
process, see the Build the Database step in Chapter 3 of
the CONTROL-M/Server for Unix Installation Guide.

BMC Software, Inc., Confidential and Proprietary Information

4-10

CONTROL-M/Server for Unix Administrator Guide

Table 4-3

Options of the Database Creation Menu

Menu Item

Description

Delete Database

Drops (deletes) the CONTROL-M database entirely and


removes the database files. After using this option, you
cannot use CONTOL-M. To use CONTOL-M, you must
rebuild the entire database, rebuild the objects as well as
redefine CONTROL-M objects. Server must be shut down
before selecting this option.
Note: The Delete Database option is not supported for
CONTROL-M installations that were installed using an
existing database server.

Erase Database
Contents

Erases the contents of the CONTROL-M database after


verification. For example, Scheduling tables, calendars,
CONTROL-M log, Active Jobs file. The database files are
not deleted. After using this option, you can still use
CONTROL-M, but no previous data exists.
CONTROL-M/Server must be shut down before selecting
this option.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-11

Table 4-3

Options of the Database Creation Menu

Menu Item

Description

Check Database

Displays the size of the CONTROL-M database and


availability of space, and verifies database integrity.
Information similar to the following is displayed:

db total = 29000.0 KB (data= 23500.00


log= 5500.00)
data used = 1928 KB (8%).
log used = 0 KB (0%).
Checking database
This function is also available by running the script:
<controlm_home>/ctm/SCRIPTS/ctmdbcheck.
ctmdbcheck can also be used to provide automatic
database and transaction log monitoring. The following
options are available:

ctmdbcheck [db threshold %] [log


threshold %]
ctmdbcheck [general threshold %]
where db threshold % and log threshold % are user
defined percentages which, when exceeded, generate
shout messages to ENTERPRISE/CS warning that the
CONTROL-M database or log should be extended.
Quit

Quits the Database Creation menu and returns to the


CONTROL-M Main menu.

Database Maintenance Menu


The Database Maintenance menu is used to perform functions related to
maintaining the CONTROL-M database. Selecting CONTROL-M Main
Menu Database Maintenance displays a menu similar to Figure 4-4.
Note

If you are using a dedicated Oracle SQL database server, an additional


option called Archive Mode appears at the beginning of this menu. This
option is described below.

BMC Software, Inc., Confidential and Proprietary Information

4-12

CONTROL-M/Server for Unix Administrator Guide

Figure 4-4

Database Maintenance Menu

Database Maintenance Menu


----------------------------Select one of the following options:
1 - Archive mode
2 - Backup Database or
3 - Restore Database
4 - List All Devices
5 - List Backup Devices
6 - Add Backup Device
7 - Drop Backup Device
8 - Extend Database Size
9 - Extend Temporary Database (Tempdb) Size
10 - Extend Database Log Size
11 - Show Database Parameters
12 - Check Database
q - Quit

Archive Mode

Activates Oracle archive mode. In this mode, Oracle database logs are
written to a special backup destination when they are full, and before
they are overwritten by new information.
If you specify the same device for each backup, make sure the previous
backup is copied to the appropriate media for archive purposes.
Two types of back up can be performed, depending on the archive mode:

Cold backup copies the contents of the database to a file when


CONTROL-M is down.
Hot backup copies the contents of the database to a file when
CONTROL-M is active.

When the Archive Mode option is chosen in the Database Maintenance


menu, you are asked to supply the name of the destination to contain
archived Oracle logs. The archived logs can be used in case of a database
crash to restore the database up until the most recent SQL transaction.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-13

If you choose to use Archive mode, it should be a choice for long term
use. If this option is activated and deactivated frequently, the archived
logs will not provide useful information for database restoration.
Note

If Archive mode is activated, database transactions may be performed


more slowly and archive files will require more disk space.

Backup Database

This option backs up the CONTROL-M database onto a backup device.


The function performed by this option is identical to the function
performed by the ctmdbbck utility. See ctmdbbck on page 2-37 for
more details. This option can be invoked while the database is running.
The Backup Database procedure should be performed periodically. Daily
backup is recommended.
Sybase Backup

To back up a Sybase database:


Step 1

Select 2 from the Database Maintenance menu.

Step 2

The following prompt is displayed:


Enter backup device name [tapedump2]:

Enter the name of the backup device. The backup device must be either a
valid device defined in the SQL database, or the full path name of a file
to be created by the backup procedure. Use the option List Backup
Devices (seeList Backup Devices on page 4-19) to display a list of
valid devices.
The backup procedure backs up the Sybase database.
Oracle Backup

To back up an Oracle database:


BMC Software, Inc., Confidential and Proprietary Information

4-14

CONTROL-M/Server for Unix Administrator Guide

Step 1

Select 2 from the Database Maintenance menu.

Step 2

The following prompt is displayed:


Enter a destination directory name [<ctm_home_dir>]:

Press <Enter> to accept the default directory, or enter the name of a


different directory where you want the backup to be saved. The backup
procedure assigns its own filename.
Step 3

If Archive mode is not active at your site, a Cold backup (described


below) is automatically performed.
If Archive mode is active, the following prompt is displayed:
Enter your choice for backup mode (Hot or Cold) [H/C]:

You have the choice between two types of Oracle database backup; Hot
or Cold.
Cold Backup

Can be used to restore the database to the state it was in when the
backup was performed.

Is performed in non-Archive mode.


Warning

CONTROL-M is automatically shut down when a Cold backup is


performed. After the backup is completed, CONTROL-M will have to be
manually restarted.
Hot Backup

Can be used to restore the database to the state it was in after the last
completed transaction (the last COMMIT command executed).

Is performed in Archive mode, and the backup procedure sets the


mode if it was not previously set. Running the database in Archive
mode requires extra disk space for Control files.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-15

Requires that the directory you specify exist prior to starting the
backup.
Note

You can perform a Hot backup on a dedicated database. However, you


cannot perform a Hot backup on an existing database.
Type H for a Hot backup or C for a Cold backup.
Step 4

The following prompt is displayed:


Specify archiving process destination directory:

Enter the directory in which the archive process will store its Control
files.
The backup procedure shuts down CONTROL-M/Server before
beginning the backup, and starts it again after the backup is completed.
The procedure displays informational messages indicating its progress.
Restore Database

This option restores the CONTROL-M database from a backup device.


The function performed by this option is identical to the function
performed by the ctmdbrst utility. For more information, see ctmdbrst
on page 2-44.
Sybase Restore

To restore a Sybase database:


1. Select 3 from the Database Maintenance menu.
2. The following prompt is displayed:
Enter restore device name [tapedump2] :

BMC Software, Inc., Confidential and Proprietary Information

4-16

CONTROL-M/Server for Unix Administrator Guide

Press <Enter> to accept the default or enter the name of your backup
device. The backup device must be either a valid device defined in
Sybase, or the full path name of a backup file to be used as input for the
ctmdbrst utility. Use the option List Backup Devices to display a list of
valid devices. For more information on this option, seeList Backup
Devices on page 4-19.
Oracle Restore

To restore an Oracle database:


1. Select 3 from the Database Maintenance menu.
2. The following prompt is displayed:
Enter a destination directory name
[<ctm_home_dir>]:

Press <Enter> to accept the default directory, or type the name of the
directory in which the backup was saved.
3. If Archive mode is not active at your site, a restore is automatically
performed using the information from the most recent Cold backup.
If Archive mode is active, a restore is automatically performed using
the information from the most recent Hot backup.
For details about Hot and Cold backups, see Step 3 on page 4-15.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-17

The restore procedure shuts down both CONTROL-M/Server and the


Oracle database server before performing the restore. After the restore is
completed, the restore procedure starts up only the Oracle database
server. CONTROL-M/Server must to be restarted manually after the
procedure is finished.
Note

If you wish to perform a restore from a Cold backup and Archive mode
is active, deactivate Archive mode (using option 1 of the Database
Maintenance menu) before performing the steps described above.

Warning

If you attempt to restore a dedicated Oracle database using the ctmdbrst


utility without previously having backed up the database, the database
will become unavailable. To access the database, enter the following
procedure from the CONTROL-M home directory command line:
svrmgrl
connect internal
dalter database mount
altere database open
exit
To restore a Sybase database if it is corrupted:

1. Shut down CONTROL-M. Make sure there are no users or processes


connected to the SQL Server.
2. Use the option Database Creation => Build Database to rebuild the
database.
3. Use the Restore Database option to load the data into the new
database.

BMC Software, Inc., Confidential and Proprietary Information

4-18

CONTROL-M/Server for Unix Administrator Guide

List All Devices

Displays a list of all Sybase devices.


Note

This menu option is relevant only for sites using a Sybase database
server.

List Backup Devices

Displays a list of Sybase backup devices. Use this option to locate a


device for backing up the CONTROL-M database (see above).
Note

This menu option is relevant only for sites using a Sybase database
server.

Add Backup Device

Adds a backup device to the list of devices available for backing up the
CONTROL-M database.
Note

This menu option is relevant only for sites using a Sybase database
server.
The following prompt is displayed:
Enter <dev_logical_name> {disk|tape} <device_name> <[size_in_MB]>

The variables in this prompt are described in Table 4-4.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-19

Table 4-4

Logical Device Description

Variable

Description

<dev_logical_name>

Logical name of the device.

{disk | tape}

Disk or tape device.

<device_name>

Path and name of the device.

<size_in_MB>

Size of the device (optional).

This device can be either a disk file or a tape drive. (Backups to disk files
are faster and do not require operator intervention.)
Enter the required parameters for the new device.
Example
cont tape cont_dev

In this instance the following messages are displayed:


Creating Tape device.Tape device added.
(return status = 0)
Drop Backup Device
Note

This menu option is relevant only for sites using a Sybase database
server.
Deletes a device from the list of backup devices. The following prompt is
displayed:
Enter <dev_logical_name>:

Enter the logical name of the device to delete from the list. Upon
completion of the process, the following message is displayed:
Device dropped (return status = 0)

BMC Software, Inc., Confidential and Proprietary Information

4-20

CONTROL-M/Server for Unix Administrator Guide

Extending the Size of the CONTROL-M Database

Table 4-5 describes the menu options that can be used to extend the size
of different segments of the CONTROL-M database. These options can
be used while CONTROL-M/Server is active or when it is shut down.
See Checking Available Space in the CONTROL-M Database on page
4-4 for additional information.
Table 4-5

Menu Options for Modifying Database Size

Option

Description

Extend Database Size

Extends the data segment of the database.

Extend Temporary
Database Size

Extends the temporary storage area of the


database (tempdb).

Extend Database Log Size

Extends the log segment of the database


(Sybase).

Extend Rollback
Tablespace Size

Extends the log segment of the database


(Oracle).

Note

The options in Table 4-5 can be applied only when CONTROL-M/Server


uses the dedicated Sybase Database Server supplied with CONTROL-M.
If CONTROL-M/Server is configured to use an existing (remote) server,
you can use the commands disk init and alter database to extend the
CONTROL-M database. To extend the log segment, the command
sp_logdevice is also used. These commands are described in the Sybase
Commands Reference Manual. Similarly, you can use these commands to
extend the CONTROL-M mirror database.
Extend Database Size

This option extends the size of the data segment only. The size of the log
segment is not extended.
To extend the size of the data segment of the CONTROL-M
database:

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-21

1. Select option Extend Database Size from the Database Maintenance


menu. The following prompt is displayed:
Enter size of database extension in MB
(default 10):

2. Specify the amount to extend the database, or press <Enter> to


accept the default. The following prompt is displayed:
For Sybase:
Enter physical device name for database extension
(default <Sybase data
directory>/controlm_extend.dat):

For Oracle:
Enter size of database extension in MB (default
10):
The entered value is: 10
1 - /disk2/controlm/oracle/oradata/ctrlm/rbs01.dbf
0 - New Data File
Your choice ? (0/1) [0]:

3. Supply a full path name or press <Enter> to accept the default


(Sybase). [0] New Data File is the default in Oracle. The file
specified must not exist. The local file system where the file will be
located must have enough free space to accommodate the size
specified above.
Upon completion of the process, the following message is displayed:
For Sybase:
Extension request succeeded

For Oracle:

BMC Software, Inc., Confidential and Proprietary Information

4-22

CONTROL-M/Server for Unix Administrator Guide

SVRMGR> Connected.
SVRMGR> Statement processed.
SVRMGR> Server Manager complete.
Extend Temporary Database Size

The size of the temporary storage area of the database should be


approximately 10% of the data segment size.
To extend the size of the temporary area of the CONTROL-M
database:
1. Select the option Extend Temporary Database Size from the
Database Maintenance menu.The following prompt is displayed:
Enter size of temporary db extension in MB (default
10):

2. Specify amount to extend the database, or press <Enter> to accept


the default. The following prompt is displayed:
For Sybase:
Enter physical device name for temporary db
extension (default <Sybase data
directory>/controlm_temp.dat):

For Oracle:
Enter size of database extension in MB (default
10):
The entered value is: 10
1 - /disk2/controlm/oracle/oradata/ctrlm/temp01.dbf
0 - New Data File
Your choice ? (0/1) [0]:

3. Supply a full path name or press <Enter> to accept the default. [0]
New Data File is the default in Oracle.
BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-23

The file specified must not exist. The local file system where the file
will be located must have enough free space to accommodate the size
specified above. Upon completion of the process, the following
message is displayed:
For Sybase:
Extension request succeeded

For Oracle:
SVRMGR> Connected.
SVRMGR> Statement processed.
SVRMGR> Server Manager complete.
Extend Database Log Size (Sybase) or
Extend Rollback Tablespace Size (Oracle)

The size of the log segment of the database should be approximately 1/3
of the data segment size.
To extend the size of the log segment of the CONTROL-M database:
1. Select option Extend Database Log Size from the Database
Maintenance menu (Sybase). In Oracle, select the Extend Rollback
Tablespace Size option from the Database Maintenance menu. The
following prompt is displayed:
Enter size of transaction log extension in MB
(default 10):

2. Specify amount to extend the database, or press <Enter> to accept


the default. The following prompt is displayed:
For Sybase:
Enter physical device name for transaction log
extension (default <Sybase data
directory>/controlm_extend.log):

For Oracle:
BMC Software, Inc., Confidential and Proprietary Information

4-24

CONTROL-M/Server for Unix Administrator Guide

Enter size of database extension in MB (default


10):
The entered value is: 10
1 - /disk2/controlm/oracle/oradata/ctrlm/rbs01.dbf
0 - New Data File
Your choice ? (0/1) [0]:

3. Supply a full path name or press <Enter> to accept the default. The
file specified must not exist. The local file system where the file will
be located must have enough free space to accommodate the size
specified above.
Upon completion of the process, the following message is displayed:
For Sybase:
Extension request succeeded

For Oracle:
SVRMGR> Connected.
SVRMGR> Statement processed.
SVRMGR> Server Manager complete.
Show Database Parameters

Displays the CONTROL-M database parameters. To choose this option,


select 11 from the Database Maintenance menu. Information similar to
the following is displayed:
SQL Server/<SQL version number>/...
SYBASE=/home/ctm/sybase
CONTROLM_USER=ctrlm
CONTROLM_DATABASE=ctrlm
DSQUERY=CTRLM
DSLISTEN=CTRLM

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-25

Check Database

Displays the size of the CONTROL-M database and availability of space,


and verifies database integrity. Information similar to the following is
displayed:
db total = 29000.0 KB (data= 23500.00 log= 5500.00)
data used = 1928 KB (8%).
log used = 0 KB (0%).
Checking database

This function is also available by running the script:


<controlm_home>/ctm/SCRIPTS/ctmdbcheck.
The ctmdbcheck utility can also be used to provide automatic database
and transaction log monitoring. The following options are available:
ctmdbcheck [db threshold %] [log threshold %]
ctmdbcheck [general threshold %]

where db threshold % and log threshold % are user defined


percentages which, when exceeded, generate shout messages to
ENTERPRISE/CS warning that the CONTROL-M database or log
should be extended.

BMC Software, Inc., Confidential and Proprietary Information

4-26

CONTROL-M/Server for Unix Administrator Guide

Database Mirroring Menu


The Database Mirroring menu is used to perform functions related to
initializing/disabling database mirroring, recovering from CONTROL-M
database failure, initializing failover, and recovering from Server
platform failure. Selecting CONTROL-M Main Menu => Database
Mirroring displays the following:
Figure 4-5

Database Mirroring Menu

Database Mirroring Menu


----------------------Select one of the following options:
Primary Server Options
1 - Check Mirroring Status
2 - Initialize Mirroring
3 - Disable Mirroring
4 - Use Mirror Database
5 - Restore CONTROL-M Database From Mirror
Failover Server Options
6 - Initialize Failover
7 - Start Failover
8 - Stop Failover
q - Quit

Table 4-6

Options of the Database Mirroring Menu

Option

Description

Check Mirroring
Status

Indicates whether or not mirroring of the CONTROL-M


database is currently enabled.

Initialize
Mirroring

Builds the CONTROL-M mirror database from the


existing CONTROL-M database and configures
CONTROL-M to maintain the mirror database. This
procedure is described in Chapter 7, Mirroring and
Failover. CONTROL-M/Server must be shut down
before selecting this option.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-27

Table 4-6

Options of the Database Mirroring Menu

Option

Description

Disable
Mirroring

Discontinues mirroring of the CONTROL-M database (if


mirroring was previously initialized). To restore mirroring
after selecting this option, use option Initialize
Mirroring. This option is used in the following
circumstances:
Mirroring is enabled but CONTROL-M cannot be started
because it cannot attach to the mirroring SQL server.
-orMirroring is no longer desired.

Use Mirror
Database

Configures CONTROL-M to use the mirror database as


its primary database. This option can be used in the
event that there was a failure of the primary
CONTROL-M database and mirroring was active.
CONTROL-M/Server must be shut down before you
select this option.
To resume using the primary database, use the option
Restore CONTROL-M Database from Mirror.
For more information, see Chapter 7, Mirroring and
Failover..

Restore
CONTROL-M
Database from
Mirror

Rebuilds the CONTROL-M database using the mirror


database. This option is used when there was a failure
of the primary CONTROL-M database and mirroring
was active. CONTROL-M must be shut down before
selecting this option.
For more information, see Chapter 7, Mirroring and
Failover..

Initialize
Failover

Saves site specific information about the backup Server


platform. This data is needed to start CONTROL-M on
the backup Server platform in case of failure of the
primary Server.

Start Failover

Copies the saved site-specific information about the


backup Server platform to the Mirror database. This
data is needed to start CONTROL-M on the backup
Server using the Mirror database.

Stop Failover

Restores the site-specific information about the primary


Server platform to the Mirror database. This data is
used to restore the primary database.

Quit

Quits the Mirror Database menu and returns to the


CONTROL-M Main menu.

BMC Software, Inc., Confidential and Proprietary Information

4-28

CONTROL-M/Server for Unix Administrator Guide

Security Authorization Menu


The Security Authorization menu is used to invoke the ctmsec Security
Maintenance utility and export or import Security Definition tables.
Selecting CONTROL-M Main Menu => Security Authorization
displays the following:
Figure 4-6

Security Authorization Menu

Security Authorization Menu


--------------------------------Select one of the following options:
1 - Security Maintenance Utility
2 - Backup Security Definition Tables
3 - Restore Security Definition Tables
q - Quit

Table 4-7

Security Authorization Menu (Part 1 of 2)

Option

Description

Security
Maintenance
Utility

Invokes the Security Maintenance utility (ctmsec). This


utility is used to define users in the CONTROL-M Security
database and assign authorizations for working with
CONTROL-M. For more information, see Security
Maintenance Utility (Interactive Mode) on page 3-11.

Backup Security
Definition
Tables

Exports Security Definition tables. Specify the full path


name of the file. This function can be run only on the
CONTROL-M/Server platform. A message confirming the
completion of the export to file process is displayed. Press
<Enter> to return to the Security Authorization menu.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-29

Table 4-7

Security Authorization Menu (Part 2 of 2)

Option

Description

Restore
Security
Definition
Tables

Restores Security Definition tables from a file created


using the Backup Security Definition Tables option of
this menu. The restored definitions override all existing
Security Definition tables.
Specify the full path name of the file. This function can be
run only on the CONTROL-M/Server platform. A message
confirming the completion of the import is displayed.
Press <Enter> to return to the Security Authorization
menu.
Note: Security Definition tables that were generated by
the export utility under CONTROL-M/Server version 2.2.5
can be imported only using the ctm_restore_aut utility. For
more information, see Importing Security Definitions from
CONTROL-M version 2.2.5 on page 3-37

Quit

Quits the Security Authorization menu and returns to the


CONTROL-M Main menu.

Note

The Backup Security Definition Tables and Restore Security


Definition Tables options in this menu can be used only to transfer or
backup existing security definitions.
To modify security definitions before copying them to another
installation, or before restoring them to the current installation, it is
recommended that you use the ctmsec utility EXPORT option. For more
information, see Exporting Security Definition Tables on page 3-35.

Parameter Customization Menu


The Parameter Customization menu is used to view and maintain the
various groups of parameters used by CONTROL-M. Selecting
CONTROL-M Main Menu => Parameter Customization displays the
following:

BMC Software, Inc., Confidential and Proprietary Information

4-30

CONTROL-M/Server for Unix Administrator Guide

Figure 4-7

Parameter Customization Menu

Parameter Customization Menu


----------------------------Select one of the following options:
1
2
3
4

Communication and Operational Parameters


System Parameters and Shout Destination Tables
Default Parameters for Communicating with Agent Platforms
Parameters for Communicating with Specific Agent Platforms

q - Quit

All the parameters that appear in these menus are described in:
Table 4-8

Customization Parameters

Option

Description

Communication and
Operational Parameters

Displays/updates CONTROL-M operational


and communication parameters. This option is
described below.

System Parameters and


Shout Destination Tables

Calls the ctmsys utility to view or update


system parameters and Shout Destination
tables. This utility is described in Chapter 2,
Utilities.

Default Parameters for


Communicating With
Agent Platforms

Displays/updates the default values of


parameters used for communication with
Agent platforms. When communicating with an
Agent platform, these values are used unless
overridden using the following option. This
option is described below.

Parameters for
Communicating With
Specific Agent Platforms

Displays/updates parameters for


communicating with a specific Agent platform.
This option is used to assign values other than
the default parameter values for a specific
Agent platform. This option is described below.

Quit

Quits the Parameter Customization menu and


returns to the CONTROL-M Main menu.

Note

For parameter changes to take effect, you must shut down and restart
CONTROL-M/Server.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-31

Communication and Operational Parameters

When this option is selected, the Communication Parameters menu is


displayed. The current value for each parameter follows the parameter
name:
Figure 4-8

Communication Parameters Menu

Communication Parameters:
1)
2)

Local IP Host Interface Name:


Agent-to-Server Port Number:
Communication Protocol:
TCP

a)
q)
n)

Modify all of the above


Quit
Next page

Enter command or item number you wish to change [n]:

When you enter n, the operational parameters menu is displayed.


Figure 4-9

Operational Parameters Menu

Operational Parameters:
1)
2)
3)
4)
5)
6)
7)

Input Process Communication Port Number:


Maximum Job State Changes:
ENTERPRISE/CS TCP/IP Port Number:
Statistics Mode:
ENTERPRISE/CS RELVER param:
Maximum server processes (CS):
Minimum server processes (CS):

a)
p)
q)

Modify all of the above.


Previous
Quit

BMC Software, Inc., Confidential and Proprietary Information

4-32

CONTROL-M/Server for Unix Administrator Guide

To modify parameters, specify the number appearing next to the


parameter that you want to change, or specify a to change all the
parameters in the menu. You are prompted for the parameter value(s)
as required.
See Chapter 5, Customization Parameters, for a description of each
parameter.

To switch between the two menus, specify n (next) or p (previous) as


required.

To exit, specify q from either menu.

If you modify either of the parameters Agent-to-Server Port


Number or ENTERPRISE/CS TCP/IP Port Number, the
following prompt is displayed:
You have modified one or more network port numbers.
It is recommended that you record the port numbers
used by CONTROL-M in the /etc/services file on your
machine. This requires access to the root password.
Do you wish these port numbers to be recorded in
the /etc/services file now (y/n) [y]:

If you respond y to the prompt above, the following prompt is


displayed:
Password:

Specify the root password. The /etc/services file is updated.


The /etc/services file contains a description of the usage of each port
on the Server platform. Proper maintenance of this file prevents
conflicting usage of ports by various applications. The
CONTROL-M Maintenance facility can automatically modify the
/etc/services file for changes you made to one or both of the port
number parameters mentioned above.

If you modify the Communication Protocol parameter, the


following message is displayed:

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-33

For this change will take effect in CONTROL-M, you


will need to re-start CONTROL-M. Use shut-ctm and
start-ctm to re-start CONTROL-M.

If the Communication Protocol parameter defined on an Agent


platform is different from the modified one, after shutting down and
starting CONTROL-M/Server again, you must also redefine this
parameter on the Agent platform according to its requirements. Refer
to the appropriate chapter for the platform in the
CONTROL-M/Agent Administrator Guide.
Note

Redefining the Communication Protocol parameter on a Unix Agent


platform requires that you re-customize the CONTROL-M/Agent
installation.

If you modify the Statistics Mode parameter, existing entries in the


statistics database are updated and new entries are added. This may
cause duplicate lines in the output of the ctmjsa utility. After
switching modes, you can eliminate these duplicate output lines by
running:
sql
truncate table CMR_STATIS
go

Afterwards, run the ctmjsa utility again for statistics compilation.


Default Parameters for Communicating With Agent Platforms

When this option is selected, the following menu is displayed. The


current value for each parameter follows the parameter name:

BMC Software, Inc., Confidential and Proprietary Information

4-34

CONTROL-M/Server for Unix Administrator Guide

Figure 4-10 Communication Parameters for Agent Platforms

Default Parameters for Communicating With Agent


Platforms:
1)
2)
3)
4)
5)
6)

Polling Interval:
Communication Timeout:
Maximum Retries:
Retry Interval:
Server-to-Agent Port Number:
Communication Protocol Version:

a) Modify all of the above


q) Quit
(All time parameters expressed in seconds)
Enter command or item number you wish to change [q]:

To modify parameters, specify the number appearing next to the


parameter that you want to change, or specify a to change all the
parameters in the menu. You are prompted for the parameter value(s)
as required.
See Chapter 5, Customization Parameters, for a description of each
parameter.

Parameters for Communicating With a Specific Agent Platform

When this option is selected, the following prompt is displayed:


To view/modify communication parameters,
enter node ID of Agent Platform:

1. Specify the node ID of the desired Agent platform.


Note

Use of this option does not require communication with the Agent
platforms. There is no verification that the specified Agent platform
exists at the time this option is used.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-35

The following menu is displayed. The current value for each


parameter follows the parameter name:
Figure 4-11 Communication Parameters for Specific Agent Platforms
Parameters for Communicating With Specific Agent Platform (<node ID>)
1)
2)
3)
4)
5)
6)

Communication Timeout:
Maximum Retries:
Retry Interval:
Server-to-Agent Port Number:
Communication Protocol Version:
Check Interval(Available)

a) Modify all of the above


q) Quit
(All time parameters expressed in seconds)
Enter command or item number you wish to change [q]:

2. To modify parameters, specify the number appearing next to the


parameter that you want to change, or specify a to change all the
parameters in the menu.
You are prompted for the parameter value(s) as required.
See Chapter 5, Customization Parameters, for a description of each
parameter.
3. To exit, specify q.

Node Group Menu


The Node Group menu is used to maintain and view node groups. Node
groups are used by the CONTROL-M load-balancing function. Selecting
CONTROL-M Main Menu => Node Group displays the following
menu:

BMC Software, Inc., Confidential and Proprietary Information

4-36

CONTROL-M/Server for Unix Administrator Guide

Figure 4-12 Node Group Menu

Node Group Menu


--------------Select one of the following options:
1 - List All Node Groups
2 - Edit Node Group
3 - Delete Node Group
q - Quit

The options in this menu are described in Table 4-9.


Table 4-9

Options of the Node Group Menu

Option

Description

List All Node Groups

Displays a list of all existing node groups.

Edit Node Group

Views, creates or modifies a node group. For


details, see the next section.

Delete Node Group

Requests the name of an existing node group, and


then deletes the group.

Quit

Quits the Node Group menu and returns to the


CONTROL-M Main menu.

Edit Node Group

This option is used to view, create or modify a node group. When this
option is selected, the following prompt is displayed:
Node Group Name:

Specify the name for a new node group or specify the name of an
existing node group whose member list you want to view or modify. The
following menu is displayed:

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-37

Edit Node Group Menu


------------------Select one of the following options:
1 2 3 -

View Current Node Group


Add Node ID
Delete Node ID

q -

Quit

Enter Option (Group: <node_group>) :

Specify the number for the desired option:


View Current Node
Group

Displays the node IDs included in the specified node


group.

Add Node ID

Prompts you for the name of a node ID to add to the


specified group.

