Z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)

Total Page:16

File Type:pdf, Size:1020Kb

Z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4) z/OS 2.4 Common Information Model User's Guide IBM SC34-2671-40 Note Before using this information and the product it supports, read the information in “Notices” on page 335. This edition applies to Version 2 Release 4 of z/OS (5650-ZOS) and to all subsequent releases and modifications until otherwise indicated in new editions. Last updated: 2021-04-26 © Copyright International Business Machines Corporation 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures................................................................................................................. xi Tables................................................................................................................ xiii Abstract.............................................................................................................. xv How to send your comments to IBM.................................................................... xvii If you have a technical problem............................................................................................................... xvii z/OS information................................................................................................ xix Summary of changes...........................................................................................xxi Summary of changes for z/OS Common Information Model User's Guide for Version 2 Release 4 (V2R4)...................................................................................................................................................xxi Summary of changes for z/OS V2R3......................................................................................................... xxi General content changes for z/OS Common Information Model........................................................xxi Summary of changes for z/OS Common Information Model User's Guide for Version 2 Release 2 (V2R2).................................................................................................................................................. xxii Message changes for z/OS Common Information Model User's Guide.............................................xxii Code changes for z/OS Common Information Model User's Guide..................................................xxiii Interface changes for z/OS Common Information Model User's Guide........................................... xxiii General content changes for z/OS Common Information Model User's Guide................................xxiv Part 1. Introduction and concepts.......................................................................... 1 Chapter 1. Introduction............................................................................................................................... 3 Chapter 2. CIM indication concept.............................................................................................................. 7 Indication delivery retry......................................................................................................................... 7 How indications work............................................................................................................................. 8 Chapter 3. z/OS CIM security concept...................................................................................................... 11 Part 2. Installation and setup...............................................................................15 Chapter 4. Installation...............................................................................................................................17 Migration from a previous z/OS release...............................................................................................17 Fallback to a previous z/OS release.....................................................................................................18 Chapter 5. Quick guide: CIM server setup and verification...................................................................... 19 Step 1: Setting up the security for the CIM server.............................................................................. 19 Quick security setup for RACF........................................................................................................19 Security setup for a production environment................................................................................ 20 Step 2: Customizing the file systems and directories......................................................................... 20 Step 3: Using default TCP/IP ports 5988 and 5989............................................................................20 Step 4: Starting the CIM server............................................................................................................21 Step 5: Customizing the UNIX System Services shell.........................................................................21 Step 6: Running the installation verification program (IVP)............................................................... 21 iii Chapter 6. CIM server security setup........................................................................................................23 Defining a CIM server user ID.............................................................................................................. 23 Configuring the resource authorization model of the CIM server.......................................................24 Enabling the must-stay-clean feature............................................................................................25 Setting up program control.............................................................................................................25 Granting clients and administrators access to the CIM server........................................................... 26 Switching identity (surrogate)..............................................................................................................27 Configuring the CIM server HTTPS connection using AT-TLS............................................................. 27 Example: Configuring AT-TLS for secure communication..............................................................28 Defining the CFZAPPL profile for the APPL class.................................................................................32 Defining an encryption key for PassTicket validation..........................................................................32 Setting up multilevel security (MLS) support...................................................................................... 32 Considering Automatic Restart Manager security...............................................................................33 Chapter 7. CIM provider setup and security............................................................................................. 35 Setting up the CIM server for RMF monitoring.................................................................................... 35 Setting up the CIM server for network providers................................................................................ 36 Setting up the CIM server for Cluster, CoupleDataset, and JES2-JES3Jobs providers..................... 36 PARMLIB updates........................................................................................................................... 36 RACF setup......................................................................................................................................37 Sysplex couple dataset formatting.................................................................................................37 JES authorities................................................................................................................................ 38 Setting up the CIM server for WLM management............................................................................... 39 Setting up the CIM server for storage management........................................................................... 39 Running providers in a designated user context................................................................................. 40 Utilizing the provider based authorization model............................................................................... 41 Chapter 8. Customization.......................................................................................................................... 43 Configuring the ports for the CIM server............................................................................................. 43 Customizing CFZRCUST....................................................................................................................... 44 Prerequisites................................................................................................................................... 44 Option 1: Placing /var/wbem in a separate file system............................................................... 44 Option 2: Using an existing file system for /var/wbem................................................................ 45 System specific directories.............................................................................................................45 Considerations for customizing CIM Server in a z/OS Sysplex......................................................46 Customizing the CIM server startup...................................................................................................
