Certification Study Guide for IBM Tivoli Configuration Manager 4.2 Front cover

advertisement
Front cover
Certification Study Guide for
IBM Tivoli Configuration
Manager 4.2
Helps you to get ITCM certified
Explains the certification path
and prerequisites
Includes sample test
questions and answers
Vasfi Gucer
Sanver Ceylan
ibm.com/redbooks
Redpaper
International Technical Support Organization
Certification Study Guide for IBM Tivoli
Configuration Manager 4.2
January 2005
Note: Before using this information and the product it supports, read the information in
“Notices” on page xi.
First Edition (January 2005)
IBM Tivoli Configuratior Manager Version 4.2.0, 4.2.1 and 4.2.2, IBM Tivoli Management
Framework Version 4.1 and 4.1.1
© Copyright International Business Machines Corporation 2005. All rights reserved.
Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP
Schedule Contract with IBM Corp.
Contents
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
The team that wrote this Redpaper . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Become a published author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Comments welcome. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiv
Chapter 1. Certification overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 IBM Professional Certification Program . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1.1 Benefits of certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1.2 Tivoli Software Professional Certification . . . . . . . . . . . . . . . . . . . . . . 4
1.2 IBM Tivoli Configuration Manager V4.2 Certification. . . . . . . . . . . . . . . . . . 7
1.2.1 Test 786 objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3 Recommended resources for study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.3.1 Courses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
1.3.2 Publication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Chapter 2. Tivoli Management Framework basics . . . . . . . . . . . . . . . . . . . 23
2.1 Components of the basic Tivoli architecture . . . . . . . . . . . . . . . . . . . . . . . 24
2.2 Tivoli user interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2.1 Tivoli Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2.2 Command line interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2.3 Navigating the Tivoli Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.3 Tivoli resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.4 Authorization roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.4.1 Scope of authorization roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.5 Tivoli profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
2.5.1 Profile managers and profile distribution. . . . . . . . . . . . . . . . . . . . . . 37
2.6 Multiplexed distribution services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.6.1 MDist and MDist 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.6.2 MDist 2 functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.6.3 MDist2 components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.6.4 wmdist command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.6.5 Using the Distribution Status console . . . . . . . . . . . . . . . . . . . . . . . . 44
2.7 Connecting multiple TMR regions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
2.7.1 Benefits of connecting TMRs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.7.2 Connection types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.7.3 Name registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
© Copyright IBM Corp. 2005. All rights reserved.
iii
2.7.4 Case study: Hub-spoke architecture . . . . . . . . . . . . . . . . . . . . . . . . . 51
2.8 Endpoint login sequence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.8.1 Initial login without a select_gateway_policy script . . . . . . . . . . . . . . 57
2.8.2 Initial login with a select_gateway_policy script . . . . . . . . . . . . . . . . 58
2.8.3 Normal login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
2.8.4 Isolated login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.8.5 Orphan login . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
2.8.6 Implementing policy scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
2.9 Firewall Security Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.9.1 Tivoli environment with a firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.9.2 Tivoli environment with demilitarized zones . . . . . . . . . . . . . . . . . . . 65
2.9.3 Sending events across firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
2.10 Installing Firewall Security Toolbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.10.1 Installing on UNIX operating systems . . . . . . . . . . . . . . . . . . . . . . . 67
2.10.2 Installing on Windows operating systems . . . . . . . . . . . . . . . . . . . . 68
Chapter 3. Tivoli Configuration Manager fundamentals and installation 71
3.1 IBM Tivoli Configuration Manager fundamentals . . . . . . . . . . . . . . . . . . . 73
3.1.1 Tivoli Configuration Manager components and services . . . . . . . . . 73
3.2 Creating a deployment plan for Tivoli Configuration Manager . . . . . . . . . 82
3.3 How to deploy Tivoli Configuration Manager components . . . . . . . . . . . . 83
3.3.1 Distributed Configuration Manager components. . . . . . . . . . . . . . . . 83
3.3.2 TMR server configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
3.3.3 Components for managed nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
3.3.4 Components for gateways . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
3.3.5 Components for endpoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
3.4 Required roles for installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
3.5 RDBMS considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
3.6 RIM considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
