CTM Admin 9.0.00
CTM Admin 9.0.00
CTM Admin 9.0.00
9.0.00
Administrator Guide
July 2015
Telephone
HOUSTON TX
77042-2827
USA
Outside United States and Canada
Telephone
Fax
U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER
THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and
computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR
Section 52.227-14, DFARS 252.227-7013, DFARS 252.227-7014, DFARS 252.227-7015, and DFARS
252.227-7025, as amended from time to time. Contractor/Manufacturer is BMC SOFTWARE INC, 2101
CITYWEST BLVD, HOUSTON TX 77042-2827, USA. Any contract notices should be sent to this address.
Customer support
You can obtain technical support by using the BMC Software Customer Support website or by contacting
Customer Support by telephone or e-mail. To expedite your inquiry, see Before contacting BMC.
Support website
You can obtain technical support from BMC 24 hours a day, 7 days a week
at http://www.bmc.com/support. From this website, you can:
Read overviews about support services and programs that BMC offers
Subscribe to receive proactive e-mail alerts when new product notices are released
Find worldwide BMC support center locations and contact information, including e-mail addresses, fax
numbers, and telephone numbers
Product information
Product name
Machine type
Operating system type, version, and service pack or other maintenance level such as PUT or PTF
Serial numbers
Related software (database, application, and communication) including type, version, and service
pack or maintenance level
Messages received (and the time and date that you received them)
(USA or Canada) Contact the Order Services Password Team at 800 841 2031, or send an e-mail
message to ContractsPasswordAdministration@bmc.com.
(Europe, the Middle East, and Africa) Fax your questions to EMEA Contracts Administration at +31 20
354 8702, or send an e-mail message to password@bmc.com.
(Asia-Pacific) Contact your BMC sales representative or your local BMC office.
Contents
Introduction to Control-M Configuration Manager .............................................................. 9
Logging in to CCM ........................................................................................................................ 10
Configuring CCM options ............................................................................................................... 10
System parameters: Enables you to define Control-M/EM, Control-M/Server, Control-M for z/OS,
and Control-M/Agent system parameters, as described in System configuration (on page 37).
Control-M/EM authorizations: Enables you to assign LDAP, Global and Prerequisite Conditions,
Quantitative and Control Resources, Calendar, Folder, Workload Policy, and Run as User
authorizations for Control-M/EM users, as described in Control-M/EM Authorizations (on page 228).
High Availability: Enables you to to fail over Control-M/EM or Control-M/Server to a secondary host,
as described in High availability (on page 262).
Alerts: Enables you to create shout destination tables and manage exception alerts, as described
in Alerts (on page 288).
Host groups: Enables you to define and run jobs on any host in a group and limit the number of
jobs submitted to a specific host according to a defined CPU usage limit and the number of
concurrently running jobs on a host, as described in Host group management (on page 295).
Control-M Deployment: Enables you to upgrade or downgrade Control-M/Agents from the CCM
and distribute the Control-M/EM client to every supported Windows computer in your organization, as
described in Control-M deployment (on page 300).
Workload Archiving: Enables you create Archive policies and configure Archive settings, as
described in Workload Archiving configuration (on page 306).
Logging in to CCM
This procedure describes how to log in to CCM, which enables you to perform component and system
configuration, enable security parameters and authorizations, and manage system alerts and host group
management.
To log in to CCM:
1. From the Start menu, select All Programs > BMC Software Control-M 9.0.00 > Control-M
Configuration Manager.
The Control-M Configuration Manager login window appears.
2. In the User Name field, type the username that you want to use to log in to CCM.
3. In the Password field, type the password of the username.
4. From the Server drop-down list, select the CMS server that you want to connect.
5. To change the Naming Service server and select the CMS server related to that environment, do the
following:
a. Click Advanced.
b. In the Host Name field, type the hostname where the Naming Service server is located.
c. In the Port Number field, type the port number for the Naming Service server.
d. The Using SSL checkbox indicates the SSL mode. To change the mode, see Introduction to SSL
for Control-M.
e. From the Domain drop-down list, select an LDAP domain or the Local_EM domain.
This field only appears if there is a defined LDAP domain, as described in Defining LDAP system
parameters (on page 39).
f.
Click Apply.
6. Click Login.
10
Component management
After you have installed Control-M, the initial configuration automatically defines and starts up the
required components. However, you might want to define additional components for one or more of the
following reasons:
Load balancing
Organizational structure
Geographic distances
In most configurations, two or more Control-M/Servers are required with multiple Control-M/Agents to
handle the load balancing of jobs. For more information about Control-M configuration, see Control-M
architecture.
The following procedures describe how to define, edit, and delete Control-M/EM, Control-M/Server,
Control-M/Agent and remote host components:
To change the status of a component, see Component status (on page 32).
To set the synchronization mode for a Control-M/Server component, see Configuring Control-M/Server
synchronization (on page 31).
3. Click OK.
The new component appears in the CCM.
Description
Desired State
Type
Name
BIM
GCS
GUI Server
Forecast Server
Web Server
Defines the name of the GUI Server that connects with the
component.
By default, the GUI Server is named according to its host
name. If more than one GUI Server is on the same host, each
instance must have a unique name.
Host Name
Check Interval
12
Field
Description
If you selected Discover, type the required values for each field and then click OK.
If you selected Define, type the required values for each field, as described in Control-M/Server
component parameters (on page 14) and then click OK:
13
Description
Name
Platform
ID
Version
Description
Contact
EM Statistics
Defines the job attribute which is used as the key for statistics
collection according to Jobname or Memname.
The settings on the Control-M/Server computer must match
these settings.
14
Field
Description
Synchronization mode
Protocol
Host
Control-M/EM Port
Gateway
15
Field
Description
Time Zone
Start Day
Control-M/Tape
Control-M/Restart
Control-M/Analyzer
16
Field
Description
Upper Case
Enable
Back up Control-M/Server, as described in Control-M/Server database backup and restore (on page
319).
Do not run any utilities that update job or calendar definitions during the rename.
GCS
GUI Server
BIM
Forecast Server
The pattern used to match the old Control-M/Server name does not match the new name.
The pattern used to exclude the old Control-M/Server name now matches the new name.
Click Ignore and Continue and fix the definitions after the rename.
The renamed Control-M/Server appears in the CCM component list and the list of warnings are saved
in the following directory:
<Control-M/EM_Home_Dir>\Log\<original_name>_to_<new_name>_<timestamp>.lo
g
Pausing Control-M/Server
This procedure describes how to pause Control-M/Server, which stops Control-M/Server from submitting
jobs.
EXAMPLE: You might want to pause submitting new jobs when you want to investigate abnormal
behavior in Control-M/Server, without shutting it down, or if you want to start it up after its
upgraded.
To pause Control-M/Server:
1. Select the Control-M/Server component that you want to pause.
2. Right-click and select Pause.
A confirmation message appears.
3. Click Yes.
If the Control-M/Server state was up, then the state changes to Up and Pause. If the
Control-M/Server state was down, then the state changes to Down and Pause. When you restart
Control-M/Server, Pause remains in effect and new jobs are not submitted.
18
5. Click Test.
The test completes successfully.
6. Click OK.
The new Control-M/Agent appears in the CCM.
SSH: Encrypts access to the remote host with SSH and determines the SSH server port,
encryption algorithm, and compression.
WMI: Encrypts access to the remote host with WMI and defines the output directory (Windows
only).
7. To test the connection to remote host, click Test. Otherwise, click Next.
The Step 3: Define an owner dialog box appears.
8. Do one of the following:
If you have a defined owner for this host, select I already have owners defined for this
host.
If you want to define a new owner for this host, select I want to define a new owner for this
host, and in the 'Run as' User Properties area, type the required values for each field and
click Test.
9. Click Next.
The Step 4: Summary window appears.
19
10. Review the remote host connection parameters and then click Finish.
20
NOTE: Verify that all fields marked with an *have the same value in all Control-M/Agents that are
connected to the Network Load Balancer Router.
Field
Description
Communication Timeout
21
Field
Description
Maximum Retries
Communication parameters
The following table describes the Control-M/Agent Communication parameters:
Field
Description
Primary Server
22
Field
Description
Authorized Servers
Communication Timeout
Maximum Retries
23
Field
Description
24
Description
Persistent Connection
Determines the maximum number of seconds between 30 86400 that the Control-M/Server allows an agent to be
disconnected before it initiates a session. This parameter is
relevant only if the Allow agent to initiate a session
parameter on the agent is set to NO.
Default: 300
Determines the maximum number of seconds between 30 86400 that a session can be idle before Control-M/Server
terminates it.
Default: 900
25
Field
Description
Description
Determines whether the job ends when all sub processes exit
or waits until the main job process exits. It is recommended to
select Yes, when the Control-M/Agent is used to start
background applications.
Echo job commands into OUTPUT Defines whether to print commands in the output of a job
Foreign Language Support
Application Locale
26
Output parameters
The following table describes the Output parameters:
Field
Description
Default Printer
OUTPUT Name
file_name
jobname
Security parameters
The following table describes the Security parameters:
Field
Description
Logon Domain
Logon as User
Owner's Authenticate Settings
only).
27
Agentless parameters
The following table describes the Agentless parameters:
Field
Description
SSH Only
Connection Retries
Connection Timeout
Temporary Directory
Default Queue
28
Email parameters
The following table describes the Email parameters:
Field
Description
Sender Email
Reply to Email
Database management
The following procedures describe how to check database space and location and extend the size of an
Oracle or MSSQL database:
Checking Database space (on page 29): Describes how to check the size of the database server.
Checking Database location (on page 30): Describes how to verify the location of the database.
Extending the Oracle database (on page 30): Describes how to extend the table space names of a
data file in the Oracle database.
Extending the MSSQL database (on page 30): Describes how to extend the MSSQL database, which
enables you to extend the size of the data or log files in the database.
29
6. In the Data file name field, select the data file that you want to extend or type the name of the new
data file that you want to extend.
7. Click OK.
The database file size is extended.
Data
30
Log
6. Click OK.
The database file size is extended.
Editing a component
This procedure describes how to edit a Control-M/EM, Control-M/Server, or a Control-M/Agent component
from the CCM.
To edit a component:
1. Select the component that you want to edit.
2. From the Home tab, in the General group, click Properties.
The Control-M <component type> dialog box appears.
3. Do one of the following:
If you are editing a Control-M/EM component, edit the required enabled fields, as described
in Defining a Control-M/EM component (on page 11).
If you are editing a Control-M/Server component, edit the required enabled fields, as described
in Defining a Control-M/Server component (on page 13).
If you are editing a Control-M/Agent component, edit the required enabled fields, as described
in Defining a Control-M/Agent component (on page 18).
4. Click OK.
The component is updated.
31
Deleting a component
This procedure describes how to delete a Control-M/EM, Control-M/Server, or a Control-M/Agent
component from the CCM.
To delete a component:
1. Select the component that you want to delete.
2. Right-click the component and select Desired State > Down.
Wait until the component is shut down before continuing.
3. From the Home tab, in the General Group, click Delete.
A confirmation message appears.
4. Click Yes.
The component is deleted.
Component status
You can set Control-M components to one of the following desired states:
Ignore: The Configuration Agent does not attempt to start up or shut down components
The Configuration Agent attempts to start up or shut down components, depending on the desired state
and defined intervals.
32
NOTE: In a high availability environment, the secondary host only starts up components that have the
desired state set to Up. If the desired state is set to Down, Ignore, or Recycle, those components remain
the same state as the primary.
The following procedures describe how to start up, shut down, ignore, and recycle Control-M
components:
To disable a Control-M/Server or Control-M/Agent component, see Disabling a component (on page 34).
To change the status of a Control-M/Server, see Changing the status of Control-M/Server (on page 34).
Starting up a component
This procedure describes how to start up a Control-M/EM, Control-M/Server, or Control-M/Agent
component.
To start up a component:
1. Select the component that you want to start up.
2. From the Home tab, select Up.
The selected component is now in an Up state.
Ignoring a component
This procedure describes how to ignore a Control-M/EM, Control-M/Server, or Control-M/Agent
component. This procedure is used in certain cluster configurations.
To ignore a component:
1. Select the component that you want to ignore.
2. From the Home tab, select Ignore.
The selected component is now in an Ignored state.
33
Recycling a component
This procedure describes how to recycle a Control-M/EM, Control-M/Server, or Control-M/Agent
component.
To recycle a component:
1. Select the component that you want to recycle.
2. From the Home tab, select Recycle.
The selected component is now in a Recycle state.
Disabling a component
This procedure describes how to disable a Control-M/Server or Control-M/Agent component. This enables
you to perform maintenance procedures, such as a backup.
To disable a component:
1. Select a Control-M/Server or Control-M/Agent component.
2. Right-click and select Disable.
The component is disabled.
If the Control-M/Server is connected to one Control-M/EM and you want to disable this function,
do the following:
a. Select the Control-M/Server that you want change.
b. Right-click and select Set to Un-Managed.
If the Control-M/Server is available to all Control-M/EMs and you want to designate it for one
Control-M/EM, do the following:
c. Select the Control-M/Server that you want change.
d. Right-click and select Set to Managed.
Control-M/Server Upgrade
Do not delete the old Control-M/Server component in the CCM. This process will upgrade the
Control-M/Server data in the Control-M/EM database and also update the Control-M/Server
component to the new version.
Do not start up the corresponding gateway until after you complete this procedure. The Promote only
affects the Control-M/Server data that is in the Control-M/EM database. It does not need to connect
to the Control-M/Server to perform this procedure.
NOTE: You need to follow this procedure only when the Control-M/Server was upgraded to 9.0.00. If only
the Control-M/EM was upgraded and not the Control-M/Server then you do not perform these steps.
35
Promote parameters
The following table describes the Promote fields:
Fields
Description
Promote
Control-M
Version
Host
Port
Defines either:
or
36
System configuration
In CCM, you can change the default values of the Control-M/EM system parameters or each component
without having to access each individual computer.
Before a modified parameter value can take effect, the component that uses the value needs to be
refreshed.
To define system configuration parameters, see the following:
Defining Control-M Workload Change Manager system parameters (on page 45)
37
Type
Name
Description
Value
Default Value
Refresh Type
Recycle: You need to recycle (stop and restart) the component (for example,
Control-M/Server) for the change to take effect.
Manual: You need to perform an action that refreshes the parameter value (with no need for
recycling the component).
Last Updated
38
39
Description
Defines the name of the user that runs the search action for
users that log on. For
example, cn=admin,dc=company,dc=us,dc=com.
If this field is not defined, then the LDAP Directory Search Base
field must have a value.
Transmission Protocol
TCP
SSL
40
Field
Description
Defines the starting domain name for the user search in the
directory tree structure. For example, sales.company.us.com
or dc=sales,dc=company,dc=us,dc=com.
This field must have a value if the LDAP Directory Search
User field is left blank. Otherwise the default value is the
domain where the search user is located.
DirectoryServiceType.cfg parameters
The following table describes the parameters listed in the DirectoryServiceType.cfg file.
After you edit any of the parameters in this table and save the DirectoryServiceType.cfg configuration file
located in the ctm_em/etc directory, you must refresh the various components and servers with the
changes.
Parameter
Description
Default Value
DirectoryUsersDnAttr
AD: distinguishedName
Other: dn
AD: sAMAccountName
Other: cn
AD: sAMAccountName
Other: cn
AD: member
Other: uniqueMember
AD: distinguishedName
Other: dn
DirectoryUsersIDAttr
DirectoryGroupIDAttr
DirectoryGroupMembersIDAttr
41
Parameter
Description
Default Value
DirectoryGroupsObjectClassAttr
AD: group
Other:
groupOfUniqueNames
Description
Enable audit
Enable annotation
Days to retain audit information Determines the number of days to retain audit information before
automatically deleting it from the Control-M/EM server database
42
Description
Defines the Login Logo path, where the site login logo is
located.
Background Color
Refresh Rate
43
Parameter
Description
Maximum number of services Determines the maximum number of services that can
in view
appear in the Map view of the Services view in the Control-M
Self Service site.
If there are more services than the number defined, you
might experience low performance. When the number of
services exceed its limitation, a warning message appears
and the user is prompted to select List view.
Output automatic load limit
Administrator Mail
Support/Helpdesk Info
44
Parameter
Description
Hold
Release
Confirm
Rerun
Restart
Kill
Order Now
Set to OK
Update
Archive Search
45
Description
English
German
French
E-Mail Sender
46
Parameter
Description
HTML
Microsoft Word
47
Description
act_chk_inpermitt_gcs_gui
AllowListEMUserNames
AllowReportViewing
0 - Not permitted
1 - Permitted (default)
AllowQueryDBFieldValues
AllowQueryFieldValues
0 - Disabled
1 - Feature enabled
0 - Disabled
48
Parameter
Description
ALERT Alerts
Configuration Manager
Manager
Configuration Manager
Configuration Manager
49
Parameter
Description
AuditCleanupOn
1: Cleanup is automatic
Default: 1
AuditFullDefinitionChanges
AuditHistoryDays
AuthenticationMethod
AutomaticOrderMethodByDefault Determines whether the default for folders that are created by Order
Method is automatic or manual.
Valid values:
Default: 1
50
Parameter
Description
bulk_def_size
bulk_def_storage_len
CentralDeployLocation
ChallengeResponseTimeout
CGSCommUserIGd
CmsCtmNGRefreshInterval
Sets the refresh interval in seconds for collecting host group data.
Valid values: 0-10000 (0 -host group data is not collected)
Default: 900
51
Parameter
Description
CTMSyncExceptions
DatabaseCheckInterval
DatabasePoolSize
DatabaseRetries
52
Parameter
Description
DatabaseRetryInterval
DefaultAverageTime
Average run time for jobs with no statistics. This value is often used
if no statistics are available.
Valid values: Any valid time, entered in the following format:
MM:SS
Default: 00:05
DefaultCTMExcludeRBC
Default: Y
If this feature was disabled during the fix pack installation, you need
to change RBC names that start with ! and run the
enable_exclude_rbc.pl perl script from the <scripts> directory.
DeleteChunkSize
DirectoryServiceAuth
Default: Off
53
Parameter
Description
DirectoryServerHostPort
The full domain name of the host on which the LDAP server is
installed and the port on which to communicate with the LDAP
server.
Format: full domain name:port number
Example: CTMhost1.DOMAIN1.level1:389
Default: <null>
Note: Multiple LDAP servers can be defined. This enables
Control-M/EM to perform authentication against backup LDAP
servers when the primary server is unavailable.
DirectorySearchUserDN
Stores the LDAP Domain Name (DN) credentials for a special user
who has read access to the directory. This parameter is mandatory if
the value of the DirectoryServiceType parameter is Active
Directory, otherwise it is optional.
If no value is used, the parameter value is interpreted as an
anonymous user (Default).
Valid values:Either the URL notated definition of the user ID or its
DN.
EXAMPLE:
DirectorySearchUserPwd
jsmith@PRODUCTION.bmc.com
Stores the LDAP password for the search user defined in the
DirectorySearchUserDN parameter who has read access to the
directory. Optional if the value of the DirectorySearchUserID
parameter is empty or anonymous.
Valid Values: The value is an encrypted password string. which is
entered into the parameter value field as regular text and is then
converted to an encrypted string before being stored in the
database. Thereafter, the displayed value is the encrypted string
whenever the parameter is accessed in the System Parameters
window. If no value is used, the parameter value is interpreted as
blank (Default).
DirectoryServiceType
54
Parameter
Description
DirectoryServiceValidation
Default: 1
Refresh type: manual
The best configuration duration time can be achieved by setting this
parameter to bypass validation actions during Control-M/EM startup
or LDAP activation. This can be done after validating your
configuration at least once to ascertain that all the configuration
values are valid.
DirectoryServerProtocol
TCP
SSL
Default: TCP
55
Parameter
Description
DirectoryUsersSearchRoot
EmailSender
Defines the email address that issues the high availability alert.
EmailServer
EmailRecipients
Defines the email addresses that receive the high availability alerts.
The email addresses must be separated by a comma.
EnableLoadBalancerRouter
True
False
Default: False
56
Parameter
Description
EnableRemoteBrowsing
Default: Y
GCSCommUserId
Defines the ID that GCS uses to identify itself to Control-M. This user
must be defined in the Control-M/Server with Add or Delete
permissions.
Default: GCSERV
HandleAlertsOnRerun
0: Alerts for this job that are in the Alerts window before the job
is rerun are not automatically changed to HANDLED. If the rerun
fails, a new alert is displayed in the Alerts window.
1: Alerts for this job that are in the Alerts window before the job
is rerun are automatically changed to HANDLED.
Default: 0
HostPort
57
Example: CTMhost1:1530
Parameter
Description
I18N
cjk
latin1
english
german
french
spanish
Default: use_account_locale
LimitGCDistribActivate
58
Parameter
Description
LimitGCDistribExcludeDates
LimitGCDistribMaxDays
LMGUI_Communication_Cfg
LockAccountForMinutes
MainEMServiceContext
MaxAuditsToDelete
59
Parameter
Description
MaxPasswordLength
MinPasswordLength
NrHandledAlarms
NumberOfFailedLogins
60
Parameter
Description
NumberOfReportDaysHistory
OutputAutoLoadLimit
PasswordComplexityOnOff
0 (no = off)
1 (yes = on)
Default: 0
PasswordComplexityRules
61
Parameter
Description
PasswordEncode
Default: 2
PasswordExpirationOnOff
Default: 0
PasswordHistoryOnOff
1 (yes)
Default: 0
PasswordLifetimeDays
62
Parameter
Description
PermitManualUnlock
Default: 1
ProxyNewsfeedHostPort
Determines the host and port of the proxy server for all users
connecting to the Newsfeed through a proxy server.
Valid values: <host>:<port>
EXAMPLE: Venus:13888
Default: Empty
RemoteBrowseEntriesMaxLimit
RFAllowReportForJobLevelAuth
Default: Y
RunTimeDeleteHistChunkSize
63
Parameter
Description
RunTimeDeleteHistInterval
64
Parameter
Description
SendAlarmToScript
65
Parameter
Description
SendAlertNotesSnmp
Default: 0
NOTE: The SendAlertNotesSnmp parameter is available for
Control-M/EM 7.0.00 fix pack 2 and later.
SendRuntimeEstimations
0 - disables the Show/Hide Time field from the View tab in the
Montoring domain
1 - enables the Show/Hide Time field from the View tab in the
Monitoring domain
Default: 0
SendSnmp
0 - SNMP only
0 - Hide
1 - Show
Default: 1
66
Parameter
Description
SnmpHost
Host name or list of host names (if a list, using semi-colons (;) as
delimiters) to send the SNMP trap on an alert. Specific ports can be
set using a colon (:) as a delimiter.