Delete Node ID

Prompts you for the name of a node ID to delete


from the specified group.

Agent Status Menu


The Agent Status menu is used to view and update the communication
status of Agent platforms. Selecting CONTROL-M Main Menu =>
Agent Status displays the following:
Figure 4-13 Agent Status Menu
Agent Status Menu
----------------Select one of the following options:
1
2
3
4
5
6

List Last Known Status of Agents Platform


Change Agent Platform Status to Available
Change Agent Platform Status to Disabled
Delete Agent Platform Status Entry
Ping Agent Platform
Discover Agent

BMC Software, Inc., Confidential and Proprietary Information

4-38

CONTROL-M/Server for Unix Administrator Guide

q - Quit
Enter option number --->

For more information about statuses for Agent platforms, see


Communication Status of Agent Platforms on page 1-6.
Table 4-10

Options of the Agent Status Menu

Option

Description

List Last Known Status


of Agents Platform

Prompts for the node ID of an Agent platform, and


then displays the last known status of the platform
(Available, Unavailable or Disabled).

Change Agent Platform


Status to Available

Prompts for the node ID of an Agent platform, and


then changes the communication status of the
platform to Available.

Change Agent Platform


Status to Disabled

Prompts for the node ID of an Agent platform, and


then changes the communication status of the
platform to Disabled.

Delete Agent Platform


Status Entry

Displays a list of all Agent platforms whose


communication status is Disabled, and prompts for
the node ID of the platform you want to delete.

Ping Agent Platform

Prompts for the node ID of an Agent platform and


then tests the communication link with the platform.
The response indicates whether the Agent platform
is available or unavailable.
This option cannot be used to test communication
with an Agent platform whose status is Disabled.

Discover Agent

Prompts for the node ID of an Agent platform, and


then pings the agent and gathers information about
the Agent platform.

Quit

Quits the Agent Status menu and returns to the


CONTROL-M Main menu.

The first four options in the above table do not require communication
with the Agent platforms. They do not verify that the Agent platforms
exist. As a result, the following may occur:

The Change options can be used to modify the status of a nonexistent platform.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-39

If you request the status of a non-existent platform, the default status


of Available is displayed. If the status of the platform has been
changed to Disabled, the platform will appear in the list of platforms
that are Not Available.

Troubleshooting Menu
The Troubleshooting menu is used to perform a variety of diagnostic
activities. Selecting CONTROL-M Main Menu => Troubleshooting
displays the following:
Figure 4-14 Troubleshooting Menu
Troubleshooting Menu
----------------------------Select one of the following options:
1
2
3
4
5

Set Diagnostics Level


Set Sleep Time
Show Processes Flags (prf)
Show All Processes (shctm)
Show Communication Environment

12
13
14
15
16

Erase Proclog File


Show Calendar names
Interactive SQL Commands
Communication Diagnostic Report
Force Download

6
7
8
9
10
11

Restart New Day Procedure


Reset CONTROL-M Active Environment
Truncate Database Log
Troubleshooting Report
Check Kernel Configuration
List Active Transactions

17 - Check directory permissions

q - Quit
Enter option number --->

Table 4-11

[]:

Options of the Troubleshooting Menu (Part 1 of 3)

Option

Description

Set Diagnostics
Level

Determines the diagnostic level for all CONTROL-M/Server processes or for


any specific process. For details, see Set Diagnostics Level on page 4-43.

Set Sleep Time

Determines the sleep time for all CONTROL-M/Server processes or for any
specific process. For details, see Set Sleep Time on page 4-45.

Show Process
Flags (prf)

Displays the status of CONTROL-M/Server processes. For details, see Show


Process Flags (prf) on page 4-46

BMC Software, Inc., Confidential and Proprietary Information

4-40

CONTROL-M/Server for Unix Administrator Guide

Table 4-11

Options of the Troubleshooting Menu (Part 2 of 3)

Option

Description

Show All
Processes (shctm)

Displays all CONTROL-M/Server processes currently running. For details, see


Show All Processes (shctm) on page 4-47.

Show
Communication
Environment

Displays the port numbers used by CONTROL-M/Server to communicate with


ENTERPRISE/CS. Information similar to the following is displayed:

ENTERPRISE/CS <-> CONTROL-M communication-port:


---------------------------------------------INPUT_SPN=2371
OUTPUT_SPN=2370
[ SPN - Socket Port Number ]

Restart New Day


Procedure

Starts the New Day procedure again (after confirmation).

Reset
CONTROL-M
Active
Environment

Clears all components of the CONTROL-M active environment (Active Jobs


file, prerequisite conditions, and so on) and forces CONTROL-M to start a
download of the entire Active Jobs file to ENTERPRISE/CS. This option is
described in Reset CONTROL-M Active Environment on page 4-48.

Truncate Database
Log

Truncates the CONTROL-M database log. This option should be used if the
Sybase message Cant allocate space for <text> in database <name>
because the log segment is full occurs in one of the log files located in
directory ~controlm/ctm/proclog/.

Troubleshooting
Report

Creates a report containing specified CONTROL-M system information. This


option is typically used at the request of Technical Support to determine the
cause of a CONTROL-M problem. This option is described in Troubleshooting
Report on page 4-45.

Check Kernel
Configuration

For Solaris platforms, checks whether the current configuration settings of the
kernel comply with requirements for CONTROL-M/Server.
If all parameters are configured correctly, the following message is displayed:
Check kernel configuration for <system>
terminated successfully
If one or more parameters are not configured correctly, the parameters are
listed followed by:
Check kernel configuration for <system>
terminated unsuccessfully
Note: This option is not relevant for AIX platforms.

List Active
Transactions

Runs the ctmdbtrans utility to list the active transactions in the database.
A transaction is a unit of work performed by CONTROL-M in the database.
Each transaction is assigned a unique name identifying that specific unit of
work.
You may be asked by technical support to run this option and to provide them
with the output for debugging purposes.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-41

Table 4-11

Options of the Troubleshooting Menu (Part 3 of 3)

Option

Description

Erase Proclog
Files

Erases the contents of the current process log file for all active
CONTROL-M/Server processes or for any specific active process.
The following prompt is displayed:
Enter <process-name> [SU,TR,SL,CO,NS,LG,ALL]
Specify the two-character code for a specific process or ALL for all current
process log files. See Set Diagnostics Level earlier in this table for more
information about process log files.

Show Calendar
Names

Displays a list of all Calendar names defined in the CONTROL-M database.

Interactive SQL
Commands

Starts an interactive SQL session that enables you to issue Sybase Database
commands to perform actions in the CONTROL-M database. To end this
session, enter the command: quit.
This option should only be used when requested by Technical Support.

Communication
Diagnostic Report

Checks parameters and environmental conditions relevant to communication


between the Server platform and a specific Agent platform. This option is
typically used at the request of Technical Support to determine the cause of a
communication problem.
When this option is selected, you are prompted to supply the node ID of an
Agent platform. A diagnostic program is then executed and a report listing the
findings is generated.

Force Download

Forces CONTROL-M to start download of the entire Active Jobs file to


ENTERPRISE/CS.

Check directory
permissions

Checks the current directory and all sub-directories under it for permissions
and displays a report similar to the following:

/home/ctm600 directory permissions OK.


/home/ctm600/ctm directory permissions OK.
/home/ctm600/ctm/scripts directory permissions OK.
/home/ctm600/ctm/exe_Solaris directory permissions
OK.
/home/ctm600/ctm/sql directory permissions OK.
/home/ctm600/ctm/sysout directory permissions OK.
/home/ctm600/ctm/proclog directory permissions OK.
Quit

Quits the Troubleshooting menu and returns to the CONTROL-M Main menu.

BMC Software, Inc., Confidential and Proprietary Information

4-42

CONTROL-M/Server for Unix Administrator Guide

CONTROL-M/Server Processes

When implemented under a Unix operating system,


CONTROL-M/Server consists of several integrated processes. Most of
the processes run whenever CONTROL-M/Server is active. Each process
is identified by a two-letter code:
Table 4-12

Two-Letter Codes for CONTROL-M Processes

Code

Description

SU

Supervisor.

TR

Tracker.

SL

Selector and submitter.

NS

Communication with Agent platforms.

CO

Communication gateway.

CD

New Day procedure, downloads, updates to the CONTROL-M


database.

CS

Communication (user requests from ENTERPRISE/CS).

LG

Utilities invoked from Agent platforms.

WD

Watchdog process.

RT

Inter-process Communication Router

Several options in the Troubleshooting menu act on one or more


processes. See Table 4-11, Options of the Troubleshooting Menu, on
page 4-40 for details.
Set Diagnostics Level

Determines the diagnostic level for all CONTROL-M/Server processes


or for any specific process. If modified while CONTROL-M/Server is
running, the diagnostic level specified is effective immediately.
The following prompts are displayed:
Enter <diagnostics-level> [0 - 5] : [0]:
Enter Module <module_number> [0,1,2,3] : [0]:
Enter PROCESS NAME [CD,CS,CO,LG,NS,SL,SU,TR,RT,WD,ALL]

: []:

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-43

Table 4-13 describes the parameters that are set when responding to these
prompts.
Table 4-13

Diagnostic Level Parameters

Parameter

Description

<diagnostic-level>

The diagnostic level ranges from 0 (no diagnostics) to


5 (highest level of diagnostics). Output from each
process is written to a separate process log file
named:

<controlm_path>/ctm/proclog/<proces
s-name>_LOG.<process-ID>
For example:

~controlm/ctm/proclog/SU_LOG.5609
The variables in this pathname are:

<module_number>

<controlm_path>

Home directory of
CONTROL-M/Server account
owner.

<process_name>

Two-character code identifying


the process.

<process-ID>

ID of the CONTROL-M/Server
process.

Indicates which components are to be traced for


diagnostic purposes.
Valid values are:
0 All components. Default
1 Common functionality flow.
2 Event manager.
3 Database layer.

Process Name

Indicates a two-character code for a specific process,


or ALL for all CONTROL-M/Server processes.
See CONTROL-M/Server Processes on page 4-43,
for a description of the process codes appearing in
this prompt.

BMC Software, Inc., Confidential and Proprietary Information

4-44

CONTROL-M/Server for Unix Administrator Guide

Set Sleep Time

Determines the sleep time for all CONTROL-M/Server processes or for


any specific process. The sleep time is the length of time that the process
lies dormant before waking up to check if any request to perform an
action was received. If modified while CONTROL-M/Server is running,
the sleep time specified becomes effective immediately. See Sleep Time
Considerations on page 4-49.
The following prompt is displayed:
Enter <process-name> [SU,TR,SL,RT,CO,NS,LG,ALL] and
<seconds-sleep-time>:

See CONTROL-M/Server Processes below for a description of the


process codes appearing in the prompt. Specify the two-character code
for a specific process, or ALL for all CONTROL-M/Server processes,
followed by the desired sleep time (in seconds).
Example
SL 130
Troubleshooting Report

Creates a report containing specified CONTROL-M system information.


This option is typically used at the request of Technical Support to
determine the cause of a CONTROL-M problem.
The following menu is displayed:
Figure 4-15 Troubleshooting Report Information
Troubleshooting Report Information

---------------------------------1)
2)
3)
4)
5)
6)
7)

Control-M Active Processes Map:


Control-M Environment Variables:
Active Jobs File Statistics:
System Communication Data:
Conditions and Resources Maps:
SU (Supervisor) Logs:
SL (Selector) Logs:

Y
Y
Y
Y
Y
Y
Y

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-45

8) TR (Tracker) Logs:
9) CD (New Day Procedure) Logs:
10) CO (Communication Gateway) Logs:
11) CS (Communication with ENTERPRISE/CS) Logs:
12) LG (Agent Utilities) Logs:
13) NS (Communication with Agents) Logs:
14) Database Error Log:
15) Logs of Failed Jobs within the Last 24 Hours:
16) Logs of All Jobs run within the Last 24 Hours:
R)
Q)

Y
Y
Y
Y
Y
Y
Y
Y
N

Generate Troubleshooting Report


Quit

Select item to include/exclude:

To change the information included in the report, enter the number of the
item to change and switch the flag from Y to N. Default options include
all information. Enter R to generate the report.
The generated report is compressed and placed in the CONTROL-M
users home directory.
<controlm_path >/ctmtsrpt.<mmddyyhhmm>.tar.Z

where:
<controlm_path>

Home directory of CONTROL-M/Server account owner.

<mmddyyhhmm>

Date and time of report.

Show Process Flags (prf)

When selected, the Show Process Flags option displays the status of
CONTROL-M/Server processes as recorded in the CONTROL-M
database.
A table similar to the following is displayed:
PROCNAME
CD
CO
LG
NS
RT
SL
SU
TR
WD

PROCID
21176
21199
21178
21180
21166
21182
21167
21184
21185

PROCSTAT
R
R
R
R
R
R
R
R
R

PSTAT_REQ
R
R
R
R
R
R
R
R
R

SLEEP_TIME
60
60
360
120
60
60
60
30
30

DIAG_LVL
0
0
0
0
0
0
0
0
0

BMC Software, Inc., Confidential and Proprietary Information

4-46

CONTROL-M/Server for Unix Administrator Guide

The columns in this table are described in Table 4-14.


Table 4-14

Columns of the Show Process Flags Table

PROCNAME

Two-letter code identifying the CONTROL-M/Server


process (described above).

PROCID

Process ID of the CONTROL-M/Server process. If this


entry is missing, the process is not currently running.

PROCSTAT and
PSTAT_REQ

Current statuses of the process. The codes that can


appear in these columns have the following meaning:
PROCSTATPSTAT_REQ
R RUNNINGRRun requested
T,Z TerminatedT,ZTerminate requested
SSuspendedSuspend requested
SLEEP_TIMECurrent sleep time of the process
DIAG_LVLCurrent diagnostic level of the process

DIAG_LVL

Current diagnostic level.

Show All Processes (shctm)

When selected, the Show All Processes option displays all


CONTROL-M/Server processes currently running on the Server
platform. A list similar to the following is displayed:
controlm
controlm
controlm
controlm
controlm
controlm
controlm
controlm
controlm
controlm

5703
5620
5645
5691
5705
5609
5712
5714
5713
5610

0:02
0:00
0:00
0:00
0:00
0:01
0:01
0:01
0:01
0:01

/usr1/controlm/ctm/exe_AIX/p_ctmco
/usr1/controlm/ctm/exe_AIX/p_ctmns
/usr1/controlm/ctm/exe_AIX/p_ctmlg
/usr1/controlm/ctm/exe_AIX/p_ctmtr
/usr1/controlm/ctm/exe_AIX/p_ctmsl
/usr1/controlm/ctm/exe_AIX/p_ctmsu
/usr1/controlm/ctm/exe_AIX/p_ctmcd
/usr1/controlm/ctm/exe_AIX/p_ctmwd
/usr1/controlm/ctm/exe_AIX/p_ctmcs
/usr1/controlm/ctm/exe_AIX/p_ctmrt

Note

The operating system identifier (in the above example, AIX) in the path
of the run module varies according to the type of Unix running on the
Server platform.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-47

The columns displayed in this list are:

User name under which the process is running (for example,


controlm)
Process ID (for example, 5703)
Run time (for example, 0:02)
Full path of the process run module (for example,
/usr1/...ctmco). The last two characters of the path identify the
process (for example, the first line in the list above represents the CO
process the Communication module).

The following additional columns are displayed for the CS process (the
last line in the list above):

Two columns of mailbox numbers (for example, 603 604)


Diagnostic level (for example, 0)

Reset CONTROL-M Active Environment


Note

Shut down CONTROL-M/Server before selecting this option.


When selected from the Troubleshooting menu, the Reset
CONTROL-M Active Environment option performs the following
actions (after confirmation by the user):

The contents of the Active Jobs file are erased.

All prerequisite conditions, Quantitative resources and Control


resources are deleted.

The entire Active Jobs file is downloaded to ENTERPRISE/CS.

It is also possible to reset the CONTROL-M/Server process sleep times


and diagnostic level using the init_prflag utility. This utility performs the
following actions:

The sleep times for all CONTROL-M/Server processes are reset to


their initial (installation) values, as follows:
BMC Software, Inc., Confidential and Proprietary Information

4-48

CONTROL-M/Server for Unix Administrator Guide

Table 4-15

Process

CONTROL-M/Server Shut Down

Sleep Time

SU

60

TR

30

SL

30

NS

120

CO

60

CD

60

LG

360

WD

360

RT

60

The diagnostic level for all CONTROL-M/Server processes is reset


to zero.

Sleep Time Considerations

The sleep time setting for CONTROL-M processes can affect the
functionality of CONTROL-M and the performance of your data center.
Sleep time is the length of time that a process lies dormant before
waking up to check if any request to perform an action was received.
When modifying certain CONTROL-M process sleep time settings, it is
important to consider the number of jobs that are processing, the job
schedule plan, and the overall load on the machine.

BMC Software, Inc., Confidential and Proprietary Information

Maintenance

4-49

Table 4-16

Sleep Time Considerations

Process

Task

Sleep Time
Initial
Settings

SU

Supervisor

60

Increase: Delay in startup, downloads, and


New Day procedure.

TR

Job Tracking

15

Increase: Delay in freeing resources after job


ends and delay in Shout messages. Can be
increased during period of minimal job
processing.
Decrease: Additional CPU resources.

SL

Job Selector

30/60

Increase: Delay in Job Submission and Shout


messages for late submission Can be
increased during period of minimal job
processing.
Decrease: Additional CPU resources.

NS

Communication

120

No effect.

CO

Communication

60

No effect.

CD

New Day Procedure;


Database uploads and
downloads

60

No effect.

LG

Utilities

360

No effect.

WD

Watchdog

30

No effect.

RT

Inter-process
Communication Router

60

No effect.

Sleep TIme Modification


Considerations

BMC Software, Inc., Confidential and Proprietary Information

4-50

CONTROL-M/Server for Unix Administrator Guide

Customization Parameters

You can customize the CONTROL-M/Server installation by modifying


parameters used by the various CONTROL-M/Server modules. You can
assign values to most of the parameters described in this chapter during
the CONTROL-M/Server installation procedure. Certain parameters are
assigned default values during installation and can be modified later.
CONTROL-M/Server parameters are divided into the following
categories:

System parameters.
Communication parameters.
Operational parameters.
Agent Communication parameters.
Database parameters.
Mirroring parameters.
Performance parameters.
Configuration parameters.

CONTROL-M/Agent customization parameters are described in


Chapter 1, General Information, of the CONTROL-M/Agent
Administrator Guide.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-1

Parameter Coordination
For CONTROL-M/Server to communicate with Agent platforms and
with the ENTERPRISE/CS workstation, the values assigned to certain
parameters described in this chapter must be coordinated with values
assigned to parameters on these systems. These parameters are listed in
the following tables.
Table 5-1

Parameter Coordination With ENTERPRISE/CS

CONTROL-M/Server
Parameter

ENTERPRISE/CS
Parameter

Default Value

ENTERPRISE/CS TCP/IP Port


Number

TCP/IP Port Number

2370

Local IP Host Interface Name

TCP/IP Host Name

Local hostname as returned by


Unix command hostname.

Table 5-2

Parameter Coordination With Agent Platforms

CONTROL-M/Server
Parameter

CONTROL-M/Agent
Parameter

Default Value

Communication Protocol

Communication Protocol

TCP

Agent-to-Server Port Number

Agent-to-Server Port Number

7005

Server-to-Agent Port Number

Server-to-Agent Port Number

7006

Local IP Host Interface Name

Authorized
CONTROL-M/Servers

No default value. Specify the


Interface Name of the machine
where CONTROL-M/Server is
installed.

BMC Software, Inc., Confidential and Proprietary Information

5-2

CONTROL-M/Server for Unix Administrator Guide

Parameter Descriptions
System Parameters
CONTROL-M system parameters are assigned default values during
installation. These parameters can be modified using the ctmsys utility,
described in Chapter 2, Utilities. CONTROL-M system parameters are
listed below. Modifiable parameters are identified by an asterisk (*). All
other parameters are display only.
Table 5-3

System Parameters (Part 1 of 4)

Parameter

Description

DBO
Password

Sybase password for the CONTROL-M database owner


(6 to 30 characters, alphanumeric). The characters you enter
are not echoed. This password is used by CONTROL-M
processes and utilities to access the CONTROL-M
database. Default: password.

Computer
System

Platform type and model where CONTROL-M/Server is


installed (for example, HP700).

Operating
System

Operating system running on the Server platform (for


example, AIX).

CONTROL-M
Version

Version number of the CONTROL-M/Server.

Database
Version

Internal database scheme version number (not the Sybase


version number).

Sysout Log
Directory *

Location where CONTROL-M puts job log (Sysout) files after


a jobs execution (for example, /usr/controlm/ctm/sysout).
This directory is created during the installation procedure.To
change this location, create the new directory first (using the
Unix mkdir command). This parameter cannot be modified
while CONTROL-M is active.

Executable
Path

Location where CONTROL-M/Server expects to find all its


executable programs (for example,
/usr/controlm/ctm/exe_Solaris).

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-3

Table 5-3

System Parameters (Part 2 of 4)

Parameter

Description

Day Time *

Installation start-of-day time used by CONTROL-M. This is


the time at which the CONTROL-M date (Odate) changes
and the New Day procedure is run. Default: +0700.
The Day Time parameter is specified using one of the
following formats:
+hhmm CONTROL-M date is changed at the specified time
after midnight.
-hhmm CONTROL-M date is changed at the specified time
before midnight.
Time is expressed in 24-hour format (for example, 2200 is
equivalent to 10 p.m.). This parameter is commonly set
using the +hhmm format.

Example
+0600 Specifies that the hours between midnight and 6:00
a.m. are considered part of the previous dates work day
(that is, system date February 10th, 5:59 a.m. is still the
CONTROL-M work day February 9th).
-2200 Specifies that the hours between 10 p.m. and
midnight are considered part of the next dates work day
(that is, at 10:00 p.m. on system date February 10th, the
CONTROL-M date changes to February 11th).
CONTROL-M
Date

Date that CONTROL-M/Server regards as the actual


working date (Odate). This date is determined using the
operating system date and the value of the parameter Day
Time (described above). The format is yyyymmdd (for
example, 20000215). The value is initially set to 00000000
by the installation procedure. The value is then updated by
the New Day procedure each time it runs.

Statistics *

Whether or not job statistics should be written to the


CONTROL-M database. Valid values are Y (record job
statistics) and N (do not record job statistics). See Runtime
Statistics on page 1-28 for more information. Default: Y.

Maximum
Retries *

Number of times the CONTROL-M auto-recovery


mechanism can reactivate CONTROL-M/Server processes
in case of failure. If this number is exceeded,
CONTROL-M/Server is shut down. Default: 10.

BMC Software, Inc., Confidential and Proprietary Information

5-4

CONTROL-M/Server for Unix Administrator Guide

Table 5-3

System Parameters (Part 3 of 4)

Parameter

Description

Start Day of
the Week *

Day of the week on which the work week at your site starts.
Valid values: 0 (Saturday), 1 (Sunday), , 6 (Friday). This
parameter affects the usage of the job processing parameter
Weekdays (described in Chapter 5 in the Enterprise
Controlstation User Guide). Default: 2 (Monday).

Active Shout
Table *

Currently-active Shout Destination table. Default: SYSTEM.

Full
Security *

Whether CONTROL-M operates in a restricted or


unrestricted level of security. Valid values:
Y (restricted) and N (unrestricted). Default: N.
For restricted security (value Y), a user not defined in the
CONTROL-M security database does not have any
application authorizations.
For unrestricted security (value N), a user not defined in
the CONTROL-M security database is regarded as having
all application authorizations.
A user for whom one or more authorizations have been
assigned in the security database can only perform the
actions for which the user is specifically authorized.

Maximum
Days
Retained by
CONTROL-M
Log *

Maximum number of days that entries are retained in the


CONTROL-M log before being deleted by the New Day
cleanup procedure. Default: 2.

Max.Days to
Retain
Sysout Files *

Number of days that job sysout files are retained for jobs
executed by Agent platforms. After this period, all job sysout
files are deleted by the New Day procedure. Default: 2.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-5

Table 5-3

System Parameters (Part 4 of 4)

Parameter

Description

Ignore New
Day
Conditions *

Specifies whether the New Day procedure should ignore


prerequisite conditions whose reference date (day and
month) matches the CONTROL-M date.
When this parameter is N, the New Day procedure deletes
any prerequisite condition whose reference date matches
the CONTROL-M date. Default.
When this parameter is Y, the New Day procedure
accesses a file containing prefixes of prerequisite
conditions that should be ignored (that is, not deleted) by
the daily cleanup procedure. (See Ignore New Day
Conditions Parameter below.)

Secure Socket
Layer

Indicates if the SSL protocol is used for communications:


Disabled: CONTROL-M/Server does not communicate
using SSL.
Enabled: CONTROL-M/Server uses only SSL for
communications.
Inactive: CONTROL-M/Server does not use SSL, but will
communicate initially with a CONTROL-M/Agent using
SSL. The CONTROL-M/Server renegotiates the
communications link with the CONTROL-M/Agent to
non-SSL communications.
SSL support must be installed on CONTROL-M/Server for
the Enabled and Inactive settings to take effect.

Ignore New Day Conditions Parameter

After assigning the new CONTROL-M date, the New Day procedure
performs a selective cleanup of prerequisite conditions. By default, any
prerequisite condition whose reference date (month and day) is equal to
the new CONTROL-M date is deleted. This is done to prevent jobs from
being triggered by any prerequisite conditions remaining from the
previous year.
This cleanup function of the New Day procedure can conflict with user
intentions under certain circumstances. For example, if a job processing
definition contains the parameter Out Conditions with the Date field
containing the value Next, a prerequisite condition is created with a
reference date one or more days in the future. This prerequisite condition
would normally be deleted by the New Day procedure before it can be
used to trigger the submission of a job.
BMC Software, Inc., Confidential and Proprietary Information

5-6

CONTROL-M/Server for Unix Administrator Guide

You have the option of selectively or completely disabling the cleanup of


such prerequisite conditions by using the CONTROL-M system
parameter Ignore New Day Conditions.
The Ignore New Day Conditions parameter specifies whether or not the
New Day procedure should delete all prerequisite conditions whose
reference date (day and month) matches the new CONTROL-M date.

When this parameter is N, the New Day procedure deletes any


prerequisite condition whose reference date matches the
CONTROL-M date. This is the default.

When this parameter is Y, the New Day procedure accesses a


user-defined file that contains prefixes of prerequisite conditions that
should be ignored (that is, not deleted) by the cleanup procedure.

The Ignore New Day Conditions parameter can be modified using the
ctmsys utility.
When this parameter is set to Y, CONTROL-M searches for a file called:
<home_dir>/ctm/data/dbs_ignrcond.dat

where <home_dir> is the home directory of the CONTROL-M owner


account. This file (referred to as the Ignore Conditions file) should
contain a list of prefixes of prerequisite conditions, and/or including
masks, that should not be deleted by the New Day procedure. (Note that
prerequisite condition names are case-sensitive.)
The mask characters that can be used in this file are:
*

Indicates any number of characters (including no characters).


Specify by itself to signify all existing conditions (see the
examples below).

Indicates any single character.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-7

You can create and maintain this file using any text editor available at
your site. Place one prerequisite condition prefix on each line in the file.
Note

If Ignore New Day Conditions parameter is set to Y but CONTROL-M


cannot locate the Ignore Conditions file, CONTROL-M behaves as if the
parameter is set to N (that is, all prerequisite conditions whose reference
date matches the new CONTROL-M date will be deleted).
Example 1

If the new CONTROL-M date is 15-01-00 and Ignore New Day


Conditions parameter is set to Y, the Ignore Conditions file contains the
following prefixes:
prq_rs_*rpt
pre_prn
srt_def_?

The following table demonstrates which prerequisite conditions will be


deleted from the Conditions/Resources table in the CONTROL-M
database by the New Day procedure:
Conditions Existing Before
Executing New Day Procedure

Conditions Remaining After


Executing New Day Procedure

bra_fn_01 14/01
bra_fn_01 15/01
prq_rs_21rpts 14/01
prq_rs_21rpts 15/01
pre_prn_01 14/01
pre_prn_01 15/01
pre_prn_02 14/01
pre_prn_02 15/01
srt_def_a 14/01
srt_def_a1 14/01
srt_def_a 15/01
srt_def_a1 15/01

bra_fn_01 14/01
prq_rs_21rpts 14/01
prq_rs_21rpts 15/01
pre_prn_01 14/01
pre_prn_01 15/01
pre_prn_02 14/01
pre_prn_02 15/01
srt_def_a 14/01
srt_def_a1 14/01
srt_def_a 15/01

BMC Software, Inc., Confidential and Proprietary Information

5-8

CONTROL-M/Server for Unix Administrator Guide

Example 2

If Ignore New Day Conditions parameter is set to Y, The Ignore


Conditions file contains the following entry:
*

No prerequisite conditions will be deleted from the Conditions/Resources


table by the New Day procedure.

