Professional Documents
Culture Documents
CONTROL-M Enterprise Manager - Administrator Guide 6.1.00 PDF
CONTROL-M Enterprise Manager - Administrator Guide 6.1.00 PDF
Manager
Administrator Guide
Address
Telephone
Fax
Telephone
Fax
Customer Support
You can obtain technical support by using Response Online (support from the Web) or Response On Demand.
To expedite your inquiry, please see Before Contacting BMC Software, below.
Response Online
You can obtain technical support from BMC Software 24 hours a day, seven days a week by accessing the
technical support Web site at http://www.bmc.com/support.html. From this site, you can
read overviews about support services and programs that BMC Software offers
find the most current information about BMC Software products
search a database for problems similar to yours and possible solutions
order or download product documentation
report a problem or ask a question
subscribe to receive e-mail notices when new product versions are released
find worldwide BMC Software support center locations and contact information, including e-mail addresses,
fax numbers, and telephone numbers
Response On Demand
In the USA and Canada, if you need technical support and do not have access to the Web, call 800 537 1813.
Outside the USA and Canada, please contact your local support center or your local sales office for assistance.
product information
product name
product version (release number)
license number and password (trial or permanent)
machine type
operating system type, version, and service pack or program temporary fix (PTF)
system hardware configuration
serial numbers
related software (database, application, and communication) including type, version, and service pack or
PTF
messages received (and the time and date that you received them)
iii
iv
Contents
Contents
About This Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Chapter 1
Overview
Maintaining CONTROL-M/EM
Contents
Security
vi
Chapter 7
Troubleshooting
Customization
SNMP Interface
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CONTROL-M/EM and SNMP Traps . . . . . . . . . . . . . . . . . . . . . . .
SNMP Trap Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing CONTROL-O/Server . . . . . . . . . . . . . . . . . . . . .
Customizing HP-OpenView . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing NetView for AIX . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing Tivoli Management Environment Console . . . . .
Customizing CONTROL-M/Links for Distributed Systems . .
Appendix B
A-2
A-3
A-3
A-5
A-6
A-7
A-10
A-13
A-17
Contents
vii
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-8
Appendix C
System Parameters
viii
Figures
Figures
Figure 1-1
Figure 1-2
Figure 2-1
Figure 2-2
Figure 3-1
Figure 4-1
Figure 4-2
Figure 4-3
Figure 4-4
Figure 4-5
Figure 4-6
Figure 4-7
Figure 4-8
Figure 4-9
Figure 4-10
Figure 4-11
Figure 6-1
Figure 6-2
Figure 6-3
Figure A-1
Figure A-2
Figures
ix
Tables
Tables
Table 1-1
Table 1-2
Table 2-1
Table 3-1
Table 4-1
Table 4-2
Table 4-3
Table 4-4
Table 4-5
Table 4-6
Table 4-7
Table 4-8
Table 4-9
Table 4-10
Table 4-11
Table 4-12
Table 4-13
Table 5-1
Table 5-2
Table 5-3
Table 5-4
Table 5-5
Table 5-6
Table 5-7
Table 6-1
Table 6-2
Table 6-3
Table 6-4
Tables
xi
Table 6-5
Table 6-6
Table 6-7
Table 6-8
Table 6-9
Table 6-10
Table 6-11
Table 7-1
Table 7-2
Table 7-3
Table 7-4
Table 7-5
Table 7-6
Table 7-7
Table 7-8
Table 8-1
Table 8-2
Table 8-3
Table 8-4
Table A-1
Table A-2
Table A-3
Table A-4
Table A-5
Table B-1
Table B-2
Table B-3
Table B-4
Table B-5
Table B-6
Table B-7
Table B-8
Table C-1
Table C-2
Table C-3
Table C-4
Table C-5
Table C-6
Table C-7
Table C-8
Column Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Privileges Panel Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Field Descriptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resource Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Calendar Fields. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Access Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting Menu Options . . . . . . . . . . . . . . . . . . . . . . . . .
Database Troubleshooting Menu Options . . . . . . . . . . . . . . . . .
Gateway Troubleshooting Menu Options. . . . . . . . . . . . . . . . . .
Set Debug Parameters Menu Options. . . . . . . . . . . . . . . . . . . . .
Gateway Log Filename Parameters . . . . . . . . . . . . . . . . . . . . . .
Global Conditions Server Parameters G . . . . . . . . . . . . . . . . . .
DIAG Initialization (.ini) File Parameters . . . . . . . . . . . . . . . . .
DIAG Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Alert Data Processing Parameters . . . . . . . . . . . . . . . . . . . . . . .
Parameters for the Global Conditions Distribution Facility. . . .
Sybase Adaptive Server Parameters. . . . . . . . . . . . . . . . . . . . . .
Oracle Server Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
SNMP Trap Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
CONTROL-M/EM Customization Parameters . . . . . . . . . . . . .
SNMP Parameter Modification Command Terms . . . . . . . . . . .
Trap Message Formatting Variables . . . . . . . . . . . . . . . . . . . . . .
Severity Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Root Menu Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Activation Menu and Line Commands. . . . . . . . . . . . . . . . . . . .
Database Creation Menu and Line Commands . . . . . . . . . . . . .
Database Maintenance Menu and Line Commands . . . . . . . . . .
Troubleshooting Menu and Line Commands . . . . . . . . . . . . . . .
Database Troubleshooting Menu . . . . . . . . . . . . . . . . . . . . . . . .
Gateway Troubleshooting Menu and Line Commands . . . . . . .
CONTROL-M/EM Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . .
General Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Gateway Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enterprise License Manager and Client Parameters. . . . . . . . . .
Global Alerts Server Parameters . . . . . . . . . . . . . . . . . . . . . . . .
Maintenance Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
GUI Server Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Global Conditions Server Parameters . . . . . . . . . . . . . . . . . . . .
6-21
6-22
6-26
6-28
6-28
6-30
6-31
7-3
7-6
7-7
7-9
7-13
7-16
7-23
7-24
8-3
8-5
8-8
8-9
A-3
A-5
A-6
A-9
A-11
B-2
B-3
B-5
B-5
B-6
B-6
B-7
B-8
C-2
C-4
C-7
C-9
C-10
C-13
C-14
C-14
xii
About . . .
This book assumes that you are familiar with your host operating system.
xiii
Description
Chapter 1
Overview
Provides an overview of CONTROL-M/Enterprise
Manager components, administrator
responsibilities, and related products.
Chapter 2
Chapter 3
Maintaining CONTROL-M/EM
Provides information about various features and
functions required to maintain the CONTROL-M/EM
environment.
Chapter 4
Chapter 5
Chapter 6
Security
Provides information about granting user
authorizations and how to maintaining a secure
environment.
Chapter 7
Troubleshooting
Describes the various problem-solving tools in the
Troubleshooting menu and the DIAG diagnostic
facility.
Chapter 8
Customization
Describes customization of
CONTROL-M/Enterprise Manager system defaults
and database server configuration settings.
xiv
Chapter/Appendix
Description
Appendix A
SNMP Interface
Describes how to interface
CONTROL-M/Enterprise Manager with various
network management applications.
Appendix B
Appendix C
System Parameters
Lists and describes the system parameters that
influence the functioning of
CONTROL-M/Enterprise Manager.
Index
xv
Related Documentation
The following BMC publications are also relevant to
CONTROL-M/EM.documentation:related publications
xvi
BMC Software provides a core set of printed books with your product
order. To request additional books, go to
http://www.bmc.com/support.html.
xvii
Online Help
You can access Help for a product through the products Help menu. The
online Help provides information about the products graphical user
interface (GUI) and provides instructions for completing tasks.
Release Notes
Printed release notes accompany each BMC Software product. Release
notes provide up-to-date information such as
The latest versions of the release notes are also available on the Web at
http://www.bmc.com/support.on-line support:release notes
documentation:conventionsdocument
conventionsConventions
The following abbreviations are used in this guide:
Abbreviationdocum
ent
conventions:abbrevi
ations
Description
CONTROL-M/EM
CONTROL-M/Enterprise Manager
Net
CONTROL-M/EM Network
WS-GTW
DC-GTW
<home-directory>
xviii
{Option A|Option B}
[Option]
Code Samples
Boldface
Italics
One-Step Procedures
The symbol
xix
Ellipsis
Option Symbol
xx
Overview
Introducing CONTROL-M/EM
CONTROL-M/Enterprise Manager is a software product that runs
primarily on Windows and Unix workstations to provide centralized
control of the job scheduling production environment for the entire
enterprise. The CONTROL-M/EM advanced graphical user interface
(GUI) enables you to view production flows for the entire active
environment.
Overview
1-1
CONTROL-M/EM Network
1-2
Component
Description
CONTROL-M/EM
Server
CONTROL-M/EM
Graphical User
Interface (GUI)
Installation Notes
Overview
1-3
Table 1-1
Component
Description
Installation Notes
Relational
Database
Management
Server
(RDBMS)
CONTROL-M/EM
Database
CONTROL-M/EM
Global Conditions
Server
(GCS)
CONTROL-M/EM
Global Alerts
Server (GAS)
CONTROL-M/EM
Gateways
(WS-GTW)
1-4
Table 1-1
Component
Description
Installation Notes
CONTROL-M/
Desktop
Administration
Facility
Overview
1-5
Figure 1-2
Multi-Platform Enterprise
1-6
CONTROL-M/EM Database
The CONTROL-M/EM database is a repository of data relating to the
functioning of CONTROL-M/EM on the workstation. The database is
maintained using a dedicated or shared Sybase Adaptive Server, MSSQL
Server, or Oracle Server. MSSQL and Sybase Adaptive Server are not
supported as a dedicated installation on Windows computers.
Note
Overview
1-7
Administrator Responsibilities
CONTROL-M/EM has three areas of administrative responsibility. Each
area has certain privileges, functions, and responsibilities, and is
accessed by a specific user name (title). The CONTROL-M/Enterprise
Manager Administrator Guide describes the responsibilities of these
three administrator-users:
CONTROL-M/EM Administrator
The CONTROL-M/EM administrator (also known as the Database
Owner or DBO) effectively owns all CONTROL-M/EM programs
and database files. In addition to being a regular user, the
CONTROL-M/EM administrator is responsible for:
Maintaining the CONTROL-M/EM database and all
CONTROL-M/EM files. For more information, see Chapter 5,
Managing CONTROL-M/EM with the Root Menu, and
Chapter 3, Maintaining CONTROL-M/EM.
Starting and stopping CONTROL-M/EM components (except
GUIs). For more information, see Starting/Stopping
CONTROL-M/EM Components in Chapter 3, Maintaining
CONTROL-M/EM.
