Custom Command Agent User Guide

Total Page:16

File Type:pdf, Size:1020Kb

Custom Command Agent User Guide Custom Command Agent User Guide 1.6 VMC-Mxx VISUAL Message Center Custom Command Agent User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright Notice Copyright © 2013 Tango/04 All rights reserved. Document date: August 2012 Document version: 1.01 Product version: 1.6 No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic mechani- cal, magnetic, optical, chemical, manual, or otherwise, without the prior written permission of Tango/04. Trademarks Any references to trademarked product names are owned by their respective companies. Technical Support For technical support visit our web site at www.tango04.com. Tango/04 Computing Group S.L. Avda. Meridiana 358, 5 A-B Barcelona, 08027 Spain Tel: +34 93 274 0051 Table of Contents Table of Contents Table of Contents.............................................................................. iii How to Use this Guide........................................................................vi Chapter 1 Introduction .....................................................................................1 1.1. What You Will Find in this Document..............................................................2 Chapter 2 Before You Begin ..............................................................................3 Chapter 3 Windows Host Requirements...............................................................4 3.1. Checking for Administrative Shares in the Remote Host ................................4 3.2. Checking the Remote Service Manager Access in the Remote Host.............5 Chapter 4 Linux/Unix-based Host Requirements ..................................................7 4.1. Checking a SSHv2 Connection Availability with the Putty Client....................7 4.1.1. Checking Command Permissions and Availability ....................................8 © 2013 Tango/04 Computing Group Page iii Table of Contents Chapter 5 Configuration of Data Sources ..........................................................10 5.1. General Settings ...........................................................................................10 5.1.1. Main Information .....................................................................................11 5.1.2. Target Host Settings ...............................................................................11 5.1.3. Connection Settings................................................................................12 5.1.4. Linux/Unix Specific Settings....................................................................13 5.1.5. General Settings .....................................................................................13 5.2. Command Execution Settings (Custom Command Data Source) ................14 5.3. Command Execution Settings (Advanced Custom Command Data Source)17 5.4. Command Execution Settings (Script Runner Data Source) ........................20 5.5. Variables (Advanced Custom Command Data Source)................................23 5.6. Command Output Settings............................................................................25 Chapter 6 Custom Command ThinAgent Configuration........................................29 6.0.1. General Settings ....................................................................................29 6.0.2. Parser Options ........................................................................................30 6.0.3. Table Settings .........................................................................................36 6.0.4. Default Health Settings ...........................................................................39 6.0.5. Default Message Templates ...................................................................40 6.0.6. Common Variables..................................................................................40 6.0.7. Field Map SmartConsole – ThinkServer .................................................40 Chapter 7 Advanced Custom Command ThinAgent Configuration .........................42 7.0.1. General Settings ....................................................................................42 7.0.2. Parser Options ........................................................................................43 7.0.3. Table Settings .........................................................................................44 7.0.4. Default Health Settings ...........................................................................44 7.0.5. Default Message Templates ...................................................................44 7.0.6. Common Variables..................................................................................44 7.0.7. Field Map SmartConsole – ThinkServer .................................................45 Chapter 8 Script Runner ThinAgent Configuration...............................................46 8.0.1. General Settings ....................................................................................46 8.0.2. Parser Options ........................................................................................47 8.0.3. Table Settings .........................................................................................47 © 2013 Tango/04 Computing Group Page iv Table of Contents 8.0.4. Default Health Settings ...........................................................................47 8.0.5. Default Message Templates ...................................................................48 