Valid values:Valid hostname or ip address
Default: <no_host>
Example: dhost1;jhost2;myhost3:2000
SnmpSendActive
Default: 0
UnsupportedClientVersions
UserAuditContext
ALERT Alerts
67
Parameter
Description
UserAuditOn
Indicates if the user will be required to enter details about the type
of operation being performed and the reason for its performance,
which will be saved as an annotation to the audit report, before
completing the operation. UserAuditOn must be defined as 1 for
UserAuditAnnotationOn to activate.
Valid values:
1 (yes)
Default: 0
Refresh Type: Manual
VMAdditionalJobsRelateFields
68
Parameter
Description
VMVersionsNumberToKeep
AlertOnAbend
Flag that indicates whether alerts are (1) or are not (0) sent for jobs
that end NOTOK.
Valid values:
Default: 1
69
Parameter
Description
CollectzOSUserDaily
ordered jobs
table list
Default: 1
CommCtmBufferSize
CommEMBufferSize
ConsiderDSN
Specifies whether the ordering job and table keys (used when
sending job ordering information from Control-M for z/OS to the
Gateway) includes dataset names. Typically, the dataset name is
changed for each job order.
Valid values:
Default: 1
DeltaMaxActMinutes
70
Parameter
Description
DownCreAlerts
Flag that indicates whether to send alerts for downloaded jobs that
end NOTOK when they are run. Note: AlertOnAbend must be set to
1 for DownCreAlert to be operational.
Valid values:
Default: 1
EBCDIC_cp
For MVS data centers: This parameter defines the EBCDIC code
page to which ASCII data is translated.
Valid values:
Default: 0
GatewayDefaultTraceOptions
GtwCondDispatchErr
71
Parameter
Description
GtwNumUpdateThreads
GtwParallelProcessingMode
on
off
Default: on
HostPortList
InsertAlertTries
MaxDownHistDays
Number of days that the list of downloads is saved. This list contains
abbreviated information about each download, such as date and
time, net name, and number of downloaded jobs and resources.
Valid values: Any whole number that is equal to or greater than
10.
Default: 100
72
Parameter
Description
MaxOldDay
Downloads are kept in the Control-M/EM database for not more than
the number of days specified in this parameter.
Valid values: Any whole number that is equal to or greater than 0.
Default: 2
NOTE: The number of downloads stored in the database is never
more than the smaller of the MaxOldDay value and the MaxOldTotal
value.
MaxOldTotal
MaxUploadBufferMPM
MaxUploadBufferMVS
MultiByte_cp
restricted_cm_admin
0-
1-
Default: 0
For more information see Authorizing non-administrators to manage
application plug-in connection profiles (on page 260).
RunInfoErrorLevel
73
Parameter
Description
RunInfoIgnoreDevCnt
RunInfoMaxSamples
RunInfoProcRecords
RunInfoUpdCtx
1 - Separate thread
Default: 1
RunInfoWaitInterval
SSLRetries
74
Parameter
Description
SSLSyncTime
75
Gateway parameters
The following table lists the Gateway parameters:
Parameter
Description
AlertOnAbend
Indicates whether alerts are (1) or are not (0) sent for jobs that
end NOTOK.
Valid Values:
0 - Alerts are not created.
1 - Alerts are created
Default: 1
CollectzOSUserDaily
CommCtmBufferSize
CommEMBufferSize
76
Parameter
Description
ConsiderDSN
Specifies whether the ordering job and table keys (used when sending job
ordering information from Control-M for z/OS to the Gateway) includes
dataset names. Typically, the dataset name is changed for each job order.
Valid values:
0 - Do not include the dataset name
1 - Include the dataset name
Default: 1
CTMSyncInterval
DeltaMaxActMinutes
DownCreAlerts
Flag that indicates whether to send alerts for downloaded jobs that
end NOTOK when they are run. Note: AlertOnAbend must be set to 1
for DownCreAlert to be operational.
Valid values:
0 - Alerts are not sent.
1 - Alerts are sent.
Default: 1
EBCDIC_cp
For MVS data centers: This parameter defines the EBCDIC code page to
which ASCII data is translated.
Valid values:
0 - Instructs the gateway to use the translation table that was used by the
previous version.
1047 for English (USA)
285 for English (British)
273 for German
297 for French
284 for Spanish
Default: 0
77
Parameter
Description
GatewayDefaultTraceOptio
ns
Enables you to set command line trace options for multiple gateways.
NOTE: If a gateway already has a trace option specified,
the GatewayDefaultTraceOptions parameter value is ignored.
Valid values: All Gateway trace option parameters
Default: <empty>
GtwCondDispatchErr
HostPortList
GtwNumUpdateThreads
78
Parameter
Description
InsertAlertTries
MaxDownHistDays
Number of days that the list of downloads is saved. This list contains
abbreviated information about each download, such as date and time, net
name, and number of downloaded jobs and resources.
Valid values: Any whole number that is equal to or greater than 0.
Default: 100
MaxOldDay
Downloads are kept in the Control-M/EM database for not more than the
number of days specified in this parameter.
Valid values: Any whole number that is greater than 0.
Default: 2
NOTE: The number of downloads stored in the database is never more
than the smaller of the MaxOldDay value and the MaxOldTotal value.
MaxOldTotal
MaxUploadBufferMPM
MaxUploadBufferMVS
MultiByte_cp
RunInfoErrorLevel
79
Parameter
Description
RunInfoIgnoreDevCnt
Indicates the maximum and minimum length of elapsed run time between
calculation discards.
Valid values: Do not change this parameter unless instructed to do so by
BMC Software Customer Support.
Default: 2
RunInfoMaxSamples
RunInfoProcRecords
RunInfoUpdCtx
RunInfoWaitInterval
SSLRetries
80
Parameter
Description
SSLSyncTime
81
Description
BulkSendIntSecs
BulkSendMax
CleanOldIntSecs
Maximum time, in seconds, unused conditions wait in the database before they
are removed. These conditions may have no data center destinations.
Valid values: 601 or higher
Default: 86400 (24 hours)
CleanOldTimeSecs
Maximum time, in seconds, unused conditions wait in the database before they
are removed. These conditions may have no data center destinations.
Valid values: 601 or higher
Default: 86400 (24 hours)
DispatchThreadsNum
DoneGcDelIntSecs
82
Parameter
Description
GcDistributionPolicy
ALL: Handle all requests, in the order they arrived, until they are sent to
all destinations
TOGGLE: Each time a new request conflicts with the current request, stop
processing the current request and start processing the new request.
Default: TOGGLE
GcDoneWaitSecs
Minimum time (in seconds) global conditions wait in memory, after they have
been sent to all connected data centers, before they are removed. This "waiting
period" prevents conditions from being sent again.
Valid values: Do not change this parameter unless instructed to do so by BMC
Software Customer Support.
Default: 120
GcMaxRetries
GcRetryIntSecs
Interval (in seconds) between attempts to send conditions to a data center that
had previously returned a temporary error.
Valid values: Do not change this parameter unless instructed to do so by BMC
Software Customer Support.
Default: 180
NOTE: In Control-M/EM environments with high workloads, the Global
Conditions server might not respond to life check requests because it is busy
communicating with gateways and re-sending messages. It is reccomended to
change the value to 360 or more to avoid overloading the Global Conditions
server and help it respond to the Maintenance Agent.
Refreh type: Manual
83
Parameter
Description
GcTogglingForSameOp
eration
1: All operations
Default: 1
GcXAlertSending
ON
OFF
Default: ON
MaintThreadPoolSize
PortNum
Default port where GCS waits for requests from clients (such as ctl commands
or life check messages). This value is used only if a port has not been defined
using the HostPort system parameter. Furthermore, this port is used only if it is
not busy; otherwise GCS selects a free port at random.
Valid values: Do not change this parameter unless instructed to do so by BMC
Software Customer Support.
Default: 10,000
SrvrsPollIntSecs
ThreadPoolSize
UpdCommIntSecs
84
Description
CondLogLvl
DbLogLvl
IntLogLvl
Determines the logging information level for messages related to internal GCS
actions involving temporary problems and rebound situations. The information is
displayed about GCS condition handling activities.
Valid values:
0 No diagnostics
1 Condition actions based on conflict handling policies
Default: 1
LogSize
Maximum number of record lines in the GCS_LOG file. When the number of record
lines in the currently open GCS_LOG file reaches the value specified in this
parameter, the file is closed and a new GCS_LOG file is opened.
Valid values: Any whole number that is equal to or greater than 0. If the value is
0, the file never closes, because there is no maximum size.
Default: 15000 KB
85
Parameter
Description
MaxLogs
ShowMsgIDLog
Default: N
Description
DetectInterval
SLSUserName
86
Description
NumDaysKeepApprovedReqs
WCMEmailSubjectTemplate
Defines the template for the e-mails subject field that is sent to
the End users after the request state changes to one of the
following:
Returned
Approved
87
Description
ActivateRetries
The number of times that the Configuration Agent tries to start an inactive
component.
Note: After the specified number of retries are attempted without success,
use the CCM to reset the unresponsive component. Change the state of the
unresponsive component to a state other than Up, then change it to Up,
and then try again to activate the component.
Valid values: Minimum of 3
Default: 10
LifeCheckRespTimeout
LifeCheckRetries
LifeCheckRetryTime
88
Parameter
Description
LogCleanInterval
LogCleanLevel
Amount of detail the clean operation erases from the LogReg log.
Valid values:
0 - No deletion
Default: 1
LogHistoryDays
Number of days that log entries are retained before they can be cleaned
from the log.
Valid values: Minimum of 0
Default: 1
LogInfoLevel
0 - No entry
Default: 2
SockRecrMaxAtmp
Valid values: Maximum number of times that the Configuration Agent can
attempt to create a socket.
Default: -1 (no limit)
SockRecrWtIntr
89
Parameter
Description
StdoutLogInfoLevel
0 - No entry
Default: 2
StopGracePeriodSec
StopTries
Number of times that the Configuration Agent tries to stop the component
using the Stop command before performing a kill operation.
Valid values: Minimum of 1
Default: 2
90
Maintenance parameters
The following table describes Maintenance paramaters.
Parameter
Description
CheckHAinDistribuitedEM
0: On
1: Off
Default: 0
FOTimeOutMinutes
HADBLifeCheckTries
HADBMaxStartupTries
HALifeCheckTries
91
Parameter
Description
HAMaxStartupTries
HATimeBetweenLifeCheck
HATimeToWaitAfterStartup
92
GUI parameters
After modifying GUI parameters, stop and restart the relevant GUI components for the changes to take
effect.
Parameter
Description
OrbShutdownWait
Default: 1
ProcessCommandsPerVP
ProcessMFCommands
ProcessVPsCommands
UserChangePassword
Default: 1
93
Description
Action_OrderForce_AuthLev
el
Default: UPDATE_ACCESS
AddJobsChunkSize
AllowQueryDBFieldValues
AuthenticationLevel
94
Parameter
Description
AuthorSecurity
Default: 1
BIMCommLoopInterval
BIMThreadPoolIdleTime
BIMThreadPoolMaxSize
BIMThreadPoolMinSize
95
Parameter
Description
bulk_act_cond
bulk_act_grp
bulk_act_job
bulk_act_res
CloseOldDownloads
ConcurrentCollections
96
Parameter
Description
ControlResourceLoadLimit
DelayBeforePinning
EMAPIActiveJobsLoadLimit
The number of jobs in the Active Jobs database that are checked by the
GUI Server when processing the request_act_retrieve_jobs request, and
included in the request response.
Valid values: from 10 to -1 (unlimited)
Default: 1000
EMThreadPoolIdleTime
EMThreadPoolMaxSize
EMThreadPoolMinSize
97
Parameter
Description
ExcludedJobFields
OWNER - Owner
DESCRIPTION- Description
CPU_ID - Host ID
Determines whether control resources are (0) or are not (1) downloaded
from the database when retrieving collections. If unneeded control
resources are not downloaded, memory requirements are reduced and
response time is improved.
Warning: BMC Software recommends that you not exclude data (change
the value of this parameter to 1) without first consulting BMC Software
Customer Support. If you do change the value to 1, be sure to modify job
processing definitions do that they do no contain excluded data.
NOTE: Control-M Workload Automation users cannot perform a find or
query on excluded control resources. After modifying this parameter, stop
and restart all GUI Server components for the change to take effect.
Valid values:
Default: 0
98
Parameter
Description
ExcludeJobQuantRes
Default: 0
FailCheckDBTimeOut
Time, in seconds, until the GUI Server checks the communication status
of the database server. If communication is still down, communication is
considered to be disrupted and the action specified
in StopIfDBConnectionFail is implemented.
NOTE: This parameter is relevant only after the GUI Server determines
that communication with the database server is disrupted. After modifying
this parameter, stop and restart all GUI Server components for the
change to take effect.
Valid values: 1-60
Default: 5
LimitArchiveJobsInMem
MaxObsoleteJobs
99
Parameter
Description
MaxUserTimeoutSec
Time, in seconds, that a Control-M/EM API client user token can be valid.
Afterwards, the GUI Server can invalidate the token.
NOTE: After modifying this parameter, stop and restart all GUI Server
components for the change to take effect.
Valid values: Any number greater than 0.
Default: 10800
NumberOfMyWorldJobs
Total number of job hosts that are displayed when Local View is used. For
information about Local View, see Alerts Monitor.
NOTE: After modifying this parameter, stop and restart all GUI Server
components for the change to take effect.
Valid values: 2-30,000
Default: 100
PinAllJobsCollection
Determines whether the All Jobs collection is loaded and pinned when the
GUI Server starts up.
Valid values:
0 The All Jobs collection is not loaded and pinned when the GUI Server
starts up.
1 The All Jobs collection is loaded and pinned when the GUI Server
starts up.
Default: 1
PrereqConditionsLoadLimit
QuantResourceLoadLimit
100
Parameter
Description
QueriedCollection
All Jobs The collection includes all jobs, not only the jobs in the
current ViewPoint.
Default: CURRENT
SecuredExcludedFields
0 - The GUI Server is not in Secure mode; it prompts the user for
confirmation whether to continue processing the request.
If a User Authorization filter includes only jobs for which the user is
the owner, but Owner is an excluded field, then a match on Owner is
assumed for every job in the Active Jobs database. This could cause
every job in the Active Jobs database to be loaded (if there are no
other exclusion criteria).
Default: 0
101
Parameter
Description
SendRequestToScript
SockRecrMaxAtmp
Maximum number of times that the GUI Server can attempt to create a
socket.
NOTE: After modifying this parameter, stop and restart all GUI Server
components for the change to take effect.
Valid values: Do not change this parameter unless instructed to do so by
BMC Software Customer Support.
Default: -1 (no limit)
SockRecrWtIntr
StopIFDBConnectionFail
Action to take if communication between the GUI Server and the database
server is disrupted.
NOTE: After modifying this parameter, stop and restart all GUI Server
components for the change to take effect.
Valid values:
Default: 0
102
Parameter
Description
Default: 1
ViewpointPolicy
Default: SELECT_JOBS
ViewPointTimeoutForBIM
UpdatesQueueLimit
UpdatesQueueMaxLimit
103
Parameter
Description
AlertsMapRefreshInterval
GatewayOutgoingQueueSize Maximum number of bytes buffered in the GUI server waiting to be sent
to Control-M/Server. For example, as a result of a Save JCL request.
Valid values: Do not change this parameter unless instructed to do so by
BMC Software Customer Support.
Default: 500000
RemedyCloseTicketMode
Indicates in which mode a Remedy ticket is closed, and what effect that
has on the alert status.
Valid values:
Default: HANDLE_ON_CLOSE
SockRecrWtIntr
104
Description
XAlertsEnableSending
1 - Enable
0 - Disable
Default: 1
IdenticalXAlertTimeDelt Determines the interval, in minutes, within which an alert is defined as identical
a
to a previous matching alert.
Valid values: Any whole number that is equal to or greater than 0.
Default: 30 minutes
IdenticalXAlertCompare Determines whether the MESSAGE field is used to compare identical alerts.
Desc
Valid values:
Default: 0
XAlertsSendSnmp
0 - Not active
2 - Sent to a script
Default: 0
IdenticalXAlertHandling Determines whether identical alerts are sent as an SNMP trap or to a script.
Valid values:
105
Parameter
Description
HandledXAlertHandling
Determines, in days, how long XAlerts are saved before they are deleted by the
Configuration Management Server.
Valid values: Any whole number that is equal to or greater than 0.
Default: 180 days
XAlertsMaxHandled
The maximum number of handled XAlerts that are displayed in the Exception
Alerts window.
Valid values: Any whole number that is equal to or greater than 0.
Default: 100
XAlertsSnmpHosts
Specifies the host names of the machines to which you want to send the SNMP
trap.
Valid values: Any host name or IP address. Separate multiple hosts with a
semicolon. To add a specific port for each host, enter the host name followed
by a colon and the port number.
EXAMPLE:XAlertsmachine:7000;SNMPmachine;Scriptsmachine:7001
Default: null
XAlertsSend2Script
Specify the full path and file name of the script to be sent. This parameter is
used only when the XAlertsSendSnmp system parameter is set to either 2 or 3.
Valid values: Any full path and file name.
Default: null
CmsXAlertsHost
Specify the host or IP address on which the CMS is forced to receive XAlerts.
Valid values: Any valid host name or IP address.
NOTE: If no value is entered for this parameter, the host name on which the
CMS is installed is used.
Default: null
106
Parameter
Description
CmsXAlertsPort
XAlertsDisableMsgIDs
Specify the message IDs for which no XAlerts are sent. By default, no message
IDs are listed. Use a comma to separate multiple message IDs.
Default: none
XAlertsMinSeverityFilte Specify the severity level filter. XAlerts with a value equal to or greater than the
r
specified severity level are sent to the Exception Alerts window.
Valid Values:
Warning
Error
Severe
Default: Warning
MaxXAlerts2Send2Clien Valid values: Do not change this parameter unless instructed to do so by BMC
t
Software Customer Support.
Determines the maximum number of exception alerts sent from the CMS to the
Exception Alerts window.
Default: 2000
107
CMS parameters
The following table lists the CMS parameters.
Parameter
Description
AdminRequestTimeout
CmsCommMode
Default: TCP
CmsCtmRefreshInterval
CmsEmRefreshInterval
CmsGateAdditionalParams
108
Parameter
Description
ManageSSL_CertExpirDays
ManageSSL_CACertExpirDays
ManageSSL_CertKeyLengthBits
Determines the number of bits of the certificate key in the Manage SSL
Generate Certificate Wizard.
Valid values: 1024, 2048, 3072, 4096
Default: 1024
MaxTableJobsToAudit
RemoteCmdTimeout
The amount of time, in seconds, that the CMS will wait for a reply to a
remote request sent through the Configuration Management Server to
Control-M/Server, Control-M/Agent, and Application Plug-Ins, before
timing out.
An example of such a request is a ping agent request.
Valid values: Any whole number that is equal to or greater than 30.
Default: 300
RunInfoStatsPurgeDays
RunInfoStatsPurgeInterval
109
Parameter
Description
VMCleanupIntervalMinutes
VMMaxDaysRetainCurJobsHistor The number of days after which the history of the current jobs should
y
be deleted automatically.
NOTE: A job version is deleted only when all of the following are true:
The number of days to retain deleted jobs and their history. Deleted
tables will also be deleted according to this value.
Valid values: Any whole number that is equal to or greater than 1.
Default: 180
110
Description
bulk_batch_size
Indicates how many job and resource details the gateway should load into
memory at a time before saving the entities in the Control-M/EM database
when performing a download from Control-M. A larger number causes the
download to occur faster and more efficiently, at the expense of virtual
memory.
Valid values: Any whole number that is equal to or greater than 10.
Default: 100
continue_not_respondin Indicates how the new gateway handles multiple gateway instances for the
g
same Control-M installation if all attempts to stop and kill the original gateway
are unsuccessful.
Valid values:
N- The original gateway continues in its "hung" state. The new gateway
stops running.
Default: N
dal_rel_cache_size
dal_select_min_bulksize These parameters indicate the bulk size being used by the database access
layer during bulk insert and choose SQL operation. Larger numbers cause the
dal_select_max_bulksiz
insert and choose SQL operations to occur faster and more efficiently, at the
e
expense of virtual memory.
dal_insert_min_bulksize
Valid values: Any whole number that is equal to or greater than 10.
dal_insert_max_bulksize
Defaults:
dal_select_min_bulksize: 10
dal_select_max_bulksize:
Oracle: 50
MSSQL: 20
dal_insert_min_bulksize: 10
dal_insert_max_bulksize:
Oracle: 100
MSSQL: 10
111
Parameter
Description
em_connect_method
gtw_send_ctl_timeout
kill_not_responding
Indicates whether a new gateway stops or kills existing gateway instances for
the same Control-M installation.
Valid values:
Y - The new gateway tries to kill the original gateway and, if successful,
continues to run. If the original gateway cannot be killed, the new gateway
handles the original gateway according to the continue_not_responding
parameter.
N - The new gateway tries to stop the original gateway (using the ctl
utility) and, if successful, continues to run. If the original gateway is not
stopped after 3 attempts, the new gateway handles the original gateway
according to the continue_not_responding parameter.
Default: N
nonBlockTimeout
112
Parameter
Description
useNonBlock
N - The gateway waits and receives for the entire message to arrive in
blocking mode, regardless of length of time.
Default: N
Description
AddAllOrphanConditions
2- Orphan conditions are added at the average start time of the first
job waiting for the condition.
Default: 2
113
Parameter
Description
AlertConsolidationMode
0- Disables consolidation.
2- Alerts are consolidated with a space between the message text for
each service.
Default: 1
114
Parameter
Description
AllowReportViewing
Allows service report viewing from web for users that are not
administrators.
Valid values: The number 1
Default: 0
BackupGUIServers
GUI Servers to use in case there is a problem with the primary GUI Server
(as indicated in the Control-M Configuration Manager). The value of this
parameter can be one GUI Server or list of GUI Servers separated by
commas ( , ).
Valid values: String expression.
BIMUserName
The user name that BMC Batch Impact Manager uses when connecting to
Control-M/EM.
Valid values: bimuser
Default: bimuser
NOTE: Before changing this value, ensure that the new user name value
already exists in Control-M/EM. (If it does not exist, create it before
changing the value.) The BMC Batch Impact Manager user name is a
hidden user, so if a new user name is indicated here it will also become
hidden.
ConditionDaysToLoad
ConnectToGsrRetryDelay
DateFormat
Format in which dates are displayed in the BMC Batch Impact Manager
Web Client or by the bim_report utility.
Valid values: DD/MM and MM/DD.
Default: DD/MM
DefaultAverageTime
Average run time for jobs with no statistics. In the format HH:MM. This
value is often used if no statistics are available.
Valid values: Time in the format of HH:MM.
Default: 00:05
115
Parameter
Description
DetectProblemsInterval
Interval at which BMC Batch Impact Manager checks for problems in the
service.
Valid values: Time in the format of HH:MM:SS.