Adding CONTROL-M/EM users to the system. For more
information, see CONTROL-M/EM Security in Chapter 6,
Security.
Defining CONTROL-M installations to CONTROL-M/EM. For
more information, see Chapter 2, Defining CONTROL-M
Installations.
Providing and maintaining CONTROL-M/EM security using the
Users and Groups Authorization facility. For more information,
see Chapter 6, Security.
Performing diagnostic functions, when necessary, to optimize
CONTROL-M/EM performance. For more information, see
Chapter 3, Maintaining CONTROL-M/EM..
1-8
Windows Administrator
The Windows administrators responsibilities include defining
Windows users and performing various system security functions.
Overview
1-9
CONTROL-M or CONTROL-M/SERVER
Production control and tracking product that runs in each
CONTROL-M installation.
CONTROL-M/Agent
Production platform-based product used when CONTROL-M
Server/Agent Technology is implemented.
Note
You can also create and run jobs for specified applications (for example
SAP or Oracle Applications). For more information, see the User Guide
for the appropriate CONTROL-M Control Module.
1-10
You can add a timezone to the predefined list. For more information, see
Adding and Modifying Time Zone Definitions on page 1-14.
If no time zone is specified for a job, it will be ordered and implemented
according to the time zone of the CONTROL-M/Server that ordered the
job.
Time Zone jobs in the Active Jobs File
Value
Description
HAW
Hawaii (GMT-10:00)
PST
Overview
1-11
Table 1-2
Value
Description
MST
CST
EST
GMT
WET
CET
EET
HKG
TOK
Tokyo (GMT+09:00)
MEL
Melbourne (GMT+10:00)
Newly defined jobs with specified time zones must be saved at least
48 hours before their intended execution dates (in order to ensure
that they are ordered automatically by the appropriate New Day
Procedure or User Daily).
If they must run today they should be ordered manually (for
example, using the ctmorder utility).
In addition to time zones, you can also order a job that is intended for
execution on a future date. For more information, see the odate and
odate_option parameters in any of the following
CONTROL-M/Server utilities:
ctmudly
ctmudchk
BMC Software, Inc., Confidential and Proprietary Information
1-12
ctmorder
ctmcreate
For more information about these utilities, see the appropriate
CONTROL-M/Server Administrator Guide.
Specify a time for the User daily that corresponds to just after the
beginning of the working day in that time zone.
In the -odate parameter, specify the working date for the time
zone (usually either the current CONTROL-M/Server working
date, or the next day).
Overview
1-13
3. List the User Daily jobs in the ctmorder section of the New Day
Procedure.
This method ensures that the appropriate jobs are ordered only when they
become necessary, thus resulting in a smaller Active Jobs file and faster
processing.
Adding and Modifying Time Zone Definitions
hh:mm
The number of hours and minutes that the specified time zone
differs from Greenwich Mean Time.
Note: The only valid values for mm are 00 or 30.
Example
To create a time zone for New York that is five hours earlier than
Greenwich Mean Time, specify:
NYC (GMT-05:00)
1-14
Notes
Overview
1-15
1-16
2-1
Figure 2-1
2-2
Field
Description
Enable
CONTROL-M
Code
Version
Platform
CONTROL-R
Installed
Protocol
2-3
Table 2-1
Field
Description
Contact
Description
Gateway TCP/IP
Host Name
5. Click OK.
6. After defining new CONTROL-M installations, start the gateways
for each of these installations on the CONTROL-M/EM
workstation(s) hosting the CONTROL-M/EM Gateway Application
(WS-GTW). For more information, see Chapter 3, Maintaining
CONTROL-M/EM.
2-4
2-5
5. Click OK.
To refresh the Communication Administration window display:
2-6
2-7
2-8
Maintaining CONTROL-M/EM
Component Descriptions
Starting and Stopping CONTROL-M/EM Components
Cleanup of Old Global Conditions
Gateway Log
CONTROL-M/EM Administrator Password
OS/390 Performance Analysis
Configuring ENTERPRISE/CS for Use with a Firewall
Hostname and Port Changes
Component Descriptions
Database Server (DB server)
A Sybase Adaptive Server, Oracle Server, or MSSQL Server that enables
the application to access the database. The database server is started as a
service on the computer on which it is installed. The database server
must be active before any of the other components is started.
Maintaining CONTROL-M/EM
3-1
3-2
Maintaining CONTROL-M/EM
3-3
3-4
When the EnablePriv utility is used, you can shut down any process
running on the computer. Therefore, use the EnablePriv utility with
caution to avoid interfering with crucial system activity or crashing the
computer.
To stop an CONTROL-M/EM process:
1. Close the Task Manager window, if it is open. The EnablePriv
utility does not work if the Task Manager is open before the utility is
run.
2. Choose Start => Run to display the Run dialog box. Type
driveletter:\Ecsnt\MaintAgent\EnablePriv.exe taskmgr.exe in the
Open text box and click OK. The Task Manager is displayed.
3. In the Processes panel, select the CONTROL-M/EM process to be
stopped, such as maint.exe, the Administration Agent process. Click
End Process to stop the process.
4. Choose File => Exit Task Manager to close the Task Manager
window.
Maintaining CONTROL-M/EM
3-5
The programs that can be started and stopped automatically are the
Administration agent, the database server, and the Orbix Server
(IT Naming and IT Locator services). These programs are compose the
basic infrastructure on which CONTROL-M/EM runs. Automating their
startup and shutdown provides greater system stability.
You must supply different parameters for each of the supported Unix
platforms. Instructions for AIX are on page 3-7. Instructions for HP-UX
are on page 3-9. Instructions for Solaris are on page 3-10.
Note
You need to specify a command only if the program that the command
affects is installed on the computer.
For example, start_server is performed only on a computer on
which the database server is installed.
3-6
AIX
Start Programs
Maintaining CONTROL-M/EM
3-7
3-8
HP-UX
Start Programs
Maintaining CONTROL-M/EM
3-9
Solaris
Start Programs
3-10
Figure 3-1
Example
Week Days
2,3,4,5,6
AutoEdit Assignment
%%A=%%CALCDATE %%DATE -10
%%B=%%CALCDATE %%DATE -5
%%A=%%SUBSTR %%A 3 4
%%B=%%SUBSTR %%B 3 4
Command Line
ctmcontb deletefrom %%A %%B
Note
Maintaining CONTROL-M/EM
3-11
Gateway Log
By default, all information and error messages displayed by a WS-GTW
are saved in a special log file, in directory
<home-directory>/ECS_HOME_NAME/log/. The Gateway Log file
name contains the following format:
To see the name of the current log file, open the Command Prompt
window running the gateway.
3-12
ECSGATE,DEBUG=nnn
-or-
ECSGATE,DEBUG=nnn
Maintaining CONTROL-M/EM
3-13
3-14
GUI Server
Global Alert Server
CLI utility
Orbix Naming Service
Orbix Locator
ENTERPRISE/CS GUI
CONTROL-M/Desktop
Ports can only be assigned for most components when they are not
active. Verify that components to be assigned ports are not active.
Note
Step 3
Maintaining CONTROL-M/EM
3-15
Step 4
Note
Specify the numbers of the components that you want to enable for use
with the firewall. Separate these numbers with commas.
Example
To configure the GUI Server, the Global Alert Server, and the Orbix
Naming Service, enter:
1,2,4
Step 6
Note
3-16
Step 7
Press <Enter> to accept the default port value (in square brackets), or
type a different port number and then press <Enter>.
Note
Maintaining CONTROL-M/EM
3-17
For information about how to register port numbers in your firewall, see
the documentation provided with your firewall software.
3-18
Server Component
Location
Global Conditions
Server
Enterprise License
Manager
Database Server
Maintaining CONTROL-M/EM
3-19
Table 3-1
Server Component
Location
SNMP server
Snmphost parameter
Datacenter
Hostportlist parameter
3-20
4-1
4-2
4-3
4-4
From the Administration facility window, you can start and stop
components in the network, receive messages from agents about
components that are not functioning properly, and modify the view to see
only components that interest you.
4-5
Component Types
The Administration facility is used to administer the following
ENTERPRISE/CS component types:
4-6
4-7
Figure 4-1
Tree Views
4-8
Click
for
-orChoose View => Tree View, and select the desired view option.
Note
4-9
Note
Description
Component Type
Name
Running On
Current State
Desired State
4-10
Column Title
Description
Last Checked
Message
Agent Status
Component States
Current State
The current state is the state most recently reported for each registered
component by its Administration agent. Current states are displayed in
the Administration facility window. The possible states that can be
displayed for a component are:
State
Description
Up
Down
Hanging
Warning
Desired State
Description
Up
Down
Ignored
4-11
The Administration Facility window uses icons and colors to help you
quickly determine the states of the components on your network. These
are described in Figure 4-1 on page 4-8.
Tree View
In the tree view, the top two levels (computers and component types) are
marked by high-level status icons: green check marks
or red
exclamation points
.
An exclamation point indicates that the current state does not match
the desired state of at least one component of the computer or
component type.
A green Up arrow
indicates that both the components current
state and desired state are Up.
A yellow arrow
indicates that the current state of the component
is Warning. The direction of the yellow arrow indicates the current
state of the component.
A red arrow
indicates that the current state and the desired state
of the component are not the same, and that the Administration
Facility agent for the component has not successfully started or
stopped the component to match the desired state. The direction of
the red arrow indicates the current state of the component.
4-12
A diamond
indicates that the components current state is
Ignored. Diamonds are always transparent.
Table View
Icon
Component Type
Gateway
GUI Server
Global Conditions Server
Global Alerts Server
Color
Description
Green
Transparent
Red
Yellow
4-13
Select the Ignored option from the Desired State list in the Component
if you do not care whether the component is up or down.
After performing any of the above procedures, the new desired state is
displayed in the Desired State column in the table view, and the
CONTROL-M/EM database is updated to indicate the desired status. The
relevant Administration Facility agent detects the update request and
attempts to start or stop the component, as requested.
The agent attempts to change the component state until either the desired
state matches the current state, until Ignored is selected as the desired
state, or until it has performed the number of attempts determined by the
ActiveRetries parameter. For information on modifying the value of this
parameter, see Table C-5, Maintenance Parameters, on page C-10.
The agent makes each attempt to start the component at an interval of
time that you can modify from the Administration Facility Options
dialog box. The range of time is from three to ten minutes. The default
value is three minutes.
To change the Component Restart interval:
4-14
Registering Components
There are two methods for registering ENTERPRISE/CS components in
the Administration facility. The Build From Network method registers
all components that are running but which have not yet been registered.
The New Component method enables you to add individual components
manually.
4-15
Click
on the toolbar.