8.0.6. Common Variables..................................................................................48 8.0.7. Field Map SmartConsole – ThinkServer .................................................48 Appendices Appendix A: Some Execution and Parsing Examples ............................50 A.1. Delimited Fields: Checking the Network Interface Connections on Windows.50 A.1.1. Checking the Requirements ...................................................................50 A.1.2. Configuring the Parser............................................................................51 A.1.3. Creating the Monitor ...............................................................................52 A.1.4. Done! ......................................................................................................58 A.2. XML Tags: Reading the Solaris Audit Trail...................................................59 A.2.1. Checking the Requirements ...................................................................59 A.2.2. Configuring the Parser............................................................................60 A.2.3. Creating the Monitor ...............................................................................60 A.2.4. Done! ......................................................................................................65 Appendix B: Regular Expressions Syntax Reference..............................68 B.1. Characters ....................................................................................................68 B.2. Characters Classes or Character Sets [abc] ................................................69 B.3. Dot ................................................................................................................70 B.4. Anchors ........................................................................................................70 B.5. Word Boundaries..........................................................................................70 B.6. Alternation ....................................................................................................71 B.7. Quantifiers ....................................................................................................71 Appendix C: Reference......................................................................73 Appendix D: Contacting Tango/04.....................................................75 About Tango/04 Computing Group ....................................................77 Legal Notice....................................................................................78 © 2013 Tango/04 Computing Group Page v How to Use this Guide How to Use this Guide This chapter explains how to use Tango/04 User Guides and understand the typographical conventions used in all Tango/04 documentation. Typographical Conventions The following conventional terms, text formats, and symbols are used throughout Tango/04 printed documentation: Convention Description Boldface Commands, on-screen buttons and menu options. Blue Italic References and links to other sections in the manual or further documentation containing relevant information. Italic Text displayed on screen, or variables where the user must substitute their own details. Monospace Input commands such as System i commands or code, or text that users must type in. Keyboard keys, such as CTRL for the Control key and F5 for the UPPERCASE function key that is labeled F5. Notes and useful additional information. Tips and hints that will improve the users experience of working with this product. Important additional information that the user is strongly advised to note. Warning information. Failure to take note of this information could potentially lead to serious problems. © 2013 Tango/04 Computing Group Page vi Introduction Chapter 1 1 Introduction The Custom Command ThinAgents are
Recommended publications
  • Xshell 6 User Guide Secure Terminal Emualtor
    Xshell 6 User Guide Secure Terminal Emualtor NetSarang Computer, Inc. Copyright © 2018 NetSarang Computer, Inc. All rights reserved. Xshell Manual This software and various documents have been produced by NetSarang Computer, Inc. and are protected by the Copyright Act. Consent from the copyright holder must be obtained when duplicating, distributing or citing all or part of this software and related data. This software and manual are subject to change without prior notice for product functions improvement. Xlpd and Xftp are trademarks of NetSarang Computer, Inc. Xmanager and Xshell are registered trademarks of NetSarang Computer, Inc. Microsoft Windows is a registered trademark of Microsoft. UNIX is a registered trademark of AT&T Bell Laboratories. SSH is a registered trademark of SSH Communications Security. Secure Shell is a trademark of SSH Communications Security. This software includes software products developed through the OpenSSL Project and used in OpenSSL Toolkit. NetSarang Computer, Inc. 4701 Patrick Henry Dr. BLDG 22 Suite 137 Santa Clara, CA 95054 http://www.netsarang.com/ Contents About Xshell ............................................................................................................................................... 1 Key Functions ........................................................................................................... 1 Minimum System Requirements .................................................................................. 3 Install and Uninstall ..................................................................................................