Recommended publications
  • Open Virtualization Format Specification
    1 2 Document Number: DSP0243 3 Date: 2013-12-12 4 Version: 2.1.0 5 Open Virtualization Format Specification 6 Document Type: Specification 7 Document Status: DMTF Standard 8 Document Language: en-US Open Virtualization Format Specification DSP0243 9 Copyright notice 10 Copyright © 2010-2013 Distributed Management Task Force, Inc. (DMTF). All rights reserved. 11 DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems 12 management and interoperability. Members and non-members may reproduce DMTF specifications and 13 documents, provided that correct attribution is given. As DMTF specifications may be revised from time to 14 time, the particular version and release date should always be noted. 15 Implementation of certain elements of this standard or proposed standard may be subject to third party 16 patent rights, including provisional patent rights (herein "patent rights"). DMTF makes no representations 17 to users of the standard as to the existence of such rights, and is not responsible to recognize, disclose, 18 or identify any or all such third party patent right, owners or claimants, nor for any incomplete or 19 inaccurate identification or disclosure of such rights, owners or claimants. DMTF shall have no liability to 20 any party, in any manner or circumstance, under any legal theory whatsoever, for failure to recognize, 21 disclose, or identify any such third party patent rights, or for such party’s reliance on the standard or 22 incorporation thereof in its product, protocols or testing procedures. DMTF shall have no liability to any 23 party implementing such standard, whether such implementation is foreseeable or not, nor to any patent 24 owner or claimant, and shall have no liability or responsibility for costs or losses incurred if a standard is 25 withdrawn or modified after publication, and shall be indemnified and held harmless by any party 26 implementing the standard from any and all claims of infringement by a patent owner for such 27 implementations.
    [Show full text]
  • [MS-WMI]: Windows Management Instrumentation Remote Protocol
    [MS-WMI]: Windows Management Instrumentation Remote Protocol Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation (“this documentation”) for protocols, file formats, data portability, computer languages, and standards support. Additionally, overview documents cover inter-protocol relationships and interactions. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you can make copies of it in order to develop implementations of the technologies that are described in this documentation and can distribute portions of it in your implementations that use these technologies or in your documentation as necessary to properly document the implementation. You can also distribute in your implementation, with or without modification, any schemas, IDLs, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications documentation. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that might cover your implementations of the technologies described in the Open Specifications documentation. Neither this notice nor Microsoft's delivery of this documentation grants any licenses under those patents or any other Microsoft patents. However, a given Open Specifications document might be covered by the Microsoft Open Specifications Promise or the Microsoft Community Promise. If you would prefer a written license, or if the technologies described in this documentation are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected].
    [Show full text]
  • Dell Command | Monitor Version 9.2 User's Guide Notes, Cautions, and Warnings
    Dell Command | Monitor Version 9.2 User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2008 - 2017 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. 2017 - 01 Rev. A00 Contents 1 Introduction..................................................................................................................... 5 What's new in this release.................................................................................................................................................. 5 Dell Command | Monitor overview......................................................................................................................................6 2 Features..........................................................................................................................8 CIM schema support.......................................................................................................................................................... 8 BIOS settings configuration and enumeration.....................................................................................................................8
    [Show full text]
  • CIM and IBM I: What It Is and How It Works
    CIM and IBM i: What it is and how it works Li Gong Liu January 29, 2013 This article provides basic knowledge about Common Information Model (CIM) and explains how CIM works on IBM® i. It helps you understand CIM and the Web Based Enterprise Management (WBEM) technology, and briefs the relationship between the standardized technology and IBM i. What is CIM If you are new to CIM with IBM i knowledge, you are in the right place. CIM provides a standard way to model and expose management information. CIM has been available on IBM i since V5R4 by loading the IBM Universal Manageability Enablement (UME) licensed program, and 5770-UME license program is included in IBM i 6.1 and IBM i 7.1 with enhanced functions. Currently, it is free for use and is mainly used as an agent of IBM Systems Director to retrieve and monitor IBM i resources. CIM is one of the core standards of WBEM. WBEM is the set of management and Internet standard technologies that defines how data can be exchanged between the ever increasing disparate networks, devices, and applications used in today's IT environment. The Distributed Management Task Force (DMTF) defines the standards for WBEM, which includes CIM that can promote multivendor interoperability (and this is the base goal of WBEM). On IBM i, CIM is a specific product that is delivered. Combining CIM with the other products that IBM i provides, the complete WBEM solution can be provided. Often, WBEM functions are simply referred to as CIM. An example from Systems Director is CIM monitors.
