IBM Workload Scheduler: Administration

Total Page:16

File Type:pdf, Size:1020Kb

IBM Workload Scheduler: Administration IBM Workload Scheduler IBM Administration Version 9 Release 5 IBM Workload Scheduler IBM Administration Version 9 Release 5 Note Before using this information and the product it supports, read the information in “Notices” on page 375. This edition applies to version 9, release 5, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2001, 2016. © Copyright HCL Technologies Limited 2016, 2019 Contents Figures .............. vii Configuring to schedule job types with advanced options ............... 80 Tables ............... ix \ Configuring security roles for users and groups 81 Configuring command-line client access authentication ............. 83 About this publication ........ xi Connection parameters ......... 83 What is new in this release ......... xi Entering passwords........... 85 Accessibility .............. xi IBM Workload Scheduler console messages and Technical training ............ xi prompts ............... 86 Support information ........... xi Setting sysloglocal on UNIX ........ 86 console command ........... 87 Chapter 1. Customizing and configuring Modifying jobmon service rights for Windows... 87 IBM Workload Scheduler ....... 1 Setting global options ........... 1 Chapter 2. Configuring the Dynamic Global options - summary ......... 3 Workload Console .......... 89 Global options - detailed description ..... 9 Launching in context with the Dynamic Workload Setting local options ........... 26 Console................ 89 Localopts summary........... 26 Scenarios .............. 89 Localopts details............ 30 Advanced optional parameters ....... 90 Local options file example ........ 44 \ Configuring access to the Dynamic Workload Setting user options ........... 48 \ Console................ 95 Sample useropts file .......... 48 \ Configuring a user registry ........ 95 Multiple product instances ........ 49 \ Configuring roles to access the Dynamic Configuring the agent ........... 49 \ Workload Console ........... 95 Configuring general properties [ITA] ..... 52 Configuring Dynamic Workload Console to use Configuring log message properties Single Sign-On ............. 97 [JobManager.Logging.cclog] ........ 52 Configuring the Dynamic Workload Console and Configuring trace properties when the agent is master domain manager for Single Sign-On .. 98 stopped [JobManager.Logging.cclog] ..... 53 Configuring the use of Lightweight Third-Party Configuring trace properties when the agent is Authentication ............. 99 running............... 54 Configuring to use the same LTPA token_keys 100 Configuring common launchers properties Disabling the automatic generation of LTPA [Launchers] ............. 57 token_keys ............. 102 Configuring properties of the native job launcher Configuring Dynamic Workload Console to use [NativeJobLauncher] .......... 58 SSL................. 102 Configuring properties of the Java job launcher Customizing your global settings ....... 103 [JavaJobLauncher] ........... 61 Customize video URLs ......... 104 Configuring properties of the Resource advisor Override graphical view limits ...... 105 agent [ResourceAdvisorAgent] ....... 61 Plan View in new window ........ 105 Configuring properties of the System scanner Plan View auto refresh interval ...... 106 [SystemScanner] ............ 64 Disable and customize NewsFeed function .. 106 Configuring environment variables [Env] ... 64 Disable and customize the creation of Regular maintenance .......... 64 predefined tasks ........... 108 Configuring the dynamic workload broker server on Add customized URL to job and job streams 108 the master domain manager and dynamic domain User registry ............ 110 manager ............... 65 z/OS http connections ......... 111 Maintaining the dynamic workload broker server Limit the number of objects retrieved by queries 111 on the master domain manager and dynamic Limit task and engine sharing ....... 112 domain manager ........... 66 Show all dependencies ......... 113 Enabling unsecure communication with the Auditing mobile app activity ....... 113 dynamic workload broker server ...... 67 Modifying the number of archived plans ResourceAdvisorConfig.properties file .... 68 displayed in the Dynamic Workload Console .. 114 JobDispatcherConfig.properties file ..... 70 Show or hide predecessors from What-if BrokerWorkstation.properties file ...... 72 Analysis Gantt view .......... 114 Archiving job data ........... 73 TdwcGlobalSettings.xml sample ...... 115 Configuring to schedule J2EE jobs ...... 73 iii Disable the What-if Analysis ........ 118 IP address validation messages ...... 228 Configuring High Availability for Dynamic Impact of network changes ......... 229 Workload Console ............ 118 \ Configuring High Availability ........ 119 Chapter 6. Setting connection security 231 Configuring Dynamic Workload Console to view Connection security overview ........ 231 reports ............... 119 Scenario: SSL Communication across the Configuring for an Oracle database ..... 120 fault-tolerant agent network ........ 231 Using SSL for netman and conman ..... 232 Chapter 3. Configuring user FIPS compliance ............ 240 authorization (Security file) ..... 123 FIPS overview ............ 240 Getting started with security ........ 123 Using FIPS certificates ......... 241 Role-based security model ......... 124 Configuring SSL to be FIPS-compliant .... 245 Configuring role-based security from Dynamic Finding the GSKit version on agents running on Workload Console ........... 125 UNIX and Linux operating systems ..... 247 Configuring role-based security with composer command-line ............ 131 Chapter 7. Data maintenance..... 