Default: 00:01:00
EmailSender
Valid values: E-mail address from which alerts are being sent.
Default: bim@bmc.com
EmailServer
ExecuteConfirmedJobs
Determines if, by default, BMC Batch Impact Manager should assume all
jobs are confirmed.
Valid values:
2-All jobs are confirmed, each at its own average start time.
Default: 0
FailoverMaxRetry
Maximum number of times the BMC Batch Impact Manager Server should
reconnect to the Control-M/EM GUI Server, if this connection repeatedly
fails. This parameter is reset by the FailoverMinUptime parameter.
Valid values: Any whole number equal to or greater than 1.
Default: 10
FailoverMinUptime
The amount of time that the BMC Batch Impact Manager Server must be
connected to the Control M/EM GUI Server, before the counter used by
the FailoverMaxRetry parameter is reset to zero. For example, if this value
is 30 minutes and the connection has been maintained for more than 30
minutes, the counter is reset.
Valid values: Time in the format of HH:MM:SS
Default: 00:30:00
JobNameMode
116
Parameter
Description
Default: JOBNAME/MEMNAME
117
Parameter
Description
MailCorrectionMessage
MaxNumDetectThreads
MaxSimulationDays
NewJobsInterval
Interval at which BMC Batch Impact Manager will check to see if new jobs
have been added to the critical service.
Valid values: Time in the format HH:MM:SS.
Default: 00:01:00
NumberOfReportDays
SendMailCorrectionMessage
0- do not send
1- send
Default: 1 (send)
SimulatorEngineStep
10 seconds
118
Parameter
Description
20 seconds
30 seconds
60 seconds
Default: 10 seconds
WebRefreshRate
Determines the rate at which the BMC Batch Impact Manager Web Client
is refreshed.
Valid values: Time in the format of HH:MM:SS.
Default: 00:01:00
NOTE: You must log out and in again to the BMC Batch Impact Manager
Web Client for the new value to take effect.
Description
Default: 0
119
NOTE: After modifying any of these system parameters, you must stop and restart the Forecast server.
System parameter
Description
AddAllOrphanConditions
Default: 2
AllowQueryFieldValues
Default: 1
DefaultAverageTime
Average run time for jobs with no statistics. In the format HH:MM.
This value is often used if no statistics are available Default: 00:05
DeleteChunkSize
120
System parameter
Description
ExecuteConfirmedJobs
Default: 0
IgnoreDeviationSampleCount
MaxDailyRerunInfo
Defines the number of runs per day the gateway will keep in the history
table for each job. Default: -1 (No limit
Valid values: Any whole number equal to or greater than 1
MaxForecastJobsInMem
Sets the minimum chunk size for jobs when generating the forecast.
Valid values: The number of jobs equal to or greater than 1.
Default: 1000
MaxSimulationDays
121
System parameter
Description
RunInfoStatsPurgeDays
Sets the number of days that job runtime statistics, which have not
been updated, are retained in the database.
Default: 100 days
RunInfoStatsPurgeInterval
RunTimeHistoryDays
ScenarioMaxSize
Maximum size (in KB) of the XML files that hold forecast What-If
scenarios.
Valid values: The number of KB greater than 1.
Default: 64
SimulatorEngineStep
upd_progress_interval_sec
1 - Improves accuracy
10 - Default
60 - Improves performance
0 - No
1 - Yes
Default: 1
122
System parameter
Description
UserDailyCmdRegexp
UserDailyFileNameRegexp
UserDailyParamNO
123
Description
ArchiveLastRead
Determines the last time the Workload Archiving Server read data
from Control-M/EM.
ArchiveRetentionPeriod
ArchiveUserName
Defines the name of the Archive user that connects from the
Workload Archiving Server to Control-M/EM.
Default:arcuser
Control-M/Server parameters
In the CCM, you can change the default component system parameter values of Control-M/Server system
parameters without having to access each individual computer.
Before a modified parameter value can take effect, the component that uses the value needs to be
refreshed.
To define Control-M/Server parameters, see Defining Control-M/Server system parameters (on page 124).
Category
124
Name
Description
Value
Default Value
Refresh Type
125
Description
Control-M Date
126
Parameter Name
Description
Day Time
(DAYTIME)
This time is when the Control-M date (Odate) changes and the New Day
procedure runs.
Valid Values: either of the following formats (where hh indicates hours
and mm indicates minutes):
+hhmm changes the Control-M date at the specified time after midnight.
These values reflect 24-hour time. For example, 2200 is equivalent to 10 P.M.
EXAMPLE:
If you use +0600, the hours between midnight and 6:00 A.M.
are considered part of the previous dates work day. Thus,
system date February 10, 5:59 A.M. is considered part of the
February 9 work day.
If you use -2200, the hours between 10 P.M. and midnight are
considered part of the next dates work day. Thus, at 10:00 P.M.
on system date February 10, the Control-M date changes to
February 11.
Default: +0700
How / where to set: Use the ctmsys utility to change the parameter value.
Refresh Type: Automatic
Executable Path
Full Security
(SECURE)
NOTE: A user for whom one or more authorizations have been assigned in
the security database can perform only the actions for which the user is
specifically authorized.
Y (restricted) means a user who is not defined in the Control-M security
database does not have any application authorizations.
N (unrestricted) means a user who is not defined in the Control-M security
database is regarded as having all application authorizations.
Default: N
Refresh Type: Automatic
127
Parameter Name
Description
Whether the New Day procedure should ignore prerequisite conditions if their
reference date (day and month) matches the Control-M date + 1.
How / where to set: Use the ctmsys utility to change the parameter value.
Refresh Type: Automatic
Valid values: Y or N
Default: N
Number of days that job OUTPUT files are retained for jobs executed by
agent computers
After this period, the New Day procedure deletes all job OUTPUT files.
This parameter also affects the number of days that old nets are saved. To
view OUTPUT files of jobs in old nets, in some cases OUTPUT files must be
saved for an extra calendar day.
Valid values: Any number greater than 0.
Default: 1
How / where to set: Use the ctmsys utility to change the parameter value.
Refresh Type: Automatic
The maximum number of days that entries are retained in the Control-M log
before the New Day cleanup procedure deletes them
NOTE:
If this value exceeds 2, the syslogs might run out of space. Either delete the
transaction log or use ALTER DATABASE to increase the size of the segment.
For example, if the data device size is 400 MB and you want to retain history
for 10 days, enlarge the temporary database to 240 MB.
Valid values: Any number greater than 0.
Default: 2
How / where to set: Use the ctmsys utility to change the parameter value.
Refresh Type: Automatic
128
Parameter Name
Description
Maximum Retries
(MAXTRY)
Default: Disabled
How / where to set: In the Control-M Main Menu, choose Parameter
Customization => System Parameters and Shout Destination
Tables => System Parameters => Next Page => Secure Sockets
Layer. The parameter that is updated is the
CTM_CONFIG_AGENT_SSL_ENBL parameter.
Refresh Type: manual
Start Day of the Week
(SWEEK)
129
Parameter Name
Description
Statistics
EMAIL_CC
EMAIL_RECIPIENTS
130
Description
AUTODEPLOY_DEPLOYING_TIMEOU
T
AD_FETCH_LOG_TIMEOUT
AUTODEPLOY_RUNNING_JOBS_TIM
EOUT
AD_MAX_BANDWIDTH
DEPLOYMENT_THREADS
AD_REQUIRED_DISK_SPACE
AD_RETAIN_PACKAGES
0: Never remove
1-365
Default: 30
131
Description
HA_DB_LIFECHECK_TIMEOUT
HA_DB_LIFECHECK_TRIES
HA_DB_MAX_STARTUP_TRIES
HA_LIFECHECK_TIMEOUT
HA_LIFECHECK_TRIES
HA_MAX_STARTUP_TRIES
132
Parameter
Description
133
Communication parameters
The following table list the Control-M/Server communication parameters.
Parameter
Description
Agent-to-Server Port
Number
(CTMS_PORT_NUM)
The listening port number of the NS process (not to be used for any other
purpose in the server computer). Control-M/Server communicates with
Control-M/Agent using two TCP/IP ports. CTMS_PORT_NUM specifies the port
for data flowing from Control-M/Server to Control-M/Agent. The other port is
specified using Server-to-Agent Port Number parameter.
NOTE: This number must match the value assigned to the Agent-to-Server
Port Number parameter on the agent computer.
Valid Values: 102465534
Default: 7005 (On UNIX, the default value is overridden, using the value
given during installation.)
How / where to set: In the Control-M Main Menu, choose Parameter
Customization => Basic Communication and Operational
Parameters => Agent to Server Port.
Refresh Type: Recycle
Communication Protocol Protocol used to communicate with the agent computers. (The protocol
specified here must be the same as that specified on the agent computer.)
Valid Values: TCP
Default: TCP It is recommended that you use TCP when there are many jobs
running simultaneously reporting to Control-M/Server.
Refresh Type: Recycle
Inter Process
The listening port number of the RT process.
Communication (IPC)
Valid Values: 102532767
Port Number
(CTM_RT_PORT_NUMBE Default: 6005
R)
How / where to set: In the Control-M Main Menu, choose Parameter
Customization => Basic Communication and Operational
Parameters => IPC Port.
Refresh Type: Recycle
134
Parameter
Description
Host interface name of the TCP/IP network interface card on the server
computer to use for communication with Control-M/EM.
This name is typically the host name of the server computer. You should
modify this parameter only if the server computer contains more than one
network interface card (for example, Ethernet and Token-Ring).
Valid Values: host name, or host IP address (for example, 192.123.186.20)
Default: the default host interface name defined in the server computer
operating environment.
Configuration Agent
Port
CTM_PRM_KPA_BETWE
EN_MSGS
CTM_PRM_KPA_ROUND
TRIP_TIMEOUT
135
Parameter
Description
CTM_VARIABLE_SHOUT Enables alerts to be sent when variables have not been resolved during job
_ON_ ERROR_URGENCY submission. You can set this parameter in the config.dat file.
The format for the parameter is:
CTM_VARIABLE_SHOUT_ON_ERROR_URGENCY <urgency>
Valid values:
U Urgent
V Very urgent
COMTRYNO
136
Parameter
Description
IPV_MODE
IPV4
Default: IPV4
How / where to set: In the config.dat file of Control-M/Server and
the CONFIG.dat file of Control-M/Agent, set the IPV_MODE parameter
to DUAL and then restart both Control-M/Server and Control-M/Agent.
NOTE: If Control-M/Server and/or Control-M/Agent.are installed on AIX,
verify that the fix for APAR IV23320 is installed.
If you want to enable IPV6 before installation, see Setting environment
variables in UNIX.
OS_PRM_HOSTNAME
Used in various ways, for example, the name of the server to be sent to the
Agent, for later comparison with the Agent's permitted server list.
Valid Values: 50 characters
Default: gethostname
How / where to set:
(UNIX) In the Control-M Main Menu, choose Parameter Customization =>
Basic Communication and Operational Parameters => Local IP host
interface name.
Refresh Type: Recycle
OUTGOING_ADDR
137
Operational parameters
The following table lists the general Control-M/Server operational parameters.
Parameter
Description
The port number that Control-M/Server uses to listen for communication from
Control-M/EM
TCP/IP Port Number Control-M/EM. Verify that the port number is not used for any other purpose on the
(GATEWAY_TO_SER server computer.
VER_PORT)
Valid values: between 1025 and 32767 inclusive.
Default: 2370
Refresh Type: Recycle
Maximum Job State
Changes
Maximum Server
Processes
Minimum Server
Processes
Number of Tracker
This parameter determines the number of worker threads available for the tracker
Worker Threads
process at startup.
(TRACKER_WORKER
Valid values: 1100
S_NUM)
Default: 5
Refresh Type: Recycle (by shutting down the Control-M/Server and then
re-starting it)
138
Parameter
Description
Maximum Number
of Tracker Worker
Threads
(TRACKER_MAX_W
ORKERS_NUM)
Determines the maximum number of worker threads that the tracker can create.
Valid values:
Minimum: TRACKER_WORKERS_NUM
Maximum: 100
Default: 20
Refresh Type: Recycle (by shutting down the Control-M/Server and then
re-starting it)
Statistics Mode
Mode used by the ctmjsa utility to collect summary statistics. JOBNAME compiles
statistics for each Control-M Job Name/Table and Host ID where the job was
submitted. MEMNAME compiles statistics for each Control-M Mem Name/Mem Lib
and Host ID.
Valid values: MEMNAME, JOBNAME
Default: MEMNAME
Refresh Type: Manual
139
The values specified for these parameters are used as the default values for communication with each
agent computer. You can change values for specific agent computers individually.
Parameter
Description
Allow Agent
Disconnection
(ALLOW_AG_DISCONNE
CTION)
Check Interval
(AVPOLTIM)
Interval (in seconds) between status checks for each Control-M/Agent that
communicates with Control-M/Server.
Valid Values: 30-65534
Default: 7200 (2 hours)
Communication Protocol
Version (COMVERSION)
Version of Control-M/Agent.
Valid values:
07 6.3.0x
09 - 6.4.0x
Default: 09
Communication Timeout
140
Parameter
Description
Maximum Concurrent
Indicates the maximum number of concurrent sessions that the NS process
Sessions
will hold.
(CTM_MAX_CONCURREN
Once the maximum of the MAX_CONCURRENT_SESSIONS parameter is
T_SESSIONS)
reached, the session with the maximum idle time will be terminated in order
to open a new connection. If this agent connection is marked as not allowed
to be disconnected (see the ALLOW_ AG_DISCONNECTION parameter) then
the next one in line will be disconnected.
Valid Values: All integers in the range of 16 to the maximum available
according to the operating system.
Default: 256
Maximum Disconnect
Time
(MAX_DISCONNECT_TIM
E)
Maximum Retries
(MAXTRY)
Persistent Connection
Indicates the persistent connection setting. Set the
(PERSISTENT_CONNECTI PERSISTENT_CONNECTION parameter to connect to a specific agent with
ON)
either a persistent or transient connection.
When Persistent Connection is set to Y (for example, with an agent
version 6.2.01), the NS process creates a persistent connection with the agent
and manages the session with this agent. If the connection is broken with an
agent or NS is unable to connect with an agent, the agent is marked
as Unavailable. When the connection with the agent is resumed, the NS
recreates a persistent connection with the agent and marks the agent
as Available.
Valid Values: Y or N
Default: N for a new agent installation and N for an agent that is known to
Control-M/Server before upgrading to version 6.2.01 and above.
Polling Interval
(POLLTIME)
Time interval (in seconds) between requests from Control-M/Server for status
updates from agent computers that are executing jobs.
Valid Values: 60-65534
Default: 900
141
Parameter
Description
Retry Interval
(UNAVPOLTIM)
Server-to-Agent Port
Number
Port number in the agent computer through which data is received from the
server computer. The value assigned to this parameter must correspond to
the value assigned to the Server-to-Agent Port Number field in the
Configuration file on the corresponding agent computer.
Valid Values: 1024-65534
Default: 7006
Refresh Type: Recycle
142
Configuration parameters
The following table describes the parameters in the Control-M/Server configuration parameter file
(<controlm_owner>/ctm_server/data/config.dat on the server computer).
Parameter
Description
AGENTS_CLEANUP_IN
_NEWDAY
NOTE: You can speed up the New Day procedure by specifying N for this
parameter and running the ctmagcln utility. For more information, see Control-M
Utilities.
Default: Y
Refresh Type: Recycle
ALARM_DEST
EMControl-M/EM GUI
CONSOLEServer console
Default: EM
Refresh Type: Manual
143
Parameter
Description
CTM_ADJUST_COND_S For jobs in the SMART Folder, determines conditions of which unscheduled
COPE
predecessor jobs to ignore.
Valid values:
AJF Ignore predecessor jobs in the Active Jobs level. When selected, jobs
in the SMART Folder ignore conditions set by jobs in Active Jobs that are
not scheduled.
GROUP Ignore predecessor jobs in the group level. When selected, jobs
in the SMART Folder ignore conditions set by jobs in the SMART Folder that
are not scheduled. Default.
CTM_CONFIG_AGENT_ The Control-M/Server Configuration Agent issues the following message when
AGENT_UNAVAIL_THR the number of unavailable agents is equal to or greater than the threshold:
ESHOLD
Some of the Control-M/Agents are unavailable.
Valid values: 12^31
Default: 1
Refresh Type: Manual
144
Parameter
Description
CTM_CONFIG_AGENT_ Frequency, in hours, with which Control-M/Server will retrieve operating system,
GET_HOSTNAME_INTE platform, and Agent version information from Control-M/Agents and remote
hosts so that the updated information is available to the end user from the CCM.
RVAL
Default: 24 (hours)
CTM_CONFIG_AGENT_ For Control-M/Agents and remote hosts for which Control-M/Server has not
INITIAL_GET_HOSTNA previously identified the operating system and Agent version, the frequency, in
ME_INTERVAL
minutes, with which Control-M/Server will try to retrieve that information so that
it is available to the end user via CCM.
Default: 5 (minutes)
CTM_CONFIG_AGENT_ Determines the mode of the Control-M/Server Configuration Agent.
MODE
Valid values:
1 (READ_MODE): Only life check and information requests are honored, any
modifying request is rejected.
Default: 2
Refresh Type: Recycle
145
Parameter
Description
0All components.
2Event manager.
3Database layer.
Default: 1
How / where to set: In the Control-M Main Menu,
choose Troubleshooting => Set Diagnostics Level.
Refresh Type: Automatic
CTM_CONFIG_AGENT_ The Control-M/Server Configuration Agent listening port number.
PORT_NUMBER
Valid values: 102532767
Default: 2369
How / where to set: In the Control-M Main Menu, choose Parameter
Customization => Basic Communication and Operational
Parameters => Configuration agent Port.
Refresh Type: Recycle
CTM_DB_TIMEOUT
146
Parameter
Description
CTM_GD_FORWARD
Indicates if job with a time zone specified should be ordered according to the
current Odate, or tomorrows Odate.
Valid values:
Y During the New Day Procedure, jobs with a specified time zone are
ordered only if they are scheduled for tomorrows Odate.
N During the New Day Procedure, jobs with a specified time zone are
ordered only if they are scheduled for the current Odate.
Default: Y
Refresh Type: Recycle
CTM_GROUP_RECHEC
K
Ygroup conditions are checked for each job in the group (in addition to
conditions specified for the job).
NOTE: If N is specified for this parameter, groups are activated when the
necessary conditions exist, and remain active regardless of whether or not any
of those conditions are deleted.
Default: N
Refresh Type: Manual
147
Parameter
Description
CTM_MULTIP_LIB_REP Indicates if AutoEdit variable %%MEMLIB overrides the MEMLIB value for all
LACE
jobs in a folder with a command such as:
ctmorder -schedtab test2...-jobname "*" -autoedit %%MEMLIB d:/testdir
If you use the same command for a specific jobname, this parameter is ignored.
Valid values: Y, N
Default: N
Refresh Type: Manual
CTM_SLP_SUSPEND
CTM_SNMP_SEND_FO
RMAT
Indicates whether Single (S) or Multiple (M) variable format is used for SNMP
traps. For more information, see the description of the ctm2snmp utility
in Control-M Utilities.
Valid values: S, M
Default: S
Refresh Type: Automatic
148
Parameter
Description
CTM_SUS_UTILS_SLP
After all processes are suspended, the CD process waits the specified number of
seconds before initiating a download or the New Day procedure.
CTM_FOLDER_ADJUST
_DUMMY
YA dummy job waits for the prerequisite conditions expected by the job it
is replacing, and performs the post processing of the job. When a SMART
Folder is ordered, jobs in the folder that should not be ordered at this time
are ordered as DUMMY jobs. This functionality is useful for data centers that
require identical job flow regardless of whether certain jobs in a folder are
ordered for a specific instance of the folder.
NOut conditions of the jobs that were not ordered are ignored by the
ordered jobs in the SMART Folder.
Parameters
Default: N
Refresh Type: Manual
149
Parameter
Description
CTM_FOLDER_RECHEC Indicates if SMART Folder or Sub-folder conditions should be checked for each
K
job in a SMART Folder or Sub-folder after the SMART Folder or Sub-folder
conditions have been satisfied.
Valid values:
Y SMART Folder or Sub-folder conditions are checked for each job in the
folder (in addition to conditions specified for the job).
CTM_TIMEZONE_DISP
LAY
N the Next Run time of a job is in local computer time, not adjusted to
time zone.
Y the Next Run time of a job is adjusted to the correct time zone.
Default: N
Refresh Type: Manual
CTM_WD_ENABLE
{YES, NO}
[UNIX only] When CTM_WD_ENABLE is set to YES, the utility init_prflag creates
a prflag file for the WD process.
Valid values: YES, NO
Default: YES
How / where to set:
Refresh Type:
150
Parameter
Description
CTM_WRITE_CONSOLE If this parameter is set, critical alerts are sent to the console of the server in
addition to being sent as Shout messages to Control-M/EM.
Valid values: YES, NO
Default: NO
Refresh Type: Recycle
CTMLOG_DEL_CHK
When set to Y, the use of the ctmlog utility for delete operation to Control-M is
restricted. Administrator only.
Valid values: Y, N
Default: N
Refresh Type: Automatic
CTMORDER_FORCE
The default action of the utility is to order, not force, jobs in Active Jobs. This
action can be modified by adding keyword Force to the command that invokes
the utility. To change the default to force, set this parameter to Y.
Valid values: Y, N
Default: N
Refresh Type: Automatic
CYCLIC_MAXWAIT
Indicates when cyclic jobs, that have previously executed at least once, are
removed from Active Jobs by the New Day procedure.
Valid values:
KEEP each job is removed when MAXWAIT days have passed regardless
of whether it ended OK.
NOT_KEEP each job (non-cyclic and cyclic) is removed from Active Jobs
at the next run of the New Day procedure. Cyclic jobs are not removed if
they are executing when the New Day procedure begins. Instead, they are
removed at the run of the following New Day procedure.
Default: KEEP
Refresh Type: Recycle
151
Parameter
Description
CYCLIC_RERUN
If a cyclic job ends NOTOK and this parameter is set to OK, the cyclic job will
be rerun. If set to NOTOK, the job will not be rerun.
Valid values: OK, NOTOK
Default: OK
Refresh Type: Manual
DO_NOT_COPY_LOG_T This parameter improves the performance of initialize mirroring. When set
O_MIRROR
to YES, the Control-M/Server log is truncated on the secondary database when
mirroring is initialized. When restoring from the mirror, the log is truncated in
the primary database. Control-M/Server log is not copied during initializing or
restoring from mirroring.
Valid values: YES, NO
Default: NO
Refresh Type: Automatic
NEW_DAY_JOB_MSG
2 Carried job messages only. Insert a message upon every job that is
carried on to the next day. Since fewer jobs are carried on, fewer records
will be inserted into the IOALOG.
Default: Y
This parameter needs to be in .cshrc file.
