IBM Workload Scheduler: Administration
Total Page:16
File Type:pdf, Size:1020Kb
IBM Workload Scheduler IBM Administration Version 9 Release 5 IBM Workload Scheduler IBM Administration Version 9 Release 5 Note Before using this information and the product it supports, read the information in “Notices” on page 375. This edition applies to version 9, release 5, modification level 0 of IBM Workload Scheduler (program number 5698-WSH) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2001, 2016. © Copyright HCL Technologies Limited 2016, 2019 Contents Figures .............. vii Configuring to schedule job types with advanced options ............... 80 Tables ............... ix \ Configuring security roles for users and groups 81 Configuring command-line client access authentication ............. 83 About this publication ........ xi Connection parameters ......... 83 What is new in this release ......... xi Entering passwords........... 85 Accessibility .............. xi IBM Workload Scheduler console messages and Technical training ............ xi prompts ............... 86 Support information ........... xi Setting sysloglocal on UNIX ........ 86 console command ........... 87 Chapter 1. Customizing and configuring Modifying jobmon service rights for Windows... 87 IBM Workload Scheduler ....... 1 Setting global options ........... 1 Chapter 2. Configuring the Dynamic Global options - summary ......... 3 Workload Console .......... 89 Global options - detailed description ..... 9 Launching in context with the Dynamic Workload Setting local options ........... 26 Console................ 89 Localopts summary........... 26 Scenarios .............. 89 Localopts details............ 30 Advanced optional parameters ....... 90 Local options file example ........ 44 \ Configuring access to the Dynamic Workload Setting user options ........... 48 \ Console................ 95 Sample useropts file .......... 48 \ Configuring a user registry ........ 95 Multiple product instances ........ 49 \ Configuring roles to access the Dynamic Configuring the agent ........... 49 \ Workload Console ........... 95 Configuring general properties [ITA] ..... 52 Configuring Dynamic Workload Console to use Configuring log message properties Single Sign-On ............. 97 [JobManager.Logging.cclog] ........ 52 Configuring the Dynamic Workload Console and Configuring trace properties when the agent is master domain manager for Single Sign-On .. 98 stopped [JobManager.Logging.cclog] ..... 53 Configuring the use of Lightweight Third-Party Configuring trace properties when the agent is Authentication ............. 99 running............... 54 Configuring to use the same LTPA token_keys 100 Configuring common launchers properties Disabling the automatic generation of LTPA [Launchers] ............. 57 token_keys ............. 102 Configuring properties of the native job launcher Configuring Dynamic Workload Console to use [NativeJobLauncher] .......... 58 SSL................. 102 Configuring properties of the Java job launcher Customizing your global settings ....... 103 [JavaJobLauncher] ........... 61 Customize video URLs ......... 104 Configuring properties of the Resource advisor Override graphical view limits ...... 105 agent [ResourceAdvisorAgent] ....... 61 Plan View in new window ........ 105 Configuring properties of the System scanner Plan View auto refresh interval ...... 106 [SystemScanner] ............ 64 Disable and customize NewsFeed function .. 106 Configuring environment variables [Env] ... 64 Disable and customize the creation of Regular maintenance .......... 64 predefined tasks ........... 108 Configuring the dynamic workload broker server on Add customized URL to job and job streams 108 the master domain manager and dynamic domain User registry ............ 110 manager ............... 65 z/OS http connections ......... 111 Maintaining the dynamic workload broker server Limit the number of objects retrieved by queries 111 on the master domain manager and dynamic Limit task and engine sharing ....... 112 domain manager ........... 66 Show all dependencies ......... 113 Enabling unsecure communication with the Auditing mobile app activity ....... 113 dynamic workload broker server ...... 67 Modifying the number of archived plans ResourceAdvisorConfig.properties file .... 68 displayed in the Dynamic Workload Console .. 114 JobDispatcherConfig.properties file ..... 70 Show or hide predecessors from What-if BrokerWorkstation.properties file ...... 72 Analysis Gantt view .......... 114 Archiving job data ........... 73 TdwcGlobalSettings.xml sample ...... 115 Configuring to schedule J2EE jobs ...... 73 iii Disable the What-if Analysis ........ 118 IP address validation messages ...... 228 Configuring High Availability for Dynamic Impact of network changes ......... 