    [Show full text]
  • Bash Guide for Beginners
    Bash Guide for Beginners Machtelt Garrels Garrels BVBA <tille wants no spam _at_ garrels dot be> Version 1.11 Last updated 20081227 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book?.................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need?...............................................................................................................................4 9. Conventions used in this
    [Show full text]
  • Character Encodings
    Character encodings Andreas Fester June 26, 2005 Abstract This article is about the concepts of character encoding. Earlier there were only a few encodings like EBCDIC and ASCII, and everything was quite simple. Today, there are a lot of terms like UNICODE, Code- page, UTF8, UTF16 and the like. The goal of this article is to explain the concepts behind these terms and how these concepts are supported in programming languages, especially Java, C and C++. 1 Introduction Character encodings are necessary because the computer hardware can only handle (and only knows) about numbers. The first computers could handle eight bit numbers (lets take aside the very first micropro- cessors which could only handle 4 bits), which is a range from 0 to 255. Larger numbers must be handled by combining two or more eight bit values. Later, computers were enhanced so that they could handle 16-, 32- and meanwhile 64 bit numbers without having to combine smaller units. But - its still all numbers, i.e. a sequence of 0 and 1 bits. However, it soon became clear that interfacing with a computer system through sequences of 0 and 1 is very cumbersome and only possible for very simple communication. Usually an end user wants to read text like "Name:" and enter words like "Bill", so it was necessary to define some conventions how numbers correspond to letters. These conventions are generally called character encodings. 2 Single byte encoding The traditional way of assigning a code to a character is to represent each character as a byte or a part of a byte (for example six or seven bits).
    [Show full text]
  • J2 615 Integrated Touchscreen Computer
    J2 615 Integrated Touchscreen Computer System Manual March 2010 Copyright © 2009, 2010 J2 Retail Systems Change history Version 0.1 to Version 1.0 1: Fix cable pin out RJ45 to DB25 J2 Serial Cable, RTS DB25 pin wrong, DB25 SD and RD signals marked wrong. 2: Fix cable “Pin-out when using 8 wire CAT5/6 cable”, RTS DB25 and DSR pin wrong, DB25 SD and RD signals marked wrong. 615 System Manual 2 Version 1.0 March 21, 2010 Contents Overview ............................................................................................................................ 5 Specifications ..................................................................................................................... 7 System ................................................................................................................................ 9 Front View ...................................................................................................................... 9 Rear View ....................................................................................................................... 9 I/O Ports ........................................................................................................................ 10 Atom Processor ............................................................................................................. 10 System Memory ............................................................................................................ 10 On /Off Button .............................................................................................................
    [Show full text]
  • Learning the Bash Shell, 3Rd Edition
    1 Learning the bash Shell, 3rd Edition Table of Contents 2 Preface bash Versions Summary of bash Features Intended Audience Code Examples Chapter Summary Conventions Used in This Handbook We'd Like to Hear from You Using Code Examples Safari Enabled Acknowledgments for the First Edition Acknowledgments for the Second Edition Acknowledgments for the Third Edition 1. bash Basics 3 1.1. What Is a Shell? 1.2. Scope of This Book 1.3. History of UNIX Shells 1.3.1. The Bourne Again Shell 1.3.2. Features of bash 1.4. Getting bash 1.5. Interactive Shell Use 1.5.1. Commands, Arguments, and Options 1.6. Files 1.6.1. Directories 1.6.2. Filenames, Wildcards, and Pathname Expansion 1.6.3. Brace Expansion 1.7. Input and Output 1.7.1. Standard I/O 1.7.2. I/O Redirection 1.7.3. Pipelines 1.8. Background Jobs 1.8.1. Background I/O 1.8.2. Background Jobs and Priorities 1.9. Special Characters and Quoting 1.9.1. Quoting 1.9.2. Backslash-Escaping 1.9.3. Quoting Quotation Marks 1.9.4. Continuing Lines 1.9.5. Control Keys 4 1.10. Help 2. Command-Line Editing 2.1. Enabling Command-Line Editing 2.2. The History List 2.3. emacs Editing Mode 2.3.1. Basic Commands 2.3.2. Word Commands 2.3.3. Line Commands 2.3.4. Moving Around in the History List 2.3.5. Textual Completion 2.3.6. Miscellaneous Commands 2.4. vi Editing Mode 2.4.1.