152
Parameter
Description
NOT_ORDERED_JOB_A Type of Alert message to send to Control-M/EM when a job is not ordered due
LERT
to scheduling criteria.
Valid values:
0 One General Alert per User Daily: ONE OR MORE JOBS IN DAILY
<daily_name> WERE NOT ORDERED
Default: 0
Refresh Type: Recycle
OUTPUT_HANDLING_S Indicates how the OUTPUT for a job will be handled. Valid values are:
EVERITY
None (default)
OUTPUT_LIMIT_SIZE
Regular
Urgent
Very Urgent
Maximum OUTPUT size that can be viewed by the output command from
Control-M/Server and Control-M/EM. The value is set in Kilobytes.
If a OUTPUT file exceeds the value specified by the OUTPUT_LIMIT_SIZE
configuration parameter, it cannot be viewed from Control-M/Server or
Control-M/EM, and the following message is displayed:
OUTPUT FILE EXCEEDED LIMIT SIZE (CAN BE VIEWED FROM FILE SYSTEM)
Valid values: 02^31
Default: 0 (unlimited)
Refresh Type: Manual
153
Parameter
Description
OUTPUT_WINDOW_SI
ZE
RUNINF_CUTOFF_NUM Affects the statistics cleanup algorithm that is performed during New Day when
BER
the RUNINF_PURGE_MODE is set to 0 (default). If the number of records to be
deleted from the table is less than the value of this parameter, then records are
deleted directly from the statistics table. Otherwise a temporary table is used to
delete the records.
Valid values: 0 - 65K
Default: 2000
Refresh Type: Recycle
RUNINF_CUTOFF_RATI Affects the statistics cleanup algorithm that is performed during New Day when
O
the RUNINF_PURGE_MODE is set to 0. If the ratio between the number of
records to be deleted and the number of records in the table is less than the
value of this parameter, then records are deleted directly from the statistics
table. Otherwise a temporary table is used to delete the records.
Valid values: decimal fraction between 01
Default: 0.33
Refresh Type: Recycle
154
Parameter
Description
RUNINF_PURGE_LIMI
T
RUNINF_PURGE_MOD
E
Valid values: 0, 1
0 Performs -PURGE cleanup. Statistics records per job are kept according to
the specified Statistics Mode (either MEMNAME or JOBNAME). Default: 20
records of each MEMNAME or JOBNAME are kept.
If the RUNINF_PURGE_LIMIT in the config.dat is specified, the number of
records that are kept is determined by this parameter.
1 Performs -DELETE cleanup. Only the amount of days that are specified are
kept. Default: The number of days kept is specified by the How Many Days to
Retain ioalog parameter.
If the RUNINF_PURGE_LIMIT in the config.dat is specified, the number of days
that are kept is determined by this parameter.
Default: 0
Refresh Type: Recycle
SCHED_NON_EXIST_D
AY
When DAYS is >n, or <n, should we order the job on the next (>n), or previous
(<n) working day, if n is a non-existing day for the specific month? If the
parameter is set to Y, then we should order the job.
Valid values: N, Y
Default: N
Refresh Type: Manual
155
Parameter
Description
STATISALG
Default: MEMNAME
Refresh Type: Recycle
STATISTICS_CLEANUP
_IN_NEWDAY
Specifies whether the statistics cleanup action is executed during the New Day
procedure.
Valid values:
NThe statistics cleanup action is not executed during New Day procedure.
Note: You can speed up the New Day procedure by specifying N for this
parameter and running ctmruninf -PURGE.
Default: Y
Refresh Type: Recycle
STATS_TIME
For statistics calculation, indicates how the START TIME and END TIME for a job
should be set.
Valid values:
AGENT START TIME and END TIME are set using information received
from the Control-M/Agent.
Default: SERVER
Refresh Type: Manual
156
Parameter
Description
STOP_SUBMISSION_B
EFORE_NEWDAY
UDLY_PARTCOPY_ERR Error code returned by ctmudly utility if one or more jobs in a folder are not
ordered by a User Daily job (due to scheduling criteria or security settings).
Valid values:
0 User Daily job ends with an exit code of 0 even if not all jobs are
ordered.
1 User Daily job ends with an exit code of 14 if not all jobs are ordered.
Default: 0
Refresh Type: Automatic
UTILITIES_DB_TIMEO
UT
{300 14400}
Timeout value (in seconds) for long database transactions performed by
utilities. Currently this parameter is implemented for the ctmldnrs utility.
Default: 300
VARIABLE_INC_SEC
Indicates which variables are sent to the agent for each submitted job.
Valid values:
SYSTEMAll the variables for each submitted job are sent to the agent.
These include System, Global, Group, and Local variables.
GLOBALGlobal, Group, and Local variables are sent to the agent for each
submitted job. System variables are not sent.
GROUPGroup and Local variables are sent to the agent for each
submitted job. System and Global variables are not sent.
Default: LOCAL
Refresh Type: Manual
157
Parameter
Description
WHEN_JOB_HAS_NO_
PREV
Determines how to notify the user when a condition contains PREV that can't be
calculated and is calculated as ODAT -1:
Valid values:
Default: WARN_AND_CONFIRM
158
Description
CD_MAX_DBU
CTM_ADJUST_COND_S For jobs in the SMART Folder, determines conditions of which unscheduled
COPE
predecessor jobs to ignore.
Valid values:
AJF Ignore predecessor jobs in the Active Jobs level. When selected, jobs
in the SMART Folder ignore conditions set by jobs in Active Jobs that are
not scheduled.
GROUP Ignore predecessor jobs in the group level. When selected, jobs
in the SMART Folder ignore conditions set by jobs in the SMART Folder that
are not scheduled. Default.
159
Parameter
Description
CTM_GD_FORWARD
Indicates if job with a time zone specified should be ordered according to the
current Odate, or tomorrows Odate.
Valid values:
Y During the New Day Procedure, jobs with a specified time zone are
ordered only if they are scheduled for tomorrows Odate.
N During the New Day Procedure, jobs with a specified time zone are
ordered only if they are scheduled for the current Odate.
Default: Y
Refresh Type: Recycle
CTM_MULTIP_LIB_REP Indicates if AutoEdit variable %%MEMLIB overrides the MEMLIB value for all
LACE
jobs in a folder with a command such as:
ctmorder -schedtab test2...-jobname "*" -autoedit %%MEMLIB d:/testdir
If you use the same command for a specific jobname, this parameter is ignored.
Valid values: Y, N
Default: N
Refresh Type: Manual
160
Parameter
Description
CTM_FOLDER_ADJUST
_DUMMY
YA dummy job waits for the prerequisite conditions expected by the job it
is replacing, and performs the post processing of the job. When a SMART
Folder is ordered, jobs in the folder that should not be ordered at this time
are ordered as DUMMY jobs. This functionality is useful for data centers that
require identical job flow regardless of whether certain jobs in a folder are
ordered for a specific instance of the folder.
NOut conditions of the jobs that were not ordered are ignored by the
ordered jobs in the SMART Folder.
Parameters
Default: N
Refresh Type: Manual
CTM_FOLDER_RECHEC Indicates if SMART Folder or Sub-folder conditions should be checked for each
K
job in a SMART Folder or Sub-folder after the SMART Folder or Sub-folder
conditions have been satisfied.
Valid values:
Y SMART Folder or Sub-folder conditions are checked for each job in the
folder (in addition to conditions specified for the job).
161
Parameter
Description
CTMORDER_FORCE
The default action of the utility is to order, not force, jobs in Active Jobs. This
action can be modified by adding keyword Force to the command that invokes
the utility. To change the default to force, set this parameter to Y.
Valid values: Y, N
Default: N
Refresh Type: Automatic
CYCLIC_MAXWAIT
Indicates when cyclic jobs, that have previously executed at least once, are
removed from Active Jobs by the New Day procedure.
Valid values:
KEEP each job is removed when MAXWAIT days have passed regardless
of whether it ended OK.
NOT_KEEP each job (non-cyclic and cyclic) is removed from Active Jobs
at the next run of the New Day procedure. Cyclic jobs are not removed if
they are executing when the New Day procedure begins. Instead, they are
removed at the run of the following New Day procedure.
Default: KEEP
Refresh Type: Recycle
CYCLIC_RERUN
If a cyclic job ends NOTOK and this parameter is set to OK, the cyclic job will
be rerun. If set to NOTOK, the job will not be rerun.
Valid values: OK, NOTOK
Default: OK
Refresh Type: Manual
Default: Y
162
Parameter
Description
NOT_ORDERED_JOB_A Type of Alert message to send to Control-M/EM when a job is not ordered due
LERT
to scheduling criteria.
Valid values:
0 One General Alert per User Daily: ONE OR MORE JOBS IN DAILY
<daily_name> WERE NOT ORDERED
Default: 0
Refresh Type: Recycle
SCHED_NON_EXIST_D
AY
When DAYS is >n, or <n, should we order the job on the next (>n), or previous
(<n) working day, if n is a non-existing day for the specific month? If the
parameter is set to Y, then we should order the job.
Valid values: N, Y
Default: N
Refresh Type: Manual
UDLY_PARTCOPY_ERR Error code returned by ctmudly utility if one or more jobs in a folder are not
ordered by a User Daily job (due to scheduling criteria or security settings).
Valid values:
0 User Daily job ends with an exit code of 0 even if not all jobs are
ordered.
1 User Daily job ends with an exit code of 14 if not all jobs are ordered.
Default: 0
Refresh Type: Automatic
163
Parameter
Description
VARIABLE_INC_SEC
Indicates which variables are sent to the agent for each submitted job.
Valid values:
SYSTEMAll the variables for each submitted job are sent to the agent.
These include System, Global, Group, and Local variables.
GLOBALGlobal, Group, and Local variables are sent to the agent for each
submitted job. System variables are not sent.
GROUPGroup and Local variables are sent to the agent for each
submitted job. System and Global variables are not sent.
Default: LOCAL
Refresh Type: Manual
Database parameters
Database configuration parameters are specified during installation, before the Control-M/Server database
is created. You can subsequently change these parameters and rebuild the Control-M/Server database by
using the Database Menu menu for PostgreSQL, MSSQL, and Oracle.
UNIX: System paths or raw partitions for the data and log files must be unique (MSSQL and PostgreSQL).
You must create this location prior to installing the Control-M/Server mirror database and the location
must be empty.
The following lists configuration parameters for the following databases:
164
Oracle parameters
The following table lists the Control-M/Server database parameters for the Oracle environment.
Parameter
Description
Control-M Database
Instance name
Defines the name of the Oracle SQL server (1 to 8 characters, alphabetic plus "_")
Control-M INDEX
tablespace file location
Defines the full path name to the Control-M INDEX tablespace file
Control-M INDEX
tablespace size
Default: ctrlm
Default: /<controlm_home_dir>/oracle/oradata/ctrlm/indx01.dbf
Defines the size of the Control-M INDEX tablespace file
Default: 50 MB
Control-M Listener port Defines the TCP/IP port for communication between Control-M and Oracle SQL
number
Server. The port must be dedicated to this purpose. Choose a number in the range
1024 to 65534 inclusive.
Default: 1521
Refresh Type: Recycle
Control-M RBS
(Rollback Segment)
tablespace file location
Defines the full path name to the Control-M RBS tablespace file
Control-M RBS
tablespace size
Control-M SYSTEM
tablespace file location
Default: /<controlm_home_dir>/oracle/oradata/
ctrlm/rbs01.dbf
Default: 50 MB
Defines the full path name to the Control-M SYSTEM tablespace file
Default: /<controlm_home_dir>/oracle/oradata/
ctrlm system01.dbf
Control-M SYSTEM
tablespace size
Control-M TEMP
tablespace file location
Defines the full path name to the Control-M TEMP tablespace file
Control-M TEMP
tablespace size
Defines the full path name of the first database log file
Default: 50 MB
Default: /<controlm_home_dir>/oracle/oradata/ctrlm/temp01.dbf
Default: 100 MB
Default: /<controlm_home_dir>/oracle/oradata/ctrlm/log01.dbf
165
Parameter
Description
Defines the full path name of the second database log file
Default: /<controlm_home_dir>/oracle/oradata/ctrlm/log02.dbf
Name of the
Tablespace data file
Defines the name of CDROM device containing the Oracle installation CDROM.
Default: /<controlm_home_dir>/oracle/oradata/ctrlmdata.dbf
Default: /<controlm_home_dir>/oracle
Oracle Server Host
name
Size of Control-M
database log files
Defines the size of each database log file. There are two files of equal size.
Tablespace size
Default: 20 MB
Defines the total size of the Control-M/Server database
Default: 250 MB
Tablespace User
User Password
166
MSSQL parameters
The following table lists Control-M/Server database parameters for the MSSQL environment.
Parameter
Description
Defines the host name of the machine where the SQL Server resides. If you
install the dedicated SQL Server, the value is the current machine. For a silent
installation the value of this parameter is blank, and the installation procedure
uses the name of the current machine.
Control-M/Server Database
Name
Defines the name for the Control-M/Server database, which must be unique.
If you use unique values for owner name, database name, and device
assignments, a new database is built on the server. By using an existing
owner name, database name, and device assignment, you delete and recreate
the database elements. Any filenames you specify for a file-based installation
must not exist on the mirror database server.
Every computer type uses a different character set for the server. If the
character set for the primary database and mirror database are not the same,
the character set for the primary database must be installed on the mirror
Server.
Default: ctrlm
Control-M/Server Database
Owner
167
Parameter
Description
Control-M/Server Database
Owner (DBO) Password
Defines the amount of space (MB) allocated for the data portion of the
Control-M/Server database.
Default: 75 (MB)
Defines the full path name where the Control-M/Server database log is
located.
Default: c:\<sql_dir>\data\ctrlm_log
168
PostgreSQL parameters
The following table lists the Control-M/Server database parameters for the PostgreSQL environment.
Parameter
Description
Defines the host name of the machine where the PostgreSQL Server resides.
If you install the dedicated PostgreSQL Server, the value is the current
machine. For a silent installation, the value of this parameter is blank, and the
installation procedure uses the name of the current machine.
Port Number
Defines the TCP/IP port for communication between Control-M/Server and the
PostgreSQL Server. If this port number is already used by an existing
application, choose another value, in the range 1024 to 65534 inclusive.
Default: 5432
Refresh Type: Recycle
Database Administrator
(postgres) Password
Defines the password for the database administrator (user postgres). The
characters you enter do not echo for security reasons. Control-M/Server
utilities uses the password to access restricted sections of the
Control-M/Server database.
NOTE: The single apostrophe symbol (" ") is not permitted for PostgreSQL.
Control-M/Server Database
Name
Control-M/Server Database
Owner
Defines the database name for the Control-M/Server database owner. The
installation script creates this user in the database. Control-M/Server uses this
when accessing its database.
If you use unique values for owner name, database name, and device
assignments, a new database is built on the server. By using an existing
owner name, database name, and device assignment, you delete and recreate
the database elements. Any filenames you specify for a file-based installation
must not exist on the mirror database server.
Every computer type uses a different character set for the server. If the
character set for the primary database and mirror database are not the same,
the character set for the primary database must be installed on the mirror
Server.
169
Parameter
Description
Control-M/Server Database
Owner (DBO) Password
Defines the password for the Control-M/Server database owner. This name
must be unique, and must contain up to 30 alphanumeric lowercase
characters (including the underscore character). The characters you enter do
not echo for security reasons. Control-M/Server processes and utilities use the
password to access the Control-M/Server database.
NOTE: The single apostrophe symbol (" ") is not permitted for PostgreSQL.
Database Scalability
Small
Medium
Large
Defines the full path name of the location where the PostgreSQL database
server resides: <Control-M/Server path>/pgsql.
NOTE: Only for PostgreSQL database server on Windows.
Defines the full path name of the location in which the Control-M/Server
database should be installed: $PGHOME
You must create this location prior to installing the Control-M/Server database.
NOTE: Only for PostgreSQL database server on UNIX.
Mirroring parameters
Parameters for database mirroring are specified when mirroring is initialized, either during
Control-M/Server installation or subsequently. You can subsequently change these parameters by using
the Database Mirroring menu.
The following lists configuration parameters for the following databases:
170
Description
DBO password
Control-M Mirror tablespace Defines the name of a defined tablespace on the database server that
name
the mirror database uses. The name must be unique.
Default: ctrlm
NOTE: Name starts with a letter followed by 1-24 alphanumeric
characters.
171
Parameter
Description
Database Administrator
Password
Force (default: Y)
172
Description
Specifies a name for the mirror Database Server. The host name must have a
vaild IP address.
Mirror Control-M/Server
Database
Control-M/Server Mirror
DBO Username
Control-M/Server Mirror
DBO Password
(Building only) Specifies the full file path to the Mirror Data Device. The
location of the Mirror Data Device must be on the Secondary database and
the full path must be valid.
(Building only) Specifies the full file path to the Mirror Log Device, which
creates the Mirror Log Device on the Secondary database.
Mirror database
Administrator password
Force (default: Y)
Y,N
Defines the database data size in MB created in the database server. The
data size must have a numeric value.
Defines the user database log size in MB created in the database server. The
log size must have a numeric value.
Encoding (default:
LATIN1)
LATIN1, CJK
173
Performance parameters
The following table describes the performance parameters.
Parameter
Description
WARN_SLOW_FAILED_
CONNECT_MILLIS
174
Description
ADD_OUTPUT_TO_EMAIL
Default: N
Refresh Type: Manual
ADD_OUTPUT_TO_EMAIL_ Determines the maximum size of the attachment OUTPUT file in kilobytes.
LIMIT_SIZE
You can specify the value 0 for unlimited size.
NOTE: If the OUTPUT file is larger than the specified maximum size, the
OUTPUT will not be attached to the e-mail message.
Valid values: 02^31
Default: 5120KB (5MB)
Refresh Type: Manual
ADD_OUTPUT_TO_EMAIL_ When sending a mail requestwith a OUTPUT file attachedto the SMTP
TIMEOUT_LIMIT
server, determines the maximum time to wait.
Valid values: 1300 (seconds)
Default: 30 (seconds)
Refresh Type: Manual
MAIL_ADD_SUBJECT_PRE
FIX
175
Parameter
Description
MAIL_TIMEOUT
Determines the maximum time to send the mail request to the SMTP server
when no OUTPUT is attached.
Valid values: 130 (seconds)
Default: 5 (seconds)
Refresh Type: Manual
SMTP_SERVER_NAME
SMTP_SENDER_EMAIL
SMTP_PORT_NUMBER
176
Parameter
Description
SMTP_SENDER_FRIENDLY Specifies the regular text name used to identify the sender.
_NAME
Valid values: 0 - 99 characters
Default: Control-M/Server (During installation, this is overridden by a
null value.)
How / where to set: In the Control-M Main Menu, choose Parameter
Customization => Simple Mail Transfer Protocol Parameters =>
Sender Friendly Name.
Refresh Type: Automatic
SMTP_REPLY_TO_EMAIL
177
Description
CTM_PRM_ENABLE_U Indicates whether Control-M user exits and Watchdog process exits are enabled.
E
Valid values: Y, N
Default: Y
Refresh Type: Recycle
CTM_PRM_SCRIPT_U
Exxx (101106)
Name of the UExxx user exit script. These scripts must reside in
the ~<controlm_owner>/ctm_server/ue_exit directory.
Valid values: 1024 characters
Default:
Refresh Type:
178
Parameter
Description
CTM_PRM_TIMEOUT_ Time to wait for a user exit script to run before it is terminated.
UExxx (101106)
For UNIX: Time is measured in units of seconds
For Windows: Time is measured in units of milliseconds
Valid values: 202^31
Default: 20
Refresh Type:
179
Description
WD_ALIVE_MSG
WD_CTMEXIT_NUMB
ER
WD_CTO_TIMEOUT
WD_ERROR_HANDLE
R_SCRIPT_FILE
Full path name of a user defined script called by the Watchdog process as an
error handler. The error messages are included as arguments to the script.
Valid values: 1024 characters
Default: "" (In the shipped config.dat, the default is overridden
by ./scripts/UE_handler.)
Refresh Type: Recycle
180
Parameter
Description
WD_ERROR_HANDLE
S_TIMEOUT
Maximum time for the Watchdog facility to wait for the user-defined script to run.
Valid values: 52^31
Default: 5 (In the shipped config.dat, this is overridden by the value 10.)
Refresh Type: Recycle
Basic time unit interval, in minutes. When the value in either the
WD_CTMEXIT_#_INTERVAL parameter or the WD_USEREXIT_#_INTERVAL
parameter is multiplied by the value in this parameter, the resulting value is the
number of minutes that must pass before reinvoking the exit script.
For example, if the value of this parameter is 6 (minutes), and the value of the
WD_CTMEXIT_1_INTERVAL parameter is 20, the script for system exit 1 will run
once every 120 minutes (20 x 6 minutes).
Valid values: 12^31
Default: 5 (In the shipped config.dat, this is overridden by the value 6.)
Refresh Type: Recycle
WD_USEREXIT_NUM
BER
181
Description
WD_CTMEXIT_#_CMD_L Contains parameters to be passed to the exit script. Arguments must start
INE
with a - sign. Values separated by either a space or a - sign must be
enclosed in double quotation. Mandatory.
Valid values: 1024 characters
Default: ""
In the shipped config.dat on UNIX, the default values are overridden as
follows:
wd_ctmexit_2: -LIMIT 90
WD_CTMEXIT_#_ERROR Error message string to be passed to the error handler(s) if the utility returns
_MSG
a "failed" status. Optional.
Valid values: 1024 characters
Default: "" (In the shipped config.dat, for wd_ctmexit_1 and
wd_ctmexit_2, the default is overridden by "Low on database space.")
Refresh Type: Recycle
182
Parameter
Description
WD_CTMEXIT_#_INTER
VAL
Number of basic time interval units that should pass before reinvoking the
exit script. The basic time interval unit is defined in parameter
WD_INTERVAL.
For example, if the value of this parameter is 20, and the basic time interval
unit (as defined in parameter WD_INTERVAL) is 5 minutes, the exit script will
be invoked every 100 minutes (20 x 5 minutes).
Valid values: 12^31
Default: 5 (In the shipped config.dat, this is overridden by the value 20.)
Refresh Type: Recycle
WD_CTMEXIT_#_RUN_S Specify whether (Y) or not (N) to run the utility when Control-M/Server is
TATE
running. A Y must be specified for either this parameter or for parameter
WD_CTMEXIT_#_SUSPEND _STATE for the utility to be run.
Valid values: Y, N
Default: N (In the shipped config.dat, this is overridden by the value Y.)
Refresh Type: Recycle
Specify whether (Y) or not (N) to run the utility in Suspend mode (that is,
during New Day procedure or download, when the database inaccessible). A
Y must be specified for either this parameter or for parameter
WD_CTMEXIT_#_RUN _STATE for the utility to be run.