249 Actions on security objects ........ 137 Maintaining the database ......... 249 Attributes for security object types ..... 142 Backing up and restoring ........ 249 Specifying object attribute values ...... 143 Reorganizing the database ........ 251 Classic security model .......... 146 Maintaining the file system......... 252 Security management overview ...... 146 Avoiding full file systems ........ 252 Updating the security file ........ 147 Log files and archived files ........ 255 Centralized security management ..... 150 Temporary files............ 259 Configuring the security file ....... 151 Managing event message queue file sizes ... 259 Sample security file .......... 184 Administrative tasks - Databases ....... 259 Administrative tasks - DB2 ......... 260 Chapter 4. Configuring authentication 193 Changing DB2 passwords ........ 260 Where to configure authentication ...... 193 Locating the DB2 tools ......... 260 \ Available configurations .......... 193 User permissions for running the DB2 tools .. 261 Rules for using a Federated User Registry with Running DB2 maintenance manually .... 261 IBM Workload Scheduler ......... 194 Reorganizing the DB2 database ...... 262 Completing the LDAP configuration...... 194 Monitoring the lock list memory ...... 263 Updating the security file ........ 194 Administrative tasks - Oracle ........ 265 Propagating the changes......... 195 Changing the Oracle access password .... 265 Example configurations of LDAP servers .... 195 Maintaining the Oracle database ...... 265 \ Configuring an OpenID Connect Client .... 197 Obtaining information about the IBM Workload Scheduler databases installed on an Oracle Chapter 5. Network administration 199 instance .............. 266 User permissions for running the Oracle tools 266 Network overview ........... 199 Modifying your RDBMS server ....... 266 Network definition ........... 200 Auditing facilities ............ 267 Network communications ......... 201 Database and plan audit......... 267 Network links ............ 201 Dynamic workload scheduling audit .... 274 Working across firewalls......... 202 Keeping track of database changes using audit Configuring dynamic agent communications reports .............. 283 through a gateway .......... 203 Collecting job metrics .......... 287 Enabling Ports ............. 207 Job metrics queries for DB2........ 287 Network operation ........... 209 Job metrics queries for DB2 for zOS ..... 288 Network processes .......... 210 Job metrics queries for Oracle database.... 288 Optimizing the network .......... 214 Data volumes ............ 214 Connectivity............. 214 Chapter 8. Administrative tasks ... 289 Planning space for queues ........ 215 Changing a domain manager ........ 290 Tuning mailman servers ......... 221 Simplified procedure for switching a domain Netman configuration file ......... 222 manager .............. 291 Determining internal Symphony table size.... 223 Complete procedure for switching a domain Defining access methods for agents ...... 224 manager .............. 292 UNIX access methods ......... 225 Changing a master domain manager or dynamic IP address validation ........... 227 domain manager ............ 295 Support for Internet Protocol version 6 .... 227 Choosing a workstation for backup master Operating system configuration (UNIX only) 228 domain manager ........... 295 iv IBM Workload Scheduler: Administration Setting up a backup master domain manager 296 Configuring trace properties when the agent is Copying files to use on the backup master stopped [JobManager.Logging.cclog]..... 329 domain manager ........... 297 Configuring trace properties when the agent is Short-term switch of a master domain manager 298 running .............. 330 Extended loss or permanent change
Recommended publications
  • Job Scheduling in Java Applications Job Schedulers Let Developers Focus on Their Applications and Not on Scheduling Details
    flux.ly File Orchestration Solutions for Banking and Finance Reading Time: 8 minutes Job Scheduling in Java Applications Job schedulers let developers focus on their applications and not on scheduling details. Reading Time: 8 minutes Scheduling tasks in J2EE applications is a common need. There is more to job scheduling than running backups at 3 o'clock in the morning. Customer relationship management (CRM) applications, for example, need to contact customers periodically during the sales cycle. File transfer applications need to transmit and receives files on a regular basis, except on holidays. Administrative applications need to send reminder emails to notify employees and customers about important events. All these enterprise applications can benefit from job scheduling. This article first explores the need for job scheduling in J2EE applications. Section 2 explains why job scheduling can add critical functionality to enterprise applications. In Section 3, related work is reviewed. Section 4 presents a set of requirements for job scheduling software in J2EE applications. Finally, Section 5 walks through the design of an enterprise application that uses job scheduling. The need for enterprise job scheduling Many enterprise applications can benefit from job scheduling. Sales and customer relationship software, for example, needs to contact customers over the course of months and years. For example: 1. Followups are sent 10 and 30 days after a potential customer first contacts the sales organization. 2. Reminder notices are sent to existing customers 60 and 20 days before the customer's support contract expires. 3. If the customer does not contact the technical support department for 90 days, a followup is sent asking if the customer needs any help with the product or service.