-or-
4-16
4-17
4-18
Component ID
Field
Description
Type
Name
Table 4-4
Running on...
Field
Description
Machine Type
Machine Name
Table 4-5
State
Field
Description
Current
State
Desired
State
Last
Update
4-19
Table 4-5
State
Field
Description
Text
Message
Check
Interval
Table 4-6
Startup
Field
Description
Command
Override
Manually
Additional
Parameters
4-20
Click
For more information about fields of the Component dialog box, see
Component Dialog Box on page 4-19.
4-21
To create a filter:
1. Choose Tools => Filter Manager to display the Filter Manager
dialog box.
2. Click New.
3. The Filter Properties dialog box is displayed.
4-22
Figure 4-4
4-23
The All Components filter is the default filter. It displays all registered
components in the network. It cannot be deleted or modified. When the
All Components filter is selected, the Update and Delete buttons in the
Filter Manager dialog box are not available.
4-24
Table 4-7
Field
Description
Filter Name
Machine
Name
Component
Type
Component
Name
Current
State
Desired
State
Note
4-25
Choose Tools => Options. In the Options dialog box, enter a number
between 1 and 3600 (seconds) in the Database Polling Interval text
box. Click OK. The Options dialog box is displayed in Figure 4-2 on
page 4-15.
To modify the Administration Facility Agent interval:
4-26
Agents Log
Records in the Agents log contain the information listed in Table 4-8:
4-27
Table 4-8
Heading
Description
Agent
Time
Events
When the log is cleared, all entries in the log are deleted. For more
information, see Filtering the Agents Log on page 4-31.
Heading
Description
<component>
PID
CTLPort
4-28
Each message in the Agent Log has a detail level assigned to it. The
CONTROL-M/EM administrator can modify the value of the
LogInfoLevel parameter to specify that only messages with a specified
detail level (or lower) should be displayed. For information on the
LogInfoLevel, see Table C-5, Maintenance Parameters, on page C-10.
The parameter is modified using the System Parameters window of the
Administration facility, described on page 4-33.
Table 4-10
Detail
Level
Message
Description
<component> PID=<PID_number>
CTLPort=<port_number> is OK.
<component> PID=<PID_number>
CTLPort=<port_number> is
Ignored.
<component> PID=<PID_number>
CTLPort=<port_number> SHOULD
BE DOWN! Trying to stop.
<component> PID=<PID_number>
CTLPort=<port_number> SHOULD
BE DOWN! Trying to terminate.
4-29
Table 4-10
Detail
Level
Message
Description
<component> PID=<PID_number>
CTLPort=<port_number> SHOULD
BE DOWN! All retries failed. Check
manually.
<component> PID=<PID_number>
CTLPort=<port_number> SHOULD
BE UP! Trying to activate.
<component> PID=<PID_number>
CTLPort=<port_number> SHOULD
BE UP! Waiting for restart interval
to expire.
<component> PID=<PID_number>
CTLPort=<port_number> SHOULD
BE UP! Activate retries exhausted.
No components found.
4-30
Description
Component name or computer name for which to display log
records.
Note: A mask can be specified for this field using wildcards. The
wildcards recognized by the Agent Log filter are % and ?. Where:
% represents any number of alphanumeric characters, and ?
represents any single alphanumeric character. Wildcards can
appear at any place in the text string.
Entry
Text
4-31
3. Click OK.
4. Stop and restart the administration agent. The Agents log is
truncated. For information on starting and stopping the
administration agent, see Gateway Verification Utility (check_gtw)
on page 7-11 or Activation Menu on page 5-3 (Unix, only).
4-32
4-33
4-34
Table 4-11
Heading
Description
Type
Name
Component
Comp. Name
Host
Value
4-35
4-36
Figure 4-7
4-37
4-38
4. Specify a value in the Value text box. The Type and Name fields
cannot be modified.
5. Click Save. A new row is displayed in the parameter table of the
CONTROL-M/EM System Parameters window with the condition
and the value that you specified.
Note
You cannot add a condition to the default row for the parameter that you
selected. To add a conditional setting, you must add a new row to the
table. As a result, both the default row and the conditional row are
displayed in the table.
Example
4-39
4-40
4. Specify a value in the Value text box. The Type and Name fields
cannot be modified.
5. Click Save. The modifications are displayed in the cells of the
selected row in the parameter table of the CONTROL-M/EM System
Parameters window.
Example
Note
Parameter entries that you added to the system parameters table in the
CONTROL-M/EM System Parameters window can be deleted by
BMC Software, Inc., Confidential and Proprietary Information
4-41
selecting the row and pressing the Delete key. Default parameter rows
cannot be deleted.
4-42
Database Administration
The ENTERPRISE/CS database requires periodic maintenance to ensure
efficient operation of ENTERPRISE/CS. The Administration facility
includes tools for performing this maintenance. These tools are located
on the Database menu.
Each database task in this menu is described below.
4-43
3. Click on the selected date. The calendar is closed and the date is
entered automatically into the Date list box.
4. Click OK.
All alerts posted prior to the specified date are deleted from the
CONTROL-M/EM database. If an alert was posted prior to the specified
date, but was updated after that date, it is not erased.
4-44
Element
Description
Data or Log
Size
File Name
Specifies the path and name for the segment that is being
modified.
4-45
Table 4-13
Element
Description
Table Space
Name
Extension
Size (MB)
Specifies the size (in MB) that the database segment will be
extended.
Extend
Existing File
Data File
Name
Specifies the path and name for the segment that is being
extended or created.
You must specify the password for the DBA superuser to access this
window. This option can be selected while CONTROL-M/EM is active.
4-46
SQL Client
Starts an interactive SQL session so that you can issue direct SQL
commands and perform troubleshooting and fixes under special
circumstances.
Note
4-47
4-48
5-1
The database server be running for the root menu and the root menu
submenus to be displayed.
1. From the Unix prompt of a CONTROL-M/EM host computer, enter
the following command:
root_menu
You are prompted for the CONTROL-M/EM administrator username
and password.
2. Enter the appropriate username and password. The following menu is
displayed:
Root Menu
--------------Select one of the following options:
1
2
3
4
5
Activation Menu
Troubleshooting Menu
New Window
Database Creation Menu
Database Maintenance Menu
Option
Description
Activation Menu
Troubleshooting Menu
Chapter 7, Troubleshooting.
New Window
5-2
Table 5-1
Option
Description
Database Creation
Menu
Database Maintenance
Menu
Activation Menu
The Activation menu starts and stops the CONTROL-M/EM
Administration agent, the Orbix Server (Naming and Locator services),
and the database server. It also performs the Check All function.
Only Check All can be performed by any CONTROL-M/EM user. All
other Activation menu functions are available only to the administrator.
The Activation menu has certain limitations:
5-3
Select Activation Menu from the root menu to display the following
menu:
Activation Menu
--------------Select one of the following options:
1
2
3
4
5
7
8
9
10
p
q
Check All
Start All
Start Database Server
Start Orbix Services
Start Administration Agent
Stop All
Stop Database Server
Stop Orbix Services
Stop Administration Agent
Previous Menu
Quit
Table 5-2
Menu Option
Description
Check All
Start All
Start Database
Server
Start Orbix
Services
Start
Administration
Agent
5-4
Table 5-2
Menu Option
Description
Stop All
Stop Database
Server
Stop Orbix
Services
Stop
Administration
Agent
5-5
5-6
Table 5-3
Build Database
Database on
Delete Database
Previous Menu
One of the most crucial types of maintenance you may need to perform is
the restoration of a corrupted CONTROL-M/EM database. The database
can be reinstalled using one of the following methods:
5-7
Database Environment
Component
Description
Database Server
(Sybase Adaptive
Server)
Sybase System
Procedures File
Data File
5-8
Table 5-4
Component
Description
Database Devices
master.dat
systemprocs.dat
ecs600.dat
ecs600.log
For more information on allocating raw devices in your system, see the
appendix, Creating a Raw Device for the CONTROL-M/EM Database
in the Enterprise Controlstation Installation Guide.
Shared Sybase Adaptive Server
5-9
60
2000
50
Note
5-10
Build Database
The default values for the parameters used in this procedure are defined
for the installation. If Build Database was run at least once, or if
parameter values were changed using Show Parameters, the displayed
values are based on the values you last assigned.
Build Database is a complex procedure. To successfully build a database
with this option, the following procedure must be followed:
To Build a Database:
Note
CONTROL-M/Desktop
All open sql sessions
5-11
Do not leave the root menu or any of its submenus (by choosing q to
quit) at any time before completing this procedure. Doing so can cause
damage to your data.
When it is safe to quit, you will be instructed to do so.
If you quit (pressed q) to leave the root menu or one of its submenus
before reaching Step 16, you must perform the workaround beginning
with Step 17 on page 5-15.
5. Enter the CONTROL-M/EM administrator username and password
when prompted. The root menu is displayed:
5-12
Root Menu
--------------Select one of the following options:
1
2
3
4
5
Activation Menu
Troubleshooting Menu
New Window
Database Creation Menu
Database Maintenance Menu
5-13
5-14
Export Database
Import Database
Custom Export/Import
Extend Database Size
Erase Alerts
Modify Interfaces File
Modify Database Name
p - Previous Menu
q - Quit
Enter option number --->
14. Press 2 to begin the Import procedure. You are prompted to locate
the <export_file_name> file you exported in Step 1 on page
5-11.
15. Enter the location of the <export_file_name> file. When the
procedure is complete, the Database Maintenance menu is displayed.
16. Press q to return to the Unix prompt.
Note
5-15
5-16
Database Environment
Component
Description
Database Server
(Oracle Server)
SYSTEM Tablespace
5-17
Table 5-5
Component
Description
Data Tablespace
Index Tablespace
system01.dbf
ecs600data.dbf
log01.dbf, log02.dbf
Note
5-18
150
50 MB
50 MB
Note
5-19
To select an option from the menu, press the number or letter appearing
to the left of the option. Each option in the Database Creation menu is
described below:
Build Database
Builds (or rebuilds) the entire CONTROL-M/EM database
environment from scratch, including the SYSTEM tablespace,
the Data tablespace, the Index tablespace, Redo log files and file
names or raw device names.
-orAdds the CONTROL-M/EM database to an existing database
server. For a full description of this procedure, see Build
Database on page 5-21.
Delete Database
Deletes the CONTROL-M/EM database entirely and removes
the database files. After using this option, CONTROL-M/EM
cannot be run until after the Build Database option is run.
5-20
Build Database
The default values for the parameters used in this procedure are defined
for the installation. If Build Database was run at least once, or if
parameter values were changed using Show Parameters, the displayed
values are based on the values you last assigned.