3.7 General pre-install checks, hints, and tips. . . . . . . . . . . . . . . . . . . . . . . . . 91
3.7.1 UNIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
3.7.2 Windows Systems on Intel® 486 or Pentium® systems . . . . . . . . . . 92
3.8 Installation methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
3.9 Overview of Integrated Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
3.10 Server Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.10.1 Typical Server Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
3.10.2 Custom Server Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
3.10.3 Starting the installation programs . . . . . . . . . . . . . . . . . . . . . . . . . . 96
3.11 Desktop Install. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
3.11.1 Starting the installation program . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
3.12 Web Gateway Install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
3.12.1 Web Gateway prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
3.12.2 Starting the installation program . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
iv
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
3.12.3 Multiple endpoints installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
3.13 Uninstallation of IBM Tivoli Configuration Manager . . . . . . . . . . . . . . . 100
Chapter 4. Inventory and Software Distribution components. . . . . . . . . 101
4.1 Inventory component. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
4.1.1 What is gathered by Tivoli Inventory . . . . . . . . . . . . . . . . . . . . . . . . 102
4.1.2 Inventory architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
4.1.3 Collection Table of Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
4.1.4 Collection files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
4.1.5 Inventory Collectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
4.1.6 Collection manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
4.1.7 Data Handler . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
4.1.8 Status Collector. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
4.1.9 Callback object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
4.1.10 Managing data collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
4.1.11 Clearing the Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
4.1.12 Inventory collection scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
4.1.13 Custom scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
4.1.14 Isolated scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
4.1.15 Querying inventory data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
4.2 Software Distribution component . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
4.2.1 Components of Tivoli Software Distribution . . . . . . . . . . . . . . . . . . 139
4.2.2 Software distribution process overview. . . . . . . . . . . . . . . . . . . . . . 142
4.3 Data Moving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
4.3.1 Using the Data Moving Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
4.4 Enterprise Data Warehouse integration . . . . . . . . . . . . . . . . . . . . . . . . . 161
Chapter 5. Deployment Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
5.1 Activity Planner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
5.1.1 Activity Planner components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
5.1.2 Roles required for the Activity Planner . . . . . . . . . . . . . . . . . . . . . . 165
5.1.3 Types of activities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
5.1.4 Activity Plan Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
5.1.5 Activity Plan Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
5.1.6 Activity Planner commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
5.2 Change Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
5.2.1 Sample Change Manager scenario. . . . . . . . . . . . . . . . . . . . . . . . . 181
5.3 Enterprise Directory integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
5.3.1 Exchanging data with a directory server . . . . . . . . . . . . . . . . . . . . . 185
5.3.2 Manipulating DirectoryContext objects . . . . . . . . . . . . . . . . . . . . . . 185
5.3.3 Directory query libraries and query directories . . . . . . . . . . . . . . . . 187
5.4 Resource Manager and pervasive devices . . . . . . . . . . . . . . . . . . . . . . . 191
5.4.1 Choosing where to install the Resource Manager components . . . 193
Contents
v
5.4.2 Web Gateway installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
5.4.3 Web objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
5.4.4 Registering the resource types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
5.4.5 Associating endpoints with the resource gateway . . . . . . . . . . . . . 194
5.4.6 Enrolling pervasive devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
5.4.7 Installing and configuring devices for resource manager . . . . . . . . 195
5.4.8 Installing the device agent for Windows CE devices. . . . . . . . . . . . 195
5.4.9 The user ID of palm devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
5.4.10 Inventory scans on pervasive devices . . . . . . . . . . . . . . . . . . . . . 196
Chapter 6. Multicast concepts and implementation . . . . . . . . . . . . . . . . 197
6.1 Reliable multicast protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
6.2 Hyper Delivery (RMTP) flow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
6.3 Distributed depot service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
6.3.1 Configuring repeaters for multicast . . . . . . . . . . . . . . . . . . . . . . . . . 205
6.4 Endpoint multicast receivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
6.4.1 Configuring endpoint to receive multicast . . . . . . . . . . . . . . . . . . . . 210
6.5 Multicast scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
6.5.1 Preloading MDist2 depots with multicast . . . . . . . . . . . . . . . . . . . . 211