    [Show full text]
  • Geek Guide > Beyond Cron
    GEEK GUIDE BEYOND CRON Table of Contents Ease of Use ..................................................................... 8 Multi-Server-Friendly .................................................... 10 Dependency Management ............................................ 13 Easy to Visualize ........................................................... 16 Delegation of Authority ................................................. 18 Management by Exception ........................................... 21 Flexible Scheduling ....................................................... 23 Revision Control ........................................................... 24 Conclusion .................................................................... 24 MIKE DIEHL has been using Linux since the days when Slackware came on 14 5.25” floppy disks and installed kernel version 0.83. He has built and managed several servers configured with either hardware or software RAID storage under Linux, and he has hands-on experience with both the VMware and KVM virtual machine architectures. Mike has written numerous articles for Linux Journal on a broad range of subjects, and he has a Bachelor’s degree in Mathematics with a minor in Computer Science. He lives in Blythewood, South Carolina, with his wife and four sons. 2 GEEK GUIDE BEYOND CRON GEEK GUIDES: Mission-critical information for the most technical people on the planet. Copyright Statement © 2015 Linux Journal. All rights reserved. This site/publication contains materials that have been created, developed or
    [Show full text]
  • VSC HPC Tutorial for Vrije Universiteit Brussel Linux Users
    VLAAMS SUPERCOMPUTER Innovative Computing CENTRUM for A Smarter Flanders HPC Tutorial Last updated: September 29 2021 For Linux Users Authors: Franky Backeljauw5, Stefan Becuwe5, Geert Jan Bex3, Geert Borstlap5, Jasper Devreker2, Stijn De Weirdt2, Andy Georges2, Balázs Hajgató1,2, Kenneth Hoste2, Kurt Lust5, Samuel Moors1, Ward Poelmans1, Mag Selwa4, Álvaro Simón García2, Bert Tijskens5, Jens Timmerman2, Kenneth Waegeman2, Toon Willems2 Acknowledgement: VSCentrum.be 1Free University of Brussels 2Ghent University 3Hasselt University 4KU Leuven 5University of Antwerp 1 Audience: This HPC Tutorial is designed for researchers at the Vrije Universiteit Brussel and affiliated institutes who are in need of computational power (computer resources) and wish to explore and use the High Performance Computing (HPC) core facilities of the Flemish Supercomputing Centre (VSC) to execute their computationally intensive tasks. The audience may be completely unaware of the VUB-HPC concepts but must have some basic understanding of computers and computer programming. Contents: This Beginners Part of this tutorial gives answers to the typical questions that a new VUB- HPC user has. The aim is to learn how to make use of the HPC. Beginners Part Questions chapter title What is a VUB-HPC exactly? 1 Introduction to HPC Can it solve my computational needs? How to get an account? 2 Getting an HPC Account How do I connect to the VUB-HPC and 3 Connecting to the HPC infrastructure transfer my files and programs? How to start background jobs? 4 Running batch jobs How to start jobs with user interaction? 5 Running interactive jobs Where do the input and output go? 6 Running jobs with input/output data Where to collect my results? Can I speed up my program by explor- 7 Multi core jobs/Parallel Computing ing parallel programming techniques? Troubleshooting 8 Troubleshooting What are the rules and priorities of 9 HPC Policies jobs? FAQ 10 Frequently Asked Questions The Advanced Part focuses on in-depth issues.