Build Database is a complex procedure. To successfully build a database
with this option, the following procedure must be followed:
To Build a Database:
Note
CONTROL-M/Desktop
All open sql sessions
5-21
Do not leave the root menu or any of its submenus (by choosing q to
quit) at any time before completing this procedure. Doing so can cause
damage to your data.
When it is safe to quit, you will be instructed to do so.
If you quit (pressed q) to leave the root menu or one of its submenus
before reaching Step 16, you must perform the workaround beginning
with Step 17 on page 5-25.
5. Enter the CONTROL-M/EM administrator username and password
when prompted. The root menu is displayed.
Root Menu
--------------Select one of the following options:
1
2
3
4
5
Activation Menu
Troubleshooting Menu
New Window
Database Creation Menu
Database Maintenance Menu
5-22
5-23
CONTROL-M/EM MAKE DB
Oracle Database Parameters
1) Oracle database instance name: ecs600
2) CONTROL-M/EM database user: ecsuser
3) CONTROL-M/EM database user password: password
4) Oracle Server host name: <servername>
5) Oracle LISTENER port number: 1521
6) Oracle SYSTEM password: manager
7) CONTROL-M/EM data tablespace name: ecs
8) CONTROL-M/EM data tablespace size: 250 MB
9) CONTROL-M/EM data tablespace file name (full path):
/home1/ecstrn6/oracle/oradata/ecs600/ecsdata01.dbf
10) CONTROL-M/EM index tablespace size: 100MB
11) CONTROL-M/EM index tablespace file name (full
path):/home1/ecstrn6/oracle/oradata/ecs600/ecsindx01.d
bf
a) Modify all of the above
q) Quit
n) Next page
Enter command or item number you wish to change [n]:
5-24
Export Database
Import Database
Custom Export/Import
Extend Database Size
Erase Alerts
Modify Interfaces File
Modify Database Name
p - Previous Menu
q - Quit
Enter option number --->
14. Press 2 to begin the Import procedure. You are prompted to locate
the <export_file_name> file you exported in Step 1 on page
5-21.
15. Enter the location of the <export_file_name> file. When the
procedure is complete, the Database Maintenance menu is displayed.
16. Press q to return to the Unix prompt.
Note
5-25
5-26
Export Database
Import Database
Custom Export/Import
Extend Database Size
Erase Alerts
Modify Interfaces File
Modify Database Name
p - Previous Menu
q - Quit
Enter option number --->
To select an option from the menu, press the number or letter appearing
to the left of the option. Each option in the Database Maintenance menu
is described in Table 5-6.
Table 5-6
Menu Option
Description
Export Database
Import Database
5-27
Table 5-6
Menu Option
Description
Custom
Export/Import
Extend
Database
Size
Erase Alerts
Modify
Interfaces File
Modify
Database Name
5-28
Export/Import Database
The Export Database utility copies the contents of the
CONTROL-M/EM database to a regular file using a format that is
independent of workstation type, configuration, or type of database.
The Import Database utility reads the data file created by the Export
Database utility and loads it into an existing CONTROL-M/EM
database, overwriting any existing data in the database.
Used together, these two utilities enable you to:
When the database is exported to a file, you are prompted for a filename.
The extension .Z is appended to the filename. When specifying the name
of the file to import, do not include the .Z extension.
If the CONTROL-M/EM database uses an existing Sybase Adaptive
Server, you must supply the sa password for the database server to use
these utilities. The SYSTEM password is required for Oracle Server
users to use the utilities. In addition, the following conditions must exist
at the time the utilities are run:
5-29
Export Database
Import Database
Name of the file or device from which the database will be imported.
Note
5-30
When this option is used to import a file into a database other than the
database from which the file was exported, the original passwords are
preserved.
5-31
Custom Export/Import
Use the Custom Export/Import menu to customize the import and export
features. options 1-7 indicate whether a specific type of
CONTROL-M/EM data is included (Y) or not included (N) in the export
or import.
Export/Import Default Parameters Menu
------------------------------------1) Definition Tables..............
2) Calendars......................
3) System Tables..................
4) Data Centers...................
5) Users Tables...................
6) Alert..........................
7) Global Conditions..............
8) Maint..........................
9) Collections....................
10) View..........................
11) Filter........................
12) Log...........................
13) Hierarchy.....................
14) User Views....................
15) Net...........................
16) Default Net Name..............
17) Default Export Media..........
18) Default Device................
{ECS_HOME}/ExportImportFile.txt
N
Y
N
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
N
All
File
e) Export Now
i) Import Now
r) Restore Default Parameters
p) Previous Menu
q) Quit
Enter item number you wish to change :
To select an option from the menu, press the number or letter appearing
to the left of the option. A prompt is displayed requesting the new value
of the parameter. Enter e or i to activate the Export Database or Import
Database utility. These menu options are described in Table 5-7.
BMC Software, Inc., Confidential and Proprietary Information
5-32
Table 5-7
Menu Option
Description
Definition Tables
Calendars
Calendar definitions.
Valid values are:
Y
N
System Tables
Data Centers
Users Tables
User definitions.
Valid values are:
Y
N
Alert
Global Conditions
Maint
Collections
ViewPoint collections.
Valid values are:
Y
N
View
Defined ViewPoints.
Valid values are:
Y
N
5-33
Table 5-7
Menu Option
Description
Filter
ViewPoint filters.
Valid values are:
Y
N
Log
Log files.
Valid values are:
Y
N
Hierarchy
ViewPoint hierarchies.
Valid values are:
Y
N
User Views
Nets
Active networks.
Valid values are:
Y
N
Default Device
5-34
Selecting this option displays the dsedit utility menu. This menu enables
you to modify the Sybase Interfaces file. For information about using
dsedit, see your Sybase Adaptive Server documentation.
5-35
The db_check utility can also be used to provide automatic database and
transaction log monitoring. The following options are available:
db_check [-d<db threshold %>] [-l<log threshold %>] [n] [-h]
5-36
Security
6
CONTROL-M/Enterprise Manager (CONTROL-M/EM) and
CONTROL-M security mechanisms determine which information each
user can obtain or update, and which program functions are available to
the user. The security mechanisms of CONTROL-M/EM and
CONTROL-M together ensure a high degree of security while not
adversely affecting efficient production.
CONTROL-M uses these mechanisms to control the users ability to
manipulate jobs by controlling access to various system components.
Security
6-1
File Protection
The Unix super-user can limit access to Unix files (program and data
files) to specific users. This provides an additional level of protection
and security.
CONTROL-M/EM Security
6-2
CONTROL-M Security
CONTROL-M security authorizes the operations that each user is
allowed to perform for each CONTROL-M installation (such as holding
jobs and modifying scheduling tables). At OS/390 sites, this security
mechanism interfaces with the other security tools used at the site (such
as RACF, ACF2/SAF and TOP SECRET).
CONTROL-M/EM interfaces directly with CONTROL-M security. For
each CONTROL-M/EM user operation (such as Hold or Rerun), the
CONTROL-M/EM gateway (WS-GTW) transfers the requesting
CONTROL-M/EM user name to the CONTROL-M gateway
(CTM-GTW). CTM-GTW uses CONTROL-M security modules to check
the authorization of the user. If the user is not authorized, the operation is
rejected and the workstation issues an appropriate message.
For additional information, see the Installing CONTROL-M
Application Server Security chapter in the INCONTROL for OS/390
Security Guide and see the CONTROL-M Administrator Guides for other
platforms.
Passing Global Conditions Between CONTROL-M Installations
Security
6-3
CONTROL-M/EM Security
Figure 6-1
6-4
Jobs that the user can view or modify. This affects usage of all
windows that rely on access to information originating in the active
environment. For example, limiting the view to jobs from a single
CONTROL-M limits the view in the CONTROL-M/Enterprise
Manager ViewPoint window.
Resources and conditions that the user can view or change in the
resource windows. This does not relate to resources and conditions
displayed in the Job Details window. For example, in the Job
Details window, the user can see that a job is waiting for a
prerequisite condition, but this user might not be authorized to create
this condition using the Prerequisite Condition window.
Calendars and Scheduling tables that the user may view or modify.
Limiting access to Scheduling tables also determines which
Scheduling tables/jobs the user can order or force.
Security
6-5
User JimA belongs to group Acct. Group Acct has Browse authority for
all Scheduling tables. User JimA is defined with Full authority for
CONTROL-M Figaro and Marius Scheduling tables. User JimA can
update and delete Scheduling tables for CONTROL-M Figaro and
Marius, but can only view Scheduling tables for other CONTROL-M
installations.
6-6
User JimA also belongs to group Staff. Group Staff has Update
authority for all definitions (ViewPoints, Collections, Filter, and
Hierarchies) but only Browse authority for Authorization definitions and
Communication. User JimA is defined with Default authority for all
definitions and Update authority for Communication. User JimA can
create and modify ViewPoints and their components, as well as add,
modify, and delete CONTROL-M installations from the
CONTROL-M/EM database.
Security
6-7
Jobs
The user has combined authorizations defined for all the groups of
which the user is a member. Authorizations specified in the User
Authorization => Job window are additional authorizations for the
specific user.
Example
User JimA belongs to group Acct. Group Acct has authorization for all
Browse and Control actions on jobs in the active environment. User
JimA is defined with authorization for Update actions. User JimA can
view jobs in the active environment in the CONTROL-M/Enterprise
Manager ViewPoint window and perform control actions (Hold, Free,
Confirm, and so forth) on these jobs. Additionally, he can edit both job
details and JCL for jobs in all CONTROL-M installations.
6-8
Security
6-9
6-10
Figure 6-2
The Users and Groups window contains a list of system users and a list
of the groups that these users are members of for authorization purposes.
This window enables a properly authorized user to define new users and
groups, view or update the authorization levels of any user or group, and
to delete existing users or groups.
Table 6-1
Field Descriptions
Field
Description
User Name
User Description
Group Name
Group Description
Security
6-11
1. Click the New button in the appropriate section of the Users and
Groups window. The New Name window is displayed.
2. Specify a name for the user or group in the New Name window and
click OK. The User Authorizations window or Group
Authorizations window is displayed accordingly.
6-12
3. Complete the details for the specified user or group in the General
panel described in User Authorizations General Panel on page 615 or Group Authorizations General Panel on page 6-17.
4. Define authorization levels in each of the entity panels.
5. Click OK to add the user or group to the CONTROL-M/EM Security
database.
To view or modify Authorizations for a specific user or group:
1. Select the user name or group name in the Users and Groups
window.
2. Click the corresponding Update button.
-orDouble-click the user name or group name.
BMC Software, Inc., Confidential and Proprietary Information
Security
6-13
1. Select the user name or group name in the Users and Groups
window.