6.5.2 Multicast from gateways to Tivoli Management Agents . . . . . . . . . 215
6.6 Multicast limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
6.7 Troubleshooting multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
6.7.1 Repeater multicast log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
6.7.2 Endpoint receiver log and structure . . . . . . . . . . . . . . . . . . . . . . . . 223
6.7.3 Best practices and tips . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager . . . . . . . 225
7.1 Generic problem determination outline . . . . . . . . . . . . . . . . . . . . . . . . . . 227
7.2 Troubleshooting Framework 4.1.1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
7.3 Autotrace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
7.4 Troubleshooting Software Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . 230
7.4.1 General troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
7.4.2 Check the log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
7.4.3 Check the Distribution Status Console . . . . . . . . . . . . . . . . . . . . . . 232
7.4.4 Make sure that Tivoli Framework is functional . . . . . . . . . . . . . . . . 233
7.4.5 Check for MDist2 problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
7.4.6 Troubleshooting the software package . . . . . . . . . . . . . . . . . . . . . . 235
7.4.7 Software Distribution traces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
7.4.8 Troubleshooting Data Moving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
7.4.9 Troubleshooting Mobile Computing . . . . . . . . . . . . . . . . . . . . . . . . 241
7.4.10 Troubleshooting pristine installations . . . . . . . . . . . . . . . . . . . . . . 241
7.4.11 Troubleshooting discovering and synchronization . . . . . . . . . . . . 242
7.4.12 Change Management Status summary. . . . . . . . . . . . . . . . . . . . . 242
vi
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.5 Troubleshooting Activity Planner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
7.5.1 Activity Planner processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
7.5.2 Activity Planner configuration file . . . . . . . . . . . . . . . . . . . . . . . . . . 243
7.5.3 Activity Planner logfiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
7.5.4 Activity Planner trace files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
7.6 Troubleshooting Change Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
7.6.1 Change Manager configuration file . . . . . . . . . . . . . . . . . . . . . . . . . 248
7.6.2 Change Manager logfiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
7.6.3 Change Manager trace files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
7.7 Troubleshooting Web Gateway and Device Management . . . . . . . . . . . 251
7.7.1 Tracing the Web Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
7.8 Troubleshooting Web User Interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . 252
7.8.1 Common Web User Interface problems . . . . . . . . . . . . . . . . . . . . . 252
7.8.2 Tracing the Web User Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
7.9 Troubleshooting Enterprise Directory Integration . . . . . . . . . . . . . . . . . . 256
7.10 Troubleshooting Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
7.10.1 Enabling logging and tracing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
Chapter 8. Certification exam objectives . . . . . . . . . . . . . . . . . . . . . . . . . 263
8.1 Planning section . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
8.2 Installation section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
8.3 Configuration section. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268
8.4 Operations, administration, and maintenance section . . . . . . . . . . . . . . 270
Appendix A. Lab exercises. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
LAB 1 Using Integrated Install method to install a Tivoli Server. . . . . . . . . . . 275
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
Install your Tivoli Server with all ITCM modules. . . . . . . . . . . . . . . . . . . . . . . 276
Exercise review/wrap-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
LAB 2. Using Integrated Install method to install a Tivoli server . . . . . . . . . . 292
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
Exercise review/wrap-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
LAB 3. Create an Inventory profile and run a hardware scan . . . . . . . . . . . . 296
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Contents
vii
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
Create a hardware profile with SMBIOS capabilities . . . . . . . . . . . . . . . . 296
8.4.1 Distribute the profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
LAB 4. Create an Inventory profile and run and cancel the software scan . . 302
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Create an Inventory profile for software scan . . . . . . . . . . . . . . . . . . . . . . 302
Distribute the profile and cancel the distribution . . . . . . . . . . . . . . . . . . . . 303
LAB 5. Create a Custom Query with where clauses . . . . . . . . . . . . . . . . . . . 305
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Create a query library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Create a query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
LAB 6. Create and install software packages for Windows . . . . . . . . . . . . . . 307
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Install the Software Package Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
Create a simple package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Test the software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Import the software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Install the software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Verify the distribution was successful . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Install software package in transactional mode and commit installation . . 313