Valid values: Y, N
Default: N
Refresh Type: Recycle
183
Parameter
Description
WD_CTMEXIT_#_TIMEO
UT
184
Description
WD_USEREXIT_#_CMD_ Contains parameters to be passed to the exit script. Arguments must start
LINE
with a - sign. Values separated by either a space or a - sign must be
enclosed in double quotation. Mandatory.
Valid values: 1024 characters
Default: ""
Refresh Type: Recycle
WD_USEREXIT_#_ERRO Error message string to be passed to the error handler(s) if the check returns
R_MSG
a "failed" status. Optional.
Valid values: 1024 characters
Default: ""
Refresh Type: Recycle
WD_USEREXIT_#_INTE
RVAL
Number of basic time interval units that should pass before reinvoking the exit
script. The basic time interval unit is defined in parameter WD_INTERVAL.
For example, if the value of this parameter is 2, and the basic time interval
unit (as defined in parameter WD_INTERVAL) is 5 minutes, the exit script will
be invoked every 10 minutes (2 x 5 minutes).
Valid values: 12^31
Default: 5
Refresh Type: Recycle
185
Parameter
Description
WD_USEREXIT_#_RUN_ Specify whether (Y) or not (N) to run the utility when Control-M/Server is
STATE
running. A Y must be specified for either this parameter or for parameter
WD_USEREXIT_#_SUSPEND _STATE for the utility to be run.
Valid values: Y, N
Default: N
Refresh Type: Recycle
WD_USEREXIT_#_SCRI
PT_FILE
WD_USEREXIT_#_SUSP Specify whether (Y) or not (N) to run the script in Suspend mode (that is,
END_STATE
during New Day procedure or download, when the database inaccessible).
This parameter or WD_CTMEXIT_#_RUN _STATE must be set to Y for the
script to be run.
Valid values: Y, N
Default: N
Refresh Type: Recycle
186
Control-M/Agent parameters
In the CCM, you can change the default component system parameter values of Control-M/Agent system
parameters without having to access each individual computer.
Before a modified parameter value can take effect, the component that uses the value needs to be
refreshed.
To define Control-M/Server parameters, see Defining Control-M/Agent system parameters (on page 187).
Category
Name
Description
Value
Default Value
187
Description
ATCMNDATA
Port number specifies the Server computer port that receives data
from the agent computer. Verify that this port is not used for any
other purpose. This value must match the Agent-to-Server Port
Number in Control-M/Server. The Timeout value is
the COMTIMOUT communication job-tracking timeout in seconds.
Mandatory. Example: 7005/30. Note: Increasing the Timeout
value reduces agent performance.
Valid values: Between 1024 and 65533 inclusive
Default: 7005
CTMPERMHOSTS
(Authorized Control-M/Server
Hosts)
CTMS_ADDR_MODE
{IP}
AG_LOG_ON
Valid values: Y, N
Default: Y
188
Parameter
Description
LOGKEEPDAYS
I18N
LISTEN_INTERFACE
(Listen to Network Interface)
LOCALE
(Locale (LATIN-1 mode only))
CTMSHOST
(Primary Control-M/Server
Host)
(UNIX only) Determines the locale under which the agent processes
run. Valid only when the agent is working in Latin-1 mode.
Supported locales are specified in.
Control-M/Server host name. Name of the primary host running
Control-M/Server.
PROTOCOL_VERSION
(Protocol version)
UMASK_MODE
(set the umask of the job
process)
Controls the umask of the job process. This parameter affects all
the jobs the agent runs. If used, it overrides any value specified in
the job owner .cshrc or .profile files.
Valid values: Unused, 000, 002, 003, 007, 022, 023, 027, 033,
037, 077
Default: 022
TCP_IP_TIMEOUT
(TCP/IP Timeout)
189
Parameter
Description
USE_JOB_VARIABLES
UTTIMEOUT
(Timeout for Agent utilities)
Maximum time (in seconds) the agent waits after sending a request
to Control-M/Server. This timeout interval should be longer than the
TCP/IP Timeout.
Valid values: 120 (recommended)
Default: 120
TRACKER_EVENT_PORT
(Tracker Event Port)
EVENT_TIMEOUT
AGCMNDATA
AGENT_OWNER
root
190
Parameter
Description
AGENT_STATUS
ALLOW_COMM_INIT
(Allow Comm Init)
Started
Stopped
Y: On
N: Off
Default: Y
AR_AG_COMM_PORT
AR_AT_COMM_PORT
AR_UT_COMM_PORT
CM_APPL_TYPE
191
Parameter
Description
CMLIST
COMM_TRACE
COMMON_EVENT
Default: Y
COMMOPT
COMMRETSLP
DBGLVL
192
Parameter
Description
LIMIT_LOG_FILE_SIZE
LIMIT_LOG_VERSIONS
(Number of log file versions)
LOGICAL_AGENT_NAME
(Logical Agent Name)
Logical name of the agent. The value specified should match the
name the agent is defined by in Control-M/Server. Where multiple
agent names are defined in Control-M/Server, and all use the same
server-to-agent port, server messages are sent to that agent.
The logical name is used when the agent initiates the
communication to Control-M/Server with the output from agent
utilities and in messages sent by the agent to the server.
Default: Agent host name
However, it can differ when either a cluster installation or the agent
host name has aliases.
MEASURE_USAGE_DAYS
193
Parameter
Description
MULTITRACK_MAX_PROC
MULTITRACK_SKIP_INTERVAL
MULTITRACK_JOBS_PER_WOR
KER
Determines the optimal ratio between the number of jobs and the
number of tracker-workers. In a normal situation, the tracker
spawns new tracker-workers if the number of jobs divided by the
number of running tracker-workers (actual ratio) is more than this
optimal ratio. It shuts down tracker-workers if the actual ratio is
less than the optimal ratio.
Valid values: 5-300
Default: 30
MULTITRACK_LATE_PERIOD
194
Parameter
Description
MULTITRACK_MAIN_EVENT_TI
MEOUT
OUTPUT_MODE
OUTPUT_MODE_AS_USER
Octal value indicating file access mode of the OUTPUT file for
non-root mode when the job owner is not the agent owner. 777
indicates the highest level of access.
Valid values: 660 664 666
Default: 660
Modifiable by ctmunixcfg: No
PERSISTENT_CONNECTION
PROTOCOL
RH_KEEPDAYS
Uses SSH connection pool for SFTP operations with remote hosts.
Valid values: Y, N
Default: Y
195
Parameter
Description
RJX_COPY_OUTPUT_REMOTE
RJX_DOWNLOAD_OUTPUT
RJX_POOL_CONNECTION_LIMI Specifies how many jobs can make use of a single connection. The
T
connections are monitored and unused ones (connections with
ended jobs) are released.
Valid values: 1 - 50. When set to 1, the Agent works as it does for
Control-M/Agent 6.4.01.
Default: 10
RJX_POOL_SLEEP_TIME
RJX_POOL_KEEP_UNUSED
WKL_CPU_SAMPLE_INTERVAL
(Interval between CPU samples
(sec))
196
Parameter
Description
UPLOAD_REMOTE_UTILS
Default: Disable
WKL_CPU_SAMPLE_NUM
WKL_HB_INTERVAL
(Interval between CPU usage
sync updates (min))
Default: 3 samples
Periodic Heart Beat interval in minutes, after which CPU usage is
reported to Control-M/Server, regardless of actual need to report it.
Valid values: 1-180 (minutes)
Default: 15 (minutes)
WKL_SLEEP_INTERVAL
(Interval between CPU monitor
operations (sec))
WMI_TCP_ONLY_PING
WMI_WAIT_TIME_OUT
197
Description
AD_GA_RETAIN_DAYS
AD_RETAIN_PACKAGES
0: Never remove
1-365
Default: 30
198
Description
APPLICATION_LOCALE
(CJK Encoding)
CM_TEMP_SCRIPTS_DIR
CTM_PARM_ENC
CTM_PRM_DONT_DELETE
(Temporary Scripts Saving)
199
Parameter
Description
CTM_PRM_KSH_FLAGS
Indicates the shell flag that will be used to run the job script.
CTM_PRM_SH_FLAGS
Indicates the shell flag that will be used to run the job script.
CTM_SU_PATH
OUTPUT_NAME
(Output Name)
{JOBNAME | MEMNAME}
If set to JOBNAME, parameter Jobname is used in the OUTPUT
file instead of parameter Memname.
Valid values: JOBNAME, MEMNAME
Default: MEMNAME
Modifiable by ctmunixcfg: Yes
PRINTER_NAME
(Default Printer)
PROCLOG_MODE
200
Parameter
Description
RJX_CONN_MODE
Valid values:
1 - The agent uses both SFTP and SSH protocols. Only one
connection is opened during job execution.
Default: 2
Modifiable by ctmunixcfg: No
RJX_CONN_TRY
(AgentLess Connection Retries)
RJX_CONN_TOUT
(Time Interval between Restore
Connections)
RJX_DETAILS_TO_OUTPUT
(Print Details to OUTPUT)
201
Parameter
Description
RJX_OVMS_DEFAULT_QUEUE
RJX_OVMS_SETVERIFY
(Save Commands in the OUTPUT
in OpenVMS Remote Host)
Default: Y
Modifiable by ctmunixcfg: No
RJX_OUTPUT_DIR
(AgentLess Temporary Directory) These files are automatically removed to Control-M/Agent when
the jobs end and the network connection is available or restored.
Default: period (.), which means that the files are stored in the
user home directory of the jobs owner in the remote host.
Modifiable by ctmunixcfg: No
SMTP_PORT_NUMBER
(Port Number)
202
Parameter
Description
SMTP_REPLY_TO_EMAIL
(Reply-To Email)
SMTP_SENDER_EMAIL
(Sender Email)
SMTP_SERVER_NAME
SSH_VER_CMD
TRANSLATE_$0
Valid values:
N - Functionality is disabled
203
Description
CHANGE_TO_USER_HOMEDIR
Default: N
Modifiable by ctmwincfg: Yes
APPLICATION_LOCALE
(CJK Encoding)
DFTPRT
(Default Printer)
Default printer for job OUTPUT files. Type a printer name in the
field box or select a name from the list box.
Valid values: Text
Default: Blank
Modifiable by ctmwincfg: Yes
DOMAIN_SERVER
204
Parameter
Description
DOMAIN
(Logon Domain)
NOTE: BMC recommends that you do not specify a value for Logon
Domain.
Valid values: Text
Default: Blank
Modifiable by ctmwincfg: Yes
ECHO_OUTPUT
Valid values:
Default: Y
Modifiable by ctmwincfg: Yes
JOB_STATISTIC
Valid values:
Default: Y
Modifiable by ctmwincfg: Yes
205
Parameter
Description
JOB_WAIT
Valid values:
N All procedures invoked by the job are run outside the job
object.
Y All procedures invoked by the job are run inside the job
object.
Default: Y
Modifiable by ctmwincfg: Yes
LOGON_AS_USER
(Logon As User)
Flag that specifies which user account is used for the services to log
on to.
Valid values:
OUTPUT_NAME
(Output Name)
Valid values:
Default: Memnam
Modifiable by ctmwincfg: Yes
206
Parameter
Description
RJX_CONN_MODE
Valid values:
1 - The agent uses both SFTP and SSH protocols. Only one
connection is opened during job execution.
Default: 2
Modifiable by ctmwincfg: No
RJX_CONN_TRY
(AgentLess Connection Retries)
RJX_CONN_TOUT
(Time Interval between Restore
Connections)
RJX_CONN_RECONNECT
RJX_CONN_SFTP
Default: Y
Modifiable by ctmwincfg: Yes
207
Parameter
Description
RJX_DETAILS_TO_OUTPUT
Valid values: Y, N
Default: Y
Modifiable by ctmwincfg: No
RJX_OVMS_DEFAULT_QUEUE
(Default Queue for OpenVMS
Remote Host)
RJX_OVMS_SETVERIFY
(Save Commands in the OUTPUT
in OpenVMS Remote Host)
Modifiable by ctmwincfg: No
208
Parameter
Description
RJX_SSH_DUAL_CONN
Default: Y
Modifiable by ctmwincfg: Yes
RJX_OUTPUT_DIR
RUN_USER_LOGON_SCRIPT
(Run user 'Logon Script')
Default: N
Modifiable by ctmwincfg: Yes
SMTP_PORT_NUMBER
(Port Number)
SMTP_REPLY_TO_EMAIL
(Reply-To Email)
209
Parameter
Description
SMTP_SENDER_EMAIL
(Sender Email)
SMTP_SERVER_NAME
SSH_VER_CMD
WRAP_PARAM_QUOTES
(Wrap parameters with double
quotes)
Default: 2
Modifiable by ctmwincfg: Yes
210
Description
Selected Statistics are added to the end of the OUTPUT file. Default.
CD to user 'Home Indication if CONTROL-M/Agent should change the directory to the user home
Dir'
directory as defined in the user profile before the user job runs.
Valid values:
Connect only
once to CM DLL
Flag that indicates whether CONTROL-M/Agent should maintain its connection to the
application between events. Values: Y, N. Default: N.
Default Printer
Default printer for job OUTPUT files. Type a printer name in the field box or select a
name from the list box. Default: Blank
Domain
Controller
Name of server managing access to resources and the database. Specify the name
of the server in the field box. Default: Blank
E-mail User
Password
Password for the e-mail user account. This parameter can only be changed after
completing the installation.
E-mail User
Account Profile
User e-mail account which the Agent uses to send e-mail. This parameter can only
be changed after completing the installation.
Job children
inside job object
Flag that specifies if procedures invoked by a job can be run outside the Job Object.
If so, this prevents a situation in which the original job remains in executing mode
until the invoked procedure completes.
Valid values:
N All procedures invoked by the job are run outside the job object.
Y All procedures invoked by the job are run inside the job object. Default.
211
Parameter
Description
Logon As User
Flag that specifies which user account is used for the services to log on to.
Valid values:
Logon Domain
Selected Jobs are submitted with the permissions and environment variables
of the specified user.
Not selected Jobs are submitted with the permissions and environment
variables of the local system account. Default.
Output Name
Flag that determines the prefix for the Output file name.
Valid values:
212
Parameter
Description
4 Parameters are passed to the operating system in exactly the same way
that they were specified in the job definition. No quotes are added or removed
in this case. This option is compatible with the way that parameters were
handled by version 2.24.0x.
213
Agent service
FileWatcher service
Parameter
Description
Log on as
Allow Service to Interact with Desktop This option is valid only if the
service is running as a local system account.
Selected the service provides a user interface on a desktop that can be used
by whoever is logged in when the service is started. Default.
Unselected the service does not provide a user interface.
This Account User account under which Control-M Agent service will run.
Startup Type
Default: Automatic
214
Type
Category
Name
Value
Default Value
Description
Refresh Type
215
The port settings are defined for the GUI, GSR, CMS, CLI , and Sweep, BIM, Forecast,and Self Service
are defined if they are installed.
timeZone (GMThh:mm) indicates the regular time zone value (for example, CET
(GMT+02:00) )
FROM and TO values indicate the time frame during which DST is in effect. (For example, FROM
01.03 01:59 TO 24.10 02:00)
The second GMT value indicates the DST time-offset relative to GMT (for
example,(GMT+03:00))
NOTE: This syntax is reversed for the southern hemisphere. The FROM and TO keywords specify the
start and end settings for daylight saving to take effect.
EXAMPLE: Bill needs to create a new time zone label for Japan, where the time is nine hours later
than Greenwich Mean Time (GMT). DST begins March 1 at 01:59 and ends October 24 at
02:00. Bill uses the following entry to create the new label (JST):
JST (GMT+09:00) FROM 01.03 01:59 TO 24.10 02:00 (GMT+10:00)
EXAMPLE: Although time zone definitions in the northern hemisphere are set to summer Daylight
Saving Time, definitions in the southern hemisphere are set to winter. In Sydney,
Australia, winter time (GMT+09:00) is from March 25 at 03:00 until October 1 at 02:00.
All other dates are GMT+10:00 (summer time). The time label for Sydney is defined as
follows:
SYD (GMT+10:00) FROM 25.03 03:00 TO 01.10. 02:00 (GMT+09:00)
If a relevant time zone contains several countries, some observe DST and some do not (or if they
change the clock on different days) add additional time zone definitions to cover the variations.
3. Update the relevant job processing definitions, using the appropriate variations.
216
NOTE: If you delete a time zone from TimeZone.dat or modify a three-character name in that file,
change any job processing definitions that specify that time zone. Otherwise, those job processing
definitions are invalid.
If the New Day procedure starts before you reset the clock, the New Day procedure will start working
before the clock is advanced, and will continue normally (even if the clock is advanced while the New
Day procedure is in process).
If the New Day procedure is scheduled to begin at exactly 02:00 A.M., the same considerations apply.
It is possible that the New Day procedure will start execution before the clock is manually changed.
Otherwise, changing the clock will initiate New Day processing.
If the New Day procedure is scheduled to begin between 02:00 A.M. and 03:00 A.M., after the
computer clock is advanced, Control-M will start the normal New Day processing.
If the New Day procedure is scheduled to begin after 03:00 A.M., no action is required. Control-M will
start the standard New Day procedure.
Shout messages that are scheduled before 02:00 A.M. do not require any action.
Shout messages that are scheduled between 02:00 A.M. and 03:00 A.M. will be issued, even though
there may not be a delay in production because the time frame for production is smaller.
The above information also applies to jobs that have Shout messages scheduled at a later time (for
example, 06:00 A.M.). These jobs might be considered late because of the tighter production time
frame.
Time-dependent schedules
FROM UNTIL: Jobs whose scheduled time overlaps the time gap created by the clock shift may need
manual intervention. For example, it is possible that a job with a FROM value of 02:15 A.M. and an
UNTIL value of 02:45 A.M. might not be submitted at all. These jobs should be manually adjusted.
Cyclic Jobs: The next run of cyclic jobs with an interval of more than one hour runs one hour sooner
than it was scheduled. Cyclic jobs with an interval of less than one hour run immediately. A cyclic job
may have to be deleted and then resubmitted to continue the processing cycle during the current
day.
Control-M/Server log file:The Control-M/Server log file will not contain entries with timestamps
between 02:00 A.M. and 03:00 A.M. Any scripts or programs that rely on log entry time should be
checked for possible discrepancies as a result of advancing the clock.
217
If the New Day procedure starts before 01:00 A.M., no special action should be taken. The New Day
procedure will run only once (between 00:00 and 00:59).
If the New Day procedure starts exactly at 01:00 A.M., computer time should not be turned back to
01:00 A.M. to avoid another New Day process. A second New Day procedure requires manual
intervention. It is advisable to wait until 02:01 A.M., for example, and turn the clock back to 01:01
A.M.
If the New Day procedure is scheduled to begin between 01:00 A.M. and 02:00 A.M., do one of the
following actions:
Wait at least a full hour after the daily run, and then turn the clock back as needed; the New Day
procedure will have ended.
EXAMPLE: If the New Day time is 01:45 A.M., the clock should be moved back one hour at no later
than 01:44 A.M. If the shift was not done by 01:44 A.M., the user should wait until 02:46
A.M. and then shift the time back.
If the New Day procedure is scheduled to begin after 02:00 A.M., no special action should be taken.
Time-dependent shout messages:Shout messages scheduled between 01:00 A.M. and 02:00 A.M.
might be issued twice.
Time-dependent schedules
FROM UNTIL: No special action should be taken for jobs with FROM-UNTIL or cyclic schedules. Jobs
scheduled to start between 01:00 A.M. and 02:00 A.M. will start at the first occurrence of the hour
(provided that other conditions, such as input conditions and resources are met). However, they can
be restarted after the clock is moved back.
Cyclic Jobs:The next run of cyclic jobs run one hour later than it was scheduled.
Control-M/Server log file:The Control-M/Server log file might contain entries with times earlier than
previous entries, due to the time shift. The same considerations that apply to advancing the clock
forward, should be applied to moving the clock backwards.
218
Control-M security
As part of the logging in process, Control-M components send user name and password information to
Control-M/Server components for authentication. You can define security permissions for every Control-M
component to ensure maximum security. For every Control-M component you can define the following:
Authorization security: Defines which users are allowed to view and which operations (including
data modification) that users can perform. At the Control-M/EM and Control-M/Server levels, you can
define security for individual users and for groups. For more information, see Control-M/Server
security (on page 219).
Authentication security: Defines run as user authentication for Control-M/Agent. For more
information, see Control-M/Agent security (on page 223).
Control-M/Server security
Control-M/Server security allows you to define authorizations for each user/group. You authorize which
user/group can run a certain a job and which actions (for example, forcing another job or running a
utility) a user/group are authorized to perform in the Control-M/Server account.
Control-M/Server authorization security applies to the Active jobs database.
Authorizations are used to perform security checks each time one of the following actions is attempted in
Control-M/Server:
Ordering a job
Running a command that affects jobs in the Active jobs database (Hold, Confirm, Rerun)
The following procedures describe how to create, edit, delete, and define permissions for a user/group:
219
Creating a user/group
This procedure describes how to create a user/group which enables you to define the Control-M/Server
users/groups.
Group: Type the name of the group the user belongs to.
4. Click OK.
The user/group is created.
Editing a user/group
This procedure describes how to edit a Control-M/Server user/group which enables you to change the
user/group properties.
To edit a user/group:
1. From the Components Tree pane, right-click the Control-M Server: <name of server> and
select Security > Control-M Server.
The Control-M/Server Security window appears.
2. From the User/Group Names list, select the user/group to edit.
3. Click
220
Deleting a user/group
This procedure describes how to delete a Control-M/Server user/group.
To delete a user/group:
1. From the Components Tree pane, right-click the Control-M Server: <name of server> and
select Security > Control-M Server.
The Control-M/Server Security window appears.
2. From the User/Group Names list, select the user/group to delete.
3. Click
User/group authorizations
In Control-M you can define permissions for Control-M/Server users and groups, which enables you to
limit the entities that a user is authorized to view or change. For example, a user can be authorized to
read a folder but not update a folder. Many operations require permissions in Control-M/Server. For
example, to hold a job, the user must be authorized in Control-M/Server to hold jobs for the job run as
user. You can define the following permissions:
Users are granted permissions based on their associated group. You can add additional authorizations,
which supersede the authorizations defined for that user in the group.
221
c. For each folder action, select one of the following to define the authorizations. For more
information, see Monitoring.
o
Yes
No
Default
If you select Default for a user, the authorizations are inherited from the group the user belongs
to. If the user does not belong to a group, the action is not authorized.
4. Click Apply.
The folder authorizations for the user/group are defined.
Yes
No
Default
If you select Default for a user, the authorizations are inherited from the group the user belongs
to. If the user does not belong to a group, the action is not authorized.
4. Click Apply.
The Active Jobs authorizations are defined for the user/group.
222
Yes
No
Default
If you select Default for a user, the authorizations are inherited from the group the user belongs to.