2. Click the Delete button in the same window. A confirmation window
is displayed.
3. Click OK.
Note
User authorizations take effect the next time the specified user logs on to
CONTROL-M/EM.
The User Authorizations window and Group Authorizations window
contain the following panels:
Panel
Purpose (Part 1 of 2)
General (User)
General (Group)
Jobs
Privileges
6-14
Panel
Purpose (Part 2 of 2)
Scheduling
Tables
Resources and
Calendars
Click the appropriate tab to display the desired panel. After completing
all the panels, click OK to add the user or group to the
CONTROL-M/EM Security database. A description of each
Authorization panel is displayed below.
Security
6-15
Table 6-2
Field Descriptions
Field
Description
User
Full Name
Description
Password
Confirm
Password
Member of
Not member
of
1. While holding down the CTRL key, select each group from the Not
member of list.
2. Click Add. The selected group names are added to the Member of
list and deleted from the Not Member of list.
To remove the user from a group or from multiple groups:
6-16
Security
6-17
Field Descriptions
Table 6-3
Field Descriptions
Field
Description
Group Name
Description
Member List
6-18
The Jobs panel is used to specify the jobs in the active environment that a
user can access and the actions that the user can perform on those jobs.
The Filter for Displayed Jobs and the Job actions are specified
independently.
Table 6-4
Field
Description
Filter
Browse actions
Control actions
Update actions
Security
6-19
Select the check box for each job action or feature that the user is
authorized to browse, control, or update.
-orTo select all the actions and features in a category, click the Select All
button for that category.
Note
Descriptions of each job action can be found in Chapter 12, Getting and
Updating Details, in the CONTROL-M/Enterprise Manager User
Guide.
6-20
Column Descriptions
Column
Description
Field
Value
Value of the parameter listed in the cell of the Field column that
determines whether the job selection criteria are satisfied.
Figure 6-3
Note
Use the Tab key to skip to the next field. Use the arrow keys or the
vertical scroll bar to move through the options in a list box.
2. Specify from one to five pairs of field=value combinations. The
relationship between these criteria is a Boolean AND.
3. To clear any selection criterion, click its Reset button.
Security
6-21
4. Click OK.
The Privileges panel is used to specify the actions that a user or group
can be perform on Collections, Hierarchies, Filters, ViewPoints, and
Alerts.
A description of each action and access level is given in the tables below.
Table 6-6
Field
Description
Collections
Hierarchies
6-22
Table 6-6
Field
Description
Filters
ViewPoints
Alerts
Authorizations
Definitions
Communication
CLI
To set access levels for ViewPoints, Collections, Hierarchies, Filters, and Alerts:
Select an access level from the list box for each ViewPoint component or
for Alerts as follows:
Access
Level
Description
None
Browse
Update
Security
6-23
Access
Level
Description
Full
Default
Description
None
Browse
Update
Full
Default
Description
None
Browse
Update
6-24
Access
Level
Description
Full
Default
The Scheduling Tables panel is used to specify the Scheduling tables that
a user can access and the authorization levels for using the tables.
Authorization can be granted at CONTROL-M level (for all tables
belonging to the specified CONTROL-M site), library level for OS/390
sites only, and individual Scheduling table level.
Security
6-25
Table 6-7
Field Descriptions
Field
Description
Access Level
CONTROL-M
Library
Scheduling
Table Name
Description
Browse
Update
Full
3. Specify all the libraries for the Scheduling tables that will have the
indicated Access Level. Use * to denote all Libraries.
6-26
4. Specify all the Scheduling table prefixes or full names that will have
the indicated Access Level. Use * to denote all Scheduling tables.
5. Repeat these steps for the other access levels.
Note
If any field is specified for an Access Level, all fields for that Access
Level must contain a value. Use an * to denote all CONTROL-M
installations, libraries, or Scheduling table prefixes.
Security
6-27
Resource Fields
Field
Description
Access
level
Type
Resource
List
Access Levels
Access
Level
Description
Browse
Update
Full
3. Specify all the resources that will have the indicated Access Level.
Click the Add button to add a resource prefix to the list. Specify
the prefix in the New Resource Prefix window, and click OK.
Use * to denote all resources.
6-28
Select the prefix and click the Delete button to delete a resource
prefix from the list.
To set the access level of prerequisite conditions beginning with the letter
C or D as Update:
1. Select Prerequisite conditions from the Type list box.
2. Select Update from the Access level list box.
3. Click Add.
4. In the New resource prefix window, enter C and click OK.
5. Click Add again.
6. In the New resource prefix window, enter D and click OK.
7. Click OK.
The user is now authorized to modify prerequisite conditions beginning
with the letter C or D.
Security
6-29
Table 6-10
Calendar Fields
Field
Description
Access
level
Calendar
List
6-30
1. Select an access level from the list box. Access Levels are described
in Table 6-11.
Table 6-11
Access Levels
Access Level
Description
Browse
Update
Full
2. Specify all the Calendars that will have the indicated Access Level.
Click the Add button to add a prefix to the list. Specify the
prefix in the New Calendar Prefix window and click OK. Use
* to denote all Calendars.
Select the prefix and click the Delete button to delete a Calendar
prefix from the list.
Security
6-31
6-32
Troubleshooting
Troubleshooting Menu
DIAG Diagnostics Facility
Troubleshooting
7-1
Troubleshooting Menu
The Troubleshooting Menu option, accessed from the
CONTROL-M/EM root menu, can be used to perform a variety of
diagnostic functions. Most of the functions are available only to the
CONTROL-M/EM administrator.
Note
Database Troubleshooting
Gateway Troubleshooting
Show Environment
Global Conditions Server Parameters
Configure Orbix2000 Parameters
p - Previous Menu
q - Quit
Enter option number --->
BMC Software, Inc., Confidential and Proprietary Information
7-2
Menu Option
Description
Database
Troubleshooting
Gateway
Troubleshooting
Show
Environment
Troubleshooting
7-3
Table 7-1
Menu Option
Description
Global Conditions
Server Parameters
Configure Orbix
2000 Parameters
Orbix2000
7-4
Database Troubleshooting
The Database Troubleshooting menu is used to check the availability of
space in the CONTROL-M/EM database, view database server settings
and issue direct commands to perform database troubleshooting
functions. The Database Troubleshooting menu functions can be
performed on both the computer where the database server is installed
and from a remote computer.
Select Database Troubleshooting from the CONTROL-M/EM
Troubleshooting menu, to display the following menu:
Database Troubleshooting
-----------------------Select one of the following options:
1
2
3
4
p - Previous Menu
q - Quit
Enter option number --->
Troubleshooting
7-5
Table 7-2
Menu Option
Description
Interactive SQL
Commands
Check Available
Space
View Server
Settings
Truncate Database
Log
7-6
Gateway Troubleshooting
The CONTROL-M/EM workstation gateway (WS-GTW) can be
executed in various debug modes. The Gateway Troubleshooting option
is used to view and set the different debug modes for a WS-GTW. This
option is available only to the CONTROL-M/EM administrator.
The Gateway Troubleshooting option is selected from the
Troubleshooting Menu option on the CONTROL-M/EM root menu,
following menu is displayed:
Gateway Troubleshooting
-----------------------Select one of the following options:
1 - Set Debug Parameters
2 - Stop Gateway Debug Mode
p - Previous Menu
q - Quit
Enter option number --->
Menu Option
Description
Troubleshooting
7-7
Debug Mode
7-8
Menu Option
Description
Do New
Download
Stop Gateway
Debug Mode (All)
Set Database
Debug Mode
Set Debug
Mode (GUI)
Troubleshooting
7-9
Table 7-4
Menu Option
Description
Truncate
Communication
Messages
Include Job
Messages
Include Download
Messages
Include Active
JCL
Apply to Gateway
7-10
Set the Set Debug Mode (GUI) or Set Debug Mode (Host)
parameter to Y with Troubleshoot Menu => Gateway
Troubleshooting => Set Debug Parameters from the
CONTROL-M/EM root menu, described in CONTROL-M/EM
Root Menu on page 5-1. Message tracing takes effect immediately.
It is not necessary to stop and restart the WS-GTW. Messages are
written to the Gateway Log file, described in Gateway Log on
page 7-12.
Troubleshooting
7-11
Turn off (set to N) the Set Debug Mode (GUI) or Set Debug Mode
(Host) parameter with Gateway Troubleshooting => Set Debug
Parameters from the CONTROL-M/EM root menu. Tracing is
disabled immediately. Tracing is not enabled when the WS-GTW is
restarted.
Gateway Log
7-12
where:
Table 7-5
Parameter
Description
<data_center>
yyyymmdd
Current date.
Core File
Troubleshooting
7-13
CTMAS.CTMAS601
ECSGATE,DEBUG=122
ECSGATE,DEBUG=122
7-14
Troubleshooting
7-15
s)
r)
h)
p)
q)
Parameter
Description
Communication
Diagnostic
Message Level
Database Diagnostic
Message Level
Gateway
Connectivity Interval
Refresh
Communication
Table Interval
Send Condition
Interval
Maximum Send
Condition Retries
7-16
Table 7-6
Parameter
Description
Send Condition
Group Interval
Maximum
Conditions in a
Group
Restore Default
Parameters
Run Global
Conditions Server
Destination Status
Interval
Troubleshooting
7-17
7-18
Use the DIAG diagnostics facility only when you are instructed to do so
by a representative of the BMC Software Customer Support staff. Only
members of the support staff are qualified to use the data collected by the
DIAG facility. However, a Support Staff employee may request that you
run this facility and send the output to BMC Software for analysis.
Troubleshooting
7-19
Log files have a special naming convention that enables you to identify
them readily:
Non-cyclic log file:
<prefix>_diag.<component_hostname>.txt
for example: gas_diag.ACCT12.txt
Cyclic log file:
<prefix>_diag.<component_hostname>.<date>.
<serial_number>.txt
for example: gas_DiagLvls.ACCT12.20010318.0001.txt
The serial number for each file is four digits long, and is incremented
for successive files (0001, 0002, and so on).
Initialization Files
For most CONTROL-M/EM components, the DIAG facility is activated
by the presence of an .ini file that you create. For the GUI server only,
this facility can be activated and deactivated by a command.
Note
The DIAG facility for the GUI server is activated and deactivated from
the command line. However, the .ini file is still needed to configure the
facility. For more information about using DIAG with a GUI server, see
Using DIAG with a GUI Server on page 7-23.
7-20
The level of message detail written to the output file (debug level)
Whether to use a cyclic log file or a fixed log file
The size of the cyclic log file (fixed log files are of unlimited size)
The component program file that is monitored. The name of this file
is supplied by BMC Software Technical Support.