    [Show full text]
  • IBM Workload Automation: Overview Setting Job Recovery
    IBM Workload Automation IBM Overview Version 9.3 SPE (Revised July 2018) IBM Workload Automation IBM Overview Version 9.3 SPE (Revised July 2018) Note Before using this information and the product it supports, read the information in “Notices” on page 83. This edition applies to version 9, release 3, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1999, 2016. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Copyright HCL Technologies Limited 2016, 2018. Contents Figures .............. vii | Hybrid Workload Automation ...... xxiv | Checking prerequisites before running a silent About this publication ........ ix | installation ............. xxiv | Automatically initializing IBM Workload What is new in this release ......... ix | Scheduler instances .......... xxv Who should read this publication ....... ix | Defining and managing IBM Workload Accessibility .............. ix | Scheduler role-based security ....... xxv Technical training ............ ix | Reply to a message for an IBM i job from Support information ............ x | Dynamic Workload Console ....... xxv How to read syntax diagrams ........ x | Automatic reply to waiting messages for an | IBM i job ............. xxvi Summary of enhancements ..... xiii | IBM Workload Scheduler Plug-in for Apache | IBM Workload Scheduler version 9.3 enhancements xiii | Oozie............... xxvi | IBM Workload Scheduler Plug-in for IBM | Running a script when a job completes ... xxvi | WebSphere MQ ............ xiv IBM Workload Scheduler for z/OS version 9.3 | IBM Workload Scheduler Plug-in for RESTful enhancements ............. xxvi | Web services............. xiv | Configuring a backup controller for disaster | IBM Workload Scheduler Plug-in for SAP | recovery ............
    [Show full text]
  • Docker Windows Task Scheduler
    Docker Windows Task Scheduler Genealogical Scarface glissading, his karyotype outgone inflicts overflowingly. Rudolph is accessorial and suckers languorously as sociologistic Engelbart bridled sonorously and systematises sigmoidally. Which Cecil merchandises so unbelievably that Cole comedowns her suavity? Simple task runner that runs pending tasks in Redis when Docker container. With Docker Content Trust, see will soon. Windows Tip Run applications in extra background using Task. Cronicle is a multi-server task scheduler and runner with a web based front-end UI It handles both scheduled repeating and on-demand jobs targeting any. Django project that you would only fetch of windows task directory and how we may seem. Docker schedulers and docker compose utility program by learning service on a scheduled time, operators and manage your already interact with. You get a byte array elements followed by the target system privileges, manage such data that? Machine learning service Creatio Academy. JSON list containing all my the jobs. As you note have noticed, development, thank deity for this magazine article. Docker-crontab A docker job scheduler aka crontab for. Careful with your terminology. Sometimes you and docker schedulers for task failed job gets silently redirected to get our task. Here you do want to docker swarm, task scheduler or scheduled background tasks in that. Url into this script in one easy to this was already existing cluster created, it retry a little effort. Works pretty stark deviation from your code is followed by searching for a process so how to be executed automatically set. Now docker for windows service container in most amateur players play to pass as.
    [Show full text]
  • IBM I Job Scheduling Reduce Your Running Costs and Boost Operational Efficiency
    AUTOMON® for iSchedule IBM i Job Scheduling Reduce your running costs and boost operational efficiency AUTOMON® for For IT operations under pressure to do more for less, it makes sense to iSchedule is an eliminate the costs and inefficiencies of manual batch scheduling by advanced job moving to a fully automated solution. AUTOMON® for iSchedule is a reliable scheduler that and robust IBM i job scheduler that is designed to: manages all batch work for one or many • Reduce your running costs and minimize errors by automating all servers from a single aspects of the job scheduling process point of control • Provide the flexibility to manage increases in workload without employing additional staff • Run an unattended scheduling operation, with the option to use AUTOMON® for iConsole and AUTOMON® for iMessage for a fully automated job scheduling and message management solution • Maximize system throughput by managing job dependencies and system resources efficiently • Increase levels of control, enabling you to prioritize critical work and improve batch performance • Reduce downtime through automated error recovery • Release operators from routine tasks to focus on value-added business activities A single, powerful solution Exploit the latest technology AUTOMON® for iSchedule is an advanced AUTOMON® for iSchedule is a flexible job scheduler that provides you with your own solution that exploits the latest features automated computer operator. available in the IBM i operating system. This includes the ability to schedule unattended The system is simple enough for basic backups, restricted tasks and IPLs. scheduling to be implemented immediately, yet offers the levels of sophistication and Enterprise-grade features ease the creation, power necessary for more detailed and maintenance, and execution of job schedules, complex requirements.