If the user does not belong to a group, the action is not authorized.
5. Click Apply.
The authorizations for Control-M entities are defined for the user/group.
Control-M/Agent security
Some of the jobs run by Control-M on a Control-M/Agent require job run as user authentications or SSH
key definitions. The security method is determined by whether the job runs on an agent or if the job is
executed from a remote host. SSH key authentication is only available for job run as users of remote host
jobs using the SSH communication protocol.
The following job types require job owner's authentication settings:
The following procedures describe how to define, edit, and delete run as user authentication settings:
Select Use Key Authentication (SSH only) if you are executing jobs on agentless technology.
c. From the Key Name drop-down list, select the key name.
d. In the Passphrase field, type the passphrase to use for authentication.
7. Click Test.
8. Click OK.
The run as user authentication settings are defined.
224
225
226
227
Control-M/EM Authorizations
In Control-M you can create, edit, copy, and delete Control-M/EM users and groups, which enables you to
limit the entities that a user is authorized to view or change. For example, a user can be limited to
modifying resources and jobs that relate to a specific Control-M/Server installation.
Users are granted permissions based on their associated group. You can add additional authorizations,
which supersede the authorizations defined for that user in the group.
EXAMPLE: User JimA belongs to group Acct. Group Acct has Browse authority for all folders. JimA has
Update authority for Control-M Figaro and Marius folders. In
addition, JimA has Update authority for jobs on Control-M Figaro and Marius where Bob is
the Run as user and the NodeID or Group is Finance. JimA can update folders
for Figaro and Marius that have jobs whose Run as user is Bob and Node ID or Group field
is Finance, but can only view folders for other Control-M installations.
Usernames are authenticated in Control-M/EM according to the AuthenticationMethod system
parameter and the DirectoryServiceAuth system parameter settings. These parameters determine
whether Control-M/EM uses internal or external authentication. If the DirectoryServiceAuth system
parameter is set to On, the AuthenticationMethod system parameter is ignored. The login procedure must
authenticate the identifiers of the user against external LDAP directories. Users who are not defined in the
Control-M/EM must belong to groups in the LDAP directory. These groups must be associated with
Control-M/EM authorization groups, as described in LDAP Groups authorization (on page 231). For more
information about these parameters and other LDAP parameters, see Control-M/EM general parameters
(on page 48).
Many operations require authorizations in both Control-M/EM and Control-M/Server. For example, to hold
a job, the user must be authorized in Control-M/EM to access that job and authorized in Control-M/Server
to hold jobs for the job run as user. For more information, see Control-M/Server security (on page 219).
The following procedures describe how to define, edit, copy, and delete Control-M/EM users and groups in
the CCM:
For a list of available authorizations for Control-M/EM users and groups, see Control-M/EM user and group
authorizations (on page 230).
228
If you want to define a Control-M/EM user, select the Users tab and click
If you want to define a Control-M/EM group, select the Group tab and click
.
.
3. Select the user or group that you want to edit and click
229
3. Select the user or group that you want to copy and click
4. Type a new name for the user or group and click OK.
5. For each tab, edit the values for each field as necessary, as described in Control-M/EM user and group
authorizations (on page 230).
The changes do not take affect until the user logs out of all Control-M/EM sessions.
3. Select the user or group that you want to delete and click
Jobs that the user can view or modify. This affects usage of all windows that rely on access to
information originating in the active jobs database. For example, limiting the view to jobs from a
single Control-M/Server installation limits the view in a Control-M/EM ViewPoint. For more
information, see Active authorizations (on page 232).
Control resources, quantitative resources, global conditions, and prerequisite conditions that the user
can view or change. This does not relate to resources and conditions displayed in the Job Details
window. For example, a user might see that a job is waiting for a prerequisite condition in the Job
Details window, but not be authorized to create this condition using the Prerequisite Condition
window. For more information, see Global Condition authorizations (on page 239), Prerequisite
Conditions authorizations (on page 241), or Quantitative and Control Resource authorizations (on
page 244).
Calendars and folders that the user can view. Limiting access to folders also determines which folders
and jobs the user can order or force. For more information, see Calendar authorizations (on page
247) or Folder authorizations (on page 249).
CCM, Administration and Monitoring Tools, and ViewPoint Manager, as described in Privileges (on
page 235).
230
Description
User Name
Full Name
Description
Password
Confirm Password
Password Expiration
Lock Account
231
The login procedure must authenticate the identifiers of the user against external LDAP directories. Users
who are not defined in the Control-M/EM users must belong to groups in the LDAP directory. These LDAP
groups must be associated with Control-M/EM authorization, as described in Defining LDAP Groups (on
page 232).
Active authorizations
The authorizations in the Active tab enable you to grant users access to browse specific job output and
perform specific actions on a job in Control-M Workload Automation based on job and folder filters, as
described in Assigning Active authorizations (on page 233).
The Browse, Control, and Update actions that you apply for a user are only applicable to the jobs and
folders that you filtered.
232
EXAMPLE: User Bob has authorization to see jobs starting with a*, and is authorized to perform Free
and Hold actions on those jobs. He also belongs to the Tech Support group, which have
permission to see jobs starting with b*, and are authorized to perform Rerun and Confirm
actions on those jobs. User Bob also belongs to the DBA group, which have authorization to
see jobs starting with c*, and are authorized to use the Log and Documentation browse
features and perform Confirm actions on those jobs.
When Bob logs into Control-M/EM, he sees all jobs starting with the letter a, b, and c. For all
jobs starting with the letter a, he can perform Hold and Free actions. For jobs starting with
the letter b, he can perform Rerun and Confirm actions. For jobs starting with the letter c he
can view the Log and Documentation and perform Confirm actions.
The following table lists the Browse, Control, and Update actions that you can apply to a user for specific
jobs and folders:
Active Authorizations field descriptions
Field
Description
Filter
Browse
Control
Update
If you want to define an Action authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to apply an authorization.
If you want to define an Action authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to apply an authorization.
233
EXAMPLE: The Jobs filter definition includes jobs that meet both of the following inclusion criteria:
The job must run on a Control-M installation whose name begins with o or job is
cyclic.
Even if a job meets the preceding inclusion criteria, the filter excludes the job if it runs on
a Control-M installation whose name is omega-ctm3.
5. Select the Browse, Control, and Update actions for this user, as described in Active authorizations (on
page 232), and then click OK.
The Active authorizations for this user are enabled.
If you want to edit an Action authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to apply an authorization.
If you want to edit an Action authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to apply an authorization.
234
Privileges
Privileges enables you to grant users access to the CCM, Monitoring and Administration Tools, and
ViewPoint Manager and perform actions based on the defined access level. To activate privileges for the
user, you must define each privilege with at least a Browse access level, as described in the following
table:
Access Level
Description
None
Browse
Update
Full
Default
EXAMPLE: User JimA belongs to group Staff. Group Staff has Update authority for all Collections,
Hierarchies, Filters, and ViewPoints but only Browse authority for Authorization definitions,
Alerts, and Archived ViewPoints. JimA is defined with Default authority for all definitions
and Update authority for Communication. JimA can create and modify ViewPoints as well as
add, modify, and delete Control-M installations from the Control-M/EM database.
The following table describes each privilege component and determines the actions that a user or member
of a group can perform on different parts of Control-M/EM:
Privilege
Category
Description
CLI
Client Access
Control-M Configuration
Manager
Client Access
Client Access
Control-M Workload
Change Manager
Client Access
235
Privilege
Category
Description
Control-M Workload
Automation, Utilities, EM
API, BIM Web UI
Client Access
Control-M Workload
Automation (Utilities,
API, BIM Web UI)
Control-M Workload
Change Manager
Authorizations
Control-M Configuration
Manager
Configuration
Control-M Configuration
Manager
Operation
Control-M Configuration
Manager
Database Maintenance
Control-M Configuration
Manager
236
Privilege
Category
Description
Security
Control-M Configuration
Manager
Archived ViewPoints
Monitoring and
Administration Tools
Alerts
Monitoring and
Administration Tools
BIM Reports
Monitoring and
Administration Tools
Forecast Reports
Monitoring and
Administration Tools
Periodical Statistics
Monitoring and
Administration Tools
BIM/Forecast
Configuration
Monitoring and
Administration Tools
Promotion Rules
Monitoring and
Administration Tools
237
Privilege
Category
Description
Promotion Action
Monitoring and
Administration Tools
Monitoring and
Administration Tools
Collections
Viewpoint Manager
Hierarchies
Viewpoint Manager
Filters
Viewpoint Manager
Viewpoints
Viewpoint Manager
238
Description
Access Level
Determines one of the following access levels for each user and
group:
Prefix
Defines the name of the global condition prefix that the user
has access to based on the access level.
The following procedures describe how to assign, edit, and delete Global Condition authorizations:
If you want to define a Global Condition authorization for a Control-M/EM user, select
the Users tab and double-click the user that you want to apply an authorization.
If you want to define a Global Condition authorization for a Control-M/EM group, select
the Group tab and double-click the group that you want to apply an authorization.
239
If you want to edit a Global Condition authorization for a Control-M/EM user, select the Users tab
and double-click the user that you want to edit.
If you want to edit a Global Condition authorization for a Control-M/EM group, select
the Group tab and double-click the group that you want to edit.
3. Select the Global Conditions tab and then select the Global Condition authorization that you want to
edit.
4. Click
240
If you want to delete a Global Condition authorization for a Control-M/EM user, select
the Users tab and double-click the user contains the authorization that you want to delete.
If you want to delete a Global Condition authorization for a Control-M/EM group, select
the Group tab and double-click the group contains the authorization that you want to delete.
3. Select the Global Conditions tab and then select the Global Condition authorization that you want to
delete.
4. Click
Description
Access Level
Determines one of the following access levels for each user and
group:
Control-M Server
Condition
Defines the name of the condition that the user has access to
based on the access level
The following procedures describe how to assign, edit, and delete Prerequisite conditions authorizations:
241
If you want to define a Prerequisite Condition authorization for a Control-M/EM user, select
the Users tab and double-click the user that you want to apply an authorization.
If you want to define a Prerequisite Condition authorization for a Control-M/EM group, select
the Group tab and double-click the group that you want to apply an authorization.
If you want to edit a Prerequisite Condition authorization for a Control-M/EM user, select
the Users tab and double-click the user that you want to edit.
If you want to edit a Prerequisite Condition authorization for a Control-M/EM group, select
the Group tab and double-click the group that you want to edit.
3. Select the Prerequisite Conditions tab and then select the Prerequisite Condition authorization that
you want to edit.
4. Click
242
NOTE: You can use pattern matching strings and an * to denote all values, as described in Pattern
matching strings.
The updated Prerequisite Condition authorization appears in the User Authorization:
<Control-M/EM user> window.
If you want to delete a Prerequisite Condition authorization for a Control-M/EM user, select
the Users tab and double-click the user contains the authorization that you want to delete.
If you want to delete a Prerequisite Condition authorization for a Control-M/EM group, select
the Group tab and double-click the group contains the authorization that you want to delete.
3. Select the Prerequisite Conditions tab and then select the Prerequisite Condition authorization that
you want to delete.
4. Click
243
Description
Access Level
Determines one of the following access levels for each user and
group:
Control-M Server
Resource
The following procedures describe how to assign, edit, and delete Quantitative and Control Resource
authorizations:
If you want to define a Quantitative or Control Resource authorization for a Control-M/EM user,
select the Users tab and double-click the user that you want to apply an authorization.
244
If you want to define a Quantitative or Control Resource authorization for a Control-M/EM group,
select the Group tab and double-click the group that you want to apply an authorization.
If you want to assign a Quantitative Resource, select the Quantitative Resources tab and click
.
If you want to assign a Control Resource, select the Control Resources tab and click
The User Authorizations: Quantitative Resources dialog box or the User Authorizations:
Control Resources appears.
4. For each field, type or select the required value, as described in Quantitative and Control Resource
authorizations (on page 244) and then click OK.
NOTE: You can use pattern matching strings and an * to denote all values, as described in Pattern
matching strings.
The Quantitative or Control Resource authorization appears in the User Authorization:
<Control-M/EM user> window.
If you want to edit a Quantitative or Control Resource authorization for a Control-M/EM user,
select the Users tab and double-click the user that you want to edit.
If you want to edit a Quantitative or Control Resource authorization for a Control-M/EM group,
select the Group tab and double-click the group that you want to edit.
If you want to edit a Quantitative Resource, select the Quantitative Resources tab .
If you want to edit a Control Resource, select the Control Resources tab.
The User Authorizations: Quantitative Resources dialog box or the User Authorizations:
Control Resources appears.
5. Edit the required fields, as described in Quantitative and Control Resource authorizations (on page
244) and then click OK.
NOTE: You can use pattern matching strings and an * to denote all values, as described in Pattern
matching strings.
The updated Calendar authorization appears in the User Authorization: <Control-M/EM user>
window.
245
If you want to delete a Quantitative or Control Resource authorization for a Control-M/EM user,
select the Users tab and double-click the user contains the authorization that you want to delete.
If you want to delete a Quantitative or Control Resource authorization for a Control-M/EM group,
select the Group tab and double-click the group contains the authorization that you want to
delete.
If you want to delete a Quantitative Resource, select the Quantitative Resources tab .
If you want to delete a Control Resource, select the Control Resources tab.
4. Select the authorization that you want to delete and then click
A confirmation message appears.
5. Click Yes.
246
Calendar authorizations
Calendar authorizations grant users access to specific calendars in Control-M Workload Automation and an
authorization level for each calendar, as described in the following table:
Field
Description
Access Level
Determines one of the following access levels for each user and
group:
Control-M Server
Calendar
Define the name of the calendar that the user has access to
based on the access level.
The following procedures describe how to assign, edit, and delete Calendar authorizations:
If you want to define a Calendar authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to apply an authorization.
247
If you want to define a Calendar authorization for a Control-M/EM group, select the Group tab
and double-click the group that you want to apply an authorization.
If you want to edit a Calendar authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to edit.
If you want to edit a Calendar authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to edit.
3. Select the Calendars tab and then select the Calendar authorization that you want to edit.
4. Click
248
If you want to delete a Calendar authorization for a Control-M/EM user, select the Users tab and
double-click the user contains the authorization that you want to delete.
If you want to delete a Calendar authorization for a Control-M/EM group, select the Group tab
and double-click the group contains the authorization that you want to delete.
3. Select the Calendars tab and then select the Calendar authorization that you want to delete.
4. Click
Folder authorizations
Folder authorizations grant users access to specific folders in Control-M Workload Automation and an
authorization level for each folder. In addition, you can define different authorizations per job within a
specific folder based on Application and Sub Application criteria.
EXAMPLE: If you want to allow the user to update jobs that belong to Application App1 but restrict this
user from changing the Folder Properties, such as User Daily, Site Standards, and Business
field values, define the fields, as follows:
Access Level=Browse
249
Application=App1
Field
Description
Access Level
Determines one of the following access levels for each user and
group:
Control-M Server
Library
Defines the name of the library that contains the jobs folder.
Folder
Application
Determines one of the following access levels for each user and
group:
250
Field
Description
Sub Application
The following procedures describe how to assign, edit, and delete folder authorizations:
If you want to define a Folder authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to apply an authorization.
If you want to define a Folder authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to apply an authorization.
251
If you want to edit a Folder authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to edit.
If you want to edit a Folder authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to edit.
3. Select the Folders tab and then select the Folder authorization that you want to edit.
4. Click
If you want to delete a Folder authorization for a Control-M/EM user, select the Users tab and
double-click the user contains the authorization that you want to delete.
If you want to delete a Folder authorization for a Control-M/EM group, select the Group tab and
double-click the group contains the authorization that you want to delete.
3. Select the Folders tab and then select the Folder authorization that you want to delete.
4. Click
252
Description
Control-M Server
Run As
Host ID/Group
NOTE: The definitions in the Run as Users tab only apply to users who have at least the Update access
level in the Folders tab. The definitions in the Run as Users tab apply to the jobs in the SMART folders,
not the SMART folders themselves.
The following procedures describe how assign, edit, and delete run as user authorizations:
If you want to define a Run as user authorization for a Control-M/EM user, select the Users tab
and double-click the user that you want to apply an authorization.
If you want to define a Run as user authorization for a Control-M/EM group, select the Group tab
and double-click the group that you want to apply an authorization.
253
NOTE: You can use pattern matching strings and an * to denote all values, as described in Pattern
matching strings.
The Run as user authorization appears in the User Authorization: <Control-M/EM user> window.
If you want to edit a Run as user authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to edit.
If you want to edit a Run as user authorization for a Control-M/EM group, select the Group tab
and double-click the group that you want to edit.
3. Select the Run as Users tab and then select the Run as user authorization that you want to edit.
4. Click
If you want to delete a Run as user authorization for a Control-M/EM user, select the Users tab
and double-click the user that contains the authorization that you want to delete.
If you want to delete a Run as user authorization for a Control-M/EM group, select the Group tab
and double-click the group contains the authorization that you want to delete.
3. Select the Run as Users tab and then select the Run as user authorization that you want to delete.
4. Click
.
254
Description
Access Level
Determines one of the following access levels for each user and
group:
Workload Policy
Defines the name of the workload policy that the user has
access to based on the access level
The following procedures describe how to assign, edit, and delete Workload Policy authorizations:
If you want to define a Workload Policy authorization for a Control-M/EM user, select
the Users tab and double-click the user that you want to apply an authorization.
255
If you want to define a Workload Policy authorization for a Control-M/EM group, select
the Group tab and double-click the group that you want to apply an authorization.
If you want to edit a Workload Policy authorization for a Control-M/EM user, select the Users tab
and double-click the user that you want to edit.
If you want to edit a Workload Policy authorization for a Control-M/EM group, select
the Group tab and double-click the group that you want to edit.
3. Select the Workload Policies tab and then select the Workload authorization that you want to edit.
4. Click
256
If you want to delete a Workload Policy authorization for a Control-M/EM user, select
the Users tab and double-click the user contains the authorization that you want to delete.
If you want to delete a Workload Policy authorization for a Control-M/EM group, select
the Group tab and double-click the group contains the authorization that you want to delete.
3. Select the Workload Policies tab and then select the Workload Policy authorization that you want to
delete.
4. Click
Service authorizations
Service authorizations grant users or groups of users access to view services, perform job actions, order,
hold, and release services.
When you add a service user authorization, the user automatically receives permission to view orderable
and non-orderable services that the user ordered.
NOTE: BMC Batch Impact Manager services appear by default in the Control-M Self Service GUI
application and override any service authorization limitation.
NOTE: If you want to utilize LDAP/active directory for adding your users, see Defining LDAP system
parameters (on page 39).
The following procedures describe how to assign, edit, and delete service authorizations:
257
If you want to define a Service authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to apply an authorization.
If you want to define a Service authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to apply an authorization.
If you want to edit a Service authorization for a Control-M/EM user, select the Users tab and
double-click the user that you want to edit.
If you want to edit a Service authorization for a Control-M/EM group, select the Group tab and
double-click the group that you want to edit.
3. Select the Services tab and then select the Service authorization that you want to edit.
4. Click
If you want to delete a Service authorization for a Control-M/EM user, select the Users tab and
double-click the user contains the authorization that you want to delete.
If you want to delete a Service authorization for a Control-M/EM group, select the Group tab and
double-click the group contains the authorization that you want to delete.
3. Select the Services tab and then select the Service authorization that you want to delete.
4. Click
259
3. Recycle all Control-M/EM components, as described Recycling a component (on page 34).
260
cm_admin.xml parameters
The following table describes parameters that are used in the cm_admin.xml file. To define these
parameters, see Authorizing non-administrators to manage application plug-in connection profiles (on
page 260).
Parameter
Description
Name
control_m
node_id
application_type
NOTE: The relationship between more than one filter in the file uses OR logic. This means that groups or
users can manage application plug ins that answer any of the criteria in the list of filters.
261
High availability
Control-M High Availability enables you to maximize your production environment uptime and prevent
data loss in the event of hardware maintenance or failure.
Control-M supports the following high availability solutions:
Control-M/EM and Control-M/Server high availability with Oracle/MSSQL (on page 264): Enables you
to set up a secondary host with Control-M/EM or Control-M/Server. If there is a hardware failure or if
all Control-M/EM or Control-M/Server processes are down unexpectedly, the secondary automatically
(by default) or manually assumes control and resumes production.
Control-M/Server high availability with PostgreSQL (on page 270): Enables you to set up a secondary
Control-M/Server and a secondary PostgreSQL database server for database replication. If the primary
Control-M/Server and database server are down, you can manually fail over to the secondary host.
Control-M/Server supports database mirroring on MSSQL and Oracle databases, but not in a Control-M
High Availability environment. For more information, see Control-M/Server mirroring database (on page
276).
262
Control-M/Server
Gateway (GTW)
Forecast Server
Web Server
Naming Service
If a Control-M/EM or Control-M/Server component goes down, the Configuration Agent attempts to start it
up (if desired state is set to Up), based on defined intervals, as described in Maintenance parameters (on
page 91) and High Availability parameters (on page 132).
If you are using a PostgreSQL database, the Configuration Agent manages the database component and
sends a life check every defined interval (see Maintenance parameters (on page 91) and High Availability
parameters (on page 132)). If there is no response after a defined number of attempts, the Configuration
Agent restarts the database automatically. If you are using an Oracle or MSSQL database, you can view
the database component in the CCM, but the Configuration Agent does not manage the component and
cannot start it up or shut it down.
263
Automatic failover (on page 267): The secondary Configuration Agent automatically takes control and
resumes production, when it detects that the primary Control-M/EM or Control-M/Server and its
primary Configuration Agent has stopped unexpectedly.
Manual failover (on page 268): You can perform a manual failover at any time from the CCM if the
manual failover option is enabled. After the failover is complete, the production runs on the
secondary.
The following procedures describe how to manually fail over to a secondary host, pause Control-M/Server,
fall back to a primary host, and set secondary to Primary:
NOTE: If you attempt to manually start up components on the secondary when the primary is active, the
components shut down automatically. This prevents both the primary and secondary from running
components simultaneously.
For a description of configurable Control-M/EM high availability system parameters, see Maintenance
parameters (on page 91). For a description of configurable Control-M/Server high availability system
parameters, see High Availability parameters (on page 132). To receive notifications about
Control-M/Server high availability events, see Control-M/Server general parameters (on page 126). To
receive notifications about Control-M/EM high availability events, see Control-M/EM general parameters
(on page 48).
264
The following diagram shows a Control-M/EM automatic failover when the the primary components are no
longer available.
265
266
The following diagram shows a Control-M/Server automatic failover when the the primary components are
no longer available.
Automatic failover
An automatic failover occurs when the secondary Configuration Agent detects that the primary
Control-M/EM or Control-M/Server and its Configuration Agent is not alive and the production on the
primary has stopped unexpectedly. This can occur due to a hardware malfunction, machine crash, a
network card stops responding, or if all components are down.