Communication Parameters
Communication parameters are modifiable during installation. You can
also modify these parameters afterwards using the Parameter
Customization menu, described in Chapter 4, Maintenance.
Valid Communication parameters are described in Table 5-4.
Table 5-4

Communication Parameters (Part 1 of 2)

Parameter

Description

Local IP Host
Interface Name

Host interface name of the TCP/IP network interface card


on the Server platform to use for communication with
ENTERPRISE/CS. This is typically the host name of the
Server platform. The default value for this parameter is the
default host interface name defined in the Server platform
operating environment. This parameter can also be
specified by its IP address (for example, 192.123.186.20).
This parameter should be modified only if the Server
platform contains more than one network interface card
(for example, Ethernet and Token-Ring). See additional
information about this parameter below.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-9

Table 5-4

Communication Parameters (Part 2 of 2)

Parameter

Description

Agent-to-Server
Port Number

CONTROL-M/Server communicates with


CONTROL-M/Agent via two TCP/IP ports. One port is
used for data flowing from CONTROL-M/Server to
CONTROL-M/Agent. The other port is used for data
flowing in the reverse direction.
This parameter specifies the port used in the Server
platform for receiving data from the Agent platform.
The second port is specified using Server-to-Agent Port
Number parameter (described in See Parameters for
Communicating With Agent Platforms on page 5-13.)
Default: 7005.
The value for this parameter must match the value
assigned to Agent-to-Server Port Number parameter on
the Agent platform.
Verify that the port number specified for this parameter is
not used for any other purpose in the Server platform.
The value for this parameter must be a number between
1024 and 65533 inclusive.

Communication
Protocol

Protocol used to communicate with the Agent platforms.


Specify UDP or TCP. It is recommended that you use TCP
when there are many jobs running simultaneously
reporting to CONTROL-M/Server. The protocol specified
here must be the same as that specified on the Agent
platform. Default: TCP.

Local IP Host Interface Name Parameter

CONTROL-M/Server only listens on one network interface card for


messages from ENTERPRISE/CS. If the Server platform contains more
than one network interface card, it is necessary to ensure that
ENTERPRISE/CS is sending messages to the same interface card
listened to by CONTROL-M/Server. This is accomplished by ensuring
that CONTROL-M/Server parameter Local IP Host Interface Name
and ENTERPRISE/CS parameter TCP/IP Host Name both refer to the
same IP address.

BMC Software, Inc., Confidential and Proprietary Information

5-10

CONTROL-M/Server for Unix Administrator Guide

If one or both of these parameters contain a logical host name, you can
determine the IP address mapped to the logical host name by specifying
the following command at the Unix prompt:
arp <host_name>

The system responds with the IP address mapped to the host name on the
local machine.
Note

Even if the same logical host name is specified for these two parameters,
the host name can be mapped to different IP addresses on the Server
platform and the ENTERPRISE/CS workstation. Use the arp command
(see above) to verify that the host name on each machine is mapped to
the same IP address.
You can also ensure that both machines are using the same address by
specifying the actual IP address of the network interface card for each of
these parameters. The IP address specified must be a local address on the
Server platform.

Operational Parameters
Operational parameters are modifiable during installation. You can also
modify these parameters afterwards using the Parameter Customization
menu, described in Chapter 4, Maintenance.
The operational parameters are described below:

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-11

Table 5-5

Operational Parameters (Part 1 of 2)

Parameter

Description

Input Process
Communication
Port Number

Socket Port number used for communication between


CONTROL-M processes. The parameter replaces the
Input Mailbox Key and Output Mailbox Key
parameters in earlier versions of CONTROL-M/Server.
As of CONTROL-M/Server version 6.0.00, all interprocess communication is handled by the RT process.

Maximum Job
State Changes

Number of job state changes retained by


CONTROL-M/Server in the event communication with
ENTERPRISE/CS is interrupted. If the number of job
state changes that occur exceeds the value specified for
this parameter, CONTROL-M/Server will initiate a
download when communication with ENTERPRISE/CS
is resumed. Default: 1000.

ENTERPRISE/CS
TCP/IP Port
Number

CONTROL-M communicates with Enterprise


Controlstation using a pair of consecutive TCP/IP ports
(for example, 2370 and 2371). The lower port is used
for data flowing from CONTROL-M to
ENTERPRISE/CS. The higher port is used for data
flowing in the reverse direction. Default: 2370.
This parameter is used to specify the lower of the two
port numbers and must correspond to the value
assigned to field TCP/IP Port Number in the definition of
the CONTROL-M data center in the ENTERPRISE/CS
Data Centers window. Verify that the two port numbers
are not used for any other purpose on the Server
platform. The value for this parameter must be a
number between 1024 and 65533 inclusive.

ENTERPRISE/CS
Release Version

ENTERPRISE/CS version number.

Statistics Mode

Mode used by the ctmjsa utility to collect summary


statistics. JOBNAME compiles statistics for each
CONTROL-M Job Name and Node ID where the job
was submitted. MEMNAME compiles them for each
CONTROL-M Mem Name/Mem Lib and Node ID.
Default: MEMNAME.

BMC Software, Inc., Confidential and Proprietary Information

5-12

CONTROL-M/Server for Unix Administrator Guide

Table 5-5

Operational Parameters (Part 2 of 2)

Parameter

Description

Minimum Server
Processes

Minimum number of communication server processes


that the CONTROL-M/Server gateway process will run
concurrently. Default: 1.

Maximum Server
Processes

Maximum number of communication server processes


that the CONTROL-M/Server gateway process can run
concurrently. Default: 1.

Parameters for Communicating With Agent Platforms


Parameters for communicating with Agent platforms are modifiable
during installation. The values specified for these parameters are used as
the default values for communication with each Agent platform.
Parameter values for specific Agent platforms can be modified separately
afterwards. You can also modify these parameters using the Parameter
Customization Menu, described in Chapter 4, Maintenance.
The parameters for communicating with agent platforms are described in
Table 5-6.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-13

Table 5-6

Parameters for Communicating with Agent Platforms

Parameter

Description

Polling Interval

Time interval (in seconds) between requests from


CONTROL-M/Server for status updates from Agent
platforms that are executing jobs. Specify -1 to disable
polling. Default: 900.

Communication
Timeout

Maximum length of time (in seconds) that


CONTROL-M/Server should spend attempting to
communicate with an Agent platform before assigning it
the status Unavailable. Default: 120.
During this time, CONTROL-M/Server attempts to
communicate with the Agent platform x times, where x is
the value specified by parameter Maximum Retries.

Example
If the value of Communication Timeout is 120 and
Maximum Retries is 12, CONTROL-M/Server attempts to
communicate with the Agent platform once every 10
seconds (120/12) during the timeout period.
Maximum
Retries

Number of communication retries to attempt in the period


of time specified before assigning the status Unavailable
to an Agent platform. Default: 12.

Retry Interval

Length of time to wait (in seconds) between attempts to


communicate with an Agent platform whose status is
Unavailable. Default: 90.

Server-to-Agent
Port Number

Port number in the Agent platform through which data is


received from the Server platform. The value assigned to
this parameter must correspond to the value assigned to
the field Server-to-Agent Port Number in the Configuration
file on the corresponding Agent platform. Default: 7006.

Communication
Protocol
Version

Version of CONTROL-M Agent.


Specify 01 (2.2.4), 02 (2.2.5), or 03 (6.0.00). Default: 03.

BMC Software, Inc., Confidential and Proprietary Information

5-14

CONTROL-M/Server for Unix Administrator Guide

Database Parameters
Sybase

Sybase Database configuration parameters are specified during


installation before the CONTROL-M database is created. You can also
modify these parameters and rebuild the CONTROL-M database using
the Database Creation menu, described in Chapter 4, Maintenance.
The Sybase database parameters are described below:
Table 5-7

Sybase Database Parameters (Part 1 of 3)

Parameter

Description

CONTROL-M
Database Owner

Sybase name for the CONTROL-M database owner. The


custom script creates this user in the database. This name
is used by CONTROL-M when accessing its database.
Default: ctrlm

DBO Password

Sybase password for the CONTROL-M database owner (6


to 30 characters, alphanumeric). The characters you enter
are not echoed for security reasons. This password is
used by CONTROL-M processes and utilities to access
the CONTROL-M database. Default: password

Database
Administrators
Password

Password (6 to 30 characters, alphanumeric) for the


Sybase database administrator (user sa). The characters
you enter are not echoed for security reasons. This
password is used by CONTROL-M utilities to access
restricted sections of the CONTROL-M database.
Default: password

Database (Data
Portion) Size

Amount of space (in MB) to allocate for the data portion of


the CONTROL-M database. Default: 20.
If the database will be located in a file system, the custom
script allocates the amount of space you specify plus an
additional 50% to accommodate the Sybase transaction
log. For example, if you specify 30 MB, the amount of
space actually allocated is 45 MB.
Sybase recommends that you use raw partitions for the
data device. In this case, the size of the raw partition must
be equal to the size of the Data portion plus 4 MB.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-15

Table 5-7

Sybase Database Parameters (Part 2 of 3)

Parameter

Description

Query Socket
Port Number
-andBackup Socket
Port Number

Sybase utilizes these two TCP/IP ports for communication


between CONTROL-M and Sybase SQL Server. The port
numbers must be different from each other. If these port
numbers are already used by an existing application,
choose other values, each in the range 1024 to 65534
inclusive.
Query Socket and Backup Socket each comprise 2 ports.
Therefore, each value entered should be the lower port of
a pair of available ports. For example, if the Query Port
Socket is 7102, then port 7103 will also be used for Query
Port communications.
Default: 7102 and 7104

Master Device
Type

Type of disk storage (raw partition or file system) used for


the master Sybase database. (A raw partition installation
offers enhanced database integrity.) Default: FILE.
If you want Sybase to use a raw partition, type y in
response to the prompt. An additional prompt will be
displayed requesting the physical device name (described
below).

Master Physical
Device/Path
Name

For Master Device Type FILE: Full path name where the
master Sybase database will be located.
Default: <controlm_home_dir>/sybase/data/master.dat
For Master Device Type RAW: Physical device name of
the raw partition on which the Sybase database will be
located.

Data Device
Type

Type of disk storage (raw partition or file system) used for


the CONTROL-M database. Default: FILE

Data Physical
Device/Path
Name

For Data Device Type FILE: Full path name where the
CONTROL-M database will be located.
Default: /<controlm_home_dir>/sybase/data/ctrlm_ux.dat
For Data Device Type RAW: Physical device name of the
raw partition in which the CONTROL-M database will be
located.

Log Device Type

Type of disk storage (raw partition or file system) used for


the CONTROL-M database log. Default: FILE.

BMC Software, Inc., Confidential and Proprietary Information

5-16

CONTROL-M/Server for Unix Administrator Guide

Table 5-7

Sybase Database Parameters (Part 3 of 3)

Parameter

Description

Log Physical
Device/Path
Name

For Log Device Type FILE: Full path name where the
CONTROL-M database log will be located.
Default: /<controlm_home_dir>/sybase/data/ctrlm_log.d
at
For Log Device Type RAW: Physical device name of the
raw partition in which the CONTROL-M database log will
be located.

Sybase
Interface
Directory

Directory in which the Sybase interfaces file is located.


This path should be visible to CONTROL-M.

Sybase Server
Name

Name of the SQL server.


When you choose to modify this value, the custom script
reads the Sybase interfaces file and displays a list of the
available SQL servers. Specify the name of an SQL server
from the displayed list (contact your system administrator
for this information). Default: SYBASE

Remote Sybase
Host Name

Name of the host for an existing Sybase Database server


installation.

CONTROL-M
Database Name

Name for the CONTROL-M database. This name must be


unique. Default: ctrlm

CONTROL-M
Database Data
Device Name

Name of the Sybase device on which the CONTROL-M


database will be created. (See the disk init command in
the Sybase Commands Reference Manual for information
about creating a Sybase device.) Default: ctrlm_ux

CONTROL-M
Database Log
Device Name

Name of the Sybase device on which the CONTROL-M


database log will be created. (See the disk init command
in the Sybase Commands Reference Manual for
information about creating a Sybase device.)
Default: ctrlm_log

Oracle

Oracle Database configuration parameters are specified during


installation before the CONTROL-M database is created. You can also
modify these parameters and rebuild the CONTROL-M database using
the Database Creation menu, described in Chapter 4, Maintenance.
The Oracle database parameters are described below:
BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-17

Table 5-8

Oracle Database Parameters (Part 1 of 2)

Parameter

Description

CONTROL-M Database
Instance name

The name of the Oracle SQL server (1 to 8


characters, alphabetic plus _). Default: ctrlm

Database User

Name of CONTROL-M database user.


Default: controlm

User Password

Password for the CONTROL-M database user (6 to


30 characters, alphanumeric). The characters you
enter are not echoed for security reasons. This
password is used by CONTROL-M processes and
utilities to access the CONTROL-M database.
Default: password

Tablespace size

Total size of the CONTROL-M database.


Default: 250 MB

Oracle home directory

Directory where Oracle binary files are stored.


Default: /<controlm_home_dir>/oracle

Size of CONTROL-M
database log files

The size of each database log file. There are two


files of equal size.
Default: 20 MB

Name of the
Tablespace data file

Full path name of the CONTROL-M database data


file.
Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/data.
dbf

Name of the first


database log file

Full path name of the first database log file.


Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/log0
1.dbf

Name of the second


database log file

Full path name of the second database log file.


Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/log0
2.dbf

Oracle CDROM name

Name of CDROM device containing the Oracle


installation CDROM.

CONTROL-M Listener
port number

Oracle utilizes this TCP/IP port for communication


between CONTROL-M and Oracle SQL Server.
The port must be dedicated to this purpose.
Choose a number in the range 1024 to 65534
inclusive. Default: 1521

BMC Software, Inc., Confidential and Proprietary Information

5-18

CONTROL-M/Server for Unix Administrator Guide

Table 5-8

Oracle Database Parameters (Part 2 of 2)

Parameter

Description

Oracle SYSTEM user


password

Password of the Oracle SYSTEM user.

CONTROL-M SYSTEM
tablespace file
location

Full path name to the CONTROL-M SYSTEM


tablespace file.
Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/syst
em01.dbf

CONTROL-M SYSTEM
tablespace size

Size of the CONTROL-M SYSTEM tablespace file.


Default: 50 MB

CONTROL-M RBS
(Rollback Segment)
tablespace file
location

Full path name to the CONTROL-M RBS


tablespace file.
Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/rbs0
1.dbf

CONTROL-M RBS
tablespace size

Size of the CONTROL-M RBS tablespace file.


Default: 50 MB

CONTROL-M TEMP
tablespace file
location

Full path name to the CONTROL-M TEMP


tablespace file.
Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/temp
01.dbf

CONTROL-M TEMP
tablespace size

Size of the CONTROL-M TEMP tablespace file.


Default: 100 MB

CONTROL-M INDEX
tablespace file
location

Full path name to the CONTROL-M INDEX


tablespace file.
Default:
/<controlm_home_dir>/oracle/oradata/ctrlm/indx
01.dbf

CONTROL-M INDEX
tablespace size

Size of the CONTROL-M INDEX tablespace file.


Default: 50 MB

Oracle Server Host


name

The host machine name of an existing Oracle


server.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-19

Mirroring Parameters
Parameters for database mirroring are specified when mirroring is
initialized, either during CONTROL-M/Server installation or any time
afterwards. You can modify these parameters by mirror initialization
using the Database Mirroring menu described in Chapter 4,
Maintenance.
Database mirroring parameters are described in Table 5-9.
Table 5-9

Mirroring Parameters (Part 1 of 2)

Parameter

Description

CONTROL-M Mirror
Database Owner
(Sybase and Oracle)

Name for the CONTROL-M mirror database owner.


The install_mirror script creates this user in the
database. This name is used by CONTROL-M when
accessing the mirror database. Default: ctrlm

DBO Password
(Sybase and Oracle)

Password for the CONTROL-M mirror database


owner (6 to 30 characters, alphanumeric). The
characters you enter are not echoed for security
reasons. This password is used by CONTROL-M
processes and utilities to access the CONTROL-M
mirror database.

Mirror Sybase
Server Name
(Sybase)

Name of the SQL server to which CONTROL-M will


connect for mirroring. When you choose to modify this
value, the install_mirror script reads the Sybase
interfaces file and displays a list of the available SQL
servers. Specify the name of an SQL server from the
displayed list (contact your system administrator for
this information). Default: CTRLM2

Mirror
Sybase/Oracle Host
Name (Sybase and
Oracle)

Host name of machine that runs the instance of the


database SQL Server used for mirroring.

Mirror
Sybase/Oracle Port
Number (Sybase
and Oracle)

TCP/IP query port number for the database SQL


Server used for mirroring. If you are using a
CONTROL-M dedicated database SQL Server for the
mirror database, you can find its Sybase/Oracle Port
Number in the QUERY_SPN field in the
<controlm_owner>/install/install_defs file.

BMC Software, Inc., Confidential and Proprietary Information

5-20

CONTROL-M/Server for Unix Administrator Guide

Table 5-9

Mirroring Parameters (Part 2 of 2)

Parameter

Description

CONTROL-M Mirror
database name
(Sybase)

Name of the Sybase CONTROL-M mirror database.


This name must be unique. Default: ctrlm

Mirror Oracle
Instance name (SID)
(Oracle)

The name of the Oracle mirror SQL server (1 to 8


characters, alphabetic plus _). Default: ctrlm

CONTROL-M Mirror
tablespace name
(Oracle)

Name of the Oracle CONTROL-M mirror database.


This name must be unique. Default: ctrlm

CONTROL-M Mirror
database data
device name
(Sybase)

Name of the Sybase device on which the


CONTROL-M mirror database will be created.
Default: ctrlm_ux

CONTROL-M Mirror
database log device
name (Sybase)

Name of the Sybase device on which the


CONTROL-M mirror database log will be created.
Default: ctrlm_log

CONTROL-M Mirror
Database Data
Device Name
(Sybase)

Name of the Sybase device on which the


CONTROL-M mirror database will be created. (See
the disk init command in the Sybase Commands
Reference Manual for information about creating a
Sybase device.) Default: ctm

CONTROL-M Mirror
Database Log
Device Name
(Sybase)

Name of the Sybase device on which the


CONTROL-M mirror database log will be created.
(See the disk init command in the Sybase
Commands Reference Manual for information about
creating a Sybase device.) Default: ctmlog

Performance Parameters
Special parameters are available for tuning CONTROL-M performance.
These parameters affect how jobs are selected for both scheduling and
post-processing. Table 5-10 describes the performance parameters in the
CONTROL-M <controlm>/ctm/data/config.dat file where <controlm>
is the CONTROL-M home directory.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-21

Table 5-10

Performance Parameters

Parameter

Description

PRIORITY_SL_SCAN

Indicates if job priority should be used during the


job selection process (when deciding which job
should run next. Valid values are:
0 - Use job priority. Default
1 - Do not use job priority. This setting increases
CONTROL-M performance.

SL_BREAK_INT

Specify how many jobs to scan in the selection


process before checking for jobs in the post
processing queue. The lower the value, the faster
the performance. The downside is that jobs at the
bottom of the queue will take longer to be
scheduled. Value range: 1-99999. Default: 100

PP_THRESHOLD

Specify the maximum number of jobs that can wait


in the post processing queue before post
processing is initiated. The lower the value, the
faster the jobs get post processed, but jobs at the
bottom of the queue will take longer to be
processed. Value range: 1-99999. Default: 10

The sleep time setting for CONTROL-M processes can also affect the
performance and functionality of CONTROL-M. For example, setting
the sleep time of the Selector (SL) and/or Tracking (TR) process to 5,
will improve performance, but CONTROL-M will consume more CPU.
For more information, see Sleep Time Considerations on page 4-49.

Configuration Parameters
The following tables contain the current parameters in the
CONTROL-M/Server configuration parameter file (config.dat) and
CONTROL-M/Agent configuration parameter file (agconfig.dat). The
config.dat file resides in directory <controlm>/ctm/data/ on the Server
platform. The agconfig.dat file resides on the Agent platform.

BMC Software, Inc., Confidential and Proprietary Information

5-22

CONTROL-M/Server for Unix Administrator Guide

CONTROL-M/Server Parameters (config.dat)


Table 5-11

CONTROL-M/Server Parameters (Part 1 of 3)

Parameter Name

{Valid Values} Explanation

ALARM_DEST

Logical name of the Shout destination for critical Alert


messages. Default: ECS

AUTOEDIT_INC_
SEC

{SYSTEM|GLOBAL|GROUP|LOCAL}
Indicates which AutoEdit variables are sent to the
Agent for each submitted job.
Valid values:
SYSTEM All the AutoEdit variables for each
submitted job are sent to the Agent. These include
System, Global, Group, and Local variables.
GLOBAL Global, Group, and Local AutoEdit
variables are sent to the Agent for each submitted
job. System AutoEdit variables are not sent.
GROUP Group and Local AutoEdit variables are
sent to the Agent for each submitted job. System and
Global variables are not sent.
LOCAL Only Local AutoEdit variables are sent to
the Agent.
Default: LOCAL

CTM_DB_
TIMEOUT

{300 3600}
Timeout value (in seconds) for long database
transactions. Default: 600

CTM_GROUP_
ADJUST_DUMMY

{Y|N}
When this parameter is set to Y, and a Group
Scheduling table is ordered, jobs in the group that
should not be ordered at this time are ordered as
DUMMY jobs. This functionality is useful for data
centers that require identical job flow regardless of
whether certain jobs in a group are ordered for a
specific instance of the group. Default: N

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-23

Table 5-11

CONTROL-M/Server Parameters (Part 2 of 3)

Parameter Name

{Valid Values} Explanation

CTM_GROUP_
RECHECK

{Y|N}
Indicates if group conditions should be checked for
each job in a Group Scheduling table after the groups
conditions have been satisfied.
N (default) group conditions are ignored when
ordering specific jobs in a group.
Y group conditions are checked for each job in the
group (in addition to conditions specified for the
job).
Note: If N is specified for this parameter, groups are
activated when the necessary conditions exist, and
remain active regardless of whether or not any of
those conditions are deleted. Default: N

CTM_SLP_
SUSPEND

{30 1200}
During the New Day Procedure and Download of the
Active Jobs file to ENTERPRISE/CS, the ctmcreate,
ctmudly, and ctmorder utilities are suspended. They
stay suspended until the Download or New Day
Procedure is complete or until the specified timeout
period. Default: 30 minutes

CTM_SNMP_
SEND_FORMAT

{S,M}
Indicates whether Single (S) or Multiple (M) variable
format is used for SNMP traps. For more information,
see ctm2snmp on page 2-155. Default: S

CTM_WRITE_
CONSOLE

{YES, NO}
If this parameter is set, critical alerts are sent to the
console of the Server in addition to being sent as
Shout messages to ENTERPRISE/CS. Default: NO

CTMLOG_DEL_CHK

{YES, NO}
When this parameter is set to Y, the use of the ctmlog
utility for delete operation to Control-M is restricted.
Administrator only.
Default: N

CTMORDER_FORCE

{Y, N}
The default action of the utility is to order, not force,
jobs in the Active Jobs file. This action can be
modified by adding keyword Force to the command
that invokes the utility. To change the default to force,
set this parameter to Y. Default: N

BMC Software, Inc., Confidential and Proprietary Information

5-24

CONTROL-M/Server for Unix Administrator Guide

Table 5-11

CONTROL-M/Server Parameters (Part 3 of 3)

Parameter Name

{Valid Values} Explanation

CYCLIC_MAXWAIT

Indicates when cyclic jobs, that have previously


executed at least once, should be removed from the
Active Jobs file by the New Day procedure.
Valid values:
KEEP jobs are removed from the Active Jobs file
when MAXWAIT days have passed regardless of
whether or not the job ended OK.
NOT KEEP jobs are removed from the Active
Jobs file at the next run of the New Day procedure.
Default.

CYCLIC_RERUN

{OK, NOTOK}
If a cyclic job ends NOTOK and this parameter is set
to OK, the cyclic job will be rerun. If set to NOTOK,
the job will not be rerun. Default: OK.

IOALOG_DEL_INT

{1 24}
During the New Day procedure, old IOALOG records
are removed. The default is to delete the old records
in hourly bundles. If set to 24, all the old logs are
deleted in one bundle. Default: 1.

RUNINF_PURGE_
LIMIT

{0 65K}
Number of Run Information records to keep for a
given MemName/MemLib/NodeID. If
RUNINF_PURGE_MODE is 0, the New Day
Procedure deletes all Run Information records for
each unique name except the last n records, where n
is the value of this parameter. Default: 20.

RUNINF_PURGE_
MODE

{0, 1}
New Day Procedure algorithm for cleaning Run
Information records. If set to 1, the New Day
procedure will keep records for the last two days only.
If 0, it uses the RUNINF_PURGE_LIMIT value.
Default: 0.

STATS_TIME

Indicates how the START TIME and END TIME for a


job should be set. Valid values are:
SERVER START TIME and END TIME are set by
CONTROL-M/Server.
AGENT START TIME and END TIME are set
using information received from the
CONTROL-M/Agent.

STATS_TIME
SERVER or AGENT

START TIME and END TIME of a job can be set


relative to either server or agent.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-25

Table 5-12

Performance Parameters

Parameter Name

{Valid Values} Explanation

PP_THRESHOLD

{1 99999}
Maximum number of jobs that can wait in the post
processing queue before the Selector process is
interrupted and post-processing is initiated. Default: 10.

PRIORITY_SL_
SCAN

{0, 1}
Indicates whether to disable (0) or enable (1) the use of
the a jobs Priority in the selection process. Disabling
priority increases performance. Default: 0.

SL_BREAK_INT

{0 99999}
The maximum number of jobs to scan in the selection
process before checking for jobs in the post processing
queue. Default: 100.

Table 5-13

Communication Parameters

Parameter Name

{Valid Values} Explanation

CMN_PRM_CD_IPC_
IN

Inter processing Communication (IPC) Input Queue.


IPC between the CD and CO processes is performed
by using Message Queue kernel resources. The CO
process creates the resource and the CD process
uses the value specified by this parameter to connect
to the resource. The value specified must be unique
for the machine where CONTROL-M is running.

CMN_PRM_CD_IPC_
OUT

IPC Output Queue.

CMN_PRM_CD_MAX
_DBU

{1000 65K}
CONTROL-M accumulates all updates to the
database before sending them to ENTERPRISE/CS.
This parameter determines the maximum number of
updates to accumulate before requesting a
Download. Default 1000.

CMN_PRM_CD_MAX
_SERVICE

{60 32K}
Sets the maximum number of requests that can be
queued by CONTROL-M/Server that originate from
ENTERPRISE/CS gateways. Default: 60.

BMC Software, Inc., Confidential and Proprietary Information

5-26

CONTROL-M/Server for Unix Administrator Guide

ENTERPRISE/CS Communication Parameters


Table 5-14

ENTERPRISE/CS Communication Parameters

Parameter
Name

{Valid Values} Explanation

CTM_PRM_KPA
_ACTIVE

{Y, N}
Indicates whether the Heartbeat monitor operates in active
(Y) or passive (N) mode. Default: Y (Active)

CTM_PRM_KPA
_BETWEEN
_MSGS

{n}
Time in seconds between heartbeat checks. Default: 300.

CTM_PRM_KPA
_ROUNDTRIP_
TIMEOUT

{n}
Time in seconds to wait for a confirmation from
ENTERPRISE/CS. If confirmation does not arrive, a
timeout is generated and the connection is severed.
Default: 300.

Table 5-15

User Exit Parameters (Part 1 of 2)

Parameter Name

{Valid Values} Explanation

CTM_PRM_ENABLE_UE

{Y, N}
Indicates whether CONTROL-M user exits and
Watchdog process exits are enabled.
(See Watchdog Process Parameters
(config.dat) on page 5-31.) Default: Y

CTM_PRM_ENABLE_
UExxx (101-106)

{Y, N}
Indicates whether the associated UExxx user exit
is enabled. For more information, see User Exits
on page 1-50. The following user exits are
available:
UE101 Job Ordering User Exit
UE102 Job Submission User Exit
UE103 Before New Day Procedure User Exit
UE104 After New Day Procedure User Exit
UE105 Before User Daily User Exit
UE106 After User Daily User Exit
Default: N

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-27

Table 5-15

User Exit Parameters (Part 2 of 2)

Parameter Name

{Valid Values} Explanation

CTM_PRM_SCRIPT_
UExxx

Name of the Uexxx user exit script. These scripts


must reside in the ~controlm/ctm/ue_exit
directory. Default: ctm_exitxxx.sh

CTM_PRM_TIMEOUT_
UExxx

{n}
Time in seconds to wait for a user exit script to
run before it is terminated. Default: 20.

CONTROL-M Server and Agent Parameters (config.dat and agconfig.dat)


Table 5-16

CONTROL-M Server and Agent Parameters

Parameter Name

{Valid Values} Explanation

COMM_TRACE

{0, 1}
Debug trace for communication. Default: 0.