    [Show full text]
  • DMTF Management Standards for Edge Virtual Bridging (EVB) and Network Port Profiles
    DMTF Management Standards for Edge Virtual Bridging (EVB) and Network Port Profiles Hemal Shah, Associate Technical Director, Broadcom Corporation DMTF Platform Management Sub-Committee Chair March, 2011 www.broadcom.com Agenda • DMTF Overview • IEEE/DMTF Areas of Collaboration • DMTF Standards for EVB Management and Network Port Profiles • VM Lifecycle Management • Open Virtualization Format (OVF) • Network Port Profiles • CIM Profiles for Virtual Networking Distributed Management Task Force (DMTF) • Develops management standards for enterprise and Internet environments • Formed in 1992 • More than 4,000 active participants – from nearly 200 organizations in over 40 countries • 3 Major committees and 25+ Working Groups/Forums – Committees: Technical, Marketing, Interoperability… • Over a dozen Alliance Partners • SNIA, OGF/GGF, NGN, TMF, TCG, OASIS, etc. • Developed standards & initiatives • CIM, CIM-XML, SMBIOS, CDM, ASF, SMASH, DASH, WS-Management… DMTF Technology Diagram DASH – Desktop and Mobile Architecture for CIM – Common Information Model System Hardware WBEM – Web Based Enterprise Management SMASH – System Management Architecture for OVF – Open Virtualization Format Server Hardware MOF – Managed Object Format SMI – Storage Management Initiative WS-Man – Web Services Based Management CDM – Common Diagnostics Model VMAN – Virtualization Management 3 DMTF Technical Committee Organization http://www.dmtf.org/about/working-groups Platform Management Sub-Committee Overview • Cloud Management Working Group (CMWG) – Focuses on management
    [Show full text]
  • Design of a WBEM-Based Management System for Ubiquitous Computing Servers
    Design of a WBEM-based Management System for Ubiquitous Computing Servers So-Jung Lee1, Mi-Jung Choi1, Sun-Mi Yoo1, James W. Hong1 Hee-Nam Cho2, Chang-Won Ahn2, Sung-In Jung2 1Dept. of Computer Science and Engineering, POSTECH 2Digital Home Research Division, ETRI {annie, mjchoi, sunny81, jwkhong}@postech.ac.kr, {hncho, ahn, sijung}@etri.re.kr Abstract As the Internet evolves and wireless network technologies develop, people’s need to get a network service at anytime from anywhere is growing, and the age of ubiquitous computing is coming in earnest. A ubiquitous computing server receives and processes lots of information from various sensors in a ubiquitous computing environment and plays a role in providing various useful services. In this paper, we analyze the requirements for managing the ubiquitous computing servers based on WBEM technologies which are being standardized in DMTF. We present the design of our management system, which satisfies the requirements. We also examine and compare available WBEM implementations by performing benchmarking testing. Based on the benchmarking results, we present our choice of WBEM implementation, which is being used for implementing our ubiquitous computing server management system. 1. Introduction As the Internet continues to grow and the wired/wireless network evolves, users want to get various services at anytime and anywhere by connecting to the network. The idea used to realize this service is ubiquitous computing. Ubiquitous computing is a new paradigm for distributed interactive systems, which moves computers into the background of people's attention while using them to support their activities and interactions in the workplace and beyond.