    [Show full text]
  • Adaptive Server® Enterprise 15.7 DOCUMENT ID: DC20001-01-1570-01
    Job Scheduler Users Guide Adaptive Server® Enterprise 15.7 DOCUMENT ID: DC20001-01-1570-01 LAST REVISED: August 2011 Copyright © 2011 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any subsequent release until otherwise indicated in new editions or technical notes. Information in this document is subject to change without notice. The software described herein is furnished under a license agreement, and it may be used or copied only in accordance with the terms of that agreement. To order additional documents, U.S. and Canadian customers should call Customer Fulfillment at (800) 685-8225, fax (617) 229-9845. Customers in other countries with a U.S. license agreement may contact Customer Fulfillment via the above fax number. All other international customers should contact their Sybase subsidiary or local distributor. Upgrades are provided only at regularly scheduled software release dates. No part of this publication may be reproduced, transmitted, or translated in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without the prior written permission of Sybase, Inc. Sybase trademarks can be viewed at the Sybase trademarks page at http://www.sybase.com/detail?id=1011207. Sybase and the marks listed are trademarks of Sybase, Inc. ® indicates registration in the United States of America. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc.
    [Show full text]
  • Job Scheduling
    Job scheduling Sandeep Agrawal C-DAC Pune What is a job? • The user's program is not simply the name of an executable. It has input data and parameters, environment variables, descriptions of computing resources needed to run the application, and output directives. All of these specifications collectively are called a job • The user submits the job to an HPC system, usually in the form of a job script • The job script contains a formal specification that requests computing resources, identifies an application to run along with its input data and environment variables, and describes how best to deliver the output data • The term job size refers to the number of nodes the job requests • The term job length refers to the total time that a job want to run Modes of program execution • Interactive mode • Similar way as of using a personal computer • Not enabled on all HPC systems • Job may have to wait in queue • Batch mode • refers to program execution in background • most HPC jobs can use resources of multiple nodes • User jobs are accepted and typically wait in queues before adequate resources are available to the job and then it is scheduled for execution. • Most resource policies on the HPC systems tend to be exclusive Batch System • A typical batch system is composed of three functionalities: • Job Scheduler or Workload Manager • Resource Manager • Execution Manager • Job Scheduling: • The batch system is responsible for receiving the job script. • If the job cannot be executed immediately, the job script is added to a queue. • The job waits in the queue until the job's requested resources are available.
    [Show full text]
  • Process Schedule
    UNIT III: PROCESSOR MANAGEMENT Overview-About Multi-Core Technologies-Job Scheduling Versus Process Scheduling- Process Scheduler-Process Scheduling Policies-Process Scheduling Algorithms –A Word about Interrupts Deadlock-Seven Cases of Deadlock -Conditions for Deadlock- Modeling Deadlock-Strategies for Handling Deadlocks –Starvation Concurrent Processes: What Is Parallel Processing-Evolution of Multiprocessors- Introduction to Multi- Core Processors-Typical Multiprocessing Configurations-Process Synchronization Software JOB SCHEDULING VERSUS PROCESS SCHEDULING Generally scheduling of jobs is actually handled on two levels by most operating systems. The Processor Manager is a composite of two sub managers. They are 1. Job Scheduler - one in charge of job scheduling 2. Process Scheduler - the other in charge of process scheduling. There exists a hierarchy exists between the Job Scheduler and the Process Scheduler. JOB SCHEDULER Generally A user views a job either as a series of global job steps—compilation, loading and execution. Therefore, each job (or program) passes through a hierarchy of managers. • First one it encounters is the Job Scheduler; this is also called the high-level scheduler. • It is only concerned with selecting jobs from a queue of incoming jobs and placing them in the process queue, whether batch or interactive, based on each job’s characteristics. • The Job Scheduler’s goal is to put the jobs in a sequence that will use all of the system’s resources as fully as possible. • The Job Scheduler strives for a balanced mix of jobs that require large amounts of I/O interaction and jobs that require large amounts of computation. • Its goal is to keep most components of the computer system busy most of the time.