Separate .ini files can be created for each component that must be
monitored. In addition, you can create a default file that contains a
default debug level value that applies to all components on the computer.
.ini files can be used in the following combinations:
When both a default .ini file and a separate component .ini files are used,
the values in the .ini component file override the default .ini file values.
.ini files are saved to the \$HOME\Ini directory on the computer on
which the component is installed. The .ini file environment path is
$ECS_INI_PATH.
Creating an Initialization (.ini) File
To create a file:
1. Open a text editor.
2. Enter the parameters and values supplied by BMC Technical
Support. Parameters are described in Table 7-7, DIAG Initialization
(.ini) File Parameters, on page 7-23.
3. Name the file according to the conventions described below and save
it to the \$HOME\Ini directory.
BMC Software, Inc., Confidential and Proprietary Information
Troubleshooting
7-21
Naming Conventions
.ini files are text files using the following naming conventions:
Syntax Rules
.ini file attributes are described in Table 7-7. A sample .ini file is
displayed in the example following Table 7-7.
7-22
Table 7-7
Parameter
Description
IsCyclic
NumOfFiles
NumOfMessages
*default
<filename>
<debug_level>
Example
IsCyclic 0
NumOfFiles 3
NumOfMessages 5000
gas_srv 7
gas_impl 7
*default 3
Troubleshooting
7-23
DIAG Commands
Command
Description
DIAGON
Starts DIAG.
DIAGOFF
Stops DIAG.
DIAGL
DIAGL main 4
7-24
Troubleshooting
7-25
7-26
Customization
Customization
8-1
8-2
Parameter
Description
SendAlarmToScript
Customization
8-3
Defaults File
The CONTROL-M/EM defaults file (Defaults.rsc) is used to customize
the parameters used by special CONTROL-M/EM facilities. These
facilities include:
8-4
Parameter
Description
limit_gcs_distrib_
max_days
limit_gcs_distrib
_activate
limit_gcs_distrib
_disable_dates
<parameter>
<value>
Example 1
To disable the Global Conditions Distribution facility and remove all date
limitations on the distribution of global conditions:
namevalue * limit_gcs_distrib_activate 0
Customization
8-5
Example 3
8-6
Multiple IP Addresses
Customization
8-7
Sybase
The SQL configuration parameters in Table 8-3 are modified or added to
the SYBASE.cfg file during CONTROL-M/EM installation to improve
the performance of the Sybase Adaptive Server:
:
Table 8-3
Parameter
Description
recovery interval
in minutes
procedure cache
percent
number of
pre-allocated
extents
8-8
Oracle
The Oracle Server configuration parameters in Table 8-4 are modified or
added to the initdatabasename.ora file during CONTROL-M/EM
installation to improve the performance of the Oracle Server:
Table 8-4
Parameter
Description
log_checkpoint
_interval
log_checkpoint
_timeout
db_block_size
db_block_buffers
shared_pool_size
log_buffer
sort_area_size
Customization
8-9
8-10
SNMP Interface
CONTROL-O/Server.
PATROL Enterprise Manager
HP-OpenView.
NetView for AIX.
Tivoli Management Environment Console.
CONTROL-M Links for Distributed Systems
SNMP Interface
A-1
Overview
The Simple Network Management Protocol (SNMP) helps network
managers locate and correct network problems (usually in a TCP/IP
network). Managers invoke an SNMP client (usually under a network
management application such as those listed above) on their local
machine and use the client to contact one or more SNMP servers (or
agents) that execute on remote machines.
SNMP uses a fetch-store (get-set) paradigm in which each server
maintains a set of conceptual variables that include simple statistics, such
as packet counters, as well as complex variables that correspond to
TCP/IP data structures, such as ARP cache and IP routing tables.
SNMP messages specify that the server should either retrieve values
from variables or store values in variables. The server translates the
requests to equivalent operations using local data structures. In addition
to the fetch-store protocol, a separate standard for a Management
Information Base (MIB) defines the set of variables that SNMP servers
maintain, as well as the semantics for each variable.
A special SNMP message type, called a trap message, is the only type
that is initiated by a server. A trap message informs the client about an
event that has occurred at the servers machine, usually a failure event
(hardware or software, permanent or temporary). Customization at the
clients site determines, according to the trap codes, whether an Alert
message should appear on the managers screen or whether the recording
of an event log message is sufficient. The trap message can carry
additional MIB variables, thereby providing additional information to the
client application.
A-2
Field
Description
CALL TYPE
ALERT ID
DATA CENTER
MEMNAME
ORDER ID
SEVERITY
STATUS
SEND TIME
SNMP Interface
A-3
Table A-1
LAST USER
LAST TIME
10
MSG TEXT
11
OWNER
12
GROUP
13
APPLICATION
14
JOB NAME
15
NODE ID
SNMP traps can be issued using either or both of the following formats:
Single Variable
Note
Multiple Variables
The trap consists of 11 distinct SNMP variables (as described above).
There is one specific trap type:
Specific-trap 10: CONTROL-M/EM alerts.
A-4
Customization
The customization procedures, described below, are required to support
SNMP traps issued by CONTROL-M/EM.
The following parameters must be modified in CONTROL-M/EM:
Table A-2
Parameter
Description
SnmpSendActive
SnmpHost
SendSnmp
SnmpSendFormat
SNMP Interface
A-5
Table A-3
Term
Description
<user id>
<password>
<name>
<value>
Example
db_sys_params -U<CONTROL-M/EM_username>
-P<password> -NSendSnmp -V1
4. Repeat the command for each parameter to be modified.
How the network management application interprets trap codes (for
example, present as alerts, under an event category) is
determined by the customization of the network management
application itself.
Examples for customizing network management applications are
shown below. The application must first be customized so that it
recognizes the Enterprise ID of CONTROL-M/EM. Next, the
corresponding trap codes must be defined.
Customizing CONTROL-O/Server
For information about customizing CONTROL-O/Server, see the
section on SNMP trap configuration in the CONTROL-O/Server for
Windows NT Installation Guide.
A-6
Customizing HP-OpenView
The /usr/OV/conf/$LANG/trapd.conf file contains definitions for the
handling of SNMP traps and events. It includes how to format their log
entries and what action to take, if any, when they are logged. The formats
are also used to display messages in the OpenView Events window.
This file can be edited using the Options Event Configuration =>
SNMP option of HP OpenView Network Node Manager, or you can edit
this file with a text editor.
To support the SNMPTRAP feature of CONTROL-M/EM, add the
following entries to the trapd.conf file:
1.3.6.1.4.1.954.1
normal (1)
warning (2)
minor (3)
major (4)
critical severity (5)
Example 1
SNMP Interface
A-7
ecs_alert_v
1.3.6.1.4.1.954.1
application alert events"
5
6 3
"
ecs_alert_u
1.3.6.1.4.1.954.1
application alert events"
4
6 2
"
ecs_alert_r
1.3.6.1.4.1.954.1
application alert events"
3
6 1
"
6 10
"
Example 2
Format statement
This is the string which is displayed in trapd.log and in the Event
Browser window as a result of the trap described above. This is in
addition to the standard display of the alert which is based on the trap
statement.
A-8
Table A-4
Cmd
Description
$n
$E
$A
$G
$S
$T
$*
Example 1
SNMP Interface
A-9
A-10
Severity Levels
Using format
Do this...
Multiple Variables
Single Variable
Shout
from CONTROL-M/EM:
text=$*
Example 2
SNMP Interface
A-11
Alternatively, you can invoke any other script or program that can
analyze the input variables and take appropriate action based on the
variables values.
For additional information on formatting commands for this string, see
the online help available in the Event Configuration window.
A-12
Format
Non-TME, non-secure
<hostname>
TME
@<EventServer>
@<EventServer>#<RegionName>
SNMP Interface
A-13
Figure A-1
#####################################################################
#
Enterprise Controlstation Traps
#
# kag
Apr 25, 1999
#
#
ENTERPRISE 1.3.6.1.4.1.954.1
#
GENERIC TYPE 6
#
SPECIFIC TYPES: 1 - Informational Alarm
#
2 - Minor Alarm
#
3 - Major Alarm
#
####################################################################
CLASS ECSAlert_Info
SELECT
1: ATTR(=,$ENTERPRISE), VALUE(PREFIX, "1.3.6.1.4.1.954.1") ;
2: $TYPE = 6 ;
3: $SPECIFIC = 1 ;
MAP
reason = $V3 ;
END
CLASS ECSAlert_Mnr
SELECT
1: ATTR(=,$ENTERPRISE), VALUE(PREFIX, "1.3.6.1.4.1.954.1") ;
2: $TYPE = 6 ;
3: $SPECIFIC = 2 ;
MAP
reason = $V3 ;
END
CLASS ECSAlert_Mjr
SELECT
1: ATTR(=,$ENTERPRISE), VALUE(PREFIX, "1.3.6.1.4.1.954.1") ;
2: $TYPE = 6 ;
3: $SPECIFIC = 3 ;
MAP
reason = $V3 ;
END
A-14
SNMP Interface
A-15
Figure A-2
##########################################################
#
# Enterprise Controlstation SNMP TRAPS
# kag Apr 25 99
#
##########################################################
TEC_CLASS :
ECSAlert_Trap ISA Specific_SNMP_Trap
DEFINES {
enterprise: default = "ECSAlert";
};
END
TEC_CLASS :
ECSAlert_Info ISA ECSAlert_Trap
DEFINES {
severity: default = MINOR;
reason: STRING;
};
END
TEC_CLASS :
ECSAlert_Mnr ISA ECSAlert_Trap
DEFINES {
severity: default = WARNING;
reason: STRING;
};
END
TEC_CLASS :
ECSAlert_Mjr ISA ECSAlert_Trap
DEFINES {
severity: default = CRITICAL;
reason: STRING;
};
END
A-16
7. Either cold start or warm start the event adapter and the event
manager.
The easiest method is to warm start the event adapter using this
syntax:
kill -HUP <process_number>
The event manager can be restarted using wstopesrv and wstartesrv.