COMTIMOUT

{20-360}
Communication timeout in seconds. Default: 120.

COMTRYNO

{1-20}
Communication retry value. Default: 12.

DEBUG_LEVEL

CONTROL-M debug level.

OS_PRM_HOSTNAME

Specifies a local Host Name other than the


machine default Host Name.

PROTOCOL

{TCP, UDP}
Communication protocol. Default: TCP

CONTROL-M/Agent Parameters (agconfig.dat)


Table 5-17

CONTROL-M/Agent Parameters (Part 1 of 3)

Parameter Name

{Valid Values} Explanation

AG_PORT_NUM

Agent Port number.

AGENT_DIR

CONTROL-M/Agent installation directory.

PRINTER_NAME

Printer name for Sysout.

CTM_PRM_DONT_
DELETE

{YES}
At the end of job execution, temporary scripts
generated from jobs are deleted. If this value is set to
Yes, temporary scripts are not deleted.
BMC Software, Inc., Confidential and Proprietary Information

5-28

CONTROL-M/Server for Unix Administrator Guide

Table 5-17

CONTROL-M/Agent Parameters (Part 2 of 3)

Parameter Name

{Valid Values} Explanation

CTM_PRM_KSH_
FLAGS

{-v,-x}
Flags to include when running a job that is written in
Korn Shell. Default: x.

CTM_PRM_SH_
FLAGS

{-v,-x}
Flags to include when running a job that is written in
Borne Shell. Default: x.

CTM_SU_PATH

Alternate path for the /bin/su binary that is used by


CONTROL-M to launch user jobs.

CTM_PARM_ENC

Character to use to enclose parameters before the


job script is launched.
To use blanks (version 2.1.0), leave the value blank.
Default: Double quotes ().
Each parameter passed to the script contains this
character before and immediately after the parameter.
If more than one parameter is used, the parameters
are delimited by a space between the parameters.
Use double quotes () if the CTM_PARM_ENC
parameter is not defined in the agconfig.dat file.
To specify the CTM_PARM_ENC parameter without a
value, leave the enclosing character blank ( ).
CONTROL-M launches a job using su - owner -c
memlib/memname parm1 parm2 parm3 ...
The user can control the evaluation of parameters by
enclosing the parameters with different characters.
If double quotes are used (") then variables are
resolved in the owners environment before they are
passed to the script. If single quotes () are used then
the parameters are not evaluated before the script is
launched.
Before enclosing a parameter with predefined
characters CONTROLM checks if the user already
enclosed the parameter.
If the parameter is already encapsulated, then
CONTROLM skips the encapsulation process so that
the parameter will not be encapsulated twice.

CTMS_ADDR_
MODE

{IP}
If this parameter is set to IP, the IP address is saved
in CTMS_HOSTNAME instead of the host name. Use
this parameter when CONTROL-M runs on a platform
with more than one network card.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-29

Table 5-17

CONTROL-M/Agent Parameters (Part 3 of 3)

Parameter Name

{Valid Values} Explanation

CTMS_
COMVERSION

{01| 02| 03}


Specifies the CONTROL-M/Server version with which
the agent is working. Valid values are:
01 for 2.2.4
02 for 2.2.5
03 for 6.0.00. Default

CTMS_HOSTNAME

Primary host running CONTROL-M/Server.

CTMS_PORT_NUM

Port number that CONTROL-M/Server listens to.

EXIT_STATUS_DIR

Redefined Exit Status directory on the Agent platform


used to store job status.

SYSOUT_NAME

{JOBNAME | MEMNAME}
If this parameter is set to JOBNAME, parameter
Jobname is used in the sysout file instead of
parameter Memname. Default: MEMNAME.

SYSOUT_MODE

Octal value indicating file access mode of the Sysout


(output) file.
For example, 777 indicates the highest level of
access.

TRANSLATE_$0

{Y | N}
If this parameter is set to N, $0 is not translated in a
script before it is run. Otherwise, $0 is replaced by a
file name before the script is run. Default: Y

BMC Software, Inc., Confidential and Proprietary Information

5-30

CONTROL-M/Server for Unix Administrator Guide

Watchdog Process Parameters (config.dat)

The following parameters are used for the Watchdog Process. (For
more information, see Watchdog Facility on page 1-44.) Parameter
CTM_PRM_ENABLE_UE must be set to Y to enable the WD process.
General Parameters
Table 5-18

General Watchdog Process Parameters (Part 1 of 2)

Parameter Name

{Valid Values} Explanation

WD_INTERVAL

{n}
Amount of time in minutes between each set of
Watchdog checks. If the checks take longer than the
specified time, the time interval is saved and the
longest interval time is included in the message sent
automatically to the error handler(s) once every 50
intervals. Default: 5.

WD_HEARTBEAT_
INTERVAL

{n}
Nth interval in the Watchdog process to check
CONTROL-M processes. If this parameter is set to 5,
the Watchdog process sends a message to each of
the primary CONTROL-M processes every 5th
interval and awaits a response. Default: 5

WD_HEARTBEAT_
TIMEOUT

{n}
Maximum time (in seconds) to wait for a response
from each of the CONTROL-M processes, after
issuing a Heartbeat check, before sending a message
to the error handlers. Default: 360.

WD_CTMEXIT_
NUMBER

{n}
Total number of CONTROL-M system exits to run.
Default: 2.

WD_USEREXIT_
NUMBER

{n}
Total number of user exits to run. Default: 0.

WD_ALIVE_MSG

Message string sent every interval to the error


handlers if all the Watchdog processes are
functioning. We recommend that you use this
parameter when using CONTROL-O/Server as an
error handler (see WD_CTO_HOSTNAME below).
Default: WD is alive.

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-31

Table 5-18

General Watchdog Process Parameters (Part 2 of 2)

Parameter Name

{Valid Values} Explanation

WD_CTO_
HOSTNAME

Host name or IP address of the machine running


CONTROL-O/Server. If this parameter is specified,
the Watchdog process sends all error messages to
the CONTROL-O/Server Central Message window.

WD_CTO_TIMEOUT

{1-10}
Maximum time (in second) to send messages to
CONTROL-O/Server before terminating the
communication. Default: 10 seconds.

WD_ERROR_
HANDLER_
SCRIPT_FILE

Full path name of a user defined script called by the


Watchdog process as an error handler. The error
messages are included as arguments to the script.
Default: ./scripts/UE_handler that sends alerts to
ENTERPRISE/CS.

WD_ERROR_
HANDLER_
TIMEOUT

{n}
Maximum time in seconds to wait for the error handler
script to run before terminating the script. Default: 5.

CONTROL-M System Exit Parameters

The # used in each of the following CONTROL-M system exit


parameters represents the corresponding CONTROL-M utility that can
be included in the CONTROL-M Watchdog process: Disk Space Utility
(1) and Database Usage Utility (2). See ctmdiskspace on page 2-62 and
ctmdbspace on page 2-45 for more information.
Table 5-19

Watchdog Parameters for CONTROL-M System Exits


(Part 1 of 2)

Parameter Name

{Valid Values} Explanation

WD_CTMEXIT_#_CMD_LINE

Arguments to be passed to the utility.


Arguments must start with a - sign. Values
separated by either a space or a - sign
must be enclosed in double quotes.
Mandatory.
Default for #1: -Limit 10M -Path $HOME
Default for #2: -Limit 90

WD_CTMEXIT_#_ERROR_MSG

Error message string to be passed to the


error handler(s) if the utility returns a
failed status. Optional.
BMC Software, Inc., Confidential and Proprietary Information

5-32

CONTROL-M/Server for Unix Administrator Guide

Table 5-19

Watchdog Parameters for CONTROL-M System Exits


(Part 2 of 2)

Parameter Name

{Valid Values} Explanation

WD_CTMEXIT_#_INTERVAL

{1-1440 intervals per day}


Interval in the Watchdog process in which
to run this utility. Required. Default: 5.

WD_CTMEXIT_#_RUN_STATE

{Y, N}
Specify whether (Y) or not (N) to run the
utility in Run (that is, normal) mode. A Y
must be specified for either this parameter
or for parameter
WD_CTMEXIT_#_SUSPEND _STATE for
the utility to be run. Default: N.

WD_CTMEXIT_#_SCRIPT_FILE

Relative path of the executable file from


the ~controlm\ctm\exe_<platform>
directory.
Default for #1: CTMDISKSPACE
Default for #2: CTMDBSPACE

WD_CTMEXIT_#_SUSPEND
_STATE

{Y, N}
Specify whether (Y) or not (N) to run the
utility in Suspend mode (that is, during New
Day procedure or download, when the
database inaccessible). A Y must be
specified for either this parameter or for
parameter WD_CTMEXIT_#_RUN _STATE
for the utility to be run. Default: N.

WD_CTMEXIT_#_TIMEOUT

{n}
Maximum time (in seconds) that the utility
is allowed to run. If the utility runs longer
than the time indicated, it will terminate
and an error message will be sent.
Mandatory. Default: 5 seconds.

Watchdog User Exit Parameters

The # used in the following user exit parameters represents a separate


number for each user exit that can be included in the CONTROL-M
Watchdog process (see Watchdog Facility on page 1-44). A user exit
can be either a user supplied script/executable file or a CONTROL-M
utility (see Chapter 2, Utilities).

BMC Software, Inc., Confidential and Proprietary Information

Customization Parameters

5-33

Table 5-20

Watchdog Parameters User Exit

Parameter Name

{Valid Values} Explanation

WD_USEREXIT_#_CMD_LINE

Arguments to be passed to the


script/executable file. Arguments must start
with a - sign. Values separated by either a
space or a - sign must be enclosed in
double quotes. Optional.

WD_USEREXIT_#_ERROR_
MSG

Error message string to be passed to the


error handler(s) if the check returns a
failed status. Optional.

WD_USEREXIT_#_INTERVAL

{1-1440 intervals per day}


Interval in the Watchdog process in which
to run this script. Mandatory. Default: 5.

WD_USEREXIT_#_RUN_
STATE

{Y, N}
Specify whether (Y) or not (N) to run the
script in Run (that is, normal) mode. This
parameter or WD_CTMEXIT_#_SUSPEND
_STATE must be set to Y for the script to be
run. Default: N.

WD_USEREXIT_#_SCRIPT_
FILE

Full path of the user script/executable file.


Mandatory. Example:
~controlm\ctm\exe_<platform>\ctm_ping
_list

WD_USEREXIT_#_SUSPEND_
STATE

{Y, N}
Specify whether (Y) or not (N) to run the
script in Suspend mode (that is, during New
Day procedure or download, when the
database inaccessible). This parameter or
WD_CTMEXIT_#_RUN _STATE must be set
to Y for the script to be run. Default: N.

WD_USEREXIT_#_TIMEOUT

{n}
Maximum time in seconds that the script is
allowed to run. If the script runs longer than
the time indicated, it will terminate and an
error message will be sent. Mandatory.
Default: 5.

BMC Software, Inc., Confidential and Proprietary Information

5-34

CONTROL-M/Server for Unix Administrator Guide

User Exits

A user exit is a user-defined procedure that can be used to modify certain


information before it is processed. At certain points in CONTROL-M
processing a flat text file is produced describing information that is to be
passed to next step in a procedure. This text file can be modified by a
user-defined exit script before it is passed on for processing.
CONTROL-M user exits can be used to enforce site standards (for
example, file naming conventions or valid date formats), and to apply
security definitions to limit certain users actions. Exits can also be used
to trigger other actions prior or subsequent to execution of a
CONTROL-M job or a CONTROL-M procedure.
All user-defined exit scripts must be located in the ~<controlm_owner>/
ctm/ue_exit directory and have default file names in the format
ctm_exitxxx.sh, where xxx is the exit number.
Table 6-1 describes the available CONTROL-M user exits.

BMC Software, Inc., Confidential and Proprietary Information

User Exits

6-1

Table 6-1

CONTROL-M General User Exits

User Exit

Description

CTMUE101

Job Ordering User Exit executed for each CONTROL-M


job before it is ordered. For more information, see Job
Order Exit (CTMUE101) on page 6-5.

CTMUE102

Job Submission User Exit executed for each


CONTROL-M job before it is submitted for execution. For
more information, see Job Submission Exit (CTMUE102)
on page 6-7.

CTMUE103

Before New Day Procedure User Exit executed before


the New Day procedure is run.
For more information, see Before New Day Procedure Exit
(CTMUE103) on page 6-9.

CTMUE104

After New Day Procedure User Exit executed after the


New Day procedure is run. For more information, see After
New Day Procedure Exit (CTMUE104) on page 6-10.

CTMUE105

Before User Daily User Exit executed before each run of


a CONTROL-M User Daily job (except SYSTEM).
For more information, see Before User Daily Exit
(CTMUE105) on page 6-11.

CTMUE106

After User Daily User Exit executed after each run of a


CONTROL-M User Daily job (except SYSTEM).
For more information, see After User Daily Exit
(CTMUE106) on page 6-11.

Note

A special category of user exits can be defined for the Watchdog facility.
For more information, see Watchdog Facility on page 1-44.

BMC Software, Inc., Confidential and Proprietary Information

6-2

CONTROL-M/Server for Unix Administrator Guide

Configuring CONTROL-M Exits


To enable CONTROL-M exits, you must specify Y for parameter
CTM_PRM_ENABLE_UE in the config.dat file. Certain other
parameters are used to enable and disable specific exits.
Some of these parameters are described in Table 6-2. For more
information, see Chapter 5, Customization Parameters.
Table 6-2

Exit Configuration Parameters

Parameter Name

Valid
Values

CTM_PRM_ENABLE_UE

{Y, N}

Indicates whether or not CONTROL-M user exits are


enabled. This parameter must be set to Y to enable
all user exits. Default: Y

CTM_PRM_ENABLE_UExxx

{Y, N}

Indicates whether or not the Associated UExxx user


exit is enabled (where xxx = 101-106).
UE101 Job Ordering User Exit
UE102 Job Submission User Exit
UE103 Before New Day Procedure User Exit
UE104 After New Day Procedure User Exit
UE105 Before User Daily User Exit
UE106 After User Daily User Exit
Default: N

CTM_PRM_SCRIPT_UExxx

string

Name of the UExxx user exit script (where


xxx = 101-106). These scripts must reside in the
~<controlm_owner>/ctm/ue_exit directory.
Default: ctm_exitxxx.sh

CTM_PRM_TIMEOUT_UExxx

{n}

Time (in seconds) to wait for the associated user exit


script to run before it is terminated. Default: 20
seconds

Description

BMC Software, Inc., Confidential and Proprietary Information

User Exits

6-3

User Exit Workflow


Each user exit is triggered at a specific point in CONTROL-M
processing. The following steps illustrate what happens when an exit has
been enabled.
Note

User exits are implemented only if they have been enabled by setting the
appropriate configuration parameters (described in Table 6-2, Exit
Configuration Parameters, on page 6-3).
1. A flat text file is produced containing parameters to be processed by
CONTROL-M.
2. The name of the text file is passed as the $1 parameter to the user
exit script in the ue_exit directory.
3. The user exit script is run. This script is often used to modify the
contents of the text file. However, it can also be used to perform any
other action (for example, to copy information from the text file to
another location).
4. CONTROL-M continues processing using the modified text file.

BMC Software, Inc., Confidential and Proprietary Information

6-4

CONTROL-M/Server for Unix Administrator Guide

Job Order Exit (CTMUE101)


This exit is executed for each CONTROL-M job before it is ordered. The
flat text file passed to the exit is a job record from the Scheduling
definition table. User exit CTMUE101 can be used to alter the job
information in this after it is fetched from the database and before it is
passed to the procedure that will determine if the job will be ordered for
the current day.
The following is a sample text file in the format that is passed to the
CTMUE101 exit:
JOBNAME daily_job
JOBNO 30
DESCRIPT
APPLIC STRESS
APPLGROUP STRESS
SCHEDTAB STRESS
AUTHOR ctm600
OWNER ctm600
PRIORITY 0
CRITICAL N
CYCLIC N
RETRO N
AUTOARCH N
TASKCLASS
CYCLICINT 0
TASKTYPE C
DATEMEM
NODEGRP
PLATFORM
NODEID
DOCLIB
DOCMEM
MEMLIB
MEMNAME
OVERLIB
CMDLINE ./stress_cmd_spl.ctm600
MAXRERUN 0
MAXDAYS 0
MAXRUNS 0
FROMTIME
BMC Software, Inc., Confidential and Proprietary Information

User Exits

6-5

UNTIL
MAXWAIT 0
DAYSTR ALL
WDAYSTR
MONTHSTR YYYYYYYYYYYY
AJFSONSTR NNNNNNNNNNNNN
CONF N
UNKNOWNTIM 0
DAYSCAL
WEEKCAL
CONFCAL
CAL_ANDOR O
SHIFT
ADJUST_COND
STARTENDCYCIND S
CREATIONUSERID ctm600
CREATIONDATETIME 20001113070229
CHANGEUSERID
CHANGEDATETIME
RELATIONSHIP
GROUPID 0
TABROWNO 1

Example

The following exit script changes the Days parameter (DAYSTR) for jobs
that were scheduled on the first day of the month, so that these jobs will
be ordered on the second day of the month.
#!/bin/ksh
cp $1 /tmp/ue101.$$
sed -e s/DAYSTR 1/DAYSTR 2/ /tmp/ue101.$$ > $1

BMC Software, Inc., Confidential and Proprietary Information

6-6

CONTROL-M/Server for Unix Administrator Guide

Job Submission Exit (CTMUE102)


This exit is executed for each CONTROL-M job before it is submitted
for execution. The flat text file passed to the exit contains a job record
from the Active Job File table. User exit CTMUE102 can be used to alter
job information in this record before it is passed to the CONTROL-M/
Agent for job submission.
The following is a sample text file in the format that is passed to the
CTMUE102 exit:
JOBNO 0
ORDERNO 19450
PRIORITY 1039
CRITICAL N
TASKTYPE C
CYCLIC N
CONFIRM_R N
CONFIRMED N
RETRO N
AUTOARCH N
TASKCLASS
HOLDFLAG N
STATUS N
STATE E
CYCLICINT 0
APPLGROUP dw_S_A_AAS
NODEGRP
NODEID fire
MEMLIB /mdw/oper/tgt/scripts/shells
MEMNAME dw##r#####
OVERLIB /mdw/oper/tgt/scripts/shells/overlib_all
CMDLINE sleep 30
ODATE 19960229
PROCID
RERUN_NO 0
OSCOMPSTAT 0
OSCOMPMSG
NEXTTIME
PREVDATE
NEXTDATE
STARTRUN
BMC Software, Inc., Confidential and Proprietary Information

User Exits

6-7

ENDRUN
MAXRERUN 0
FROMTIME
UNTIL
JOBNAME dwlnr21AAS
SCHEDTAB CREATED
OWNER ctm600
MAXWAIT 7
APPLIC DW_ln
RUNCOUNT 1
DAILYNAME ctm600
AJFSONSTR YYNNYNNNNNNNN
DESCRIPT Datawarehouse ln snapshot sort and form
DOCMEM dwlnr1
DOCLIB /mdw/cntlm/doc
MAXDAYS 0
MAXRUNS 0
UNKNOWNTIM 0
STARTENDCYCIND S
TRIGGER_TAG
GROUP_ORD 0
AUTHOR

Example

The following exit script checks if the job has a Owner of root and
changes the Owner for these jobs to nobody.
#!/bin/ksh
cp $1 /tmp/ue102.$$
sed -e s/OWNER root/OWNER nobody/ /tmp/ue102.$$ > $1

BMC Software, Inc., Confidential and Proprietary Information

6-8

CONTROL-M/Server for Unix Administrator Guide

Before New Day Procedure Exit (CTMUE103)


This exit is executed before the New Day procedure is run. The New Day
Procedure performs automatic functions at the beginning of each new
CONTROL-M working day. This procedure is used as a master scheduler
for all CONTROL-M activities. For more information, see New Day
Procedure on page 1-13.
The flat text file that is passed to the exit contains the name of the Daily
(SYSTEM), time, and original scheduling date (Odate) of the procedure.
The following is a sample text file in the format that is passed to the
CTMUE103 exit:
DAILY_NAME SYSTEM
TIME 1300
ODATE 20001121

Example

The following exit script runs a procedure that performs various actions
before the New Day procedure is run.
#!/bin/ksh
/opt/controlm/scripts/run_pre_New_Day_proc

BMC Software, Inc., Confidential and Proprietary Information

User Exits

6-9

After New Day Procedure Exit (CTMUE104)


This exit is executed after each run of the CONTROL-M New Day
procedure. The flat text file that is passed to the exit contains the name of
the Daily (SYSTEM), time, and original scheduling date (Odate) of the
procedure.
The following is a sample text file in the format that is passed to the
CTMUE104 exit:
DAILY_NAME SYSTEM
TIME 1319
ODATE 20001121

Example

The following exit script runs a procedure that performs various actions
after completion of the New Day procedure.
#!/bin/ksh
/opt/controlm/scripts/run_post_New_Day_proc

BMC Software, Inc., Confidential and Proprietary Information

6-10

CONTROL-M/Server for Unix Administrator Guide

Before User Daily Exit (CTMUE105)


This exit is executed before each CONTROL-M User Daily job (except
SYSTEM) is run. User Daily jobs can be used to order new jobs. For
more information, see User Daily Jobs on page 1-18.
The flat text file that is passed to the exit contains the name of the User
Daily, time, and original scheduling date (Odate) of the User Daily job.
The following is a sample text file in the format that is passed to the
CTMUE105 exit:
DAILY_NAME my_daily
TIME 1321
ODATE 20001121

After User Daily Exit (CTMUE106)


This exit is executed after each CONTROL-M User Daily job (except
SYSTEM) is run. User Daily jobs can be used to order new jobs. For
more information, see User Daily Jobs on page 1-18.
The flat text file that is passed to the exit contains the name of the User
Daily, time, and original scheduling date (Odate) of the User Daily job.
The following is a sample text file in the format that is passed to the
CTMUE105 exit:
DAILY_NAME my_daily
TIME 1322
ODATE 20001121

BMC Software, Inc., Confidential and Proprietary Information

User Exits

6-11

BMC Software, Inc., Confidential and Proprietary Information

6-12

CONTROL-M/Server for Unix Administrator Guide

Mirroring and Failover

This chapter provides in-depth information about database mirroring and


failover support for the CONTROL-M/Server platform. General planning
considerations and detailed administrative procedures are discussed.

Failover Planning
You can implement either one of the following levels of failover
capability:

Mirror Database - a database on an independent database server


mirrors the CONTROL-M/Server database.

Failover Server - a secondary CONTROL-M/Server installation on a


different computer, including a mirror database.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-1

Mirror Database

The Mirror Database option is illustrated schematically in Figure 7-1. In


addition to the primary database installed with CONTROL-M/Server, a
secondary database is built on another Database Server platform. All
transactions to the primary CONTROL-M database are written to the
secondary mirror database.
Figure 7-1

Database Mirroring

If the CONTROL-M primary database server fails, or if the primary


database loses integrity, CONTROL-M/Server operation can be restored
using either of the following manual interventions:

You can direct CONTROL-M/Server to use the mirror database


instead of the primary database. The primary CONTROL-M
database can be rebuilt when time allows.

You can rebuild the CONTROL-M primary database from the mirror
database.

If communication with the mirror database fails, the mirror database is


considered damaged and writing to it is disabled. Normal CONTROL-M
operation is not affected. Mirroring can be re-initialized after you repair
the communications link.
Implementing a Mirror Database

Database mirroring can be initialized any time after CONTROLM/Server has been installed.

BMC Software, Inc., Confidential and Proprietary Information

7-2

CONTROL-M/Server for Unix Installation Guide

The mirror database should be built on a separate database server,


independent of the database server that hosts the primary CONTROL-M
database.

Requirements and preparatory steps for a mirror database on a


Sybase database server are described in Preparing a CONTROL-M
Mirror Database on a Sybase Server on page 7-4.

Requirements and preparatory steps for a mirror database on an


Oracle database server are described in Preparing a CONTROL-M
Mirror Database on an Oracle Server on page 7-7.

Several administrative functions are used to initialize, enable, and restore


CONTROL-M database mirroring. They are described in Table 7-1.
These functions are accessed from the Database Mirroring menu of the
CONTROL-M/Server Main Menu (see The Database Mirroring Menu
on page 7-13).
For a description of database failover, recovery, and restoration
procedures, see Recovering from Database Failure (Mirror Database)
on page 7-29.
Table 7-1

Database Mirroring Functions (Part 1 of 2)

Menu Option

Description

Check
Mirroring
Status

Reports the current mirroring status:


Enabled: system writes transactions to mirror database.
Disabled: system does not write to mirror database.
Damaged: mirror database is damaged, mirroring is
disabled.
Mirroring is not defined: the query process did not
succeed in accessing the primary database server.

Initialize
Mirroring

Initializes Mirroring with a secondary database. You can


choose to copy the primary database to an existing
database, or build/rebuild the secondary database from
scratch. Running this procedure leaves mirroring enabled.
See Initializing the Mirror Database - Copy/Build on page
7-16.

Disable
Mirroring

Stops Mirroring. Transactions are no longer written to the


secondary database server. You must use the Initialize
Mirroring option to re-enable mirroring.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-3

Table 7-1

Database Mirroring Functions (Part 2 of 2)

Use Mirror
Database

Used when the primary database has failed or become


damaged. CONTROL-M/Server operates using the mirror
database. See Operating CONTROL-M/Server with the
Mirror Database on page 7-30.

Restore
CONTROL-M
Database from
Mirror

Restores normal function after the primary database has


been repaired. Copies mirror database to primary
database. CONTROL-M/Server operates using the
primary database. After restoring, you must run the
Initialize Mirroring option to re-enable mirroring. See
Restoring the Primary Database and Initializing Mirroring
on page 7-31.

Preparing a CONTROL-M Mirror Database on a Sybase Server

To prepare the mirror database, verify the requirements listed here, and
perform the specified configuration steps.
Note

Database and account names that you create must conform to Sybase
naming conventions.
1. Verify that the Sybase SQL Server used for mirroring will be
running, both when initializing mirroring, and whenever
CONTROL-M/Server is operational.
2. When building a database from scratch, you will need the password
of the Sybase system administrator for installation.
3. Determine the following parameter values:

Sybase Host Name - Host name of the machine that runs the
Sybase SQL Server to be used for mirroring.

Sybase Port Number - TCP/IP query port number for the


Sybase SQL Server to be used for mirroring. Use the dsedit
utility to find this value.

BMC Software, Inc., Confidential and Proprietary Information

7-4

CONTROL-M/Server for Unix Installation Guide

Parameters user connections, memory, and locks must contain


appropriate values. For more information, see the
CONTROL-M/Server for Unix Installation Guide.

If you change the value of any of these parameters, the change will
not be implemented until you shut down and restart Sybase SQL
Server. For more information about Sybase parameters see
descriptions of dsedit, sp_configure, and reconfigure in the Sybase
Commands Reference Manual.
4. The following details are needed to construct the database:

A database name and a database owner (DBO) name for the


mirror database. The database name can be the same as the
database owner name, but the database name and database owner
name must each be unique for a particular Sybase SQL Server.
Therefore, when selecting names for the CONTROL-M database
(using an existing Sybase SQL Server), verify that the database
name and database owner name are unique for the Sybase SQL
Server.

Unix system paths or raw partitions for the temp and log
datafiles. These paths must be unique.

Sybase device names for the temp and log databases. These
names must be unique for the database server. Use the
sp_helpdevice command to view existing devices on the
database server.

If you will be building a database, you must supply values for the
database owner, database name, devices and file/partition paths:

Specifying existing owner name, database name, and device


assigments will erase and recreate these database elements.

Specifying new, unique values for owner name, database name,


and device assigments will build a new database on the server.

Any filenames you specify for a file-based installation must not


exist on the mirror database server.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-5

For more information about database names, see create database in


the Sybase Commands Reference Manual. For more information
about login names, see sp_addlogin in the Sybase Commands
Reference Manual.
5. Every platform type uses a different character set for Sybase. If the
character set for the primary database and mirror database are not the
same, the character set for the primary database must be installed on
the mirror Sybase SQL Server. Use the dsedit Sybase utility to
configure the character set for the existing SQL Server.

BMC Software, Inc., Confidential and Proprietary Information

7-6

CONTROL-M/Server for Unix Installation Guide

Preparing a CONTROL-M Mirror Database on an Oracle Server

To prepare the mirror database, verify the requirements listed here, and
perform the specified configuration steps.
Note

Database and account names that you create must conform to Oracle
naming conventions.
1. Verify that the Oracle SQL Server and the listener for the mirror
database will be running, both when initializing mirroring, and
whenever CONTROL-M/Server is operational.
2. When building a database from scratch, you will need the password
of the Oracle system administrator for installation.
3. Determine the following parameter values:

Oracle SID - Server ID of the secondary database server.

Oracle Host Name - Host name of the machine that runs the
Oracle SQL Server to be used for mirroring.