    [Show full text]
  • Supervision of Computer Equipment in ABB Operateit Using WMI
    ISSN 0280-5316 ISRN LUTFD2/TFRT--5655--SE Supervision of computer equipment In ABB OperateIT using WMI Jens Axelsson Department of Automatic Control Lund Institute of Technology October 2000 Department of Automatic Control Document name MASTER THESIS Lund Institute of Technology Date of issue Box 118 October 2000 SE-221 00 Lund Sweden Document Number ISRN LUTFD2/TFRT—5655--SE Author(s) Supervisor Jens Axelsson Jan Gjerseth ABB Karl-Erik Årzén LTH Sponsoring organization Title and subtitle Supervision of computer equipment in ABB operateIT using WMI (Övervakning av datorutrustning i ABB OperateIT med hjälp av WMI) Abstract This document details the investigation and implementation of a product intended for supervision and management of standard computer and office equipment. The product is run from inside the ABB OperateIT Platform, as an Aspect System. The Aspect receives its data through communication with the CIM Object Manger, as suggested in the WBEM Initiative. The document also details the WBEM Initiative and some the standards brought forward by this initiative. Keywords Classification system and/or index terms (if any) Supplementary bibliographical information ISSN and key title ISBN 0280-5316 Language Number of pages Recipient’s notes English 66 Security classification The report may be ordered from the Department of Automatic Control or borrowed through: University Library 2, Box 3, SE-221 00 Lund, Sweden Fax +46 46 222 44 22 E-mail [email protected] Master Theses at: Lund Institute of Technology Author: Jens Axelsson Examiner: Karl-Erik Årzén, Associate Professor in Automatic Control Supervisor: Jan Gjerseth Site: ABB Automation Products AB Document number: 3BSE022901/0.6 OperateIT WMI Powered Aspect Abstract This document details the investigation and implementation of a product intended for supervision and management of standard computer and office equipment.
    [Show full text]
  • Dell Command | Monitor Version 9.1.2 User's Guide Notes, Cautions, and Warnings
    Dell Command | Monitor Version 9.1.2 User's Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2008 - 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. 2016 - 06 Rev. A00 Contents 1 Introduction........................................................................................................... 5 Dell Command | Monitor overview...................................................................................................... 5 Dell Command | Monitor architecture................................................................................................. 6 What's new in this release..................................................................................................................... 7 Features..................................................................................................................................................7 CIM 2.17 schema support................................................................................................................7
    [Show full text]
  • Dell™ Openmanage™ Client Instrumentation Version 7.6 User's
    Dell™ OpenManage™ Client Instrumentation Version 7.6 User’s Guide www.dell.com | support.dell.com Notes and Notices NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. ____________________ Information in this document is subject to change without notice. © 2008 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, OpenManage, Latitude, OptiPlex, and Dell Precision are trademarks of Dell Inc.; Intel is a trademark of Intel Corporation in the U.S. and other countries; Altiris is a registered trademark of Altiris Inc.; Microsoft, Windows, and Windows Vista are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. June 2008 Contents 1 Introduction . 7 CIM Overview . 7 WMI Overview . 8 Data Sources Used by OMCI. 8 OMCI Architecture . 9 Features . 11 CIM 2.6 Schema Support . 11 Dell LegacySelect 2.0 Support . 11 Remote Boot Device Select . 12 WMI Security . 12 Event Reporting . 12 Remote Shutdown . 13 Remote Wake-Up Configurability. 13 WfM Version 2.0 Compliance. 13 What's New . 13 Supported Operating Systems .
    [Show full text]
  • A Year-In-Review with Jeff Hilland Prepare Now for 2019 Membership Dues and Changes in Case You Missed It • Youtube • Upcoming Events • More!