SNMP Interface
A-17
A-18
B-1
CONTROL-M/EM
Root Menu
Description
Activation Menu
New Window
B-2
Activation
Menu
Line
Command
Check All
check_all
Start All
start_ all
Start Database
Server
start_server
Start
Orbix Services
start_orbix
_daemon
start_orbix2000
_services
Start
Administration
Agent
start_admin
_agent
Stop All
stop_all
Description
stop_server
B-3
Table B-2
Activation
Menu
Line
Command
Stop Orbix
Services
stop_orbix
_daemon
Stop
Administration
Agent
Description
stop_orbix2000_
services
stop_admin
_agent
B-4
Database
Creation Menu
Description
Show Database
Parameters
Build Database
Delete Database
Database
Maintenance
Menu
Description
Export Database
Import Database
Custom
Export/Import
Extend Database
Size
Erase Alerts
Modify Interfaces
File
Modify Database
Name
B-5
Troubleshooting
Menu
Description
Database
Troubleshooting
Gateway
Troubleshooting
Show
Environment
Global Conditions
Server Parameters
Database
Troubleshooting
Description
Interactive SQL
Commands
Check Available
Space
View Server
Settings
Truncate Database
Log
B-6
Gateway
Troubleshooting
Description
Set Debug
Parameters
Stop Gateway
Debug
B-7
CONTROL-M/EM Utilities
cli
copydefcal
copydefjob
defcal
defjob
defjobconvert
deftable
deldefjob
duplicatedefjob
exportdefcal
exportdefjob
exportdeftable
B-8
Table B-8
CONTROL-M/EM Utilities
serverutil
skeletonconvert
updatedef
util
B-9
B-10
System Parameters
System Parameters
C-1
Table C-1
Parameter
Description
HandleAlertsOnRerun
HostPort
NrHandledAlarms
C-2
Table C-1
Parameter
Description
SendAlarmToScript
SendSnmp
SnmpHost
SnmpSendActive
SnmpSendDemo
SnmpSendFormat
System Parameters
C-3
Table C-2
Parameter
Description
AlertOnAbend
DeltaMaxActMinutes
DownCreAlerts
GtwCondDispatchErr
GtwLogDestFileType
GtwLoggerOn
GtwLogMsgFile
GtwLogNofFiles
GtwLogNofMsgs
C-4
Table C-2
Parameter
Description
GtwLogQSize
GtwLogRefreshInter
GtwLogThrowMsgs
HostPortList
InsertAlertTries
MaxDownHistDays
MaxOldDay
System Parameters
C-5
Table C-2
Parameter
Description
MaxOldTotal
MaxUploadBufferMPM
MaxUploadBufferMVS
SSLPassword
SSLRetries
SSLSyncTime
C-6
Table C-3
Parameter
Description
LMGUIServerCTLTimeSev
LMGUIServerUpdTimeout
LMGUI_Communication
_Cfg
LMGUI_LastReportTime
LMGUI_LicenseHost
LMGUI_LicensePort
LMGUI_MaxGui
LMGUI_PollingInterval
System Parameters
C-7
Table C-3
Parameter
Description
LMGUI_ReportInterval
LMGUI_Severity_1_List
LMGUI_Severity_2_List
LMGUI_Severity_3_List
C-8
Table C-4
Parameter
Description
AlertsMapRefreshInterval
LogTablesRefreshInterval
NumberOfLogFileMessage
NumberOfLogFiles
System Parameters
C-9
Table C-5
Parameter
Description
ActivateRetries
ComponentRestartInterval
ComponentShowState
LifeCheckRespTimeout
C-10
Table C-5
Parameter
Description
LifeCheckRetries
LifeCheckRetryTime
LogCleanInterval
LogCleanLevel
LogHistoryDays
LogInfoLevel
System Parameters
C-11
Table C-5
Parameter
Description
StdoutLogInfoLevel
StopGracePeriodSec
StopTries
C-12
Table C-6
Parameter
Description
MaxUserTimeoutSec
NumberOfLogFileMessage
NumberOfLogFiles
LogTablesRefreshInterval
NumberOfMyWorldJobs
System Parameters
C-13
Table C-7
System Parameters
Parameter
Description
SysInit1
Table C-8
Parameter
Description
GcsLogDestFileType
GcsLoggerOn
GcsLogMsgFile
GcsLogNofFiles
GcsLogNofMsgs
GcsLogQSize
GcsLogRefreshInter
GcsLogThrowMsgs
C-14
Index
Index
Symbols
!IXGEN_DONT_EDIT_THIS! xvi, xvii,
xviii, xix
*default 7-23
.ini files. See initialization files
A
ACF2 6-3
act_view_only_option 8-7
act_view_only_option parameter
Defaults.rsc file 8-7
action statements. See Do statements
ActivateRetries C-10
activation menu
administration agent 5-3
check all option 5-4
description 5-3
menu options B-3
options 5-4
starting options 5-4
starting the administration agent 5-3
stopping options 5-5
stopping the administration agent 5-3
Active environment
downloading 7-9
Index
truncating 4-31
window contents 4-27
AIX
starting programs automatically 3-7
stopping programs automatically 3-7
ALERT ID
SNMP trap A-3
alert processing
audio support 8-4
description 8-3
gateway check errors 7-11
removing from database 4-43
SendAlarmToScript 8-3
SendSnmp 8-3
SNMP interface A-1
SNMP trap or script 8-3
AlertOnAbend C-4
alerts
See also messages
Alerts window
DIAG component prefix 7-22
AlertsMapRefreshInterval C-9
Application
SNMP trap A-4
assign_ports 3-14
authorization
See also License Manager
authorization. See security
B
batch utilities
listed B-8
build database menu
Sybase Server 5-11, 5-21
C
calendars
BMC Software, Inc., Confidential and Proprietary Information
security 6-31
CALL TYPE
SNMP trap A-3
Central European Time 1-12
Central Standard Time 1-12
CET time zone 1-12
check_gtw utility
description 7-11
cleanup. See maintenance
cli utility
description B-8
clock
time zone support 1-11
closing. See exiting
collapsing. See stepping out
communication
between gateway and GCS 7-16
defining CONTROL-M installations 2-1
gateway log 3-12
IP addresses 8-4
message level (GCS) 7-16
multiple gateway IP addresses 8-7
OS/390 performance data 3-13
reading the communication table 7-16
security 6-24
trace messages 7-11
tracing 7-11
truncate messages 7-10
communication tracing 7-11
description 7-11
starting 7-12
stopping 7-12
component state
administration facility polling interval
4-26
agent polling interval 4-26
current state 4-3, 4-11
default polling interval 4-26
description 4-11
desired state 4-3, 4-11
down 4-11
hanging 4-11
ignored 4-11, 4-14
up 4-11
warning 4-11
ComponentRestartInterval C-10
ComponentShowState C-10
conditions
See also prerequisite conditions
configuring
Global Conditions Server 7-15
hostname 3-19
port number 3-19
continue_with_dup parameter 8-6
Defaults.rsc file 8-6
CONTROL-M
administering 2-1
CONTROL-M/EM 1-2, 1-5
defining 2-1
deleting definitions 2-6
disabling definitions 2-5
enabling definitions 2-5
performance analysis 7-13
TCP/IP host name 2-3
TCP/IP port number 2-4
troubleshooting 7-13
version 2-3
CONTROL-M/Agent 1-10
CONTROL-M/Desktop 1-5
DIAG component prefix 7-22
starting 3-3
CONTROL-M/EM
components 1-3
connectivity 1-3
CONTROL-M/Desktop 1-5
CONTROL-M/EM Server 1-3
graphical user interface (GUI) 1-3
platforms xiii
related products 1-10
starting components 3-4
Index
starting/stopping 3-2
CONTROL-M/EM server
description 1-3
starting 3-2
CONTROL-M/Enterprise Manager. See
CONTROL-M/EM
CONTROL-M/Links
SNMP customization A-17
CONTROL-O/Server
SNMP traps A-6
CONTROL-R
in a CONTROL-M definition 2-3
with CONTROL-M/EM 1-2
copydefcal utility B-8
copydefjob utility B-8
creating
See also defining
ENTERPRISE/CS database 5-7
CST time zone 1-12
ctl
DIAG component prefix 7-22
CTMAS 7-13
custom import/export
database maintenance menu 5-32
options 5-33
customizing
Defaults.rsc file 8-4
security 8-1
system defaults 8-2
D
data centers
defining 8-2
database administration 4-43
administrator responsibilities 5-1
checking available space 4-47
extending 4-44
performing queries with isql 4-47
database creation menu
BMC Software, Inc., Confidential and Proprietary Information
DATACENTER
SNMP trap A-3
datacenter
modifying hostname 3-20
modifying port number 3-20
datacenter definition. See CONTROL-M
definition
db threshhold % parameter 5-36
db_block_buffers parameter
Oracle Server 8-9
db_block_size parameter
Oracle Server 8-9
db_check utility
db threshhold % parameter 5-36
log threshold % parameter 5-36
db_sys_params utility A-5
debugging
See also troubleshooting xiii
Apply to Gateway 7-10
Clear Flags from Screen 7-10
CONTROL-M/EM GUI 7-9
database server 7-9
gateway 7-7
gateway debug mode description 7-8
Keep Alive messages 7-10
messages 7-10
Set Active JCL 7-10
stopping gateway debug mode 7-9
Defaults.rsc file
act_view_only_option parameter 8-7
comm_userid parameter 8-6
continue_with_dup parameter 8-6
description 8-4
limit_gcs_distrib parameter 8-4
use_all_ip_address parameter 8-7
defcal utility B-8
defining
See also creating
CONTROL-M installations 2-1
jobs for time zones 1-12
Index
E
Eastern European Time 1-12
Eastern Standard Time 1-12
ECSGATE 1-10
EET time zone 1-12
EnablePriv utility 3-5
ENTERPRISE/CS
custom export 5-28
custom import 5-28
Unix platform 5-1
ENTERPRISE/CS administrator
responsibilities 5-1, 5-3
ENTERPRISE/CS components
using with firewall 3-14
ENTERPRISE/CS database
corruption 5-7
creating 5-7
database file 5-18
erase alerts option 5-28
exporting 5-30
extending 5-28
importing 5-28, 5-29, 5-30
restoring 5-7
BMC Software, Inc., Confidential and Proprietary Information
F
File Name parameter
See also memname
filters
wildcards 4-25
firewall
assign_ports script 3-14
configuring for use 3-14
focusing. See zooming
Full Security parameter 6-3
G
GAS. See Global Alerts Server
gateway communication
log 3-12
multiple IP addresses 8-7
OS/390 performance data 3-13
trace messages 7-11
Gateway Connectivity Interval
Global Conditions Server parameter
7-16
gateway log
Index
H
Handling Conflicting Conditions
Global Conditions Server parameter
7-17
HAW time zone 1-11
Hawaii time zone 1-11
HKG time zone 1-12
Hong Kong time zone 1-12
host debugging 7-10
hostname
changing 3-19
changing in Defaults.rsc 3-19
changing in the Sybase Interfaces file
3-19
HostPort C-2
HostPortList
description C-5
modifying 3-20
hours
time zone support 1-11
HP-UX
starting programs automatically 3-9
stopping programs automatically 3-9
I
ID.Seeuser ID
importing