Oracle Port Number - TCP/IP query port number for the Oracle
SQL Server used for mirroring.

To find the values for these parameters, specify the following


commands on the secondary database server:
echo $ORACLE_SID
cat $ORACLE_HOME/network/admin/tnsnames.ora

4. The tablespace name and database owner name must each be unique
for a particular Oracle SQL Server. However, the tablespace name
and the DBO name can be identical to each other. Therefore, when
selecting names for the CONTROL-M mirror database, verify that
the tablespace name and owner name are each unique for the
particular Oracle SQL Server.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-7

If you will be building a database, you must supply values for the
database owner and tablespace name:

Specifying existing owner and tablespace will erase and recreate


these database elements.

Specifying new, unique values for owner and tablespace name


will build a new database on the server.

BMC Software, Inc., Confidential and Proprietary Information

7-8

CONTROL-M/Server for Unix Installation Guide

Failover Server

The Failover Server option is illustrated schematically in Figure 7-2. A


secondary installation of the CONTROL-M/Server resides on a separate
computer. Typically the database of the secondary CONTROL-M/Server,
created as part of the CONTROL-M/Server installation, acts as a mirror
database.
The secondary CONTROL-M/Server, including its database, acts as a
backup to the primary CONTROL-M/Server. This secondary
CONTROL-M/Server platform is sometimes called the Mirror
Environment.
The secondary CONTROL-M/Server duplicates all of the primary
CONTROL-M/Servers links to CONTROL-M/Agents or
ENTERPRISE/CS workstations. The secondary CONTROL-M/Server is
defined in the each ENTERPRISE/CS workstations Data Centers
window, and in each Agents list of authorized server hosts.
Figure 7-2

Server Platform Failover - Primary Environment and Mirror


Environment

During normal operation, the secondary database is constantly updated to


remain identical with the primary database. The secondary
CONTROL-M/Server remains inactive.
BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-9

If the primary CONTROL-M/Server fails due to a hardware/software


problem on the primary platform, the administrator activates failover to
the secondary CONTROL-M/Server. The secondary CONTROLM/Server performs all normal CONTROL-M functions until the primary
CONTROL-M/Server is repaired.
Jobs submitted to Agent platforms before failover continue executing.
The secondary CONTROL-M/Server polls the Agent platforms to
determine the status of jobs listed in the Active Jobs file.
When the primary CONTROL-M/Server is stable, normal operation is
restored. The failover server is shut down, the primary database is
restored, and the primary CONTROL-M./Server is restarted. The
secondary server returns to passive readiness.
Implementing a Failover Server

A failover server can be implemented any time after CONTROLM/Server has been installed.
The secondary CONTROL-M/Server installation should be built on a
separate computer and database server, independent of the platforms
server that host the primary CONTROL-M/Server and its database.
Requirements and preparatory steps for the failover server are described
in Preparing a Failover Server on page 7-12.
Several administrative functions are used to initialize, enable, and restore
database mirroring. They are described in . These functions are accessed
from the Database Mirroring menu of the CONTROL-M/Server Main
Menu (see The Database Mirroring Menu on page 7-13).
For a description of server failover, recovery, and restoration procedures,
see Recovering from Primary CONTROL-M/Server Failure (Server
Failover) on page 7-33.

BMC Software, Inc., Confidential and Proprietary Information

7-10

CONTROL-M/Server for Unix Installation Guide

Table 7-2

Server Failover Functions

Menu Option

Description

Initialize Failover

Initializes the Failover Server on the secondary


CONTROL-M/Server. The secondary CONTROLM/Server is dormant and inactive. See Initializing the
Failover Server on page 7-27.

Start Failover

Used when primary CONTROL-M/Server platform fails. To


activate the secondary CONTROL-M/Server using the
mirror database, you must first run this option, then start
CONTROL-M/Server on the secondary platform. See
Failover to the Secondary CONTROL-M/Server on page
7-33.

Stop Failover

Stops failover operation. See Restoring the Primary


CONTROL-M/Server on page 7-34.

Disable Failover

Disengages the secondary CONTROL-M/Server from the


primary CONTROL-M/Server. To restore failover, you must
initialize the failover server from scratch using the Initialize
Failover and Initialize Mirroring options.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-11

Preparing a Failover Server

Install CONTROL-M/Server on the secondary, failover computer using


the standard installation procedures described in the CONTROLM/Server for Unix Installation Guide. Verify the following conditions for
the secondary installation:

The Agent-to-Server Port Number and Server-to-Agent Port


Number communication parameters must be the same on both
CONTROL-M/Server platforms. These ports must also be
dedicated to the use of CONTROL-M/Server. You should also
ensure that both machines are using the same date.

Although the failover server can be configured to use a dedicated


or a non-dedicated database SQL Server, it should not use the
same instance of the database SQL Server used by the primary
environment.

The parameter Database (Data Portion) Size should be


assigned the same value as the current size of the primary
database.

All Agent platforms or ENTERPRISE/CS workstations that are


defined on the primary CONTROL-M/Server should also be
defined on the failover server. These definitions must be
identical. If you installed CONTROL-M/Agent on the primary
CONTROL-M computer, it should also be installed on the
failover server. The parameters should be the same on both
CONTROL-M/Server installations.
The failover servers host name must be added to each Agents
list of authorized hosts. Similarly, each ENTERPRISE/CS
workstation.should include the mirror environment host name in
the Data Center window.

BMC Software, Inc., Confidential and Proprietary Information

7-12

CONTROL-M/Server for Unix Installation Guide

Failover Administration Procedures


This section details the steps you will take to prepare failover systems, to
implement them if necessary, and to restore normal function.
The Database Mirroring Menu

Most of the commands and procedures used to manage mirroring and


failover are accessed through the Database Mirroring menu.
To access the Database Mirroring Menu:
Step 1

Log in to the platform as the CONTROL-M/Server owner.

Step 2

Enter the following command to open the CONTROL-M Main Menu:


ctm_menu

Step 3

The following menu is displayed:


CONTROL-M Main Menu: Select one of the following menus:
1 - CONTROL-M Manager
2 - Database Creation
3 - Database Maintenance
4 - Database Mirroring
5 - Security Authorization
6 - Parameter Customization
7 - Node Group
8 - Agent Status
9 - Troubleshooting
q - Quit

Type 4 to select Database Mirroring and press <Enter>.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-13

Step 4

The Database Mirroring menu is displayed:


Database Mirroring Menu
---------------------------Select one of the following options:
Primary Server Options:
1 - Check Mirroring Status
2 - Initialize Mirroring
3 - Disable Mirroring
4 - Use Mirror Database
5 - Restore CONTROL-M Database from Mirror
Failover Server Options:
6 - Initialize Failover
7 - Start Failover
8 - Stop Failover
9 - Disable Failover
q - Quit
Enter option number --->

[]:

The options of the Database Mirroring menu are divided into procedures
implemented on the primary CONTROL-M/Server, and procedures
implemented on the secondary, failover CONTROL-M/Server. Table 7-3
summarizes the Database mirroring options.
Note

Most options on the Database Mirroring menu change system variables


in the user environment (in file .cshrc). To start CONTROL-M/Server in
the current window after running these options, specify the command
source ~/.cshrc to restore user environment variables.

Table 7-3

Database Mirroring Menu Options (Part 1 of 2)

Primary Server Options

Option

Description

Check Mirroring
Status

Reports the current mirroring status:


Enabled: system writes transactions to mirror database.
Disabled: system does not write to mirror database.
Damaged: mirror database is damaged, mirroring is
disabled.
Mirroring is not defined: the query process did not
succeed in accessing the primary database server.

BMC Software, Inc., Confidential and Proprietary Information

7-14

CONTROL-M/Server for Unix Installation Guide

Table 7-3

Database Mirroring Menu Options (Part 2 of 2)

Initialize Mirroring

Initializes Mirroring with a secondary database. You can


choose to copy the primary database to an existing
database, or build/rebuild the secondary database from
scratch. Running this procedure leaves mirroring enabled.

Disable Mirroring

Stops Mirroring. Transactions are no longer written to the


secondary database. You must use the Initialize Mirroring
option to re-enable mirroring.

Use Mirror
Database

Used when the primary database has failed or become


damaged. CONTROL-M/Server operates using the mirror
database.

Restore
CONTROL-M
Database from
Mirror

Restores normal function after the primary database has


been repaired. Copies mirror database to primary
database. CONTROL-M/Server operates using the
primary database. After restoring, you must run the
Initialize Mirroring option to re-enable mirroring.

Failover Server Options

Option

Description

Initialize Failover

Initializes the Failover Server on the secondary


CONTROL-M/Server. The secondary CONTROLM/Server remains dormant and inactive.

Start Failover

Used when primary CONTROL-M/Server platform fails.


First run this option on the secondary CONTROLM/Server, then start the secondary CONTROL-M/Server.

Stop Failover

Stops failover operation.

Disable Failover

Disengages the secondary CONTROL-M/Server from the


primary CONTROL-M/Server. To restore failover, you must
implement the failover server from scratch using the
Initialize Failover and Initialize Mirroring options.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-15

Initializing Mirror Database and Failover Server

This section describes the procedures for initializing the mirror database
and failover server.

For a Mirror Database, the initialization process copies the contents


of the existing database to an existing secondary database, or builds a
new secondary database from scratch and copies the contents of the
existing database. Then database mirroring is activated between the
primary and secondary databases.
To initialize a mirror database, follow the procedure Initializing the
Mirror Database - Copy/Build on page 7-16.

For a Failover Server, the initialization process synchronizes primary


and secondary CONTROL-M/Servers and activates failover
readiness. The Mirror Database is also initialized.
To initialize a mirror environment, follow the procedure Initializing
the Failover Server on page 7-27.

Initializing the Mirror Database - Copy/Build

The following procedure is used to initialize database mirroring for the


CONTROL-M database.
Note

During the procedure to initialize the CONTROL-M mirror database:


for Sybase: a new entry is automatically added to the interfaces file with
the Sybase Server Name MIRROR.
for Oracle: a new entry is automatically added to the tnsnames.ora file
with the Oracle Server Name ctrlm_mirror.
Step 1

Verify that the secondary database server conforms to the requirements


for mirroring as described in:

Preparing a CONTROL-M Mirror Database on a Sybase Server on


page 7-4 for a Sybase SQL Server
Preparing a CONTROL-M Mirror Database on an Oracle Server
on page 7-7 for an Oracle SQL Server
BMC Software, Inc., Confidential and Proprietary Information

7-16

CONTROL-M/Server for Unix Installation Guide

Step 2

Verify that:

The primary CONTROL-M/Server is not running.


Both the primary and mirror database servers are running.

Step 3

Log in to the primary platform as the CONTROL-M/Server owner.

Step 4

Specify the ctm_menu command to open the CONTROL-M Main


Menu. Type 4 to select Database Mirroring and press <Enter>. From
the Database Mirroring menu, type 2 to select Initialize Mirroring and
press <Enter>.

Step 5

The following messages are displayed:


+----------------------------------------+
|Copy/Build the CONTROL-M Mirror database|
+----------------------------------------+
Do you wish to build a new CONTROL-M Mirror database [y/n] :

To copy the primary database to an existing secondary database, type n


and press <Enter>.
To build a secondary database from scratch, type y and press <Enter>.
Note

If you are initializing database mirroring for the first time, you must
select the build option to create the mirror database. You cannot use the
copy option until the mirror database has been built.

Step 6

For Sybase database servers, continue with Step 6.

For Oracle database servers, continue with Step 8 on page 7-21.

The Mirroring Parameters screen is displayed.


If you selected the copy option, Figure 7-3 shows the Mirroring
Parameters screen for Sybase Database Servers.
Figure 7-3

Mirroring Parameters for Database Copying - Sybase

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-17

Mirroring Parameters:
1)
2)

3)
4)
5)
a|A)
b|B)
q|Q)

CONTROL-M Mirror Database owner(DBO):


DBO password:
Mirror database (data portion) size:
Sybase interface directory:
Mirror Sybase Host Name:
Mirror Sybase Port Number:
CONTROL-M Mirror database name:

ctmfox
######
80 MB
/home/ctm600us/sybase
jordan
4100
FoxDb

Modify all of the above


Build Mirror Database
Quit

Enter command or item number you wish to change [b]:

If you selected the build option, additional parameters are displayed as in


Figure 7-4.
Figure 7-4

Mirroring Parameters for Database Build/Rebuild - Sybase

Mirroring Parameters:
1)
2)

3)
4)
5)
6)
7)
8)
9)
a|A)
b|B)
q|Q)

CONTROL-M Mirror Database owner(DBO):


ctmfox
DBO password:
######
Mirror database (data portion) size:
80 MB
Sybase interface directory:
/home/ctm600us/sybase
Mirror Sybase Host Name:
jordan
Mirror Sybase Port Number:
4100
Mirror Sybase server name:
MIRROR
CONTROL-M Mirror database name:
FoxDb
CONTROL-M Mirror database data device name:
FoxDb_data
CONTROL-M Mirror database log device name:
FoxDb_log
Data Physical Device Path Name: /home1/syb12/FoxDb/FoxDb_data.dat
Log Physical Device Path Name: /home1/syb12/FoxDb/FoxDb_log.dat
Modify all of the above
Build Mirror Database
Quit

Enter command or item number you wish to change [b]:

Step 7

The following options are available on these screens:

BMC Software, Inc., Confidential and Proprietary Information

7-18

CONTROL-M/Server for Unix Installation Guide

Option

Description

a
or a
specific
number

Prompts you for a new value for a parameter.

Continues with Step

Quits the initialization procedure. You can restart the initialization at


a later time from the CONTROL-M Main Menu. Modifications you
have made may not be saved.

To modify all parameters enter a. You will be prompted for a value


for each parameter in the current parameter page. For more
information about these parameters, see Chapter 5, Customization
Parameters.

10, copying or building the database.

Verify that the Mirroring Parameters match the port, host, and database
values of the target mirror database server. Modify the values as
necessary. Table 7-4 describes the parameters. Parameter values must
conform to Sybase naming conventions.
If mirroring has already been implemented, the parameter values shown
generally reflect the settings of the existing mirror database server.
However, some parameters may have been changed since the last
database initialization.
Continue with Step 10 on page 7-23.
Table 7-4

Sybase Mirroring Parameters (Part 1 of 2)

Parameter

Description

CONTROL-M
Mirror Database
Owner

Name of the CONTROL-M Mirror database owner. This


name is used by CONTROL-M when accessing the mirror
database.
When building a new mirror database, the initialization
script creates this user on the database server.
When copying to an existing database, this user must
already be defined on the database server.

DBO Password

Password for the CONTROL-M Mirror database owner (6


to 30 characters, alphanumeric). The characters you enter
are not echoed for security reasons. This password is
used by CONTROL-M processes and utilities to access
the mirror database.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-19

Table 7-4

Sybase Mirroring Parameters (Part 2 of 2)

Parameter

Description

Mirror Database
(Data Portion)
Size

Amount of space (in MB) to allocate for the data portion of


the CONTROL-M Mirror database.
This value is taken from the current size of the primary
database. It cannot be modified. Verify that the secondary
database server can host a database of this size.

Sybase
Interface
Directory

Full path to the Sybase interfaces file on the primary


system. This value is displayed, but cannot be modified.

Mirror Sybase
Host Name

Name of the host computer for the mirror Sybase


Database server.

Mirror Sybase
Port Number

The communications port on which the secondary


database server listens for queries.

Mirror Sybase
Server Name

Name of the mirror database server. This entry is


automatically added to the primary databases interfaces
file. This value is displayed, but cannot be modified.

CONTROL-M
Mirror Database
Name

Name for the CONTROL-M Mirror database. This name


must be unique.
When building a new mirror database, the initialization
script creates this user on the database server.
When copying to an existing database, this user must
already be defined on the database server.

CONTROL-M
Mirror Database
Data Device
Name

Name of the Sybase device on which the CONTROL-M


Mirror database will be created.

CONTROL-M
Mirror Database
Log Device
Name

Name of the Sybase device on which the CONTROL-M


Mirror database log will be created.

Data Physical
Device Path
Name

Full path or physical device name where the mirror


database will be located on the secondary database
server. Specifying a pathname initiates a File-based
installation. Specifying a device name initiates an
installation to a Raw partition.

Log Physical
Device Path
Name

Full path or physical device name where the mirror


databases log database will be located on the secondary
database server. Specifying a pathname initiates a Filebased installation. Specifying a device name initiates an
installation to a Raw partition.
BMC Software, Inc., Confidential and Proprietary Information

7-20

CONTROL-M/Server for Unix Installation Guide

Step 8

The Mirroring Parameters screen is displayed.


If you selected the copy option, Figure 7-5 shows the Mirroring
Parameters screen for Oracle Database Servers.
Figure 7-5

Mirroring Parameters for Database Copying - Oracle

Mirroring Parameters:
1)
2)
3)
4)
5)

CONTROL-M Mirror Database Owner(DBO): ctrlm


DBO Password:
#####
Mirror Oracle Host Name:
Mirror Oracle Port Number:
Mirror Oracle Instance name (SID):

a|A) Modify all of the above


b|B) Build Mirror Database
q|Q) Quit
Enter command or item number you wish to change [b]:

If you selected the build option, additional parameters are displayed as in


Figure 7-6.
Figure 7-6

Mirroring Parameters for Database Build/Rebuild - Oracle

Mirroring Parameters:
1)
2)
3)
4)
5)
6)

CONTROL-M Mirror Database Owner(DBO): ctrlm


DBO Password:
#####
Mirror Oracle Host Name:
Mirror Oracle Port Number:
Mirror Oracle Instance name (SID):
CONTROL-M Mirror tablespace name:
ctrlm

a|A) Modify all of the above


b|B) Build Mirror Database
q|Q) Quit
Enter command or item number you wish to change [b]:

Step 9

The following options are available on these screens:

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-21

Option

Description

a
or a
specific
number

Prompts you for a new value for a parameter.

Continues with Step

Quits the initialization procedure. You can restart the initialization at


a later time from the CONTROL-M Main Menu. Modifications you
have made may not be saved.

To modify all parameters enter a. You will be prompted for a value


for each parameter in the current parameter page. For more
information about these parameters, see Chapter 5, Customization
Parameters.

10, copying or building the database.

Verify that the Mirroring Parameters match the port, host, and database
values of the target mirror database server. Modify the values as
necessary. Parameters are described in Table 7-5. Parameter values must
conform to Oracle naming conventions.
If mirroring has already been implemented, the parameter values shown
generally reflect the settings of the existing mirror database server.
However, some parameters may have been changed since the last
database initialization.
Table 7-5

Oracle Mirroring Parameters (Part 1 of 2)

Parameter

Description

CONTROL-M Mirror
Database Owner

Name of the CONTROL-M Mirror database owner.


This name is used by CONTROL-M when
accessing the mirror database.
When building a new mirror database, the
initialization script creates this user on the database
server.
When copying to an existing database, this user
must already be defined on the database server.

Database Owner
Password

Password for the CONTROL-M database user.


The characters you enter are not echoed for
security reasons. This password is used by
CONTROL-M processes and utilities to access the
CONTROL-M database.

Mirror Oracle Host


Name

The host machine name of an existing Oracle


server.

BMC Software, Inc., Confidential and Proprietary Information

7-22

CONTROL-M/Server for Unix Installation Guide

Table 7-5

Oracle Mirroring Parameters (Part 2 of 2)

Parameter

Description

Mirror Oracle Port


Number

Oracle utilizes this TCP/IP port for communication


between CONTROL-M/Server and Oracle
Database Server. The port must be dedicated to
this purpose.

Mirror Orcale Instance


Name (SID)

The name of the Oracle Database Server.


To find out this name use the following command
on the mirror database server:
echo $ ORACLE_SID

Tablespace name

Name of a defined tablespace on the database


server that will be used by the mirror database.

Continue with Step 10.


Step 10

Step 11

When you are satisfied with the values of all the parameters, specify b
and press <Enter>.

If you selected the copy option, the initialization process continues


with Step 12.

If you selected the build/rebuild option, the initialization process


continues with Step 11.

The following prompt is displayed:


Please confirm that you wish to build a new CONTROL-M Mirror database [y/n]:

Specify y to start building the CONTROL-M mirror database.


The following messages are displayed during the process:
+----------------------------------------------+
| CONTROL-M Database Mirroring Customization |
+----------------------------------------------+
Working...
Building CONTROL-M database ...
Building the CONTROL-M database requires the System Administrators password.
Do you wish to continue? [y]: y

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-23

Specify y or press <Enter> to continue. The following prompt is


displayed:
Please enter mirror database administrators password:

Specify the requested password. The following message is displayed:


For Sybase Database Servers:
This procedure creates new devices on the following physical files:
/home/sybase/<data_file>.dat
/home/sybase/<log_file>.dat
copying database contents.......

During the copy/rebuild process, messages may appear if server settings


do not match recommended settings for database operation. For example:
Locks (sp_configure) is less than 30000 for CONTROL-M database of 50 Mb size.
Please modify the above resource(s) before starting CONTROL-M.
Press <Return> to continue.

Note the system parameters that need to be changed, then press <Enter>
to complete the copy/rebuild procedure. You will need to manually
change these system settings after the copy/build procedure.
The initialization process continues with Step 13.
For Oracle Database Servers:
If the database you wish to build does not exist on the secondary
database server, the following message is displayed:
ATTENTION !!!
The data tablespace file location is on the Server Host Machine
Enter the data tablespace file name with full
path:/home/ctm600uo/oracle/oradata/hurr224uo.dbf

Enter the full path and name of the tablespace file, or press <Enter> to
accept the default path and file . The filename must conform to Oracle
naming conventions.
The following messages are displayed:
Creating CONTROL-M/Server database schema...
copying database contents.......

BMC Software, Inc., Confidential and Proprietary Information

7-24

CONTROL-M/Server for Unix Installation Guide

The initialization process continues with Step 13.


Step 12

The following prompt is displayed:


Please confirm that you wish to copy the contents of CONTROL-M primary
database to CONTROL-M Mirror database [y/n] :y

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-25

Specify y or press <Enter> to continue. The following message is


displayed:
+-----------------------------------------------+
|
CONTROL-M Database Mirroring Customization |
+-----------------------------------------------+
Working...
copying database contents......................................

Step 13

The following message is displayed:


In order to complete this procedure after exiting the menu, please execute
source ~/.cshrc command.
CONTROL-M Database Mirroring initialization completed successfully
Press Enter to continue

Press <Enter> to return to the CONTROL-M Main Menu.


This marks the conclusion of the procedure to build the CONTROL-M
mirror database and initialize mirroring. From now on, any changes
CONTROL-M/Server makes to the primary database are copied to the
mirror database.
Step 14

Exit the current session and start a new login session, or specify the
command source ~/.cshrc to reset user environment variables in the
current window.

Step 15

Restart CONTROL-M/Server.

BMC Software, Inc., Confidential and Proprietary Information

7-26

CONTROL-M/Server for Unix Installation Guide

Initializing the Failover Server


Step 1

Install the secondary CONTROL-M/Server on the secondary computer.


Verify the configuration requirements listed in Preparing a Failover
Server on page 7-12.

Step 2

Verify that the secondary CONTROL-M database conforms to the


requirements for the mirror database as described in:

Preparing a CONTROL-M Mirror Database on a Sybase


Server on page 7-4 for a Sybase SQL Server

Preparing a CONTROL-M Mirror Database on an Oracle


Server on page 7-7 for an Oracle SQL Server

Step 3

Duplicate all communications links to Agent platforms and


ENTERPRISE/CS workstations that are configured on the primary
CONTROL-M/Server platform. Enter the mirror environments host
computer in each Agents list of authorized servers (see Chapter 1,
Authorized CONTROL-M Servers File), and in the ENTERPRISE/CS
Data Center window.

Step 4

Verify that:

Both primary and secondary installations of CONTROL-M/Server


are shut down.

Both the primary and mirror database servers are running.

Step 5

Log in to the secondary platform as the CONTROL-M/Server owner.

Step 6

Specify the ctm_menu command to open the CONTROL-M Main


Menu. Type 4 to select Database Mirroring and press <Enter>. From
the Database Mirroring menu, type 6 to select Initialize Failover and
press <Enter>.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-27

Step 7

The following message is displayed:


CONTROL-M failover initialization completed successfully.
Press Enter to continue

Press <Enter> to return to the Database Mirroring menu. Then type q


and press <Enter> to exit the Main Menu.
Step 8

Continue with Step 3 of Initializing the Mirror Database - Copy/Build


on page 7-16. When you restart CONTROL-M/Server on the primary
platform, CONTROL-M/Server on the failover server remains down
until it is needed.

BMC Software, Inc., Confidential and Proprietary Information

7-28

CONTROL-M/Server for Unix Installation Guide

Recovering from Database Failure (Mirror Database)

If database mirroring has been implemented and the primary database


fails, two options exist for restoring CONTROL-M/Server operation:

Operate CONTROL-M/Server using the mirror database instead of


the primary database. The primary CONTROL-M database can be
rebuilt at a later stage.
This method resumes CONTROL-M/Server operation in the
minimum time possible. However, mirroring cannot be reactivated
until after the primary database is rebuilt.
To implement this option, follow the procedure Operating
CONTROL-M/Server with the Mirror Database on page 7-30.
When the primary database is stable, restore normal operation using
the procedure Restoring the Primary Database and Initializing
Mirroring on page 7-31.

Restore the CONTROL-M primary database from the mirror


database and start CONTROL-M/Server again.
This method allows the CONTROL-M database to continue to
operate with mirroring. However, you will not be able to start
CONTROL-M/Server until you have completed restoring the
CONTROL-M database - and this can result in significant downtime.
To implement this option, follow the procedure Restoring the
Primary Database and Initializing Mirroring on page 7-31 to rebuild
the primary database and resume normal operation.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-29

Operating CONTROL-M/Server with the Mirror Database


Step 1

Verify that the primary CONTROL-M/Server is not running. Log in to


the primary platform as the CONTROL-M/Server owner.

Step 2

Specify the ctm_menu command to open the CONTROL-M Main


Menu. Type 4 to select Database Mirroring and press <Enter>. From
the Database Mirroring menu, type 4 to select Use Mirror Database and
press <Enter>.

Step 3

The following message is displayed:


Please confirm that you wish to use the Mirror
Database INSTEAD of the Main Control-M database [y/n]:

Type y and press <Enter>. The following message is displayed:


In order to complete this procedure after exiting the
menu, please execute source ~/.cshrc command.
Step 4

Exit the current session and start a new login session, or specify the
command source ~/.cshrc to reset user environment variables in the
current window.

Step 5

Restart CONTROL-M/Server on the primary platform.


CONTROL-M/Server uses the Mirror Database instead of the primary
database.
Note

This is intended as a temporary solution to restore CONTROL-M/Server


operation as quickly as possible. At the first opportunity, the primary
database should be restored and CONTROL-M/Server should be
re-configured to use the primary database.

BMC Software, Inc., Confidential and Proprietary Information

7-30

CONTROL-M/Server for Unix Installation Guide

Restoring the Primary Database and Initializing Mirroring


Step 1

Log in to the primary platform as the CONTROL-M/Server owner.


Verify that CONTROL-M/Server is not running.

Step 2

Specify the ctm_menu command to open the CONTROL-M Main


Menu. Type 4 to select Database Mirroring and press <Enter>. From
the Database Mirroring menu, type 5 to select Restore CONTROL-M
Database from Mirror and press <Enter>.

Step 3

The following prompt is displayed:


Restore Database from Mirror [N]:y

Type y and press <Enter> to restore the database.


Step 4

The following prompt is displayed:


Warning: Attempt to restore primary CONTROL-M database without rebuilding it.
Please confirm that this is your intention [y/n]:y

Type y and press <Enter>.


Step 5

The following messages are displayed:


For Oracle databases:
Oracle is up and runnning ...

For both Oracle and Sybase databases:


...........................................................
In order to complete this procedure after exiting the menu, please execute
source ~/.cshrc command
Press Enter to continue

Press <Enter> to return to the Database Mirroring menu.


Step 6

Exit the current session and start a new login session, or specify the
command source ~/.cshrc to reset user environment variables in the
current window.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-31

Step 7

Continue with Step 3 of Initializing the Mirror Database - Copy/Build


on page 7-16.
Before restarting CONTROL-M/Server, remember to exit the current
session and start a new login session, or specify the command source
~/.cshrc to reset user environment variables in the current window.

BMC Software, Inc., Confidential and Proprietary Information

7-32

CONTROL-M/Server for Unix Installation Guide

Recovering from Primary CONTROL-M/Server Failure (Server Failover)

These procedures assume that a failover server has already been installed
and initialized on a secondary platform. Two procedures are used during
failover situations:

When the primary CONTROL-M/Server fails, use the procedure


Failover to the Secondary CONTROL-M/Server on page 7-33 to
activate the secondary CONTROL-M/Server.

After the primary CONTROL-M/Server has been stabilized, use the


procedure Restoring the Primary CONTROL-M/Server on page 734 to restore normal function.