    [Show full text]
  • Serial Terminal
    Serial Terminal Design Documentation William Hatch and Scott Sorensen April 2013 Table of Contents 1. Introduction 2 2. Scope 2 3. Design Overview 2 3.1 Requirements 2 3.2 Theory of Operation 3 4. Design Detail 3 4.1 Hardware Design 3 4.2 Software Design 4 4.2.1 PS/2 Keyboard Communication 4 4.2.2 USART Communication 5 4.2.3 LCD 5 4.2.4 Control Codes and Escape Sequences 6 4.2.5 Visual Effects 6 4.2.6 Onboard DAC 6 5. Verification 6 6. Conclusion 7 Appendix A: Hardware Schematic 8 Appendix B: Software Flow Charts 9 Appendix C: Verification Pictures 11 Appendix D: Source Code 12 1 1 Introduction This document describes the design of a serial computer terminal. The microcontroller reads input from a keyboard connected to the PS/2 port, outputs the input received via the RS-232 to the host computer, and then receives data from the host computer to output to the LCD screen. 2 Scope In this document is shown how to connect a microcontroller and its components to a personal computer and the software design necessary for the communication between all of the devices. This document does not cover the host computer's software nor the mechanical design of the components. 3 Design Overview 3.1 Requirements 1. The system will receive data from a PS/2 keyboard. 2. The system will be able to translate the key codes from the PS/2 keyboard to usable ASCII characters for the host computer. 3. The system will transmit and receive data to the host computer via USART 4.
    [Show full text]
  • Perl Programming
    Perl Programming Wikibooks.org December 1, 2012 On the 28th of April 2012 the contents of the English as well as German Wikibooks and Wikipedia projects were licensed under Creative Commons Attribution-ShareAlike 3.0 Unported license. An URI to this license is given in the list of figures on page 131. If this document is a derived work from the contents of one of these projects and the content was still licensed by the project under this license at the time of derivation this document has to be licensed under the same, a similar or a compatible license, as stated in section 4b of the license. The list of contributors is included in chapter Contributors on page 125. The licenses GPL, LGPL and GFDL are included in chapter Licenses on page 135, since this book and/or parts of it may or may not be licensed under one or more of these licenses, and thus require inclusion of these licenses. The licenses of the figures are given in the list of figures on page 131. This PDF was generated by the LATEX typesetting software. The LATEX source code is included as an attachment (source.7z.txt) in this PDF file. To extract the source from the PDF file, we recommend the use of http://www.pdflabs.com/tools/pdftk-the-pdf-toolkit/ utility or clicking the paper clip attachment symbol on the lower left of your PDF Viewer, selecting Save Attachment. After extracting it from the PDF file you have to rename it to source.7z. To uncompress the resulting archive we recommend the use of http://www.7-zip.org/.
    [Show full text]
  • Emeditor Manual
    Greeting Thank you for choosing EmEditor Professional. EmEditor has been used and favored by many users because of its extremely high standard of quality and reliability. EmEditor has become my masterpiece, and I put all my effort into it. I highly recommend this software to all users. EmEditor can be evolved much more with your feedback. I would appreciate it if you would consider EmEditor for long term use and contact me anytime, by e-mail or on the forums, if you have questions or comments. Yutaka Emura President, Emurasoft, Inc. November 2011 E-mail: [email protected] Web: http://www.emeditor.com/ ii Contents Contents Greeting ............................................................................................................................................... i Contents ............................................................................................................................................. ii Getting Started ................................................................................................................... 1 About License .................................................................................................................................................. 1 About Support ................................................................................................................................................. 1 Premium Support............................................................................................................................................. 1 Getting
    [Show full text]
  • Es 201 873-11 V4.9.1 (2021-06)
    ETSI ES 201 873-11 V4.9.1 (2021-06) ETSI STANDARD Methods for Testing and Specification (MTS); The Testing and Test Control Notation version 3; Part 11: Using JSON with TTCN-3 2 ETSI ES 201 873-11 V4.9.1 (2021-06) Reference RES/MTS-201873-11 v4.9.1 Keywords JSON, language, testing, TTCN-3 ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - APE 7112B Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° w061004871 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI deliverable is the one made publicly available in PDF format at www.etsi.org/deliver. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Notice of disclaimer & limitation of liability The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of experience to understand and interpret its content in accordance with generally accepted engineering or other professional standard and applicable regulations.