229 Workload Console ............ 118 \ Configuring High Availability ........ 119 Chapter 6. Setting connection security 231 Configuring Dynamic Workload Console to view Connection security overview ........ 231 reports ............... 119 Scenario: SSL Communication across the Configuring for an Oracle database ..... 120 fault-tolerant agent network ........ 231 Using SSL for netman and conman ..... 232 Chapter 3. Configuring user FIPS compliance ............ 240 authorization (Security file) ..... 123 FIPS overview ............ 240 Getting started with security ........ 123 Using FIPS certificates ......... 241 Role-based security model ......... 124 Configuring SSL to be FIPS-compliant .... 245 Configuring role-based security from Dynamic Finding the GSKit version on agents running on Workload Console ........... 125 UNIX and Linux operating systems ..... 247 Configuring role-based security with composer command-line ............ 131 Chapter 7. Data maintenance..... 249 Actions on security objects ........ 137 Maintaining the database ......... 249 Attributes for security object types ..... 142 Backing up and restoring ........ 249 Specifying object attribute values ...... 143 Reorganizing the database ........ 251 Classic security model .......... 146 Maintaining the file system......... 252 Security management overview ...... 146 Avoiding full file systems ........ 252 Updating the security file ........ 147 Log files and archived files ........ 255 Centralized security management ..... 150 Temporary files............ 259 Configuring the security file ....... 151 Managing event message queue file sizes ... 259 Sample security file .......... 184 Administrative tasks - Databases ....... 259 Administrative tasks - DB2 ......... 260 Chapter 4. Configuring authentication 193 Changing DB2 passwords ........ 260 Where to configure authentication ...... 193 Locating the DB2 tools ......... 260 \ Available configurations .......... 193 User permissions for running the DB2 tools .. 261 Rules for using a Federated User Registry with Running DB2 maintenance manually .... 261 IBM Workload Scheduler ......... 194 Reorganizing the DB2 database ...... 262 Completing the LDAP configuration...... 194 Monitoring the lock list memory ...... 263 Updating the security file ........ 194 Administrative tasks - Oracle ........ 265 Propagating the changes......... 195 Changing the Oracle access password .... 265 Example configurations of LDAP servers .... 195 Maintaining the Oracle database ...... 265 \ Configuring an OpenID Connect Client .... 197 Obtaining information about the IBM Workload Scheduler databases installed on an Oracle Chapter 5. Network administration 199 instance .............. 266 User permissions for running the Oracle tools 266 Network overview ........... 199 Modifying your RDBMS server ....... 266 Network definition ........... 200 Auditing facilities ............ 267 Network communications ......... 201 Database and plan audit......... 267 Network links ............ 201 Dynamic workload scheduling audit .... 274 Working across firewalls......... 202 Keeping track of database changes using audit Configuring dynamic agent communications reports .............. 283 through a gateway .......... 203 Collecting job metrics .......... 287 Enabling Ports ............. 207 Job metrics queries for DB2........ 287 Network operation ........... 209 Job metrics queries for DB2 for zOS ..... 288 Network processes .......... 210 Job metrics queries for Oracle database.... 288 Optimizing the network .......... 214 Data volumes ............ 214 Connectivity............. 214 Chapter 8. Administrative tasks ... 289 Planning space for queues ........ 215 Changing a domain manager ........ 290 Tuning mailman servers ......... 221 Simplified procedure for switching a domain Netman configuration file ......... 222 manager .............. 291 Determining internal Symphony table size.... 223 Complete procedure for switching a domain Defining access methods for agents ...... 224 manager .............. 292 UNIX access methods ......... 225 Changing a master domain manager or dynamic IP address validation ........... 227 domain manager ............ 295 Support for Internet Protocol version 6 .... 227 Choosing a workstation for backup master Operating system configuration (UNIX only) 228 domain manager ........... 295 iv IBM Workload Scheduler: Administration Setting up a backup master domain manager 296 Configuring trace properties when the agent is Copying files to use on the backup master stopped [JobManager.Logging.cclog]..... 329 domain manager ........... 297 Configuring trace properties when the agent is Short-term switch of a master domain manager 298 running .............. 330 Extended loss or permanent change