database maintenance menu 5-29
In conditions
See also prerequisite conditions
index entries
modifying 8-4
initialization files
DIAG 7-20
DIAG file syntax rules 7-22
DIAG ini file 7-21
syntax rules for DIAG ini files 7-22
BMC Software, Inc., Confidential and Proprietary Information
InsertAlertTries C-5
installation
types 1-5
Interfaces file
changing hostname 3-19
modifying 3-19, 5-14
modifying with dsedit 5-35
parameters menu 5-14
IOAGATE
performance analysis 7-13
IP addresses
Defaults.rsc file 8-7
modifying 8-4
multiple IP addresses description 8-7
use_all_ip_address parameter 8-7
IsCyclic 7-23
isql
database administration 4-47
starting a session 4-47
J
JOB NAME
SNMP trap A-4
job parametersSee also specific parameter
name
joining. See concatenation
L
LAST TIME
SNMP trap A-4
LAST USER
SNMP trap A-4
library
See also doclib
Licence Manager. See Enterprise License
Manager
license client
Index
modifying 4-29
logon
security 6-2
logs
See also messages xiii
cyclical files 7-19
DIAG messages 7-19
gcs_log.### log file 7-16
monitoring with db_check 5-36
single-file 7-19
transaction log 5-36
logs. See output
LogTablesRefreshInterval C-9, C-13
low-level node. See job node
M
maintenance
See also Administration facility
See also database maintenance
global conditions 3-11
prerequisite conditions 3-11
maintenance agent. See administration agent
MaxDownHistDays C-5
Maximum Conditions in a Group
Global Conditions Server parameter
7-17
Maximum Send Condition Retries
Global Conditions Server parameter
7-16
MaxOldDay C-5
MaxOldTotal C-6
MaxUploadBufferMPM C-6
MaxUploadBufferMVS C-6
MaxUserTimeoutSec C-13
MEL time zone 1-12
Melbourne time zone 1-12
MEMNAME
SNMP trap A-3
messages
N
naming conventions
DIAG ini file 7-22
DIAG log files 7-20
NetView for AIX
SNMP traps A-10
Network Management applications
HP-OpenView A-7
interfacing with CONTROL-M/EM A-1
NetView for AIX A-10
Tivoli Management Environment
Console A-13
Network View Authorization window
Read Only mode 8-7
New Day procedure
time zone support 1-13
Node ID
SNMP trap A-4
nodes
BMC Software, Inc., Confidential and Proprietary Information
10
O
odate
time zone support 1-12
open objects parameter
Sybase Server 5-10
Option parameter. See Sysout Handling
or. See and/or
Oracle Applications
application support 1-10
Oracle Server
configuration 8-9
data tablespace description 5-18
database creation menu 5-19
database environment 5-17
database parameters menu 5-24
dataserver process 5-17
file 5-18
index tablespace description 5-18
initdatabasename.ora file 8-9
modifying configuration parameters
5-19
modifying hostname 3-19
modifying parameters 5-24
modifying port number 3-19
raw device 5-18
redo log file description 5-18
sharing 5-18
SYSTEM tablespace description 5-17
tsnames.ora file 3-19
user connections parameter 5-19
Orbix Server
description 7-18
hostname modification 7-18
parameter modification 7-18
parameters 7-4
port number modification 7-18
starting 3-3
stopping 3-3
Order ID
SNMP trap A-3
output. See alsoSYSDATA
output. See alsosysout
overview. See Net Overview
OWNER
SNMP trap A-4
P
Pacific Standard Time 1-11
parameters
See also job definition parameters xiii
parameters. See alsosystem parameters xiii
Parm parameter. See Sysout Handling
passwords
changing 3-12
Path parameter
See also memlib
port numbers
changing 3-19
prerequisite conditions
cleanup 3-11
deleting 3-11
security 6-3, 6-28
printing
capturing configuration parameters 4-47
PST time zone 1-11
R
R/3. See SAP
Index
11
RACF 6-3
raw device
Oracle Server 5-18
Sybase Server 5-9
reading
See also copying
See also downloading
See also uploading
Refresh Communication Interval Table
Global Conditions Server parameter
7-16
removing. See deleting
resolution. See zooming
resources
See also Control resources
See also quantitative resources
security 6-28
Restore Default Parameters
Global Conditions Server parameter
7-17
root menu
activation option 5-2
database creation option 5-3
database maintenance option 5-3
description 5-1
ENTERPRISE/CS administration 5-1
menu options B-2
new window option 5-2
starting 5-2
troubleshooting menu 5-2, 7-2
Run Global Conditions Server
Global Conditions Server parameter
7-17
S
SAP
application support 1-10
scheduling
time zone support 1-11
Scheduling tables
See also Group Scheduling tables
authorization to access 6-25
security 6-26
script 3-14
security
authorization definitions 6-24
authorization facility 6-4
calendars 6-31
changing password 3-12
collections 6-23
communication 6-24
CONTROL-M 6-3
CONTROL-M/EM 6-1
CONTROL-M/EM customization 8-1
CONTROL-M/EM data protection 6-2
CONTROL-M/EM log on protection
6-2
CONTROL-M/EM user operations 6-3
data center 6-3
database server customization 8-1
define authorizations selection window
6-21
description 6-24
enabling job actions 6-20
file protection 6-2
filters 6-23
firewall configuration 3-14
gateway 6-3
hierarchies 6-23
Integral Workstation Security 6-1
job access 6-20
logon 6-2
network view authorizations 8-4
operating system 6-1
passwords 3-12
privileges panel 6-22
resources 6-28
Resources and Calendars panel 6-28
security mechanisms 6-1
BMC Software, Inc., Confidential and Proprietary Information
12
Unix 6-2
user authorizations 6-3
ViewPoints 6-23
Windows-based 6-2
workstation level 6-1
Send Condition Group Interval
Global Conditions Server parameter
7-17
Send Condition Interval
Global Conditions Server parameter
7-16
SEND TIME
SNMP trap A-3
SendAlarmToScript 8-3, C-3
SendSnmp 8-3, A-5, C-3
Set Debug Parameters menu
description 7-8
gateway debugging 7-9
options 7-9
setting. See customizing
Setvar. See AutoEdit Assignment
SEVERITY
SNMP trap A-3
shared_pool_size parameter
Oracle Server 8-9
Shout parameter
See also Do Mail parameter
See also Do Shout parameter
show environment 7-3
size
See also zooming
size of rollback segments parameter
Oracle Server 5-19
size of tempdb parameter
Sybase Server 5-10
size of temporary tablespace parameter
Oracle Server 5-19
skeletonconvert B-9
SNMP
See also SNMP compatibility xiii
alerts A-1
CONTROL-M/EM parameters A-5
description A-2
interfacing with CONTROL-M/EM A-1
network manager A-1
product compatibility A-1
trap format A-3
trap message A-2
traps A-3
variable format A-4
SNMP customization
CONTROL-M/EM A-5
CONTROL-M/Links A-17
CONTROL-O/Server A-6
HP-OpenView A-7
NetView for AIX A-10
parameters A-5
Tivoli A-13
SNMP server
hostname modification 3-20
port number modification 3-20
SnmpHost
description A-5, C-3
Snmphost
modifying 3-20
SnmpSendActive A-5, C-3
SnmpSendDemo C-3
SnmpSendFormat A-5, C-3
Solaris
automatic program start 3-10
automatic program stop 3-10
sort_are_size parameter
Oracle Server 8-9
sorting. See filtering
sp_configure
modifying Oracle Server parameters
5-19
setting database server parameters 5-10
SQL server configuration
Oracle 8-9
Index
13
Sybase 8-8
sql.ini
modifying 3-19
SSLPassword C-6
SSLRetries C-6
SSLSyncTime C-6
starting
administration agent 3-6, 5-3
administration facility 4-4
automatically 3-6
communication tracing 7-11
CONTROL-M/EM components 3-4,
4-13
CONTROL-M/EM server 3-2
CTMAS 7-13
database debug mode 7-9
database server 3-1, 3-6
DIAG diagnostics 7-20
DIAG for GUI server 7-24
Global Alerts Server 3-3
GUI debugging 7-9
host debugging 7-10
Orbix Server 3-6
root menu 5-2
troubleshooting menu 7-2
STATUS
SNMP trap A-3
StdoutLogInfoLevel C-12
stepping in and out
See also collapsing
See also expanding
StopGracePeriodSec C-12
stopping
administration agent 3-6, 5-3
automatically 3-6
communication tracing 7-12
CONTROL-M/EM components 3-4,
4-13
CONTROL-M/EM Server 3-2
CTMAS 7-13
14
T
tables
See also Group Scheduling tables
See also Prerequisite Condition tables
See also Resource tables
See also Scheduling tables
task manager
Enable Priv utility 3-5
TCP/IP
CONTROL-M host name 2-3
CONTROL-M port number 2-4
WS-GTW host name 2-4
WS-GTW port number 2-4
templates. See skeletons
time
time zone support 1-11
time zone
CONTROL-M support 1-11
time zones
default values 1-11
TimeZone.dat file
modifying 1-14
Tivoli Management Environment Console
SNMP traps A-13
tnsnames.ora
modifying 3-19
TOK time zone 1-12
Tokyo time zone 1-12
troubleshooting
See also debugging xiii
communication tracing 7-11
CONTROL-M communication 7-13
gateway log 7-12
Global Conditions Server 7-15
Troubleshooting menu
database troubleshooting 7-3
gateway troubleshooting 7-3
menu options B-6
options 7-3
show environment 7-3
U
Unix
ENTERPRISE/CS administration 5-1
updatedef utility B-9
use_all_ip_address parameter 8-7
Defaults.rsc file 8-7
user authorizations
description 6-4, 6-10
General panel 6-15
Jobs panel 6-19
Privileges panel 6-22
Resources and Calendars panel 6-28
Scheduling Tables panel 6-25
specifying authorizations 6-20
Index
15
X
Xterm window
opening 5-2
V
variables. See AutoEdit variables
verify user
DIAG component prefix 7-22
viewing
See also display
ViewPoint
collection security 6-23
filter security 6-23
hierarchy security 6-23
security 6-23
ViewPoint window
security 6-5
VMS. See OpenVMS
W
Western European Time 1-12
WET time zone 1-12
wildcard characters
filters 4-25
Windows administrator
responsibilities 1-9, 6-2
workstation gateway
communication tracing 7-11
description 1-4
log 3-12
TCP/IP host name 2-4
BMC Software, Inc., Confidential and Proprietary Information
16
Notes
*100037645*
*100037645*
*100037645*
*100037645*
*100037645*