Control-M/EM: To ensure that the primary Control-M/EM is not functioning, the following conditions
must be met before an automatic failover occurs (default: 60 seconds):
There are no life check responses from all Control-M/EM components and the primary Configuration
Agent (see Maintenance parameters (on page 91)).
EXAMPLE: If HA_LIFECHECK_TRIES is set to 3, and each Check Interval for each Control-M/EM
component is set to 20, an automatic failover starts after 60 seconds. The production on the
secondary is ready after all the components are up and this time is determined by the
operating system, number of Control-M/Servers, and number of jobs.
There are no transactions recorded in the database from all Control-M/EM components and its
primary Configuration Agent.
EXAMPLE: If all components are down and the Configuration Agent is up, an automatic failover does not
occur.
Control-M/Server: To ensure that the primary Control-M/Server is not functioning, the following
conditions must be met before an automatic failover occurs (default: 60 seconds):
267
There is no life check response from the primary Configuration Agent (see High Availability
parameters (on page 132)).
EXAMPLE: If HA_TIME_BETWEEN_LIFECHECKS is set to 15 (default)
and HA_LIFE_CHECK_TIMEOUT is set to 5 (default), the primary Configuration Agent
is considered not functioning after 20 seconds.
There are no transactions recorded in the database from all running Control-M/Server processes and
its primary Configuration Agent.
EXAMPLE: If HA_LIFE_CHECK_TRIES is set to 3 (default), HA_TIME_BETWEEN_LIFECHECKS
is set to 15 (default) and HA_LIFE_CHECK_TIMEOUT is set to 5 (default), processes
are considered not writing to the database after 40 seconds ( (3-1) * (15 +5) )
EXAMPLE: If all Control-M/Server processes are down but the Configuration Agent is up, an
automatic failover does not occur.
Manual failover
You can perform a manual failover at any time from the CCM if the manual failover option is enabled.
The following scenarios describe the required conditions for a manual failover to occur.
Oracle/MSSQL: A manual failover can occur in one of the following scenarios:
The secondary Configuration Agent responds to life check requests from the primary
Configuration Agent.
The secondary Configuration Agent responds to life check requests from the primary
Configuration Agent.
The primary and secondary Configuration Agent has access to the shared directory.
The secondary database server is available for the Secondary Configuration Agent.
268
270
Failing over Control-M/Server and PostgreSQL database server to secondary (on page 273)
Falling back Control-M/Server and PostgreSQL database server to primary (on page 273)
For a description of configurable Control-M/Server high availability system parameters and to receive
notifications about high availability events, see High Availability parameters (on page 132).
271
The following diagram shows a Control-M/Server manual failover when the the primary components are
no longer available.
272
273
Description
Fix packs
If you install a fix pack on the primary, you must manually install
it in on the secondary. A failover cannot occur if the fix packs on
both hosts are not the same.
Cluster
Sync files
etc/site/resource/Defaults.rsc
etc/DirectoryServiceType.cfg
etc/resource/Defaults.rsc
TimeZone.dat
etc/ldap.conf
etc/log4j.selfservice
etc/log4j.wcm
274
System action
User action
Reconnecting Control-M/Server
to Control-M/EM after a
failover/fallback of
Control-M/Server
After a secondary
N/A
Control-M/Server is installed,
Control-M/EM is provided with
the secondary host. If there is a
disconnection between
Control-M/EM and
Control-M/Server, a check is
performed to see if
Control-M/Server has failed over
to the secondary (or primary if it
is a fallback).
275
Scenario
System action
User action
Reconnecting Control-M/EM
clients
Control-M Workload
Automation
After you set up database mirroring, Control-M keeps the primary and secondary databases synchronized.
However, if you run utilities to update the Control-M database, you may have to set up database
mirroring again (see Primary and mirror database synchronization (on page 279)).
276
The new database complies with the relevant Database parameters (on page 164). You can prepare
the secondary database server from the CD provided with the product, or from a Control-M/Server
that is not your primary Control-M/Server (for a third-party database, you should prepare it in the
same way as the primary database).
shut_ca
shut_ctm
NOTE: If you plan to build a mirror database, you need the password of the database system
administrator.
6. At the prompts, type the relevant Mirroring parameters (on page 170).
NOTE: Ensure that you do not change the values of the parameters. If you do change the
parameters, they cannot be implemented until you shut down and restart the SQL Server.
7. If you need to install, type i and confirm.
8. Perform any post-processing that the interactive utility instructs.
9. To check Mirroring status, repeat steps 2 and 3 and type the number for Check Mirroring Status.
10. On the host computer, restart the primary Configuration Agent and Control-M/Server by typing the
following commands:
start_ctm
277
start_ca
shut_ca
shut_ctm
start_ctm
start_ca
All processing is performed on the mirror database.You should now fix the problem on the primary
database.
shut_ca
shut_ctm
278
4. From the Database Mirroring Menu, type the number for Restore Control-M Database from
Mirror.
5. On the host computer, restart the primary Configuration Agent and Control-M/Server by typing the
following commands:
start_ctm
start_ca
All processing is performed on the primary and mirror database. The primary database is restored.
Disabling mirroring
This procedure describes how to disable mirroring. You can stop the process at any time.
To disable mirroring:
1. On the host computer, shut down the primary Configuration Agent and Control-M/Server by typing the
following commands:
shut_ca
shut_ctm
start_ctm
start_ca
279
Database
Utility/Menu
Action
Oracle
internal utility
Initialize Mirroring
MSSQL
Database Menu
Build Database
Delete Database
Oracle
Troubleshooting
Menu
Initialize Mirroring
Erase Database
Oracle
Initialize Mirroring
MSSQL
Troubleshooting
Menu
Oracle
Database Menu
Initialize Mirroring
MSSQL
ctm_dbextend
Initialize mirroring
internal utility
Initialize Mirroring
clean_ajf
Initialize Mirroring
ctmhostmap or
Control-M
Configuration
Manager
Restore Database
Oracle
MSSQL
Oracle
MSSQL
Oracle
MSSQL
Oracle
MSSQL
Troubleshooting Menu
280
ctm_menu Option
Database
Utility/Menu
Action
By updating or modifying the the
specified remote host computer details in
the Control-M/Server database, you
need to run the command on the
secondary Control-M/Server: ctm_agstat
-AGSTAT <remoteHostName> R R
Replace the <remoteHostName>
variable with the name of remote host
that was updated.
Oracle
MSSQL
ctmhostmap or
Control-M
Configuration
Manager
By converting a Control-M/Agent to a
remote host run the command on the
secondary Control-M/Server: ctm_agstat
-AGSTAT <remoteHostName> R R
Replace the <remoteHostName>
variable with the node that was updated.
Failover implementation
Failover implementation allows you to set up both a secondary Control-M/Server and a secondary
database, in case of primary database and Control-M/Server disruption. Failover Control-M/Server
implementation utilizes the same agents and remote hosts as the primary Control-M/Server installation.
NOTE: This option is not compatible with high availability.
The following procedures describe how to prepare and initialize a failover Control M-Server, what to do in
the event of disruption, and how to stop the process:
Initializing failover on the primary and secondary computers (on page 284)
After you have implemented database mirroring, Control-M keeps the primary and secondary databases
synchronized. However, if you run utilities to update the Control-M database, you must perform database
initialization again (see Primary and mirror database synchronization (on page 279)).
$HOME/ctm_server/data/TimeZone.dat
$HOME/ctm_server/data/SSL
$HOME/ctm_server/data/Remedy
282
3. Add the secondary server host name to the list of authorized hosts of each Control-M/Agent.
4. Review the Environment variables worksheet (on page 283) to verify that the secondary
Control-M/Server database complies with the requirements for the mirror database.
5. Verify that the primary and secondary Control-M/Servers are mapped to the same Control-M/Agent
remote host computer by typing the ctmhostmap -action list command on the primary
Control-M/Server.
A report appears, displaying a list of remote host computers in the primary Control-M/Server.
6. If you prepare a secondary database from a (non-primary) Control-M/Server, on the host computer,
type the following commands to shut down the Configuration Agent and Control-M/Server:
shut_ca
shut_ctm
7. On the secondary Control-M/Server computer for each remote host on the displayed report, run the
following command:
ctm_agstat -AGSTAT <remoteHostName> R R
NOTE: For each iteration, replace the <remoteHostName> variable with the name of a remote host
from the report.
Oracle
echo $CONTROLM_USER
echo $ORACLE_SID
283
Your
value
Database
MSSQL
SQLSRVRNAME
CONTROLM_DATABASE
DBO Owner
DBO Owner
Your
value
3.
shut_ca
shut_ctm
On the failover (secondary) Control-M/Server database, verify that mirroring is disabled as follows:
a. In the Control-M/Server, type the ctm_menu command.
b. The Control-M Main Menu appears.
c. Type the number for the Database Mirroring.
d. The Database Mirroring Menu appears.
e. From the Database Mirroring Menu, type the number for Check Mirroring Status.
4. From the Database Mirroring Menu, type the number for Initialize Failover.
5. On the host computer, shut down the primary Configuration Agent and Control-M/Server by typing the
following commands:
shut_ca
shut_ctm
284
d. At the prompts, type the relevant Mirroring parameters (on page 170).
e. If you need to install, type i and confirm.
f.
g. To check that mirroring is enabled, repeat steps 3a to 3d and type the number for Check
Mirroring Status.
7. On the host computer, restart the primary Configuration Agent and Control-M/Server by entering the
following commands:
start_ctm
start_ca
NOTE: Parameters in the config.dat file are not copied from the primary to secondary server or
from the secondary to primary server. For example, if SMTP communication parameters are not
updated on the secondary database, all domail actions fail.
shut_ca
shut_ctm
start_ctm
start_ca
All processing is performed by the failover Control-M/Server. You should now fix the problem on the
primary Control-M/Server.
285
shut_ca
shut_ctm
shut_ca
shut_ctm
6. To restore data to the primary Control-M/Server database, do the following on the primary
Control-M/Server:
a. Repeat steps 2 and 3.
b. From the Database Mirroring Menu, type the number for Restore Control-M Database
from Mirror.
c. For every remote host that appears in Database parameters (on page 164) enter the following
command:
ctm_agstat -AGSTAT <remoteHostName> R R
Each time that you run this command, replace the <remoteHostName> variable with the name
of a remote host from the list that was generated in Preparing the failover Control-M/Server (on
page 282).
7. Start the primary Configuration Agent and Control-M/Server by entering the following commands on
the host computer:
start_ctm
start_ca
All processing is performed by the primary Control-M/Server on the primary and failover database.
286
shut_ca
shut_ctm
shut_ca
shut_ctm
start_ctm
start_ca
All processing is performed by the primary Control-M/Server on the primary database. The failover
system is disabled.
287
Alerts
The following are types of alerts in Control-M:
Shouts: Shouts are alerts that relate to job processing problems and you can define their
settings in the Shout Destination Manager. For more information, see Shout destination
management (on page 288).
Exception alerts: Alerts that notify you of system failures in the database, communication
network, and application errors and failures. You can handle these exception alerts as necessary
in the Exception Alerts window. The Exception Alerts window displays information about each
alert, such as the alert ID, severity of the alert, the message that was generated by the alert, and
more. For more information, see Managing exception alerts (on page 291).
Alerts are deleted automatically after they reach the threshold in the database. You can also delete alerts
manually if necessary,(example: low disk space), as described in Removing old alerts (on page 292).
288
5. Click Close.
The shout destination table is updated.
289
If you have reached the Shout Destination List Editor window after you created a shout
destination table, continue to step 3.
From the Manage tab, in the Alerts group, click Shout Destination
290
Select Properties to view properties of the alert such as Alert ID, Severity, Time, Message,
and more. You can also add a note to the alert in the Note field.
Select Remove Old Alerts and define the number of days to delete old alerts in the Remove
X-Alerts older than x days ago field.
291
Usage alerts
Usage alerts enable you to send alerts when the number of tasks in a Control-M/Enterprise Manager
environment exceed the permitted limit of tasks in the Active Jobs file. You can specify the following:
The platforms you want to set the task count and alerts for, depending on which platforms you have.
If you have both a Control-M for z/OS and Control-M for Distributed Systems platforms, you can
choose the all platforms option. For more information, see Creating a usage alert (on page 292).
The number of tasks allowed per day on all Control-M/Enterprise Manager environments, as described
in Creating a usage alert (on page 292).
The percentage of the permitted tasks that when exceeded an alert is issued, as described in Creating
a usage alert (on page 292).
The recipients that receive the alert notification if task count is exceeded, as described in Creating a
usage alert (on page 292).
All Control-M/Enterprise Manager environments that are in use, to manage task counts on, and send
alerts when the task count exceeds the permitted limit. For more information, see Adding a usage
alert environment (on page 293).
If the number of permitted tasks is exceeded, an alert is sent to the recipients you specified.
292
If you have both a Control-M for z/OS and a Control-M for Distributed Systems platform, select
the Alerts for all platforms option.
5. In the Task Count field, set the number of permitted tasks.
6. In the Alert when task count exceeds field, set the percentage of the permitted tasks that when
exceeded an alert is issued.
7. In the Alert e-mail recipients field, type the e-mail addresses of the recipients of the alert.
If adding multiple e-mails, type each e-mail separated with ;.
8. Click Save.
The usage alert is created.
4. Define the required parameters, as described in Enterprise Manager parameters (on page 294).
5. Click Test Connectivity, to check that the environment is available.
A message appears confirming that the environment is available. If the environment is unavailable,
the test fails, and you will not be able to save your alert settings.
6. Click Save.
The environment is added.
293
Description
Environment Name
Database type
Host
Port
User Name
Password
Database/Inst..
To delete an environment:
1. From the Manage tab, in the Alerts group, select Usage Alerts.
The Usage Alerts window appears.
2. Select the Enterprise Manager tab.
3. Select the environment you want to delete.
4. Click
294
Host groups
A host is a computer that can run jobs and a host group is a collection of hosts, which enable you to
define and run jobs on any of the computers within the host group.
For example, if you have a job that might require more resources than the host ID where the job runs,
you can define the job to run on host group. If the host ID is not able to handle the job, it is routed to
another host, which has more resources, or the job is set to a Wait status.
The load on any host computer or host group can be controlled. You can limit the usage of a host and the
specific times when those limitations are applied. A hosts participation in a host group can also be
defined for specific times. This helps you control the hosts available to the jobs in the active environment.
The following procedures describe how to create, edit, delete host groups, and remove hosts from host
groups:
295
All of the hosts in the group with the same Application Type Filter, must have the same Application
Plug-in version, including fix pack number. For example, if you select Control-M for Databases, then
make sure that all the hosts in the group have the same version of Control-M for Databases.
6. In the Associated Hosts area, select a host that you want to apply active definitions.
This determines when a job can run on the host based on days, hours, or conditions.
7. Click
In the Date & Time Settings area, select the time frame when a job can run on the host.
In the Conditions area, type the name of the condition and select a condition date when a job
can run on the host.
9. Click OK.
The host setting appears in the Participation Definitions area.
10. Click OK.
The host group appears in the Host Group tab.
4. Click OK.
297
298
299
Control-M deployment
In Control-M Workload Automation, you can deploy the following components:
Control-M Client:The Client Distribution tool that enables you to deploy a single instance of
Control-M/EM client components over the Web to every supported Windows computer in your
organization, as described in Client Distribution (on page 304).
Chapter
Control-M/Agent deployment
The Control-M/Agent Deployment tool enables you to automatically upgrade multiple Control-M/Agents
from one single point of access.
From the CCM, you can transfer Control-M/Agent software packages to multiple Control-M/Agents. After
the transfer, you can then upgrade the Control-M/Agents to version 9.0.00 and higher on UNIX and
Windows, and to version 7.0.01 and higher on AS400.
The following procedures describe how to set up the software packages, upgrade, and downgrade
Control-M/Agents:
For a description of configurable Agent Deploy parameters, see Control-M/Server Agent deployment
parameters (on page 131), Control-M/Agent deployment parameters (on page 198), and Control-M/EM
general parameters (on page 48).
NOTE:
If the Control-M/Agent windows service is set to Log on as > This account, the upgrade must be
performed with this user.
If you are using Control-M/Agent 8.0.00.100 or lower (excluding 7.0.00.500), verify that the Upgrade
User, defined in the Properties window, is correct. If not, change it.
BMC recommends to perform the Agent deployment in groups. By default, you can
300
If you want to save the installation packages to the Control-M/EM computer, copy the installation
package to the $EM_HOME/AUTO_DEPLOY directory on the computer where the CMS is
installed.
EXAMPLE: /home/one900a/ctm_em/AUTO_DEPLOY
If you want to save the installation packages to a specific network location, define
the CentralDeployLocation system parameter, as described in Defining a Control-M/EM
component (on page 11).
NOTE: Verify that the Control-M/EM user that is defined in the Control-M/EM Configuration Agent
Windows service is set to This account and has access to the relevant network location.
3. Restart the New Activity Upgrade wizard.
Upgrading Control-M/Agents
This procedure describes how to transfer installation packages to existing Control-M/Agents and upgrade
them to the current base version or fix pack on UNIX, Windows, or AS400.
NOTE: (Windows only) An upgrade does not begin until all jobs have ended, unless you selected Force
Upgrade in a Retry.
NOTE: You cannot upgrade more than one Control-M/Agent on the same Windows computer
simultaneously.
To upgrade Control-M/Agents:
1. From the Manage tab, select Agent Deployment.
The Agent Deployment window appears.
2. Click New Activity > Upgrade.
The Upgrade Control-M Agents Activity window appears.
3. Do the following:
a. In the Activity Name field, accept the default or type a new name for this activity.
b. In the Description field, describe the purpose of this activity (optional).
c. In the E-Mail Notification field, type the email address(es) that you want to receive notifications
about this activity (optional).
301
To receive email notification, you need to define the email server parameters, as described
in E-mail configuration parameters (on page 175).
4. Select one of the following:
Transfer and Automatically Install Package: Transfers the installation package to specific
Control-M/Agent computers and begins the upgrade process automatically.
NOTE:
The Control-M/Agent installation package is deleted after a successful upgrade. If the upgrade
failed or you performed a transfer only, then the installation package remains on the
Control-M/Agent computer for 30 days if the Control-M/Agent is version 9.0.00 or higher. If the
Control-M/Agent version is lower than 9.0.00, the installation package will remain indefinitely If
you want to change this setting, define the Control-M/Agent system
parameter AD_RETAIN_PACKAGES, as described in Defining Control-M/Agent system
parameters (on page 187).
The Control-M/Agent installation package remains on the Control-M/Server computer for 30 days.
If you want to change this setting, define the Control-M/Server AD_RETAIN_PACKAGES, as
described in Defining Control-M/Server system parameters (on page 124).
5. Click Next.
6. From the Upgrade Agents to Version drop-down list, select the version or fix pack that you want to
upgrade to and then select the Control-M/Agent(s) that you want to upgrade.
The list of values depends on the Agent installation packages in your repository. For more
information, see Copying Control-M/Agent installation packages (on page 301).
7. Depending on which method you selected, click Transfer or Upgrade.
The transfer process starts and progress messages appear in the right pane of the deployment
activity. To view and troubleshoot the internal stages of the upgrade, click Log from the Agent
Deployment window. If you selected to transfer the installation package, you can upgrade the
Control-M/Agent(s) any time after the transfer is complete. A job runs on the Control-M/Agent(s) to
verify that it upgraded successfully.
Downgrading Control-M/Agents
This procedure describes how to downgrade Control-M/Agents to their original version prior to the
upgrade, if there was a problem with the upgrade. You can only downgrade Control-M/Agents that were
upgraded with the Control-M/Agent Deployment tool.
This procedure must be done within a defined period based on the AD_GA_RETAIN_DAYS system
parameter, as described in Control-M/Agent deployment parameters (on page 198).
302
Verify that all jobs on the selected Control-M/Agents have ended. If jobs are still running during the
downgrade, they might fail.
To downgrade Control-M/Agents:
1. From the Manage tab, select Agent Deployment.
The Agent Deployment window appears.
2. Click New Activity > Downgrade.
The Downgrade Control-M Agents Activity window appears.
3. Do the following:
a. In the Activity Name field, accept the default or type a new name for this activity.
b. In the Description field, describe the purpose of this activity (optional).
c. In the E-Mail Notification field, type the email address(es) that you want to receive notifications
about this activity (optional).
To receive email notification, you need to define the email server parameters, as described
in E-mail configuration parameters (on page 175).
NOTE: Any configuration changes that you might have made after the upgrade will be lost when you
downgrade to the previous version including the updating the the primary or secondary
Control-M/Server or communication port.
4. Click Next.
5. From the Downgrade Agents from Version drop-down list, select the version or fix pack that you
want to downgrade from and then select the Control-M/Agent(s) that you want to downgrade.
6. Click Downgrade.
The downgrade process begins immediately and is downgraded to the previous version.To view and
troubleshoot the internal stages of the downgrade, click Log from the Agent Deployment window.
303
To delete an activity:
1. From the Agent Deployment window, select a completed or failed transfer, upgrade, or downgrade
activity that you want to delete.
2. Click Delete.
The activity is deleted.
If you want to export the details of a transfer, upgrade, or downgrade deployment activity, do the
following:
a. Click Export.
b. Browse to the location where you want to save the file, select the file type and click Save.
Client Distribution
Client Distribution is a software deployment tool that enables you to deploy a single instance of
Control-M/EM client components over the Web to every supported Windows computer in your
organization. The distribution includes base versions, fix packs, patches, and SSL certificates.
Control-M Workload Automation client updates are automatically distributed to end users. If a new update
is available, users will receive a message when they log in. SSL certificates are automatically distributed
and installed. To generate an SSL certificate, see Certificate generation. If you are using the Manage SSL
BYO to bring your own SSL certificate, see Configuring client distribution installation to use Manage SSL
BYO (Bring Your Own) Script certificates.
304
You can require end users to install updates by a specific date. If the end users have not installed the
update by the defined deadline, they cannot log in until they complete the installation.
To distribute Control-M Workload Automation clients, see Distributing Control-M Workload Automation
clients (on page 305).
Verify that all the target computers meet the system requirements, as described in Control-M client
system requirements.
If you want to distribute the base version to the end users, copy the URL and send it to them via
email.
If you want to distribute a fix pack, select Fix Packs and from the Distribute Control-M
Workload Automation client version drop-down list, select the fix pack or patch that you
want to distribute to the end users.
The list of available fix packs/patches reflects the installations on the Control-M/EM server.
NOTE: If you want to ensure that the end users upgrade the distributed client by a certain date,
select the Prevent login if user has not upgraded by: checkbox and select a date.
3. Click OK.
If you distributed a fix pack or a patch, the installation is automatically downloaded to your end users
computers. They will receive a notification that an installation update is ready to be installed. The
connection parameters to the Control-M/EM server are automatically populated in the installation
wizard. When the installation is complete, the Control-M Workload Automation client is available to
the end users.