    Subscribe Past Issues Translate News from the DMTF View this email in your browser December 2018 Issue Highlights A Year-in-Review with Jeff Hilland Prepare Now for 2019 Membership Dues and Changes In Case You Missed It • YouTube • Upcoming Events • More! A Year-in-Review with Jeff Hilland Every year in our December issue, we take the opportunity to pause and reflect on the last twelve months. As we wrap up another highly productive year for DMTF, I’m happy to highlight the vast list of accomplishments the organization achieved in 2018: Technical Milestones Redfish Technical work on the Redfish® standard takes place in DMTF's Redfish Forum (formerly known as the Scalable Platforms Management Forum, or SPMF), with significant progress this year including: In April, DMTF announced that its Redfish standard has been adopted and published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) as ISO/IEC 30115:2018. Redfish’s publication by ISO/IEC as an International standard for Information Technology is expected to further accelerate worldwide adoption and interoperability. Redfish 2018.1 was released in May, with additional schemas for LDAP/ActiveDirectory support, as well as Server Sent-Eventing (SSE), and more. As part of the Redfish 2018.1 release, DMTF also debuted its new Redfish Resource and Schema Guide – a human- readable guide to the Redfish Schema to help educate users of Redfish. In September, updated Redfish DCIM Schemas were released as version 0.8 of the Redfish Data Center Equipment (DCIM) Model. Also in September, Redfish version 2018.2 was released, adding support for OpenAPI 3.0, as well as telemetry streaming and eventing, and improved event subscription methods.
    [Show full text]
  • DMTF Tutorial > Introduction
    DMTF Tutorial > Introduction Introduction Technology Overview Introduction Common Information Model Welcome to the Distributed Management Task Force (DMTF) Tutorial. This tutorial will Web Based Enterprise familiarize you with the DMTF's organization, standards and initiatives. Management This tutorial is designed for both beginner and intermediate users. This tutorial is designed Profiles for management application developers, instrumentation developers, information Initiatives technology (IT) managers and system administrators. To better understand the terminology and concepts used in this tutorial, you should have a basic understanding of DMTF object-oriented concepts and the Unified Modeling Language (UML) is required. Glossary Tutorial Requirements To view this tutorial you will need the following: ● Netscape Navigator or Internet Explorer version 4.0 or later ● 800 x 600 or higher screen resolution Tutorial Navigation You can navigate through this tutorial in the following ways: ● Index - Click any link in the index on the left-hand side of the screen to go directly to that topic. For example, if you are already familiar with the Common Information Model and are interested only in learning about the CIM Schema, click the Common Information Model link in the index and then click CIM Schema from the navigation tool bar ● Next/Back - To read the tutorial in order, just click on the Next image in the lower right-hand corner of the screen. Note: If you click on a link or access the glossary you must use the index to return to the tutorial. Downloading the Tutorial To run the tutorial locally on your computer, download the DMTF Tutorial file. Copyright © 2002-2006 Distributed Management Task Force, Inc.
    [Show full text]
  • Common Information Model (CIM) Infrastructure
    1 2 Document Number: DSP0004 3 Date: 2012-04-22 4 Version: 2.7.0 5 Common Information Model (CIM) Infrastructure 6 Document Type: Specification 7 Document Status: DMTF Standard 8 Document Language: en-US Common Information Model (CIM) Infrastructure DSP0004 9 Copyright Notice 10 Copyright © 1997, 2012 Distributed Management Task Force, Inc. (DMTF). All rights reserved. 11 DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems 12 management and interoperability. Members and non-members may reproduce DMTF specifications and 13 documents, provided that correct attribution is given. As DMTF specifications may be revised from time to 14 time, the particular version and release date should always be noted. 15 Implementation of certain elements of this standard or proposed standard may be subject to third party 16 patent rights, including provisional patent rights (herein "patent rights"). DMTF makes no representations 17 to users of the standard as to the existence of such rights, and is not responsible to recognize, disclose, 18 or identify any or all such third party patent right, owners or claimants, nor for any incomplete or 19 inaccurate identification or disclosure of such rights, owners or claimants. DMTF shall have no liability to 20 any party, in any manner or circumstance, under any legal theory whatsoever, for failure to recognize, 21 disclose, or identify any such third party patent rights, or for such party’s reliance on the standard or 22 incorporation thereof in its product, protocols or testing procedures. DMTF shall have no liability to any 23 party implementing such standard, whether such implementation is foreseeable or not, nor to any patent 24 owner or claimant, and shall have no liability or responsibility for costs or losses incurred if a standard is 25 withdrawn or modified after publication, and shall be indemnified and held harmless by any party 26 implementing the standard from any and all claims of infringement by a patent owner for such 27 implementations.
    [Show full text]