Undo an installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
Repair a damaged distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
Add links, registry keys, and text file objects. . . . . . . . . . . . . . . . . . . . . . . 317
LAB 7. Creating a software package using AutoPack . . . . . . . . . . . . . . . . . . 321
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Creating an AutoPack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
LAB 8. Verifying the status of a software package. . . . . . . . . . . . . . . . . . . . . 323
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
viii
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
LAB 9. Using the Activity Planner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
AP - RIM and RDBMS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Assigning AP roles and verifying the AP Administrator. . . . . . . . . . . . . . . 325
Registering the AP plug-ins. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Creating a simple Activity Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
Exercise review/wrap-up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
LAB 10. Using Change Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Configuring RIM and RDBMS for Change Manager . . . . . . . . . . . . . . . . . 333
Assigning CM roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Registering the CM plug-ins . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
Creating a Reference Model using an existing Endpoint . . . . . . . . . . . . . 335
Customizing the Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Submitting the Reference Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
LAB 11. Using Data Moving Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
Using the Data Moving Service GUI to delete a file . . . . . . . . . . . . . . . . . 343
Recursively sending a directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
LAB 12. Using Multicast to install a software package. . . . . . . . . . . . . . . . . . 345
What this exercise is about . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
What you should be able to do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Required materials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Exercise instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345
Configuring the repeaters for Multicast . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
Creating the software package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
Distributing the software package without using Multicast . . . . . . . . . . . . 347
8.4.2 Distributing the software package using Multicast . . . . . . . . . . . . . 347
Contents
ix
Appendix B. Additional material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Locating the Web material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Using the Web material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
System requirements for downloading the Web material . . . . . . . . . . . . . 350
How to use the Web material . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
Related publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Other publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
Online resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
How to get IBM Redbooks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Help from IBM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
x
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in other countries. Consult
your local IBM representative for information on the products and services currently available in your area.
Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product, program, or service that
does not infringe any IBM intellectual property right may be used instead. However, it is the user's
responsibility to evaluate and verify the operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents. You can send license
inquiries, in writing, to:
IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY 10504-1785 U.S.A.
The following paragraph does not apply to the United Kingdom or any other country where such provisions
are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer
of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically made
to the information herein; these changes will be incorporated in new editions of the publication. IBM may
make improvements and/or changes in the product(s) and/or the program(s) described in this publication at
any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in any
manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the
materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Information concerning non-IBM products was obtained from the suppliers of those products, their published
announcements or other publicly available sources. IBM has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on
the capabilities of non-IBM products should be addressed to the suppliers of those products.
This information contains examples of data and reports used in daily business operations. To illustrate them
as completely as possible, the examples include the names of individuals, companies, brands, and products.
All of these names are fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which illustrates programming
techniques on various operating platforms. You may copy, modify, and distribute these sample programs in
any form without payment to IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating platform for which the
sample programs are written. These examples have not been thoroughly tested under all conditions. IBM,
therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to IBM for the purposes of
developing, using, marketing, or distributing application programs conforming to IBM's application
programming interfaces.