305
10
10
Configuring Workload Archiving disk space and cleanup settings (on page 309)
Deleting data from the Workload Archiving server (on page 310)
After you have created a Workload Archiving policy and have configured the required settings, you can
now perform an Archive search, as described in Control-M Workload Archiving.
Right-click the Workload Archiving Server component and select Desired State > Up.
The Workload Archiving Server is now up.
306
307
Description
Name
Status
Description
Retention Period
Archive Data
Control-M Server
Type
Job Status
Library
Application
Sub-application
308
Parameter
Description
Folder
309
Description
Determines the size of free disk space that must remain where
Control-M Workload Archiving is installed. If the threshold is
exceeded, the Archiving process stops collecting data until the free
disk space issue is resolved.
Interval to check free disk space Determines intervals in seconds, minutes, or hours when to check
the Workload Archiving Server for free disk space
Data cleanup cycle
The search criteria support wildcard characters (* and ?) for both values and exceptions .
NOTE: The parameters -user and -password are mandatory arguments.
EXAMPLE: Delete all archived jobs that contain AA except for jobs that start with B.
arc_cleanup user <user> -password <password> job_name *AA*
job_name_exceptions B*
310
Right-click the Workload Archiving Server component and select Desired State > Down.
The Workload Archiving Server is now down.
311
11
11
Control-M diagnostics
Control-M diagnostics enables you to gather diagnostic information to identify and fix a problem that
occurs in one or more of the Control-M components. For each Control-M component, you can define the
debug levels and generate diagnostics data.
There are several diagnostic mechanisms you can use to gather diagnostic information, such as:
Communication Traces: creates either a log or trace file that contains detailed data communication
between Control-M/Server and Control-M/Agent. For more information, see Defining the
Control-M/Agent debug level (on page 313).
Exception alerts: alerts you to system failures and enables you to handle them as necessary. For more
information, see Managing exception alerts (on page 291).
The following procedures describe how to define debug levels and generate diagnostic data for each
Control-M component:
Debug levels
Debug levels determine which information you want to view in the logs. Debug levels range according to
each Control-M component. For example, if you set a debug level to 4, you are able to view all levels of
information. The higher the level set, the more details are displayed in the logs. However, the higher the
level set, the more system resources are required. This can result in an environment functioning slower
than usual.
The following procedures describe how to define the debug levels for Control-M/EM, Control-M/Server,
and Control-M/Agent:
312
DIAGL: Sets the debug level. For more information, see Debug levels (on page 312).
Context: Defines which context to set the debug level on. The context suggestions are listed in
the Result section.
313
arc_dbg_lvl
2. Type the following:
-level <x>
Where x is the a number 1(low)-5(high).
4. In the Last days field, define the number of days in the past to include data in the report.
5. Click Advanced.
6. In the Save to section, select one of the following:
314
7. Click OK.
The Action Result dialog box appears.
8. Monitor the status of the request until the diagnostic data collection completes.
If the diagnostic data collection returns with the following error, see Troubleshooting diagnostic data
collection failure (on page 315):
Data collection failed. ERROR: No available disk space, <SIZE_IN_MB> needed, exiting...
Define a new value that is less than the available disk space divided by 3.
3. Click OK.
The data is regenerated.
In the Specify a control shell command line field, type the command.
To display the list of valid commands and requests for the selected component, click Usage and
select one of the commands that appear in the Result section.
4. Click Apply.
315
316
12
12
Use the interactive Database Maintenance menu, which you access from the Root menu.
To maintain Control-M/Server databases, use the Database Maintenance menu that you access from
the Control-M Main Menu.
317
Description
Extend
Database Size
Erase Audit Data Erases audit records that were stored in the database.
Erase Exception
Alerts
318
Hot backup: Tracks changes to the database while Control-M/Server is active. After a crash (or other
event), you can restore the database to the previous state before the crash. Hot backups are
performed in archive mode, which requires extra disk space for control files. You must specify an
existing directory when implementing hot backups (Dedicated PostgresSQL only).
Cold backup: Copies the contents of the database to a file when Control-M/Server is shut down. The
database can be restored up to the date/time of the last backup. You can use cold backups to restore
the database to the state it was in when the backup was performed. To perform a cold backup,
archive mode must be disabled. You can run the ctm_backup_bcp utility even when the database is in
archive mode. Shut down Control-M/Server before performing a cold backup (Existing Oracle and
dedicated PostgresSQL only).
Archive mode: Control-M/Server backs up the logs before overwriting them with new information. If
the database subsequently crashes, you can use the archived logs to restore the database up until the
most recent SQL transaction. If you enable archive mode, you should plan to keep it enabled for long
term use. If you enable and disabled it frequently, the archived log files do not provide useful
information for database restoration. You can only use Archive Mode option when Control-M is
running with the database server supplied with the Control-M installation. The Control-M/Server
automatically shuts down during this procedure. If archive mode is enabled, database transactions
might perform slowly, and archive files require more disk space (Dedicated PostgresSQL only).
Restore and rebuild: Restores data from a correct database structure. If the Control-M/Server
database structure (schema) becomes corrupt, you must rebuild the database. After the rebuild, you
must restore the data. When a cold restore is performed, the restore file must be exported from the
database with the same encoding as the destination database. If you rebuild the database with UTF8
encoding, you must manually configure the environment settings, to enable the Control-M/Server
components to support this encoding.
NOTE: Before rebuilding the database running the Build DB option through ctm_menu, when using an
existing PostgreSQL database, first kill all transactions and then run Build DB. To find out which
transactions are still open, you can refer to the Transactions Report that is generated by running the List
All Active Transactions option using ctm_menu.
Enabling archiving of a Control-M/Server database (Oracle and PostgreSQL only) (on page 320)
319
320
If Archive mode is not active at your site, a cold backup is automatically performed.
5. Select either H for hot backup or C for cold backup, and press Enter.
The following prompt appears:
321
Description
<dev_logical_name>
{disk|tape}
Type of device. This device can be either a disk file or a tape drive.
Backups to disk files are faster and do not require operator
intervention.
<file_full_path_name|
device_name>
If you specify disk, you must specify the file full path name.
322
If Archive mode is not active, a restore is automatically performed using information from the
most recent Cold backup.
If Archive mode is active, a restore is automatically performed using information from the most
recent Hot backup.
(For PostgreSQL only) - If a hot restore process failed, it is possible to revert back to the file system
as it existed before the restore process began. For details, see the following instructions.
NOTE: The hot restore process uses the ctm_em/pgsql/data/pg_xlog directory to recover the
database up until the point of failure. If this directory was damaged during the failure, the database
can only be recovered up until the last database log switch.
323
Back up the database data (see Backing up a Control-M/Server MSSQL database (on page 320))
324
You can use the ctmsec batch utility to export and import Control-M Security Definition tables. The file
that is generated by the ctmsec command is an executable file containing API functions that redefines all
the security entries when the script runs. The generated file can be modified and imported to any
Control-M installation.
325
Invoke the util utility with -export and -type audit, using the following syntax:
util -U DBO_name -P DBO_password -export -type audit
The following procedures describe how to perform periodic Control-M/EM database maintenance and
cleanup:
327
Uses a current database server, it is the responsibility of the database administrator to truncate this
file on a regular basis
UNIX: $CONTROLM_SERVER/proclog
Windows: <ctm_installation>\proclog
The proclog file from the previous session is saved to one of the following locations:
UNIX: $CONTROLM_SERVER/proclog.sav
Windows: <ctm_installation>\proclog.sav
The higher the trace level, the larger the log files. If Control-M/Server entities operate for a long time
using a trace level greater than zero, these log files utilize a large amount of disk space.
The following procedures describe how to perform periodic Control-M/Server database cleanup
procedures:
328
Description
12^31
Default: -1 (In the shipped config.dat, the default value is overridden by 10.)
Refresh Type: Recycle
OS_DIAG_LIMIT_LOG_ Maximum size (MB) of diagnostic log files for a process or a thread.
FILE_SIZE
Valid values:
12^31
Default: -1 (In the shipped config.dat, the default value is overridden by 10.)
Refresh Type: Recycle
329
13
13
User Exits
A user exit is a user-defined procedure that can be used to modify certain information before it is
processed. At certain points in processing, a flat text file is produced describing information that is to be
passed to the next step in a procedure. This text file can be modified by a user-defined exit script before
it is passed on for processing.
Control-M/Server user exits can be used to enforce site standards (for example, file naming conventions
or valid date formats), and to apply security definitions to limit certain users actions. Exits can also be
used to trigger other actions prior or subsequent to execution of a Control-M job.
EXAMPLE: A flat text file is produced containing parameters to be processed by Control-M. The name of
the text file is passed as a parameter to the user exit script. The user exit script runs, and is
often used to modify the contents of the text file. However, it can also be used to perform
any other action (for example, to copy information from the text file to another location).
Control-M then continues processing using the modified text file.
User exits are implemented only if they have been enabled by setting the appropriate configuration
parameters.
To implement user exits, see Implementing User Exits in Control-M/Server (on page 330).
To view available user exits, see Control-M general user exits (on page 331).
UNIX: <controlmOwner>/ctm_server/data/config.dat
Windows: <productDirectory>\ctm_server\data\config.dat
3. Do the following:
a. Enable Control-M exits: Ensure that the value of the CTM_PRM_ENABLE_UE parameter is set to Y
(default).
b. Enable specific user exits: Set the value of the relevant CTM_PRM_ENABLE_UEnnn configuration
parameters to Y (nnn is the numeric part of the user exit name, valid values 101-106).
c. In the CTM_PRM_TIMEOUT_UEnnn configuration parameter, set the maximum time to wait
for the associated user exit script to run before it is terminated (where nnn is the numeric part of
the user exit name, valid values 101-106).
UNIX: Time is measured in units of seconds.
330
UNIX: ctm_exitnnn.sh (nnn is the numeric part of the user exit name, valid values 101-106).
Windows: ctm_exitnnn.bat (nnn is the numeric part of the user exit name, valid values
101-106).
UNIX: controlmOwner/ctm_server/ue_exit
Windows: <productDirectory>\ctm_server\ue_exit
Description
Job Submission Exit (CTMUE102) Executes for each Control-M job before it is submitted for
(on page 333)
execution
Before New Day Procedure Exit
(CTMUE103) (on page 335)
331
JOBNAME daily_job
JOBNO 30
DESCRIPT
APPLIC STRESS
APPLGROUP STRESS
SCHEDTAB STRESS
AUTHOR ctm600
OWNER ctm600
PRIORITY 0
CRITICAL N
CYCLIC N
RETRO N
AUTOARCH N
TASKCLASS
CYCLICINT 0
TASKTYPE C
DATEMEM
NODEGRP
computer
NODEID
DOCLIB
DOCMEM
MEMLIB
MEMNAME
OVERLIB
CMDLINE ./stress_cmd_spl.ctm600
MAXRERUN 0
MAXDAYS 0
MAXRUNS 0
FROMTIME
UNTIL
MAXWAIT 0
DAYSTR ALL
332
WDAYSTR
MONTHSTR YYYYYYYYYYYY
AJFSONSTR NNNNNNNNNNNNN
CONF N
UNKNOWNTIM 0
DAYSCAL
WEEKCAL
CONFCAL
CAL_ANDOR O
SHIFT
ADJUST_COND
STARTENDCYCIND S
CREATIONUSERID ctm600
CREATIONDATETIME 20001113070229
CHANGEUSERID
CHANGEDATETIME
RELATIONSHIP
GROUPID 0
TABROWNO 1
EXAMPLE: The following exit script changes the Days parameter (DAYSTR) for jobs that were scheduled
on the first day of the month, so that these jobs are ordered on the second day of the month.
#!/bin/ksh
cp $1 /tmp/ue101.$$
sed -e 's/DAYSTR 1/DAYSTR 2/' /tmp/ue101.$$ > $1
JOBNO 0
ORDERNO 19450
PRIORITY 1039
CRITICAL N
TASKTYPE C
333
CYCLIC N
CONFIRM_R N
CONFIRMED N
RETRO N
AUTOARCH N
TASKCLASS
HOLDFLAG N
STATUS N
STATE E
CYCLICINT 0
APPLGROUP dw_S_A_AAS
NODEGRP
NODEID fire
MEMLIB /mdw/oper/tgt/scripts/shells
MEMNAME dw##r#####
OVERLIB /mdw/oper/tgt/scripts/shells/overlib_all
CMDLINE sleep 30
ODATE 19960229
PROCID
RERUN_NO 0
OSCOMPSTAT 0
OSCOMPMSG
NEXTTIME
PREVDATE
NEXTDATE
STARTRUN
ENDRUN
MAXRERUN 0
FROMTIME
UNTIL
JOBNAME dwlnr21AAS
SCHEDTAB CREATED
OWNER ctm600
MAXWAIT 7
APPLIC DW_ln
334
RUNCOUNT 1
DAILYNAME ctm600
AJFSONSTR YYNNYNNNNNNNN
DESCRIPT Datawarehouse ln snapshot sort and form
DOCMEM dwlnr1
DOCLIB /mdw/cntlm/doc
MAXDAYS 0
MAXRUNS 0
UNKNOWNTIM 0
STARTENDCYCIND S
TRIGGER_TAG
GROUP_ORD 0
AUTHOR
EXAMPLE: The following exit script checks if the job has a Owner of root and changes the Owner for
these jobs to nobody.
#!/bin/ksh
cp $1 /tmp/ue102.$$
sed -e 's/OWNER root/OWNER nobody/' /tmp/ue102.$$ > $1
DAILY_NAME SYSTEM
TIME 1300
ODATE 20001121
EXAMPLE: The following exit script runs a procedure that performs various actions before the New Day
procedure is run.
#!/bin/ksh
/opt/controlm/scripts/run_pre_New_Day_proc
335
DAILY_NAME SYSTEM
TIME 1319
ODATE 20001121
EXAMPLE: The following exit script runs a procedure that performs various actions after completion of
the New Day procedure.
#!/bin/ksh
/opt/controlm/scripts/run_post_New_Day_proc
DAILY_NAME my_daily
TIME 1321
ODATE 20001121
DAILY_NAME my_daily
TIME 1322
ODATE 20001121
If the User Daily job fails, the User Exit 106 (UE106) will not be executed.
336
14
14
Configuring BMC Service Impact Manager on Microsoft Windows (on page 337)
Configuring the Control-M BMC Batch Impact Manager computer (on page 339)
For BMC Service Impact Manager versions earlier than version 5.0.00, copy the contents of the
bim_impact\dynamic subdirectory.
For BMC Service Impact Manager 5.0.x, copy the contents of the
bim_impact\static subdirectory.
3. Edit the first three lines of the load.cmd file, as described in load.cmd file parameters (on page 338).
337
Details
MASTERCELL_HOME
CELLID
PERL
338
For BMC Service Impact Manager versions earlier than version 5.0.00, copy the contents of the
bim_impact/dynamic subdirectory.
For BMC Service Impact Manager 5.0.x, copy the contents of the
bim_impact/static subdirectory.
3. Copy the ctm_bim_classes.baroc file to the BMC SIM classes directory, called
%MCELL_HOME%/etc/%CELLID%/kb/classes.
4. Add "ctm_bim_classes" to the end of the .load file, located in
%MCELL_HOME%/etc/%CELLID%/kb/classes/.load
5. Copy the ctm_bim_rules.mrl file to SIM rules directory, called
%MCELL_HOME%/etc/%CELLID%/kb/rules.
6. Add "ctm_bim_rules" to the end of the .load file, located at
%MCELL_HOME%/etc/%CELLID%/kb/rules/.load.
The BMC SIM engine compiles all files listed in this file.
7. Run the following command to compile the database:
%MCELL_HOME%/server/bin/mccomp" -v
%MCELL_HOME%/server/etc/%CELLID%/kb/manifest.kb
8. Run the following commands to reload the database:
%MCELL_HOME%/bin/mcontrol -n
%CELLID%
reload data
%MCELL_HOME%/bin/mcontrol -n
%CELLID%
reload kb
%MCELL_HOME%/bin/mcontrol -n
%CELLID%
reload collect
UNIX: $EM_HOMEForTheControl-M/EMUserAccount/ctm_em/etc/BIM/ImpactClient
2. Edit the cell parameter line in the mcell.dir file by entering the correct SIM parameters, computer,
and port number (default port is 1828) in the following format:
cell SIMCELL mc COMPUTER:PORT
3. Save the mcell.dir file.
339
Periodic statistics entries that are not updated for a specified duration of time are considered obsolete and
are removed from the database. The user specifies the duration of the time by setting the
RunInfoStatsPurgeDays parameter (Type: cms) to the required number of days.
The Control-M Configuration Manager server automatically purges the database of obsolete statistics
records at specific intervals. The user determines the interval between purges by setting the
RunInfoStatsPurgeInterval parameter (type: cms) to the required number of minutes.
340
15
15
Remedy configuration
You can configure the connection to the Remedy server and test the connection with the new parameters
by using the following interactive utilities:
These utilities enable you to set the Remedy server hostname, port, username, and password.
NOTE: When the Remedy server is configured to use a port mapper, the Remedy port must be set to 0
(default), otherwise the port is the Remedy server port.
The following sections describe how to configure the Remedy connection parameters, to change Remedy
incident information and create an incident form from the indirect process.
emremedy_configure (Control-M/EM)
remedy_configure (Control-M/Server)
2. Select the appropriate menu items and type the required information.
3. Type s.
Your configuration settings are saved.
341
Connection settings: Enables you to configure the Remedy server connection through either
emremedy_configure or remedy_configure. For more information, see: Remedy configuration (on
page 341).
Configuration settings: Enables you to configure settings for Remedy server version 6
Configuration settings: Enables you to configure settings for Remedy server version 7
Each Remedy server version contains action configurations for opening and closing incidents, which
contain the schema or form name as shown in the following table.
Server
Action
Form
Remedy 7
Open
HPD: IncidentInterface_Create
Close
HPD: IncidentInterface
Open
HPD: IncidentInterface_Create
Close
HPD: IncidentInterface
Remedy 8
An incident form is created either directly (the default process for Remedy 6) or indirectly (the default
process for Remedy 7) by the Remedy server. When the indirect process is used to create an incident
form, the Remedy sever initially creates an intermediate form that contains an ID number that identifies
the real (target) form. The intermediate form must be resolved to obtain the real form ID. To create an
incident form, see: Creating an incident form (on page 343).
When Remedy incidents are created, default values are used for each of the Remedy incident fields.
Each Remedy incident field consists of the following attributes:
Data Type - either a string field (indicated by the number 4) or a selection field (indicated by the
number 6)
The Remedy field ID values for additional Remedy fields must be obtained from the Remedy
administrator.
The configuration file contains the following built-in Remedy fields that are automatically populated by
BMC Batch Impact Manager and Control-M/Server.
342
Summary
Note
Urgency
For the RealFormFieldID, specify a field ID number that will contain the real form ID.
NOTE: The built-in fields are used to resolve the field ID in the Remedy form. When BMC Batch
Manager or Control-M/Server creates an incident, the built-in fields are automatically resolved,
overwriting any values that may have been manually specified. For more information about Remedy
fields and parameters, see the Remedy documentation.
Batch Discovery
Batch Discovery utility outputs Business Service information and their dependent computer systems into
CSV files.
In BMC Atrium Core and BMC Atrium Integrator, you can transform your output from CSV files into CMDB
classes and create dependencies between them.
Each CSV file corresponds to one transformation. Transformations can be grouped into jobs to ensure that
they run in a correct sequence. For example:
Step 3:Lookup the endpoints for the newly created classes and insert a dependency class instance
into CMDB.
The following only applies to the first two transformations; BMC_BusinessService and
BMC_ComputerSystem.
Each CSV file output by Batch Discovery corresponds to one transformation in BMC Atrium Spoon. For
more information, see CSV file ouput (on page 344).
When creating the transformations for the first time, there are several procedures you have to do, as
described in:
343
Creating the CMDB output for a Business Service (on page 346)
After you have completed these procedures, you can run the transformations, as described in Running the
transformation and checking the CMDB classes (on page 353), and create dependencies between the
Business Services and the relevant computer systems. For more information, see Connecting the
computer system to the Business Service (on page 350).
You can use the transformations you created before to import CSV files into Remedy, without creating
new rules and jobs. For more information, see Running Batch Discovery for a second time (on page 353).
BMC_BusinessService.csv
BMC_BusinessService
BMC_ComputerSystem.csv
BMC_ComputerSystem
BMC_Mainframe.csv
BMC_Mainframe
BMC_MFVirtualSystem.csv
BMC_Sysplex.csv
BMC_Cluster.cs
BMC_Cluster
344
Variable
Type
ShortDescriptionNA
na
String
MarkAsDeletedN
Intege
345
Comparator:=
346
Target Fields
Update
Name
Name
Z1DTmpField1
BatchServer
Z1DTmpField2
BatchServiceID
Z1DTmpField3
BatchServerURL
MarkAsDeleted
MarkAsDeletedN
ShortDescription
ShortDescriptionNA
347
Variable
Type
HardDatasetId
BMC.CTM
String
ShortDescriptionNA
N/A
String
FromBatchService
SERVICEDELIVEREDBY
String
FromCluster
HOSTEDLOGICALSYSTEM
String
MarkAsDeletedN
Integer
HasImpactY
Integer
ImpactDirection
20
Integer
Comparator: =
5. Map the fields to their counterparts in the CSV file, as described in Computer system field updates (on
page 349).
The CMDB output is saved in the draft dataset.
348
Value
Step Name
BMC.ComputerSystem
Connection
Class Name
Choose BMC_ComputerSystem
Namespace
BMC.CORE
DatasetId
BMC.CTM
Commit Size
100
TokenId
Stream Field
Update
ShortDescription
ShortDescription
HostName
HostName
Domain
Domain
Name
Name
NameFormat
NameFormat
349
350
Value
Step Name
CMDB Lookup
Connection
ARServerProd
Class Name
BMC_ComputerSystem
Name space
BMC_CORE
Dataset Id
BMC.CTM
TokenId
Field: InstanceId
New Name:ComputerInstID
Type:String
Check
351
Value
Step Name
CMDB Lookup 2
Connection
ARServerProd
Class Name
BMC_BusinessService
Name space
BMC_CORE
Dataset Id
BMC.CTM
TokenId
Field: InstanceId
New Name:BatchServiceInstID
Type:String
Check
Comparator
Stream field1
Source.InstanceId
BatchServiceInstID
Destination.InstanceId
ComputerInstId
Name
FromBatchService
352
Stream field
Submitter
Submitter
DatasetId
HostName
ShortDescription
ShortDescriptionNA
MarkAsDeleted
MarkAsDeletedN
HasImpact
HasImpactY
ImpactDirection
ImpactDirection
353
354