Failover to the Secondary CONTROL-M/Server


Step 1

Verify that:

Both primary and secondary CONTROL-M/Server installations are


not running.

Both the primary and mirror database servers are running.

Step 2

Log in to the secondary platform as the CONTROL-M/Server owner.

Step 3

Specify the ctm_menu command to open the CONTROL-M Main


Menu. Type 4 to select Database Mirroring and press <Enter>. From
the Database Mirroring menu, type 7 to select Start Failover and press
<Enter>.
Warning

Do not start the secondary CONTROL-M/Server while the primary


CONTROL-M/Server is running, or before the Start Failover procedure
finishes executing. If the secondary CONTROL-M/Server is started too
early, the following message is displayed:
** Unable to start CONTROL-M due to path specified for
PROCLIB directory $PROCLIB. This path is invalid **

Step 4

The following message is displayed:

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-33

This operation disables CONTROL-M database mirroring,


and starts FailOver CONTROL-M !!!
Confirm that CONTROL-M in the primary data center is not running.
Continue [y/n] :

Type y and press <Enter> to continue with failover.


Step 5

The following message is displayed:


Failover started successfully
Press Enter to continue

Press <Enter> to return to the Database Mirroring menu.


Step 6

From the Database Mirroring menu, specify q to return to the


CONTROL-M Main Menu.

Step 7

From the CONTROL-M Main Menu, type 1 to select CONTROL-M


Manager. Then select the Start CONTROL-M/Server option. This
starts CONTROL-M/Server on the failover server, using the mirror
database. Database mirroring is disabled.

Step 8

In the ENTERPRISE/CS Data Centers window, modify the parameters


TCP/IP Host Name and TCP/IP Port Number to the values
appropriate to the secondary CONTROL-M/Server.
Note

At the first opportunity, the primary CONTROL-M/Server environment


should be returned to operational status. The primary database should be
restored and CONTROL-M/Server should be restarted on the primary
environment.
Restoring the Primary CONTROL-M/Server
Step 1

Log in to the secondary platform as the CONTROL-M/Server owner.


Shut down CONTROL-M/Server.

Step 2

Specify the ctm_menu command to open the CONTROL-M Main


Menu. Type 4 to select Database Mirroring and press <Enter>. From

BMC Software, Inc., Confidential and Proprietary Information

7-34

CONTROL-M/Server for Unix Installation Guide

the Database Mirroring menu, type 8 to select Stop Failover and press
<Enter>.
Step 3

The following prompt is displayed:


This procedure stops FailOver CONTROL-M
Continue [y/n] :y

Type y and press <Enter> to continue.


Step 4

The following message is displayed:


Failover Stopped
Press Enter to continue

Press <Enter> to return to the Database Mirroring menu.


Step 5

Continue with Restoring the Primary Database and Initializing


Mirroring on page 7-31.

Step 6

Continue with Step 3 of Initializing the Mirror Database - Copy/Build


on page 7-16. In Step 15 of that procedure, start the primary CONTROLM/Server.

Step 7

In the ENTERPRISE/CS Data Centers window, modify parameters


TCP/IP Host Name and TCP/IP Port Number to values appropriate
for the primary CONTROL-M/Server.

Synchronizing the Primary and Mirror Databases


When database mirroring is enabled, all database updates from
CONTROL-M/Server are sent simultaneously to both the primary and
mirror CONTROL-M database. However, if a CONTROL-M/Server
administrative utility modifies the primary database, the mirror database
will not automatically reflect these changes. Either the same or a similar
utility must be run against the mirror database, or the mirror database
must be re-initialized as described in Initializing the Mirror Database Copy/Build on page 7-16.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-35

The following table lists CONTROL-M/Server utilities that affect the


primary database. Also included is the action to perform to get the mirror
database in sync. For more information about these utilities, see Chapter
2, Utilities.
Table 7-6

Utilities Affecting the Primary Database

ctm_menu Option

Database

Utility

Action

Build Database

All

make_db

Initialize Mirroring

Delete Database

All

Erase Database

All

ctm_clean_db

Initialize Mirroring

Restore Database

All

ctmdbrst

Initialize Mirroring

Add Backup Devices

Sybase

addumpdev

No action necessary

Delete Backup Devices

Sybase

deldumpdev

No action necessary

Extend Database Size

All

ctm_db_extend

Initialize mirroring

Extend Temporary
Database Size

Sybase

ctm_tempdb_extend

Either run the utility on the


backup Server platform or
see your Systems
Administrator.

Extend Temp
Tablespace Size

Oracle

ctm_tempdb_extend

Either run the utility on the


backup Server platform or
see your Systems
Administrator.

Extend Rollback
Tablespace Size

Oracle

ctm_rollback_extend

Either run the utility on the


backup Server platform or
see your Systems
Administrator.

Extend Database Log Size

Sybase

ctm_logdb_extend

Either run the utility on the


backup Server platform or
see your Systems
Administrator.

Sybase

ctm_cleanlog

Either run the utility on the


backup Server platform or
see your Systems
Administrator.

Database Creation Menu

Initialize Mirroring

Database Maintenance Menu

Troubleshooting Menu
Truncate Database Log

BMC Software, Inc., Confidential and Proprietary Information

7-36

CONTROL-M/Server for Unix Installation Guide

Table 7-6

Utilities Affecting the Primary Database

ctm_menu Option

Database

Utility

Action

Restart New Day Procedure

All

reset_gd

Initialize Mirroring.

Reset CONTROL-M Active


Environment

All

clean_ajf

Clears all components of the


CONTROL-M active
environment (Active Jobs file,
prerequisite conditions, and
so on) and forces
CONTROL-M to start a
download of the entire Active
Jobs file to
ENTERPRISE/CS.

BMC Software, Inc., Confidential and Proprietary Information

Mirroring and Failover

7-37

BMC Software, Inc., Confidential and Proprietary Information

7-38

CONTROL-M/Server for Unix Installation Guide

Messages and Codes

The messages described in this appendix are displayed on the


Server-platform and/or recorded in the CONTROL-M log. Each
CONTROL-M/Server message is preceded by a two character code
identifying the Server process that generated the message. Each
ENTERPRISE/CS message is preceded by the code CTM.
Table A-1

Message Prefixes

Code

Server Process

SU

Supervisor

TR

Tracker

SL

Selector and submittor

NS

Communication with Agent platforms

CO

Communication gateway

CD

New Day procedure, downloads, updates to CONTROL-M database

CS

Communication (user requests from ENTERPRISE/CS)

LG

Utilities invoked from Agent platforms

WD

Watchdog process

CTM

Enterprise Controlstation

Example
TR5103 COMSTAT=OK. STATUS CHANGED TO OK

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-1

Messages
5000

CONTROL-M IS NOW INACTIVE


Explanation:

5001

All CONTROL-M processes have been terminated.

FORCING <process_ID> OUT


Explanation:
The CONTROL-M supervisor process is about to force a
CONTROL-M process to stop. An attempt to perform an orderly termination of
a CONTROL-M process failed. The process is being stopped.
System Action:

5002

The CONTROL-M process is stopped.

PROCESS <process_ID> IS RUNNING


Explanation:
CONTROL-M process <process_ID> (Tracker, Submittor,
and so forth) has been successfully activated.

5003

MAXRETRY REACHED FOR <process_ID>. SUPERVISOR IS


SHUTTING DOWN
Explanation:
CONTROL-M is shutting down. The supervisor tried to
activate CONTROL-M process <process_ID> (Tracker, Submittor, and so forth)
the number of times specified in the CONTROL-M system parameter
MAXRETRY, and failed.
User Response: Restart CONTROL-M. If the problem persists, notify your
BMC Software technical support representative.

5004

RUNNING NEW DAY PROCEDURE


Explanation:

The New Day procedure is executing.

System Action: While this process is executing, all other CONTROL-M


processes are suspended.
5005

NEW DAY PROCEDURE TERMINATED


Explanation:

The New Day procedure has terminated successfully.

System Action:

Operation of all other CONTROL-M processes resumes.


BMC Software, Inc., Confidential and Proprietary Information

A-2

CONTROL-M/Server for Unix Administrator Guide

5006

CONTROL-M LOG CLEANUP ENDED. DAYS=<days>


Explanation:
This information message indicates that the New Day
procedure has performed a partial cleanup of the CONTROL-M log. Data for the
specified number of days is retained, as determined by the value assigned to the
CONTROL-M system parameter Maximum Days Retained by CONTROL-M
Log.
System Action:

5007

New Day processing continues.

STATISTICS INFORMATION CLEANUP ENDED


Explanation:
This information message indicates that the New Day
procedure has performed a partial cleanup of CONTROL-M job statistics. When
the CONTROL-M system parameter Statistics is set to Y, CONTROL-M retains
statistical data regarding the last 20 executions of each job. Older data is deleted
by the New Day procedure.
System Action:

5008

New Day processing continues.

PREREQUISITE CONDITIONS WITH DATEREF <mmdd> CLEANUP


ENDED
Explanation:
This information message indicates that the New Day
procedure has performed a partial cleanup of prerequisite conditions. The New
Day procedure deletes prerequisite conditions whose reference date is equal to
the specified month and day (from the new CONTROL-M date).
System Action:

5009

New Day processing continues.

RESET CYCLIC FLAG TO NO


Explanation:
This message indicates that the job is being modified to a noncyclic job. A cyclic job that is executing at the time the New Day procedure is
started is changed to a non-cyclic job. This is because CONTROL-M cannot
determine what action to take regarding this job while it is executing.
System Action:
cyclic job.

The job completes its current cycle and is changed to a non-

User Response: If the job should continue executing as a cyclic job modify the
job processing parameter Cyclic accordingly.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-3

5010

MIRRORING HAS FAILED


Explanation:
A failure of the mirroring SQL server has occurred. If you
installed the database mirroring option for CONTROL-M, the instance of
Sybase SQL server that handles the CONTROL-M mirror database must be
running whenever CONTROL-M is running. This error message is displayed if
the mirroring Sybase SQL Server fails. In this event, the mirror database is no
long synchronized with the CONTROL-M database.
System Action: CONTROL-M continues operating normally. The mirror
database is no longer updated.
User Response: You can allow CONTROL-M to continue operating without
updating the mirror database. However, to restore the mirroring function, you
must stop CONTROL-M normally and then rebuild the mirror database. (See
Security Authorization Menu on page 4-29.)

5020

PROCESS STATE CHANGED FROM <old_state> TO <new_state>


Explanation:
This information message indicates that a CONTROL-M
process that was interrupted has restarted.

5030

ACTIVE JOBS FILE DOWNLOADED TO ENTERPRISE/CS


{STARTED|ENDED}
Explanation:
This information message indicates that the New Day
procedure has completed and the Active Jobs file has started/ended downloading
to the ENTERPRISE/CS workstation.
System Action: All other CONTROL-M processes that were suspended during
the New Day procedure are resumed.

5040

NEW DAY PROCEDURE STARTED


Explanation:

The New Day procedure has been submitted.

System Action: While this procedure is executing, all other CONTROL-M


processes are suspended.

BMC Software, Inc., Confidential and Proprietary Information

A-4

CONTROL-M/Server for Unix Administrator Guide

5041

ACTIVE JOBS FILE CLEANUP ENDED


Explanation:
The New Day procedure has finished cleaning up the Active
Jobs file. This message is issued by the New Day procedure just before it starts
inserting new job orders into the Active Jobs file.

5042

NEW DAY PROCEDURE TERMINATED DATES INCORRECT


Explanation:
The New Day procedure cannot run due to a date
inconsistency. The date inconsistency is due to one of the following causes:

The New Day procedure has already run today.


The last running date of the New Day procedure is later than today's
date.

User Response: If the New Day procedure has already run today, no user
action is required. If the last running date of the New Day procedure is later than
todays date, run the ctmudlst utility and modify the last running date.
5043

QUANTITATIVE RESOURCE INTEGRITY ERROR.


<quantitative_resource> USED = <n1>, QRTAB = <n2>
Explanation:
Due to an internal accounting problem, there is a discrepancy
between the actual usage count (<n1>) of the specified Quantitative resource,
and the calculated sum of the usage of this resource by all jobs (<n2>) in the
Quantitative Resource table.
User Response: Hold all jobs using this resource and run the ecaqrtab utility
to adjust the usage count in the table so that it matches the actual usage count.

5044

CONTROL RESOURCE <resource> INTEGRITY ERROR.


USED=<n1>, CTLTAB=<n2>
Explanation:
Due to an internal accounting problem, there is a discrepancy
between actual usage count (<n1>) of the specified Control resource by all
submitted and not-ended jobs (in Shared mode), and the calculated sum of the
usage of this resource by all jobs (<n2>) in the Control Resource Database table.
User Response: Contact your BMC Software representative for assistance.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-5

5045

CONTROL RESOURCE <resource_ID> INTEGRITY ERROR. MODE


EXCLUSIVE, USED = <n>
Explanation:
Due to an internal accounting problem, Control resource
<resource_ID> appears to be used in exclusive mode by more than one job.
User Response: Allow the jobs using this resource to terminate. If the problem
persists, notify your BMC Software technical support representative.

5046

CONTROL RESOURCE <resource_ID> INTEGRITY ERROR. MODE


EXCLUSIVE, CTLTABCOUNT=<n>
Explanation:
Due to an internal accounting problem, Control resource
<resource_ID> appears in the Conditions/Resources table as being used in
Exclusive mode by more than one job.
User Response: Allow the jobs using this resource to terminate. If the problem
persists, notify your BMC Software technical support representative.

5047

MAXWAIT PARAMETER EXCEEDED


Explanation:
The job was deleted from the Active Jobs file because it
existed in the Active Jobs file without being submitted for more than the number
of days specified in the MAXWAIT parameter.
User Response: Check the jobs pre-processing parameters.

5060

LAST RUN DATE OF USER <daily_ID> NONEXISTENT. STATUS =


<status_text>
Explanation:
The User Daily job was run for the first time. When a new
User Daily job is run (that is, the User Daily job is run for the first time), the last
run date is nonexistent and therefore cannot be accessed. No user action is
required. At the end of this run (as at the end of all runs), a new last run date will
automatically be generated.

5061

USER DAILY <daily_ID> STARTED


Explanation:
<daily_ID>.

This is the normal start message of User Daily job

BMC Software, Inc., Confidential and Proprietary Information

A-6

CONTROL-M/Server for Unix Administrator Guide

5062

USER DAILY <daily_ID> ENDED


Explanation:
<daily_ID>.

5063

This is the normal termination message of User Daily job

CALENDAR <calendar_ID> NOT FOUND OR NOT COMPLETE


Explanation:
The calendar referred to in the job processing definition (of
the User Daily) could not be found, or does not contain all the relevant years.
System Action:

The User Daily job cannot be run.

User Response: Use Enterprise Controlstation to either create the calendar or


to verify that all relevant years appear in the calendar.
5064

USER DAILY <daily_ID> STOPPED DATE PROBLEM. LAST


<date1>, NEXT <date2>
Explanation:
The specified User Daily job cannot run due to a date
inconsistency. The inconsistent date can be due to one of the following:

The User Daily job has already been run today.


The last running date of the User Daily job is later than today's date.

System Action:

The User Daily job stops executing.

User Response: If the User Daily job has already been run today, no user
action is required. If the last running date of the User Daily job is later than
todays date, run the ctmudlst utility (see Chapter 2, Utilities) to modify the
last running date according to your requirements.
5065

ORDERED JOB: <job_ID>; DAILY <daily_ID>, ODATE <odate_spec>


Explanation:
This information message indicates that Job <job_ID> with
ODATE <odate_spec> has been inserted into the Active Jobs file by User Daily
job <daily_ID>.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-7

5070

USER HOME DIRECTORY IS NOT DEFINED


Explanation:
The owner of the job does not have a home directory in the
data center. No home directory is defined in the data center for the user specified
in the job processing parameter Owner for this job.
System Action:

The job is not submitted.

User Response: Define a home directory for the job owner; then rerun the job.

BMC Software, Inc., Confidential and Proprietary Information

A-8

CONTROL-M/Server for Unix Administrator Guide

5080

FAILED TO SUBMIT JOB <job_name>. <reason>


Explanation:
The requested job could not be submitted due to <reason>.
The reasons include:
For UNIX Platforms:

Mem Lib <mem_lib> does not exist the path/library was not found.
Mem Name <mem_name> does not exist the script was not found.
User <userr_name> does not exist there was a security violation.
Owner <owner_name> does not exist there was a security violation
Owner <owner_name> is not allowed to execute this script there was
a security violation
The script <script_name> does not have execute permissions there
was a security violation

For Windows NT Platforms:

There are currently no logon servers available to service the logon


request.
Logon failure: unknown user name or bad password.
Logon failure: user account restriction.
Logon failure: account logon time restriction violation.
Logon failure: user not allowed to log on to this computer.
Logon failure: the specified account password has expired.
A specified privilege does not exist.
A required privilege is not held by the client.
The name provided is not a properly formed account name.
The specified user already exists.
The specified user does not exist.
Logon failure: the user has not been granted the requested logon type
at this computer.
A specified logon session does not exist. It may have been terminated.

For All Platforms:

CONTROL-M/Server <host_name> is not authorized to run jobs on this


agent the CONTROL-M/Server specified is not listed in the Authorized
CONTROL-M Servers file for the Agent platform.

System Action:

The job is not submitted.

User Response: Examine the job processing definition to verify the


information that caused the problem. Either make the necessary corrections,
provide the necessary security authorizations, or add the Server platform to the
Authorized CONTROL-M Servers List. Rerun the job.
BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-9

5100

ENDED AT <time.> OSCOMPSTAT <return_code.> RUNCNT


<rerun_counter>
Explanation:
This information message indicates that the job ended its
execution at the specified time with the given return code and the given run
count of the job.

5101

STARTED ON <node_ID>
Explanation:
This information message indicates that the job began
executing on the specified Agent platform.

5102

DISAPPEARED AT <time>. RUNCNT <rerun_counter>


Explanation:
A job cannot be found in the system. After the job was
submitted, it could not be located by the system (that is, the job has
disappeared). The jobs status, and the location of its log, cannot be determined.
The job may have been stopped by a user, or the Agent platform on which the
job was running may have been rebooted.
System Action:

The job is assigned the completion status NOTOK.

User Response: Either rerun the job, or force the job if the job processing
definition has changed since the last New Day procedure or User Daily job.
5103

<message _text>. STATUS CHANGED TO {OK|NOTOK}


Explanation:
This information message indicates that after analyzing the
job, CONTROL-M has changed the jobs status to either OK or NOTOK. The
reason for the status change is indicated in the <message_text>:

SYSOUT LOST
The jobs sysout file cannot be located.

DISAPPEARED
The job that was executing cannot be located by CONTROL-M.

COMSTAT=OK
The jobs completion code indicated that the job ended OK.

COMSTAT=NOTOK
The jobs completion code indicated that the job ended not OK.

BMC Software, Inc., Confidential and Proprietary Information

A-10

CONTROL-M/Server for Unix Administrator Guide

5104

DUMMY
The job submitted is one of dummy format

NOT SUBMIT
Job Submission failed. This might have resulted from a Server/Agent
communication problem.

PID=<procID>, CPU:<cpu_time>, EL:<elapsed_time>,


END:<end_time>
Explanation:
A job terminated with the status OK. This statistical message
is written to the sysout file when a job terminates with the status OK and the
CONTROL-M system parameter Statistics has been set to Y.

5105

SUBMITTED AT <time> TO <node_ID>


Explanation:
This information message indicates that the job was submitted
for execution at the specified time to the specified Agent platform.

5106

DISAPPEARED AT <time>. RUNCNT <rerun_counter>. AGENT IS


DISABLED
Explanation:
CONTROL-M cannot track a job because a user changed the
communication status of the Agent platform on which it was running to
Disabled.
System Action:

The job is assigned the completion status NOTOK.

User Response: Rerun the job or force the job on a different Agent platform.
5110

LIBMEMSYM FILE <pathname> NOT FOUND


Explanation:
The file <pathname> that is specified in a %%LIBMEMSYM
AutoEdit variable was not found. AutoEdit variable %%LIBMEMSYM can be
used to refer to a list of AutoEdit assignments contained in a file in the data
center. The file referred to in this instance was not found.
System Action:

The job continues to execute.

User Response: Determine why the file was not found. Create the file or
correct the pathname specified for the AutoEdit variable.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-11

5120

JOB STATE CHANGED TO <state_text>


Explanation:
This information message indicates that after analyzing the
job, CONTROL-M has changed the jobs state to <state_text>.

5121

SYSOUT FILE COPIED TO <location>


Explanation:
The sysout file of the specified job was copied to location
<location>. This message is issued following a successful SYSOUT or DO
SYSOUT copy operation.
System Action:

5122

The sysout file is copied to the specified location.

SYSOUT FILE MOVED TO <location>


Explanation:
The sysout file of the specified job was moved to location
<location>. This message is issued following a successful SYSOUT or DO
SYSOUT move operation.
System Action:

5123

The sysout file is moved to the specified location.

SYSOUT FILE RELEASED


Explanation:
The sysout file of the specified job was released to the print
queue. This message is issued following a successful SYSOUT or DO
SYSOUT release operation.
System Action:

5124

The sysout file is placed on the print queue.

SYSOUT FILE DELETED


Explanation:
The sysout file for the specified job was deleted. This message
is issued following a successful SYSOUT or DO SYSOUT delete operation.

BMC Software, Inc., Confidential and Proprietary Information

A-12

CONTROL-M/Server for Unix Administrator Guide

5125

SYSOUT FILE OPEN ERROR


Explanation:
The sysout file for the specified job cannot be opened. Either
the sysout file could not be found, or it is corrupt. Since the sysout file could not
be opened, the jobs output cannot be analyzed.
System Action:
job fails.

The sysout file is not opened, the job is not analyzed, and the

User Response: Check if the file is missing, and rerun the job if applicable. If
other information in the system indicates that the job has run successfully (for
example, other output data, new files), use available maintenance utilities to
adjust condition values to the state in which they would be if the job had been
analyzed.
5126

SYSOUT FILE COPY TO <location> FAILED


Explanation:
The sysout file for the specified job could not be
copied.CONTROL-M was unable to perform the specified SYSOUT or DO
SYSOUT copy action. Possible reasons are operating system security
restrictions, or lack of disk space.
System Action:

The sysout file is not copied.

User Response: Verify user authorization of CONTROL-M, examine operating


system security information, and verify that there is enough disk space.
5127

SYSOUT FILE MOVE TO <location> FAILED


Explanation:
The sysout file for the specified job could not be moved.
CONTROL-M was unable to perform the SYSOUT or DO SYSOUT move
action. Possible reasons are operating system security restrictions, or lack of disk
space.
System Action:

The sysout file is not moved.

User Response: Verify user authorization of CONTROL-M, examine operating


system security information, and verify that there is enough disk space.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-13

5128

SYSOUT FILE RELEASE FAILED


Explanation:
The sysout file for the specified job could not be printed.
CONTROL-M was unable to perform the SYSOUT or DO SYSOUT releaseto-print action. Possible reasons are the print queue is stopped, closed or
nonexistent.
System Action:

The sysout file is not printed.

User Response: Try to correct the print queue problem. If you cannot, notify
your ENTERPRISE/CS administrator.
5129

SYSOUT FILE DELETE FAILED


Explanation:
The sysout file for the specified job could not be deleted.
CONTROL-M was unable to perform the SYSOUT or DO SYSOUT delete
action. Possible reasons are that the file does not exist, or that the user is not
authorized to delete the file.
System Action:

The sysout file is not deleted.

User Response: Check if the file actually exists. If it does, check the job
owners authorization (both system and CONTROL-M authorization). If
necessary, contact your ENTERPRISE/CS administrator.
5132

STATUS SET TO <job_status> AS A RESULT OF DO OK/NOTOK


Explanation:
This information message indicates that the completion status
of the job was changed as a result of Do OK or Do NOTOK post-processing
actions.

5133

ENDED OK
Explanation:
This information message indicates that the job has terminated
with status OK. Following job execution and post-processing, CONTROL-M
has analyzed the results and has assigned the completion status OK to the job.

BMC Software, Inc., Confidential and Proprietary Information

A-14

CONTROL-M/Server for Unix Administrator Guide

5134

ENDED NOTOK
Explanation:
The job has terminated with a final status of NOTOK.
Following job execution and post-processing, CONTROL-M has analyzed the
results, and assigned a final status of NOTOK to the job, indicating that a
problem occurred during job processing.
User Response: Examine the job log (SYSOUT) to determine why the job
terminated with a status of NOTOK.

5135

AUTHORIZATION PROBLEM <problem_description>


Explanation:
The job has terminated abnormally due to a security
authorization problem. CONTROL-M attempted to execute a job contained in
the Active Jobs file. The job failed to execute due to the security-related
problem stated in <problem_description>.
System Action:

The job is not executed.

User Response: Determine what authorization is lacking. Request that your


CONTROL-M system administrator define the necessary authorization then
rerun the job.
5136

JOB STATE CHANGED TO RETRY SUBMIT


Explanation:
This information message indicates that CONTROL-M
attempted to submit the job to the Agent platform but it failed due to the Agent
not responding. The jobs state was changed to Retry and the job was
resubmitted.

5160

SYSOUT LOST. STATUS CHANGED TO NOTOK


Explanation:
The jobs sysout file cannot be located. The sysout file is
required to determine which post-processing actions, if any, are required for the
job.
System Action:

The job is assigned a completion status of NOTOK.

User Response: Determine what happened to the sysout. Once the cause of the
problem has been corrected, resubmit the job.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-15

5161

DISAPPEARED. STATUS CHANGED TO NOTOK


Explanation:
The job that was executing cannot be located by
CONTROL-M. Something occurred to the job while it was running that caused
it to disappear from CONTROL-Ms control. A possible cause is that a user
canceled the job directly and not via CONTROL-M.
System Action:

The job is assigned a completion status of NOTOK.

User Response: Using the operating systems process identification number,


determine what happened to the job and act accordingly.
5162

COMPSTAT=OK. STATUS CHANGED TO OK


Explanation:
This information message indicates that the job ended OK.
CONTROL-M assigns the job a status of OK based on the jobs
completion code.

5163

COMPSTAT=NOTOK. STATUS CHANGED TO NOTOK


Explanation:
This information message indicates that the job ended not OK.
CONTROL-M assigns the job a status of NOTOK based on the jobs
completion code.

5164

DUMMY. STATUS CHANGED TO OK


Explanation:
This information message indicates that the job was assigned a
status of Ended OK because it is a dummy job.

5165

NOT SUBMITTED. STATUS CHANGED TO NOTOK


Explanation:
Job Submission failed. This might have resulted from a
Server/Agent communication problem.
System Action:

The job is assigned a completion status of NOTOK.

User Response: Using the operating systems process identification number,


determine why the Job Submission failed and act accordingly.
5200

ORDER STATE CHANGED TO <state_text>


Explanation:
This information message indicates that CONTROL-M has
finished job post-processing, and changed the job's state to <state_text>.
BMC Software, Inc., Confidential and Proprietary Information

A-16

CONTROL-M/Server for Unix Administrator Guide

5201

SHOUT TO <destination> PERFORMED


Explanation:
This information message indicates that a Shout message was
issued to the specified destination.

5202

SHOUT TO <destination> FAILED


Explanation:
An attempt to issue a Shout message to the specified
destination was not successful. Possible reasons for the failure are that the
terminal is not connected, an invalid destination was specified, and so forth.
System Action:

The Shout message is not issued.

User Response: Check the validity of the destination.


5203

CONTROL RESOURCE <resource_ID> RESERVED


Explanation:
This information message indicates that Control resource
<resource_ID> has been reserved for the specified critical job.

5204

CONTROL RESOURCE <resource_ID> ALLOCATED. MODE:


<mode>
Explanation:
This information message indicates that Control resource
<resource_ID> has been allocated for the specified non-critical job in the
indicated mode (Shared or Exclusive).

5205

RESERVED CONTROL RESOURCES ALLOCATED


Explanation:
This information message indicates that all reserved Control
resources for the specified critical job have been allocated successfully.

5206

CONTROL RESOURCES RELEASED


Explanation:
This information message indicates that all Control resources
allocated for the job order have now been released because the job has
terminated.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-17

5207

QUANTITATIVE RESOURCE <resource_ID> QUANTITY


<resource_quantity> RESERVED
Explanation:
This information message indicates that Quantitative resource
<resource_ID> has been reserved in quantity <resource_quantity> for the
specified critical job, and is ready to be allocated.

5208

QUANTITATIVE RESOURCE <resource_ID> QUANTITY


<resource_quantity> ALLOCATED
Explanation:
This information message indicates that quantity
<resource_quantity> of Quantitative resource <resource_ID> has been allocated
for a non-critical job.

5209

CONDITION <condition_ID> <date_ref> ADDED


Explanation:
This information message indicates that following job
termination, the specified condition has been added to the Conditions/Resources
table.