    [Show full text]
  • Mastering Oracle Scheduler in Oracle 11G Databases
    Mastering Oracle Scheduler in Oracle 11g Databases Ronald Rood Chapter No. 3 "Control the Scheduler" In this package, you will find: A Biography of the author of the book A preview chapter from the book, Chapter NO.3 "Control the Scheduler" A synopsis of the book’s content Information on where to buy this book About the Author Ronald Rood is an IT professional for over 20 years. His private domain is named after the first account that was created on a computer for him. That account was ronr on a DPS9 system, and so his private domain is called ronr.nl where you can contact him using [email protected]. He eagerly joined the Oracle community and became a skilled, innovating DBA and troubleshooter. He is a master of C, PRO*C, lots of scripting languages, and—of course—PL/SQL. Ronald’s real power is in the combination of the rich Unix world and Oracle. According to him, there is no such thing as a problem that cannot be solved; it just might take a little time. Ronald speaks several languages such as Dutch, English, German, and some French. In the private time that he shares with his wife and two children, he likes to take an occasional dive (from the sky), fl y with radio-controlled models, ride recumbents, and work as a volunteer for a local water scouts group. Currently, Ronald is one of the Ciber Oracle consultants in The Netherlands and cooperates in many projects for many large companies. Before writing this book, Ronald wrote Oracle-related articles for the Dutch Oracle user group magazine.
    [Show full text]
  • Cron Job Schedule Format
    Cron Job Schedule Format Socrates is cheek and pamper solo while interdepartmental Corwin overpriced and disarm. Kirby disarrays avidly if procephalic Sanford torrefy or piques. Distal and clovered Hewett proliferate her centiare border while Prentiss pull-out some dithyramb discriminately. You use cron expressions as jobs as another tab or window before finalising the job schedule cron format and each file Here, the asterisks refers the specific blocks of time. Linux system cron jobs from applications, assume a cron job scheduled tasks are limited time zone of cron. You must be logged into splunk. Setting Up a Basic Cron Job shoot a Linux Server Tania Rascia. For transition you doing use cron to make scheduled web requests to a. Do cron jobs run after reboot? To baptize a cron expression as will describe two main format used for the. Cron Job Arch Wiki. Singleton in all customers to take to take this job schedule cron format or. The Cron time string format consists of five fields that Cron converts into twenty time interval Cron then uses this interval to surface how sophisticated to follow an associated command on your Drupal site For eclipse a Cron time really of 0 10 15 executes a command on the 15th of each won at 1000 AM UTC. You can be at specified, it is not often to for recurring execution of your help protect your submission was successful. In this format: works fine from running properly without saving changes in part of your scheduled job schedule format of whatever month, server administrators and websites.
    [Show full text]
  • IBM Workload Automation: Glossary Scheduler
    IBM Workload Automation IBM Glossary Version 9 Release 5 IBM Workload Automation IBM Glossary Version 9 Release 5 Note Before using this information and the product it supports, read the information in “Notices” on page 31. This edition applies to version 9, release 5, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 1999, 2016. © Copyright HCL Technologies Limited 2016, 2019 Glossary Use the glossary to find terms and definitions for the IBM Workload Automation products. The following cross-references are used: v See refers you from a term to a preferred synonym, or from an acronym or abbreviation to the defined full form. v See also refers you to a related or contrasting term. To view glossaries for other IBM products, go to www.ibm.com/software/ globalization/terminology. “A” “B” on page 3 “C” on page 4 “D” on page 6 “E” on page 9 “F” on page 11 “G” on page 12 “H” on page 13 “I” on page 13 “J” on page 14 “L” on page 16 “M” on page 17 “N” on page 18 “O” on page 19 “P” on page 20 “Q” on page 22 “R” on page 22 “S” on page 24 “T” on page 26“U” on page 27 “V” on page 28 “W” on page 28 “X” on page 29“Z” on page 30 A access method An executable file used by extended agents to connect to and control jobs on other operating systems (for example, z/OS®) and applications (for example, Oracle Applications, PeopleSoft, and SAP R/3).
    [Show full text]