© Copyright IBM Corp. 2005. All rights reserved.
xi
Trademarks
The following terms are trademarks of the International Business Machines Corporation in the United States,
other countries, or both:
AIX®
DB2®
Informix®
IBM®
ibm.com®
NetView®
OS/2®
OS/400®
PartnerWorld®
Redbooks (logo)
™
Redbooks™
S/390®
SecureWay®
Tivoli Enterprise Console®
Tivoli Enterprise™
Tivoli Management
Environment®
Tivoli®
TME®
Wake on LAN®
WebSphere®
The following terms are trademarks of other companies:
Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Intel, Intel Inside (logos), MMX, and Pentium are trademarks of Intel Corporation in the United States, other
countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or both.
Other company, product, and service names may be trademarks or service marks of others.
xii
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Preface
This IBM Redpaper is a study guide for IBM Tivoli® Configuration Manager
Version 4.2 and is aimed at the people who want to get IBM Certifications in this
specific product.
The IBM Tivoli Configuration Manager Certification, offered through the
Professional Certification Program from IBM, is designed to validate the skills
required of technical professionals who work in the implementation of the IBM
Tivoli Configuration Manager Version 4.2 product.
This redpaper provides a combination of theory and practical experience needed
for a general understanding of the subject matter. It also provides sample
questions that will help in the evaluation of personal progress and provide
familiarity with the types of questions that will be encountered in the exam.
This publication does not replace practical experience, nor is it designed to be a
stand-alone guide for any subject. Instead, it is an effective tool that, when
combined with education activities and experience, can be a very useful
preparation guide for the exam.
The team that wrote this Redpaper
This Redpaper was produced by a team of specialists from around the world
working at the International Technical Support Organization, Austin Center.
Vasfi Gucer is a Project Leader at the International Technical Support
Organization, Austin Center. He worked for IBM Turkey for 10 years and has
been with the ITSO since January 1999. He has more than 10 years of
experience in the areas of systems management, networking hardware, and
software on mainframe and distributed platforms. He has worked on various
Tivoli customer projects as a systems architect in Turkey and the U.S. He writes
extensively and teaches IBM classes worldwide on Tivoli software. Vasfi is also a
IBM Certified Senior IT Specialist.
Sanver Ceylan is a Project Leader at the International Technical Support
Organization, Austin Center. Sanver worked for IBM Turkey for 11 years and he
joined to ITSO in September 2003. His main area of expertise is Tivoli Storage
Management Products. Before ITSO, Sanver worked in the Software
Organization of IBM Turkey as an Advisory IT Specialist, where he was involved
in numerous pre-sales projects for major customers of IBM Turkey.
© Copyright IBM Corp. 2005. All rights reserved.
xiii
Thanks to the following people for their contributions to this project:
Julie Czubik
International Technical Support Organization, Poughkeepsie Center
Ben Briggs, Susan Farago, Elizabeth Purzer
IBM USA
Johan Raeymaeckers
JorSy Systems Management
Become a published author
Join us for a two- to six-week residency program! Help write an IBM Redbook
dealing with specific products or solutions, while getting hands-on experience
with leading-edge technologies. You'll team with IBM technical professionals,
Business Partners and/or customers.
Your efforts will help increase product acceptance and customer satisfaction. As
a bonus, you'll develop a network of contacts in IBM development labs, and
increase your productivity and marketability.
Find out more about the residency program, browse the residency index, and
apply online at:
ibm.com/redbooks/residencies.html
Comments welcome
Your comments are important to us!
We want our papers to be as helpful as possible. Send us your comments about
this Redpaper or other Redbooks™ in one of the following ways:
򐂰 Use the online Contact us review redbook form found at:
ibm.com/redbooks
򐂰 Send your comments in an e-mail to:
redbook@us.ibm.com
򐂰 Mail your comments to:
IBM® Corporation, International Technical Support Organization
Dept. JN9B Building 905
xiv
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
11501 Burnet Road
Austin, Texas 78758-3493
Preface
xv
xvi
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
1
Chapter 1.