5210

CONDITION <condition_ID> <date_ref> DELETED


Explanation:
This information message indicates that following job
termination, the specified condition (with the matching date reference) has been
deleted from the Conditions table.

5211

FORCEJOB FAILURE. JOB <job_number>, TABLE <table_ID>


Explanation:
A FORCEJOB operation for the specified job number in the
specified table failed. Failure may have been due to problems with the job
processing definition (for example, job not found), security verification
problems, and so forth.
User Response: Verify the existence of the script file, and check
CONTROL-M and operating system security restrictions.

5212

JOB <job_number>, TABLE <table_ID> FORCED


Explanation:
This information message indicates that the FORCEJOB
operation for the specified job/table has completed successfully.

BMC Software, Inc., Confidential and Proprietary Information

A-18

CONTROL-M/Server for Unix Administrator Guide

5213

RESERVED QUANTITATIVE RESOURCES ALLOCATED


Explanation:
This information message indicates that all reserved
Quantitative resources for the specified critical job have been allocated.

5214

QUANTITATIVE RESOURCES RELEASED


Explanation:
This information message indicates that all allocated
Quantitative resources for the specified job have now been released.

5215

ALL RERUNS HAVE BEEN PERFORMED. MAXRERUN = <number>


Explanation:
This information message indicates that all the reruns
requested for the specified job have been performed.

5216

<shout_text>
Explanation:
The Shout message <shout_text> was issued to the
CONTROL-M log. The text in this message is issued by a Shout statement and
is written to the CONTROL-M log.

5217

FORCE NOT PERFORMED: JOB <job_ID>, TABLE <table_ID> DOES


NOT EXIST
Explanation:
An attempt to force job <job_ID>, located in table
<table_ID>, failed because the job/table does not exist. Either the table specified
in <table_ID> does not exist, or the job specified in <job_ID> does not exist in
the specified table.

An ENTERPRISE/CS user attempted to force a job via the Scheduling


menu option in the Enterprise Controlstation window.
-orA CONTROL-M job attempted to execute a Do Forcejob statement as part of
its Post-processing parameters.
System Action:

No action is taken.

User Response: Determine the source of the problem (missing job processing
definition, missing Scheduling table, incorrectly specified Do Forcejob
statement, and so forth). Correct the problem and re-execute the Force.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-19

5218

FORCE WAS NOT PERFORMED TABLE <table_ID> DOES NOT


EXIST
Explanation:
An attempt to force Scheduling table <table_ID> failed
because the table specified in <table_ID> does not exist.
An ENTERPRISE/CS user attempted to force a Scheduling table via the
Scheduling menu option in the Enterprise Controlstation window.
-orA CONTROL-M job attempted to execute a Do Forcejob statement as part of
its post-processing parameters.
System Action:

No action is taken.

User Response: Determine the source of the problem (missing Scheduling


table, incorrectly specified Do Forcejob statement, and so forth). Correct the
problem and re-execute the Force.
5220

STATUS OF AGENT PLATFORM <node_ID> CHANGED TO


AVAILABLE
Explanation:
This information message indicates that CONTROL-M
changed the communication status of the Agent platform identified by
<node_ID> from Unavailable to Available. The communication status of the
Agent platform had been changed from Available to Unavailable due to failed
communication. As a result of resumed communication, the status of the Agent
platform has been returned to Available.
System Action: CONTROL-M resumes sending job-handling requests to the
Agent platform.

5221

STATUS OF AGENT PLATFORM <node_ID> CHANGED TO


AVAILABLE BY USER
Explanation:
This information message indicates that an authorized user
changed the communication status of the Agent platform identified by
<node_ID> from Disabled to Available. The communication status of the Agent
platform had been previously changed to Disabled, either by a user or due to a
communication failure.
System Action: CONTROL-M resumes sending job-handling requests to the
Agent platform.
BMC Software, Inc., Confidential and Proprietary Information

A-20

CONTROL-M/Server for Unix Administrator Guide

5222

STATUS OF AGENT PLATFORM <node_ID> CHANGED TO


UNAVAILABLE
Explanation:
CONTROL-M changed the communication status of the
Agent platform identified by <node_ID> from Available to Unavailable due to
repeated communication timeouts. A communication failure has occurred
between the Server platform and the specified Agent platform.
-or<node_ID> was not specified correctly in the job processing definition or in the
node group.
System Action: CONTROL-M tries to communicate with the Agent platform
but does not send job-handling requests to the platform. If CONTROL-M
succeeds to communicate with the Agent platform, the status of the platform will
be returned to Available; otherwise, the status of the platform will be changed to
Disabled.
User Response: Verify that the node ID specified in the job processing
definition or in the node group is valid. Determine the cause of the failed
communication and correct it.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-21

5223

STATUS OF AGENT PLATFORM <node_ID> CHANGED TO


DISABLED
Explanation:
CONTROL-M changed the communication status of the
Agent platform identified by <node_ID> from Unavailable to Disabled due to
repeated communication timeouts.
A communication failure has occurred between the Server platform and the
specified Agent platform.
-orThe node ID was not specified correctly in the job processing definition or in the
node group.
System Action: CONTROL-M no longer attempts to communicate with the
Agent platform and does not send job-handling requests to the platform.
User Response: Verify that the node ID specified in the job processing
definition or in the node group is valid. Determine the cause of the failed
communication and correct it. After correcting the problem, use the Agent Status
menu to change the status of the Agent platform to Available.

5224

STATUS OF AGENT PLATFORM <node_ID> CHANGED TO


DISABLED BY USER
Explanation:
An authorized user changed the communication status of the
Agent platform identified by <node_ID> from Unavailable to Disabled.
System Action: CONTROL-M no longer attempts to communicate with the
Agent platform and does not send job-handling requests to the platform.
User Response: When desired, use the utility to change the status of the Agent
platform to Available.

BMC Software, Inc., Confidential and Proprietary Information

A-22

CONTROL-M/Server for Unix Administrator Guide

5250

ACCESS TO TABLE <table_ID> IS NOT ALLOWED TO USER


<user_ID>
Explanation:
A User Daily job attempted to order a job from a table that it
is unauthorized to access. This is a security violation.
System Action:

Access to the scheduling table is denied to the User Daily job.

User Response: Verify/modify user authorizations pertaining to the specific


scheduling table.
5251

THIS OWNER IS NOT AUTHORIZED TO EXECUTE THE JOB SCRIPT


Explanation:
The owner of the job processing definition is not authorized to
execute the script file specified by the job processing parameters.
System Action:

The job terminates with a NOTOK status.

User Response: Either modify the script file protection accordingly, or grant
the owner execution privileges.
5252

ENTERPRISE/CS USER <user_ID> NOT AUTHORIZED FOR OWNER


<owner_ID>
Explanation:
User <user_ID> tried to perform an unauthorized action on a
job belonging to owner <owner_ID>. There are restrictions on the operations
that users can perform on jobs belonging to other owners unless the user is
authorized by the security administrator.
User Response: If you still want to perform the specified operation, contact
your security manager for the required authorization.

5260 5330

5351

See Appendix C, Messages and Codes, in the Enterprise Controlstation User


Guide.

QUANTITATIVE RESOURCE <resource_ID> QUANTITY


<resource_quantity> DEFINED
Explanation:
The user defined a new Quantitative resource, and its
maximum quantity.
System Action:

The resource is added to the CONTROL-M resource pool.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-23

5352

QUANTITATIVE RESOURCE <resource_ID> DELETED


Explanation:
This information message indicates that by user request,
Quantitative resource <resource_ID> has been deleted from the CONTROL-M
resource pool.

5353

QUANTITATIVE RESOURCE <resource_ID> QUANTITY INCREASED


BY <resource_quantity>
Explanation:
This information message indicates that by user request, the
maximum quantity of Quantitative resource <resource_ID> has been increased
by quantity <resource_quantity>. The use of Quantitative resources is discussed
in Chapter 2 in the Enterprise Controlstation User Guide.

5354

QUANTITATIVE RESOURCE <resource_ID> QUANTITY


DECREASED BY <resource_quantity>
Explanation:
This information message indicates that by user request, the
maximum quantity of Quantitative resource <resource_ID> has been decreased
by quantity <resource_quantity>. The use of Quantitative resources is discussed
in Chapter 2 in the Enterprise Controlstation User Guide.

5355

QUANTITATIVE RESOURCE <resource_ID> QUANTITY


<resource_quantity> RELEASED
Explanation:
This information message indicates that the number of units
<resource_quantity> of Quantitative resource <resource_ID>, that were
allocated by a job, have been released and are now available for other jobs that
require this resource. The use of Quantitative resources is discussed in Chapter 2
in the Enterprise Controlstation User Guide.

5356

CONTROL RESOURCE <resource_ID> DEFINED


Explanation:
This information message indicates that the user requested
allocation of a Control resource that does not exist.
System Action:
the user.

5357

Control resource <resource_ID> is defined and allocated to

CONTROL RESOURCE <resource_ID> RELEASED


Explanation:
This information message indicates that by ENTERPRISE/CS
user request, Control resource <resource_ID> has been released.
BMC Software, Inc., Confidential and Proprietary Information

A-24

CONTROL-M/Server for Unix Administrator Guide

5401

HELD BY USER <user_name>


Explanation:
This information message indicates that the job associated
with the message was held by the ENTERPRISE/CS user <user_name>.

5402

FREED BY USER <user_name>


Explanation:
This information message indicates that the job associated
with the message was released from its held state by the ENTERPRISE/CS user
<user_name>.

5403

DELETED BY USER <user_name>


Explanation:
This information message indicates that the job associated
with the message was marked as deleted by the ENTERPRISE/CS user
<user_name>.

5404

RERUN BY USER <user_name>


Explanation:
This information message indicates that the job associated
with the message was rerun by the ENTERPRISE/CS user <user_name>.

5405

CONFIRMED BY USER <user_name>


Explanation:
This information message indicates that the job associated
with the message, that was waiting for confirmation prior to submission, was
confirmed by the ENTERPRISE/CS user <user_name>.

5406

CHANGED BY USER <user_ID>


Explanation:
This information message indicates that the indicated
ENTERPRISE/CS user changed a parameter of an active job.

5407

CREATED BY USER <user_name>


Explanation:
This information message indicates that the job associated
with the message was placed in the Active Jobs file by the ctmcreate utility.

5500 5599

See Appendix C, Messages and Codes, in the Enterprise Controlstation User


Guide.

BMC Software, Inc., Confidential and Proprietary Information

Messages and Codes

A-25

BMC Software, Inc., Confidential and Proprietary Information

A-26

CONTROL-M/Server for Unix Administrator Guide

Structure of CONTROL-M Log EntriesB


The CONTROL-M log is part of the CONTROL-M database in each data
center. For more information, see CONTROL-M Log on page 1-31.
Table B-1

Fields of the CONTROL-M Log

Field

Description

Characters

Logtime

Message time

Logdate

Message date

Subsystem

CONTROL-M process that generated the message

Jobname

Job name of the job that generated the message

10

Jobno.

Job number (from job processing definition)

4 (integers)

Orderno

Order number of the job

4 (integers)

Owner

User name of jobs owner

30

Odate

Original scheduling date of job

Msgid

Message ID (messages are described in Appendix A)

Message

Text of message

66

Tasktype

Task Type identifier (for example, batch, detached, command)

Memname

Member name

30

BMC Software, Inc., Confidential and Proprietary Information

Structure of CONTROL-M Log Entries

B-1

BMC Software, Inc., Confidential and Proprietary Information

B-2

CONTROL-M/Server for Unix Administrator Guide

Glossary

Glossary
Active Jobs File (AJF)

The Active Jobs file lists all jobs scheduled for submission in the
current day. Each job in the Active Jobs file is not submitted
until all conditions contained in the job processing definition for
the job are satisfied. The Active Jobs file is contained in the
CONTROL-M database.

Agent Platform

Platform on which CONTROL-M/Agent runs. The Agent


platform handles requests from CONTROL-M/Server to execute
jobs or provide information.

Calendar

A collection of dates which are used by CONTROL-M/Server to


schedule the ordering of jobs.

CONTROL-M

Software product which schedules, submits, tracks and follows


up the execution of jobs in a data center. CONTROL-M
functions are divided between two separate components:
CONTROL-M/Server and CONTROL-M/Agent.

CONTROL-M (Primary)
Database

Repository of operational data relating to the functioning of the


CONTROL-M data center. Contents of the database include the
Active Jobs file, Scheduling tables (job processing definitions)
and the Resources/Conditions table. The database is maintained
by CONTROL-M/Server, using Sybase SQL Server.

CONTROL-M Date

Date used by CONTROL-M to assign the Scheduling date


(Odate) to jobs.

BMC Software, Inc., Confidential and Proprietary Information

Glossary

CONTROL-M Log

Log containing a complete audit trail of every significant event


occurring in the CONTROL-M production environment.

CONTROL-M Platform

Platform on which CONTROL-M/Server runs.

CONTROL-M/Agent

The component of CONTROL-M which runs on each Agent


platform. CONTROL-M/Agent submits jobs and performs other
tasks based on requests from CONTROL-M/Server, and
performs post-processing analysis of completed jobs.

CONTROL-M/Server

The component of CONTROL-M which runs on the Server


platform. CONTROL-M/Server maintains the CONTROL-M
database (including the Active Jobs file), schedules jobs,
performs load balancing, sends job-handling requests to Agent
platforms, and handles requests from ENTERPRISE/CS.

Conditions/Resources
Table

A component of the CONTROL-M database which lists the


current status of all prerequisite conditions, Control resources
and Quantitative resources in the data center.

Control Resource

User-defined variable representing a physical or logical resource


in the data center. For each job, the user specifies whether the job
requires exclusive or shared access to the resource.
CONTROL-M/Server verifies that a job is not submitted for
execution unless the Control resources required by the job are
available in the required state (shared/exclusive). This prevents
deadlock situations or contention between jobs for a given
resource. Control resources are recorded in the
Conditions/Resources table.

Data Center (or


CONTROL-M Data
Center)

A Server platform and all the Agent platforms that it handles.

Download (of active


environment)

Transmission of the Active Jobs file and other elements of the


CONTROL-M database to the ENTERPRISE/CS database. This
allows ENTERPRISE/CS to provide the user with a graphical
display of the current situation in the data center. Download
occurs upon completion of the New Day procedure, after which
updates are issued to maintain the accuracy of the graphical
display.
BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

Enterprise
Controlstation or
ENTERPRISE/CS

Software product that provides a central point of control for


CONTROL-M data centers. ENTERPRISE/CS provides the GUI
which allows users to graphically view the status of job
schedules and execution in data centers, to issue requests for
additional information and to handle problems.
ENTERPRISE/CS also passes global conditions among data
centers.

Force

To force a job is to instruct CONTROL-M/Server to place the


job in the Active Jobs file for possible submission, regardless of
the scheduling parameters contained in the job processing
definition for the job. See also Order.

Gateway

The process that handles communication between


CONTROL-M/Server and ENTERPRISE/CS. There are gateway
processes on both the Server platform and the ENTERPRISE/CS
workstation.

General Daily
Procedure

See New Day Procedure.

Global Condition

A prerequisite condition that is passed between data centers via


ENTERPRISE/CS. Global conditions allow jobs in one data
center to be dependent on completion of a job in another data
center.

Heartbeat Monitor

Special monitor which verifies that TCP/IP communication with


ENTERPRISE/CS is functional.

Job Processing
Definition

Set of user-defined parameters for each job which provide


CONTROL-M with detailed instructions for processing the job.
Job processing definitions are organized into Scheduling tables.

Load Balancing

CONTROL-M mechanism for maximizing throughput of


production jobs by automatic selection of the platform to execute
each job, based on workload considerations.

BMC Software, Inc., Confidential and Proprietary Information

Glossary

Manual Conditions
File

The Manual Conditions file contains prerequisite conditions


which are required by jobs in the Active Jobs file but which will
not be available (that is, added to the Conditions/Resources
table) unless there is some form of manual intervention. These
conditions include conditions which are never added
automatically by scheduled jobs because manual confirmation is
always desired, as well as conditions which are normally added
automatically, but the jobs which add them are not scheduled for
the day.

Mirror Database

A backup copy of the CONTROL-M database which is


constantly updated. The Mirror database allows
CONTROL-M/Server to resume functioning with minimal time
loss in the event of a primary database failure.

New Day Procedure

Formerly General Daily Procedure. Daily scheduling and


housekeeping procedures which run on the Server platform. The
CONTROL-M date is advanced to the next day when this
procedure runs.

Node Group

A user-defined collection of Node IDs. A node group is specified


in a Job Processing definition to indicate a group of Agent
platforms from which CONTROL-M/Server can select a
platform to execute the job.

Node ID

Name by which an Agent platform is identified to the Server


platform. This is generally the Agent platforms host name.

Odate (Original
Scheduling Date)

Jobs managed by CONTROL-M are assigned a date when they


are ordered (placed in the Active Jobs file). This date, referred to
as the Odate, is the CONTROL-M date at the time the job is
ordered and represents the date on which the job should be
submitted for execution. Odate is also the default date assigned
to prerequisite conditions at the time they are created. The
variable ODAT (representing the Odate) is used when defining
job dependencies to insure that a job waiting for completion of
another job is only triggered by a job with the same working
date.

BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

Order

To order a job is to request that CONTROL-M/Server review


the scheduling parameters contained in the job processing
definition for the job and, if the parameters are satisfied, place
the job in the Active Jobs file for possible submission. See also
Force.

Prerequisite
Conditions or
Conditions

A flag representing a user-specified situation or condition.


Submission of a job for execution can be made dependent on the
existence of one or more prerequisite conditions. Prerequisite
conditions are recorded in the Conditions/Resources table.

Quantitative Resource

User-defined variable representing a resource in the data center.


The user defines the total quantity of this resource in the data
center and, for each job, the quantity require/used by that job.
CONTROL-M/Server verifies that a job is not submitted for
execution unless the Quantitative resources required by the job
are available. Quantitative resources are recorded in the
Conditions/Resources table.

Scheduling Table

A collection of related job processing definitions. Scheduling


tables are stored in the CONTROL-M database (and duplicated
in the ENTERPRISE/CS database). Scheduling tables are
ordered by the New Day procedure or User Daily jobs.

Server Platform

Platform on which CONTROL-M/Server runs. The Server


platform communicates with the ENTERPRISE/CS workstation
and with the Agent platforms.

Sleep Time

The length of time that a CONTROL-M/Server process lies


dormant before waking up to determine if any request to
perform an action was received. The value assigned to Sleep
Time affects CONTROL-M/Server throughput and the load on
the Server platforms resources.

Sybase SQL Server

Software product used by CONTROL-M/Server to maintain the


CONTROL-M database. The database can be maintained using
either a dedicated instance of Sybase SQL Server (provided with
CONTROL-M) or an existing instance of Sybase SQL Server
(provided by the user).

BMC Software, Inc., Confidential and Proprietary Information

Glossary

User Daily Job

User-defined job which can be used to automate the ordering of


production jobs.

User Exits

Mechanism which enables users to modify CONTROL-M


operations to suit site needs.

Watchdog Process

Mechanism which automatically monitors CONTROL-M


processes and resources

BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

Index

Index
A
account parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-58
ACTION parameter
ctmudchk utility 2-145
ctmvar utility 2-151
Active Jobs file
ad hoc jobs 2-25
ctmpsm utility 2-107, 2-109
downloading 4-42, 4-48
erasing contents 4-48
forcing download 4-42
listing job details 2-107
New Day procedure 1-13
options 2-108
security 3-5, 3-24
Active shout table
system parameter 5-5
ad hoc jobs
creating 2-25
Add Backup Device option
Database Maintenance menu 4-19
adding
backup devices 4-19
groups 3-18
prerequisite conditions 2-21

users 3-13
AG_PORT_NUM
agent parameter 5-28
agconfig.dat file
description 5-22
Agent communication parameters
defaults 4-34
description 5-13
modifying 4-35
Agent platform
deleting 2-15
status 2-15
Agent platforms
communication parameters 5-13
communication status 1-6, 2-103, 4-38,
A-11
configuration information 2-103
ctmping utility 2-103
definition 1-2
disabled A-22
identification 1-6
Shout messages to 2-138
Agent Status menu
description 4-38
AGENT_DIR
agent parameter 5-28
Agent-to-Server
port number 5-10

BMC Software, Inc., Confidential and Proprietary Information

Index

ALARM_DEST
server parameter 5-23
application security 3-1
appname parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
Archive Mode option
Database Maintenance menu 4-13
archive_info parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-58
archive_object parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-58
archive_sapobject parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-58
arp command
IP address locator 5-11
asap parameter
SAP jobs (ctmcreate) 2-33
SAP jobs (ctmdefine) 2-58
ASCII files
ctm_restore_bcp utility 2-19
ctmexdef utility 2-64
authorization. See security
Authorization menu, Security 4-29
Authorized CONTROL-M/Servers file
host names 1-12
overview 1-9, 1-12
usage A-9
AutoEdit variables
ctmstvar utility 2-133
ctmvar utility 2-150
quote marks 2-29, 2-52, 2-76, 2-133
AUTOEDIT_INC_ SEC parameter 5-23
Available status
agent platform 1-7

B
backing up
CONTROL-M database 2-37
backup
Oracle 4-14
Sybase 4-14
Backup Database
option
Database Maintenance menu 4-14
Backup Socket port number
Sybase 5-16
batch mode
Security Maintenance utility 3-32
binary files
ctmdbrst utility 2-17, 2-19

C
CDROM name
Oracle parameter 5-18
character set
Sybase SQL server 7-6
Check Database option
Database Maintenance menu 4-26
Check Kernel Configuration parameter 4-41
checking
free disk space 2-62
User Daily jobs 2-145
waiting jobs 2-154
CHILD mode
ctmpsm utility 2-113
cleanup. See maintenance
closing. See stopping
CMN_PRM_CD_IPC_IN
communication parameter 5-26
CMN_PRM_CD_IPC_OUT
communication parameter 5-26

BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

CMN_PRM_CD_MAX_DBU
communication parameter 5-26
CMN_PRM_CD_MAX_SERVICE
communication parameter 5-26
Cold backup
archive mode 4-13
COMM_TRACE
agent parameter 5-28
server parameter 5-28
communication
see also interaction
agent parameters 4-34
agent platforms 5-13
Available status 1-7
ctmping utility 2-103
defaults for parameters 4-34
Diagnostic report 4-42
Disabled status 1-7
interruptions 1-8
parameter defaults 4-34
parameter descriptions 5-9
parameter modification 4-32, 4-35
status 1-6, 2-103, 4-38, A-11
Timeout parameter 5-14
Unavailable status 1-7
Communication protocol parameter
description 5-10
version 5-14
Computer system
system parameter 5-3
COMTIMOUT
agent parameter 5-28
COMTRYNO
server parameter 5-28
Condition Date parameter
ctmcontb utility 2-21
Condition Name parameter
ctmcontb utility 2-21
conditions. See prerequisite conditions
Conditions file, Manual 2-82

config.dat file
Event logger configuration 1-40
parameters 5-21
user exit parameters 6-3
watchdog parameters 5-31
configuration
CONTROL-M/Agent 1-12
Configuration parameter, Check Kernel 4-41
configuration parameters
agconfig.dat file 5-22, 5-28
description 5-22
Watchdog parameters 5-31
Control resources
deleting 4-48
listing 2-157
reserved A-17
CONTROL-M
administrator 1-36
Authorized Servers file 1-9
failover planning 1-10
log B-1
main menu 4-6
maintenance 4-3
menu system 4-6
sample job flow 1-2
security facility 3-1, 3-7

BMC Software, Inc., Confidential and Proprietary Information

Index

CONTROL-M database
backing up 2-37, 4-14
checking data usage 2-45
checking integrity 2-39, 4-4
creation menu 4-10
defining jobs 2-47
extending 4-21
maintenance 4-4
Oracle parameters 5-18, 7-23
overview 1-4
owner parameter (Sybase) 5-15, 7-19
parameters 4-25, 5-15, 5-17
percent utilization 2-39
recovery procedure 7-29
restoring 2-44, 4-16
statistics 2-77, 2-124
Sybase parameter 5-17, 7-20
CONTROL-M date
Day Time parameter 5-4
description 1-13
Odate 1-13
CONTROL-M log
cleanup by New Day procedure 1-14
deleting entries 2-91
description 1-31
fields B-1
listing entries 2-91
messages A-1
recorded times 1-8
Shout destination 1-27
Shout utility 2-138
CONTROL-M Mirror database parameters
5-21
CONTROL-M SYSTEM tablespace
parameters 5-19
CONTROL-M version
system parameter 5-3
CONTROL-M/Agent
see also Agent platforms
configuration 1-12

description 1-2
discovery 1-6
interrupted communication 1-8
CONTROL-M/Server
see also Server
agent interaction 1-5
backup server 7-33
host name 1-12, 5-9, 5-28
messages and codes A-1
parameters 5-1
processes 2-134, 4-43
recovery 1-11
Shout messages 2-138
starting 4-2, 4-8
stopping 4-2, 4-8
TCP/IP port number 5-12
Windows NT 1-9
creating
see also ctmcreate, defining
ad hoc jobs 2-25
application-specific jobs 2-31
CONTROL-M database 4-10
files 2-66
Manual Conditions file 2-82
csh command
environment variables 2-10
path modification 2-13
CTLTABCOUNT
messages and codes A-6
CTM_AGSTAT utility
Agent status 2-15
description 2-15
ctm_backup_bcp utility
comparison with ctmdbbck 2-17
exporting database data 2-17
CTM_CB_TIMEOUT
server parameter 5-23
CTM_GROUP_ADJUST_DUMMY
server parameter 5-23

BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

CTM_GROUP_RECHECK
server parameter 5-24
ctm_menu command 4-6
CTM_PARM_ENC
agent parameter 5-29
CTM_PRM_DONT_DELETE
agent parameter 5-28
CTM_PRM_ENABLE_UExxx
user exit parameter 5-27, 6-3
CTM_PRM_KPA_ACTIVE
communication parameter 5-27
Heartbeat monitor 1-38
CTM_PRM_KPA_BETWEEN_MSGS
Heartbeat monitor 1-38
CTM_PRM_KPA_ROUNDTRIP_...
communication parameter 5-27
Heartbeat monitor 1-38
CTM_PRM_KSH_FLAGS
agent parameter 5-29
CTM_PRM_SCRIPT_UExxx
user exit parameter 5-28, 6-3
CTM_PRM_SH_FLAGS
agent parameter 5-29
CTM_PRM_TIMEOUT_UExxx
user exit parameter 5-28
wait interval 6-3
ctm_restore_bcp utility
ASCII files 2-19
comparison with ctmdbrst 2-19
importing database data 2-19
CTM_SLP_SUSPEND
server parameter 5-24
CTM_SNMP_SEND_FORMAT
server parameter 5-24
CTM_SU_PATH
agent parameter 5-29
CTM_WRITE_CONSOLE
server parameter 5-24
ctm2snmp utility
message distribution 2-155

ctmcontb utility
prerequisite conditions 2-21
ctmcreate utility
ad hoc jobs 2-25
application-specific jobs 2-31
Oracle Applications parameters table
2-34
SAP parameters table 2-33
ctmdbapasswd utlity
database password maintenance 2-36
ctmdbbck utility
database backup 2-37
ctmdbcheck utility
database status 2-39
problem detection 1-39
vs ctmdbused command 2-39
ctmdbrst utility
comparison with ctm_restore_bcp 2-19
database size 2-17
database, restoring the 2-44
ctmdbspace utility
space verification 1-46, 2-45
ctmdbtrans utility
problem detection 1-39
ctmdbused command
database utilization 2-39
ctmdefine utility 2-47
application-specific jobs 2-57
Oracle Applications parameters table
2-59
SAP parameters table 2-58
ctmdiskspace utility
disk space check 1-45, 2-62
ctmexdef utility
export job definitions 2-64
ctmfw utility 2-66
ctmjsa utility 2-77
job statistics 1-30
ctmkilljob utility
job termination 2-81

BMC Software, Inc., Confidential and Proprietary Information

Index

ctmldnrs utility
Manual Conditions file 2-82
ctmloadset utility
load balancing 1-10
resource usage 2-86
ctmlog utility
CONTROL-M log 2-91
problem detection 1-39
CTMLOG_DEL_CHK
configuration parameter 5-24
ctmordck utility
job processing definition list 2-94
ctmorder utility
description 2-96
forcing a job 2-98
CTMORDER_FORCE
server parameter 5-24
ctmpasswd utility
database passwords 2-102
ctmping utility
Agent configuration information 2-103
communication status 1-7
Watchdog facility 1-48
ctmpsm utility
Active Jobs file 2-107
job listing 2-113
mode descriptions 2-113
Production Support menu 2-106
Resource Table options 2-110
scheduling function options 2-110
Scheduling tables 2-111
syntax 2-113
ctmrpln utility
description 2-120
ctmruninf utility 1-30
Statistical Details table 2-124
CTMS_ADDR_MODE
agent parameter 5-29
CTMS_COMVERSION
agent parameter 5-30