    [Show full text]
  • Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1
    Bash Reference Manual Reference Documentation for Bash Edition 5.1, for Bash Version 5.1. December 2020 Chet Ramey, Case Western Reserve University Brian Fox, Free Software Foundation This text is a brief description of the features that are present in the Bash shell (version 5.1, 21 December 2020). This is Edition 5.1, last updated 21 December 2020, of The GNU Bash Reference Manual, for Bash, Version 5.1. Copyright c 1988{2020 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents 1 Introduction ::::::::::::::::::::::::::::::::::::: 1 1.1 What is Bash?:::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 What is a shell? :::::::::::::::::::::::::::::::::::::::::::::::: 1 2 Definitions ::::::::::::::::::::::::::::::::::::::: 3 3 Basic Shell Features ::::::::::::::::::::::::::::: 5 3.1 Shell Syntax :::::::::::::::::::::::::::::::::::::::::::::::::::: 5 3.1.1 Shell Operation :::::::::::::::::::::::::::::::::::::::::::: 5 3.1.2 Quoting ::::::::::::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.1 Escape Character ::::::::::::::::::::::::::::::::::::: 6 3.1.2.2 Single Quotes ::::::::::::::::::::::::::::::::::::::::: 6 3.1.2.3 Double Quotes ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Computer Features
    J2 630 Integrated Touchscreen Computer System Manual December 2010 Copyright © 2010 J2 Retail Systems Change history Version 1.0 Release December 2, 2010 Version 1.1 change power usage number to match testing and add IEA “One Watt Initiative” statement. 630 System Manual 2 Version 1.1 December 14, 2010 630 System Manual 3 Version 1.1 December 14, 2010 Contents Overview ............................................................................................................................ 6 Specifications ..................................................................................................................... 8 System .............................................................................................................................. 10 Front View .................................................................................................................... 10 Rear View ..................................................................................................................... 10 I/O Ports ........................................................................................................................ 11 Atom Processor ............................................................................................................. 11 System Memory ............................................................................................................ 11 On /Off Button .............................................................................................................. 11 Hard Disk
    [Show full text]
  • RS6000 Ring Scanner User Guide (En)
    RS6000 Ring Scanner User Guide MN-002704-04 Copyright © 2018 ZIH Corp. and/or its affiliates. All rights reserved. ZEBRA and the stylized Zebra head are trademarks of ZIH Corp., registered in many jurisdictions worldwide. All other trademarks are the property of their respective owners. COPYRIGHTS & TRADEMARKS: For complete copyright and trademark information, go to www.zebra.com/ copyright. WARRANTY: For complete warranty information, go to www.zebra.com/warranty. END USER LICENSE AGREEMENT: For complete EULA information, go to www.zebra.com/eula. Terms of Use • Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed to any other parties for any other purpose without the express, written permission of Zebra Technologies. • Product Improvements Continuous improvement of products is a policy of Zebra Technologies. All specifications and designs are subject to change without notice. • Liability Disclaimer Zebra Technologies takes steps to ensure that its published Engineering specifications and manuals are correct; however, errors do occur. Zebra Technologies reserves the right to correct any such errors and disclaims liability resulting therefrom. • Limitation of Liability In no event shall Zebra Technologies or anyone else involved in the creation, production, or delivery of the accompanying product (including hardware and software) be liable for any damages whatsoever (including, without limitation, consequential damages including loss of business profits, business interruption, or loss of business information) arising out of the use of, the results of use of, or inability to use such product, even if Zebra Technologies has been advised of the possibility of such damages.
    [Show full text]