CTMS_HOSTNAME
agent parameter 5-30
CTMS_PORT_NUM
agent parameter 5-30
ctmsec utility 3-11
see also Security Maintenance utility
User Maintenance option 3-13
ctmshout utility
message distribution 2-127
ctmshtb utility 1-26
Shout destination table 2-129
ctmstats utility 1-30
statistical summary table 2-130
ctmstvar utility
AutoEdit variables 2-133
ctmsuspend utility
ENTERPRISE/CS communication
2-134
ctmsys utility
parameter modification 5-7
system parameters 2-135
ctmudchk utility
ordering jobs 2-145
User Daily job check 2-145
ctmudlst utility
Date Control record 1-21
description 2-147
messages and codes A-5, A-7
ctmudly utility
User Daily jobs 1-18, 2-149
CTMUE101 user exit
job ordering 6-5
CTMUE102 user exit
job submission 6-7
CTMUE103 user exit
New Day procedure 6-9
CTMUE104 user exit
New Day procedure 6-10
CTMUE105 user exit
User Daily jobs 6-11
BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

CTMUE106 user exit


User Daily jobs 6-11
ctmwhy utility
waiting jobs 2-154
customizing
Customization menu 4-30
customization parameters 4-30, 5-1
platform coordination 5-2
CYCLIC_MAXWAIT
server parameter 5-25
CYCLIC_RERUN
server parameter 5-25

D
DAILY parameter
ctmudchk utility 2-145
Daily report
ctmrpln utility 2-120
data
CONTROL-M database 1-4
data center
description 1-2
data device name
Sybase parameter 5-17, 7-20
data device type
Sybase parameter 5-16
data device, physical
Sybase parameter 5-16, 7-20
database
backup 2-17
CONTROL-M 1-4
log files 5-18
mirroring A-4
parameters 5-15, 5-17
password maintenance 2-36
recovery procedure 7-29
restoration 2-17
server 4-9
size 2-17, 5-15, 7-20

Sybase SQL server name 5-17


synchronization 7-36
transaction listing 1-39
transaction log 2-39
utilization percentage 2-39
verification 2-37, 2-39
Database Administrator password
Sybase 5-15
Database Creation menu 4-10
database mirroring
see alsomirror database
see alsomirroring
messages and codes A-4
Database Size parameter
Sybase 5-15, 7-20
database status
ctmdbcheck utility 2-41
Database version
system parameter 5-3
Date Control record
description 1-21
inconsistency A-5, A-7
modifying manually 2-147
UDLAST parameter 1-14
Date parameter
description 5-4
Day Time parameter
description 5-4
New Day procedure 1-13
Daylight Savings Time 1-33
DBASE events
problem detection 1-40
DBO password
Oracle parameter 5-20
Sybase parameter 5-15, 5-20, 7-19
system parameter 5-3
debug parameter
ctmvar utility 2-153

BMC Software, Inc., Confidential and Proprietary Information

Index

DEBUG_LEVEL
agent parameter 5-28
server parameter 5-28
defining
see also creating, ctmdefine
application-specific jobs 2-57
CONTROL-M jobs 2-47
deleting
backup devices 4-20
CONTROL-M log entries 2-91
files 2-66
groups 3-18
prerequisite conditions 1-14, 2-21, 4-48,
5-6
statistics 1-14, 2-124
users 3-13
dependencies. See prerequisite conditions
description parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
diagnostic level
setting 4-49
Disabled status
communication 1-7
Disappeared status
agent platform 1-7
messages and codes A-10, A-16
discovery process 1-6, 2-103
disk space
see also df command
downloading
Active Jobs file 4-42, 4-48
Drop Backup Device option
Database Maintenance menu 4-20

messages and codes A-5


enabling
user exits 6-3
ENDED time
CONTROL-M log 1-8
ENTERPRISE/CS
ctmsuspend utility 2-134
description 1-1
release version 5-12
Shout messages 2-138
TCP/IP port number 5-12
entity authorization
Security Maintenance utility 3-28
environment variables
required 2-9
setting 2-10
event logger
problem detection 1-39
executable path
system parameter 5-3
Executable Path parameter 5-3
EXIT_STATUS_DIR
agent parameter 5-30
exits
CTMUE101 6-5
CTMUE102 6-7
CTMUE103 6-9
CTMUE104 6-10
CTMUE105 6-11
CTMUE106 6-11
Watchdog facility 1-45, 1-47
exporting
job definitions 2-64
Extend Database Size option
Database Maintenance menu 4-21
extending
CONTROL-M database 4-21

ecactltb utility 2-157


ecaqrtab utility
description 2-158
BMC Software, Inc., Confidential and Proprietary Information

CONTROL-M/Server for Unix Administrator Guide

F
failover
levels 7-1
overview 1-10
server platform 1-11
FILE parameter
ctmudchk utility 2-145
File Watcher utility 2-66
file, Manual Conditions 2-82
filename parameter
ctmvar utility 2-152
first database log file
Oracle parameter 5-18
forcing a job
authorization 3-5
ctmorder utility 2-98
failure A-18, A-19
forcing a table
failure A-20
forcing download
Active Jobs file 4-42
Full Security parameter
description 5-5
usage 3-2

GROUP
value for AUTOEDIT_INC_SEC 5-23
group scheduling
Autoedit variables 2-150
New Day procedure 1-17
groups
see also node ID
assigning users to 3-11

H
Heartbeat monitor
active mode 1-37
description 1-37
parameters 1-38
passive mode 1-37
home directory
messages and codes A-8
host name
agent platforms 1-6
CONTROL-M/Agent 1-12
host parameter
SAP jobs (ctmcreate) 2-33
SAP jobs (ctmdefine) 2-58
Hot backup
archive mode 4-13

G
GCSERV user
global condition security 3-8
General Daily. See New Day procedure
general threshold %
ctmdbcheck utility 2-43
GLOBAL
value for AUTOEDIT_INC_SEC 5-23
global conditions
security considerations 3-8
global variables
batch utility (ctmvar) 2-150

I
identification
agent platforms 1-6
Ignore Conditions file
description 5-7
mask characters 5-7
Ignore New Day Conditions parameter
description 5-6
usage 1-14
IMPORT_CAL mode
ctmpsm utility 2-113

BMC Software, Inc., Confidential and Proprietary Information

Index

In conditions
see prerequisite conditions
Index tablespace file
Oracle parameter 5-19
init_prflag 4-48
Input process communication port number
operational parameter 5-12
install_mirror script 7-17
interaction
see also communication
Server-Agent 1-5
ioa_appl parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-59
IOALOG events
problem detection 1-40
IOALOG_DEL_INT
server parameter 5-25
IP address
arp command 5-11
communication parameter 5-9

Jobno field
CONTROL-M log B-1
jobs
CTMUE101 user exit 6-5
CTMUE102 user exit 6-7
Disappeared status 1-7
order options 1-24
ordering 6-5
ordering by New Day procedure 1-14
ordering manually 1-23
retroactive ordering 1-22
sample flow 1-2
scheduling 1-15
submitting 6-7
terminating 2-81
User Daily 1-18
jobs ordering
manually 2-96
jobs submission
failure A-16

J
job status
Disappeared A-11
messages and codes A-10
job submission
error messages A-9
job_in_file parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-58
job_mode parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-58
jobcount parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
Jobname field
CONTROL-M log B-1

Kernel Configuration parameter, Check 4-41


killing
ctmkilljob utility 2-81

L
language parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
Last Run date
Date Control record 1-21
level, Restricted security 3-2
LIBMEMSYM file
AutoEdit variable A-11
List All Devices option
Database Maintenance menu 4-19
BMC Software, Inc., Confidential and Proprietary Information

10

CONTROL-M/Server for Unix Administrator Guide

List Backup Devices option


Database Maintenance menu 4-19
LISTAJFTAB mode
ctmpsm utility 2-117
LISTALL mode
ctmpsm utility 2-116
LISTCAL mode
ctmpsm utility 2-113
LISTDETAILS mode
ctmpsm utility 2-118
listener port number
Oracle parameter 5-18, 7-23
LISTGROUP mode
ctmpsm utility 2-116
listing
Active Jobs file 2-107
job processing definitions 2-94
jobs 2-113
prerequisite conditions 2-21
scheduling tables 2-111
statistics 2-77, 2-124
unordered jobs 2-145
LISTJOB mode
ctmpsm utility 2-116
LISTSYSOUT mode
ctmpsm utility 2-118
load balancing
agent identification 1-6
overview 1-9
resource usage 2-86
loading
Manual Conditions file 2-82
LOCAL
value for AUTOEDIT_INC_SEC 5-23
Local IP Host Interface Name
communication parameter 5-10
location
user exits 6-1
Log device name
Sybase parameter 5-17, 7-20

Log device type


Sybase parameter 5-16
log files
archiving 1-41
CONTROL-M 1-31
generation limits 1-41
managing 1-41
problem detection 1-39
purged by New Day procedure 1-32
renaming 1-41
size limits 1-41
size monitor 1-39
log physical device
Sybase parameter 5-17, 7-20
Logdate field
CONTROL-M log B-1
logical devices
adding 4-19
Logtime field
CONTROL-M log B-1

M
maintainence
CONTROL-M menu 4-6
maintaining
CONTROL-M database 2-17, 4-4
database passwords 2-36, 2-102
New Day procedure 1-14
security 3-11, 4-29
Sybase SQL server 4-4
system parameters 2-135
Manual Conditions file 2-82
mask characters
Ignore Conditions file 5-7
Master Device Type
Sybase parameter 5-16
Master physical device
Sybase parameter 5-16

BMC Software, Inc., Confidential and Proprietary Information

Index

11

Max Wait parameter


New Day procedure 1-13
Maximum Days Retained by CONTROL-M
Log
system parameter 1-14, 5-5
Maximum Days to Retain Sysout Files
system parameter 1-14, 5-5
Maximum job state changes
operational parameter 5-12
Maximum Retries parameter
description 5-4, 5-14
Maximum server processes
operational parameter 5-13
Memname field
CONTROL-M log B-1
menu, Production Support 2-106
menu, Security Authorization 4-29
menus
CONTROL-M main menu 4-6
Database Creation 4-10
Message field
CONTROL-M log B-1
messages
see also shout messages
messages and codes
description A-1
prefixes A-1
messages, distribution of
ctm2snmp utility 2-155
Minimum server processes
operational parameter 5-13
mirror database
extending 4-21
messages and codes A-4
Oracle 5-20
parameters 5-20
port numbers 5-20, 7-4
QUERY_SPN field 7-4
Sybase 5-20, 7-4
synchronization 7-35

mirror database data device


Sybase parameter 5-21
mirror database log device
Sybase parameter 5-21
mirroring
failure A-4
server environment 1-11
mode
Sysout file access 5-30
modifying
see also changing
see also creating
see also editing
see also updating
environment variables 2-9
monitoring
Quantitative resources 2-86
Monthly report
ctmpln utility 2-120
MSGID field
CONTROL-M log B-1

N
Network Management applications
ctm2snmp utility 2-155
New Day procedure
Active Jobs file 1-13
CTMUE103 user exit 6-9
CTMUE104 user exit 6-10
Daylight Savings Time 1-35
description 1-13
group scheduling 1-17
ordering jobs 1-14
prerequisite conditions cleanup 5-6
purging log files 1-32
restarting 4-41
scheduling 1-15
sysout files cleanup 1-14
UDLAST parameter 1-14
BMC Software, Inc., Confidential and Proprietary Information

12

CONTROL-M/Server for Unix Administrator Guide

Node group
load balancing 1-9
menu 4-36
modifying 4-36
usage 1-9
Node ID
agent platforms 1-6

O
Odate
CONTROL-M log B-1
ctmcontb utility 2-21, 2-22
ctmcreate utility 2-28
ctmdefine utility 2-51
ctmorder utility 2-98
ctmpsm utility 2-110
Date Control record 1-21
Date parameter 5-4
description 1-13
New Day procedure 1-13
working date 1-21
ON_GROUP_END OK actions
New Day procedure 1-17
operating system
system parameter 5-3
operational parameters
description 5-11
modifying 4-32
Oracle
backing up 4-14
database logs 4-13
Oracle Applications
job parameters (ctmcreate) 2-34
Oracle SQL server
home directory 5-18
host parameter 5-19, 7-22
listner port number 5-18, 7-23
parameters 5-18, 7-22
ordering jobs

authorization 3-5
job security 3-5
New Day procedure 1-14
Orderno field
CONTROL-M log B-1
OS_PRM_HOSTNAME
agent parameter 5-28
server parameter 5-28
output
see reports
see sysout files
Owner field
CONTROL-M log B-1

P
parameter, Check Kernel Configuration 4-41
parameters
see also variables
CONTROL-M/Server 5-1
coordination 5-2
customization 5-1
Customization menu 4-30
database 5-15
performance 5-21
Sybase database 5-15
system 5-3
PARM1 AutoEdit variable
User Daily jobs 1-20
PARMn parameter
Oracle Applications 2-35
Oracle Applications (ctmcreate) 2-35
Oracle Applications (ctmdefine) 2-60
passwords
database 2-102
path modification
tcsh command 2-13
permission. See security
pinging
ctmping utility 2-103

BMC Software, Inc., Confidential and Proprietary Information

Index

13

Polling interval parameter


communication 5-14
description 5-14
polling_interval parameter
SAP (ctmcreate) 2-34
SAP (ctmdefine) 2-59
port numbers
Agent-to-Server 5-10
backup socket 5-16
CONTROLM/Server 4-41
ENTERPRISE/CS TCP/IP 5-12
mirror database 5-20, 5-21
query socket 5-16
Server-to-Agent 5-14
post-processing
performance parameters 5-21
PP_THRESHOLD
performance parameter 5-22
prefixes
messages and codes A-1
prerequisite conditions
adding 2-21
cleanup 5-6
ctmcontb utility 2-21
deleting 1-14, 2-21, 4-48, 5-6
listing 2-21
unscheduled 2-82
print_archmode parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_authorization parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_banner parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_banner_page parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_copies parameter

SAP (ctmcreate) 2-33


SAP (ctmdefine) 2-59
print_destination parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_expiration parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_immediately parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_numcolumns parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_numlines parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_recipient parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
print_release parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
printcopies parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
PRINTER_NAME
agent parameter 5-28
printername parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
printstyle parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
PRIORITY_SL_SCAN
performance parameter 5-22
server parameter 5-26

BMC Software, Inc., Confidential and Proprietary Information

14

CONTROL-M/Server for Unix Administrator Guide

problem detection
IOALOG events 1-40
log file size monitor 1-39
tools 1-38
Process log file
erasing contents 4-42
process, discovery 1-6, 2-103
processes
CONTROL-M/Server 4-43
suspending 2-134
proclog file
stack trace output 1-42
Production Support menu 2-106
profile_ parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
progname parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
program parameter
SAP (ctmcreate) 2-33
SAP (ctmdefine) 2-59
Protocol
communication parameter 5-10, 5-28
communication with agents 1-6
Protocol Version parameter
description 5-14

Q
Quantitative resources
agent platform usage 2-86
ctmloadset utility 2-86
deleting 4-48
discrepancy A-5
listing 2-158
maintaining 2-158
reserved A-18
Query Socket
port number 5-16

QUERY_SPN field
mirror database 7-4
quiet parameter
ctmvar utility 2-153
quotation marks
AutoEdit variables 2-29, 2-52, 2-76,
2-133

R
R/3See SAP
r3_owner parameter
SAP jobs (ctmdefine) 2-59
SAP jobs(ctmcreate) 2-34
raw partitions. See partitions
RBS tablespace file
Oracle parameter 5-19
read permission
assigning 2-14
reading. See downloading
recovery
see also failover
data center failure 7-33
database failure 7-29
failover planning 1-10
relationship parameter
New Day procedure 1-17
release version
ENTERPRISE/CS parameter 5-12
Remote Sybase host name
database parameter 5-17, 7-20
removing. See deleting
reordering jobs
User Daily 2-145
reporting
CONTROL-M log entries 2-91

BMC Software, Inc., Confidential and Proprietary Information

Index

15

reports
ctmcontb utility 2-21
ctmlog utility 2-92
ctmordck utility 2-95
ctmrpln utility 2-120
description 2-6
ecactltb utility 2-157
ecaqrtab utility 2-159
resources
see Control resources
see Quantitative resources
Resource Table options
ctmpsm utility 2-110
respapp parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
respname parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
Restore Database option
Database Maintenance menu 4-16
restoring
CONTROL-M database 2-44, 4-16
ctmdbrst utility 2-44
Restricted security level 3-2
Retro parameter
job processing 1-22
Retry Interval parameter
description 5-14
Rollback segment tablespace file
Oracle parameter 5-19
RUNCNT
rerun counter A-10
RUNINF_PURGE_LIMIT
server parameter 1-14, 5-25
RUNINF_PURGE_MODE
server parameter 5-25
runtime statistics 1-28

S
SAP
job parameters (ctmcreate) 2-33
job parameters (ctmdefine) 2-58
Savings Time, Daylight 1-33
SCHEDTAB mode
ctmpsm utility 2-117
scheduling function options
ctmpsm utility 2-110, 2-111
scheduling jobs
New Day procedure 1-15
performance parameters 5-21
scheduling tables
authorization 3-21
ctmpsm utility 2-113
defining jobs 2-47
listing jobs 2-120
security 3-4
scope
AutoEdit variables 2-150
script, install_mirror 7-17
Secure Socket Layer
ctmsys utility 2-142

BMC Software, Inc., Confidential and Proprietary Information

16

CONTROL-M/Server for Unix Administrator Guide

security
Active Jobs file 3-5
agent platform 3-8
application 3-1
assigning users to groups 3-11
authorization problem A-15
authorizations 3-2, 3-9
CONTROL-M entities 3-7
ctmsec maintenance utility 3-11
database 3-11
export defintion tables 4-29
Global conditions 3-8
import definition tables 4-29
job script execution denied A-23
job status 2-94
levels 3-2
permission assignment 2-14
Restricted security level 3-2, 5-5
Scheduling tables 3-4
Security Authorization menu 4-29
Servers file 1-9
setting levels 5-5
summary 3-9
table access denied A-23
Unrestricted security level 3-2, 5-5
user ID not authorized A-23
Security Authorization menu 4-29
security level, Restricted 3-2
Security Maintenance utility
Active Jobs file 3-24
adding groups 3-18
adding users 3-13
batch mode 3-32
deleting groups 3-18
deleting users 3-13
description 3-11
entity authorization 3-28
menu 4-29
Scheduling table authorization 3-21
security, application 3-1

security_groupname parameter
Oracle Applications (ctmcreate) 2-35
Oracle Applications (ctmdefine) 2-60
server
see also CONTROL-M/Server
see also Oracle SQL Server
see also Sybase SQL Server
failover 1-11
Server process
message prefix A-1
Server-to-Agent
port numbers 5-14
setting. See customizing
Shout Destination tables
active table 2-129
ctmsys utility 2-135
description 1-24
maintenance 2-135
specifying destinations 1-28
Shout facility
description 1-24
Shout messages
agent platforms 2-138
ctmshout utility 2-127
Daylight Savings Time 1-34, 1-35
ENTERPRISE/CS 2-138
invalid destination A-17
Show Database Parameters option
Database Maintenance menu 4-25
SID mirror
Oracle parameter 5-21
size monitor
log files 1-39
size of database log files
Oracle parameter 5-18
SL_BREAK_INT
performance parameter 5-22
server parameter 5-26

BMC Software, Inc., Confidential and Proprietary Information

Index

17

Sleep Time
considerations 4-49, 5-22
resetting 4-48
SNMP traps
ctm2snmp utility 2-155
space usage
database 2-45
spool parameter
SAP jobs (ctmcreate) 2-34
SAP jobs (ctmdefine) 2-59
SQL server
see also Oracle SQL server
see also Sybase SQL server
SSL
see also Secure Socket Layer
stack trace
debugging 1-42
problem detection 1-39
proclog file 1-42
stageparm parameter
Oracle Applications (ctmdefine) 2-60
stageparm parameter
Oracle Applications (ctmcreate) 2-35
Start Day of the Week parameter 5-5
starting
CONTROL-M/Server 4-2, 4-8
Sybase SQL server 4-9
Statistical Details table
ctmjsa utility 1-30
Statistical Summary table
ctmstats utility 2-130
statistics
compiling 2-77
ctmjsa utility 1-30
deleting 1-14, 2-124
listing 2-77, 2-124
overview 1-28
runtime 1-28
summary mode 5-12
systems parameter 1-29, 5-4

viewing 2-130
Statistics Mode parameter
description 1-29, 2-77, 5-12
Statistics Summary table
ctmjsa utility 1-30
statistics, runtime 1-28
STATS_TIME
server parameter 5-25
step_num parameter
SAP jobs (ctmcreate) 2-34
SAP jobs (ctmdefine) 2-59
stopping
CONTROL-M/Server 4-2, 4-8
ctmkilljob utility 2-81
Sybase SQL server 4-9
SUBMITTED AT time
CONTROL-M log 1-8
Subsystem field
CONTROL-M log B-1
Support menu, Production 2-106
Sybase
backing up 4-14
Sybase interface directory
database parameter 5-17
Sybase parameter
log physical device 5-17, 7-20
Master physical device 5-16
owner 5-15, 7-19
Sybase SQL server
character set 7-6
considerations 7-4, 7-7
database mirroring 7-4
database name 5-17
database parameters table 5-15
dedicated 7-4
maintenance 4-4
starting 4-9
stopping 4-9

BMC Software, Inc., Confidential and Proprietary Information

18

CONTROL-M/Server for Unix Administrator Guide

synchronization
database 7-36
mirror database 7-36
sysout files
cleanup by New Day procedure 1-14
copy error A-13
days retained 5-5
delete failure A-14
lost A-15
move failure A-13
open error A-13
release failure A-14
sysout log directory
system parameter 5-3
Sysout Log Directory parameter 5-3
SYSOUT_MODE
agent parameter 5-30
SYSOUT_NAME
agent parameter 5-30
SYSTEM
value for AUTOEDIT_INC_SEC 5-23
system parameters
description 5-3
maintenance 2-135
System User Daily
UDLAST parameter 1-14
System user password
Oracle parameter 5-19

T
table. See Scheduling tables
table security
access denied A-23
Tablespace
data file 5-18
Oracle SQL server 7-7
size 5-18
user 5-18
Tasktype field

CONTROL-M log B-1


tasktype parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-60
TCP/IP host name parameter
compatibility 5-10
TCP/IP port number
ENTERPRISE/CS 5-12
TCP/IP protocol
agent communication 1-6
tcsh command
environment variables 2-10
path modification 2-13
terminating
jobs 2-81
time
CONTROL-M functions 1-8
Time From parameter
Job Submission window 1-8
Time Until parameter
Job Submission window 1-8
Time, Daylight Savings 1-33
Timeout parameter
description 5-14
transfering
files 2-66
TRANSLATE_$0
agent parameter 5-30
Troubleshooting
menu 4-40
report 4-45

U
UDLAST parameter
description 1-21
New Day procedure 1-14
User Daily 1-14
ue_exit directory
user exits 6-4

BMC Software, Inc., Confidential and Proprietary Information

Index

19

Unavailable status
agent platform 1-7
Unknown status
agent platform 1-8
unordered jobs
listing 2-145
User Daily jobs 2-145
Unrestricted security level
description 3-2
UPDATEAJF mode
ctmpsm utility 2-118
UPDATEGROUP mode
ctmpsm utility 2-119
UPDATETABLE mode
ctmpsm utility 2-119
User Daily
AutoEdit variable %%PARM1 1-20
ctmordck utility 2-94
CTMUE105 user exit 6-11
CTMUE106 user exit 6-11
Date Control record 1-21
example 1-19
interruptions 1-23
reordering jobs 2-145
scheduling 1-15
workflow 1-18
User Daily jobs
checking 2-145
ctmudly utility 2-149
last run date 2-147
listing job definitions 2-94
unordered jobs list 2-145
user exits
see also exits
configuration parameters 5-27, 6-3
location 6-1
Watchdog facility 1-47
workflow 6-3
user ID
see also owner

unauthorized A-23
User Maintenance option
ctmsec utility 3-13
User password
Oracle parameter 5-18, 7-22
userexits
enabling 6-3
username parameter
Oracle Applications (ctmcreate) 2-34
Oracle Applications (ctmdefine) 2-34,
2-60
utilities
ctm_backup_bcp 2-17
ctm_restore_bcp 2-19
ctm2snmp 2-155
ctmcontb 2-21
ctmcreate 2-25
ctmdbapasswd 2-36
ctmdbbck 2-37
ctmdbcheck 2-39
ctmdbrst 2-44
ctmdbspace 2-45
ctmdbtrans 2-46
ctmdefine 2-47
ctmdiskspace 2-62
ctmexdef 2-64
ctmfw 2-66
ctmgrpdef 2-75
ctmjsa 2-77
ctmkilljob 2-81
ctmldnrs 2-82
ctmloadset 2-86
ctmlog 2-91
ctmordck 2-94
ctmorder 2-96
ctmping 2-103
ctmpsm 2-106
ctmrpln 2-120
ctmruninf 2-124
ctmsec 3-13
BMC Software, Inc., Confidential and Proprietary Information

20

CONTROL-M/Server for Unix Administrator Guide

ctmshout 2-127
ctmshtb 2-129
ctmstats 1-30, 2-130
ctmstvar 2-133
ctmsuspend 2-134
ctmsys 2-135
ctmudchk 2-145
ctmudlst 2-147
ctmudly 2-149
ctmvar 2-150
ctmwhy 2-154
ecactltb 2-157
ecaqrtab 2-158
environment variables 2-9
Oracle variables 2-10
output destination 2-7
reference table 2-4
reports 2-6
summary table 2-2
Sybase variables 2-10
user access to 2-9

V
var parameter
ctmvar utility 2-152
varexpr parameter
ctmvar utility 2-152
variables. See AutoEdit variables.
Environment variables, and parameters
variant parameter
SAP (ctmcreate) 2-34
SAP jobs (ctmcreate) 2-34
SAP jobs (ctmdefine) 2-59
verifying
database integrity 2-37
User Daily jobs 2-145
viewing
see also listing
statistics 2-130

W
waitchild parameter
Oracle Applications (ctmcreate) 2-35
Oracle Applications (ctmdefine) 2-60
waitonly parameter
SAP jobs (ctmcreate) 2-34
SAP jobs (ctmdefine) 2-59
Watchdog facility
configuration parameters 5-31
description 1-44
error handlers 1-48
parameters 5-31
predefined exits 1-45
problem detection 1-39
user exits 1-47
Watcher utility, File 2-66
WD_ALIVE_MSG parameter
Watchdog facility 1-48
WD_CTMEXIT__CMD_LINE parameter
Watchdog exit 1-46
WD_CTMEXIT__ERROR_MSG parameter
Watchdog exit 1-46
WD_CTMEXIT__INTERVAL parameter
Watchdog exit 1-46
WD_CTMEXIT__RUN_STATE parameter
Watchdog exit 1-46
WD_CTMEXIT__SCRIPT_FILE parameter
Watchdog exit 1-46
WD_CTMEXIT__SUSPEND_STATE
Watchdog exit 1-46
WD_CTMEXIT__TIMEOUT parameter
Watchdog exit 1-46
WD_CTMEXIT_NUMBER parameter
Watchdog facility 1-44
WD_CTO_HOSTNAME parameter
Watchdog facility 1-48
WD_CTO_TIMEOUT parameter
Watchdog facility 1-49

BMC Software, Inc., Confidential and Proprietary Information

Index

21

WD_ERROR_HANDLER_SCRIPT_FILE
Watchdog facility 1-49
WD_ERROR_HANDLER_TIMEOUT
Watchdog facility 1-49
WD_HEARTBEAT_INTERVAL exit
Heartbeat check 1-45
WD_INTERVAL parameter
Watchdog facility 1-49
WD_USEREXIT__CMD_LINE parameter
Watchdog exit 1-47
WD_USEREXIT__ERROR_MSG
Watchdog exit 1-47
WD_USEREXIT__INTERVAL parameter
Watchdog exit 1-47
WD_USEREXIT__RUN_STATE parameter
Watchdog exit 1-47
WD_USEREXIT__SCRIPT_FILE
Watchdog exit 1-47
WD_USEREXIT__SUSPEND_STATE
Watchdog exit 1-47
WD_USEREXIT__TIMEOUT parameter
Watchdog exit 1-47
WD_USEREXIT_NUMBER parameter
Watchdog facility 1-44
Windows NT
CONTROL-M/Server 1-9
workflow
CONTROL-M jobs 1-2
New Day procedure 1-13
scheduling jobs 1-15
User Daily jobs 1-18
write permission
assigning 2-14

Y
Yearly report
ctmpln utility 2-120

BMC Software, Inc., Confidential and Proprietary Information

22

CONTROL-M/Server for Unix Administrator Guide

Notes

*100037648*
*100037648*
*100037648*
*100037648*
*100037648*

You might also like