Certification overview
This chapter provides an overview of the skill requirements needed to obtain an
IBM Advanced Technical Expert certification. The following chapters are
designed to provide a comprehensive review of specific topics that are essential
for obtaining the certification:
򐂰 IBM Professional Certification Program
򐂰 IBM Tivoli Configuration Manager 4.2 Certification
򐂰 Recommended study resources
© Copyright IBM Corp. 2004. All rights reserved.
1
1.1 IBM Professional Certification Program
Having the right skills for the job is critical in the growing global marketplace. IBM
Professional Certification, designed to validate skill and proficiency in the latest
IBM solution and product technology, can help provide that competitive edge.
The IBM Professional Certification Program Web site is available at:
http://www.ibm.com/certify/index.shtml
The Professional Certification Program from IBM offers a business solution for
skilled technical professionals seeking to demonstrate their expertise to the
world.
The program is designed to validate your skills and demonstrate your proficiency
in the latest IBM technology and solutions. In addition, professional certification
may help you excel at your job by giving you and your employer confidence that
your skills have been tested. You may be able to deliver higher levels of service
and technical expertise than non-certified employees and move on a faster
career track. Professional certification puts your career in your control.
This is the way for skilled IT professionals to demonstrate their expertise to the
world. It validates your skills and demonstrates your proficiency in the latest IBM
technology and solutions.
The certification requirements are tough, but it is not rocket science, either. It is a
rigorous process that differentiates you from everyone else.
The mission of IBM Professional Certification is to:
򐂰 Provide a reliable, valid, and fair method of assessing skills and knowledge.
򐂰 Provide IBM with a method of building and validating the skills of individuals
and organizations.
򐂰 Develop a loyal community of highly skilled certified professionals who
recommend, sell, service, support, and/or use IBM products and solutions.
The Professional Certification Program from IBM has developed certification role
names to guide you in your professional development. The certification role
names include IBM Certified Specialist, IBM Certified Solutions/Systems Expert,
and IBM Certified Advanced Technical Expert for technical professionals who
sell, service, and support IBM solutions. For technical professionals in
application development, the certification roles include IBM Certified Developer
Associate and IBM Certified Developer. An IBM Certified Instructor certifies the
professional instructor.
The Professional Certification Program from IBM provides you with a structured
program leading to an internationally recognized qualification. The program is
2
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
designed for flexibility by allowing you to select your role; prepare for and take
tests at your own pace; and, in some cases, select from a choice of elective tests
best suited to your abilities and needs. Some roles also offer a shortcut by giving
credit for a certification obtained in other industry certification programs.
You may be a network administrator, systems integrator, network integrator,
solution architect, solution developer, value-added reseller, technical
coordinator, sales representative, or educational trainer. Regardless of your role,
you can start charting your course through the Professional Certification Program
from IBM today.
1.1.1 Benefits of certification
Certification is a tool to help objectively measure the performance of a
professional on a given job at a defined skill level. Therefore, it is beneficial for
individuals who want to validate their own skills and performance levels, their
employees, or both. For optimum benefit, the certification tests must reflect the
critical tasks required for a job, the skill levels of each task, and the frequency by
which a task needs to be performed. IBM prides itself in designing
comprehensive, documented processes that ensure that IBM certification tests
remain relevant to the work environment of potential certification candidates.
In addition to assessing job skills and performance levels, professional
certification may also provide such benefits as:
򐂰 For employees:
–
–
–
–
–
Promotes recognition as an IBM certified professional
Helps to create advantages in interviews
Assists in salary increases, corporate advancement, or both
Increases self-esteem
Provides continuing professional benefits
򐂰 For employers:
–
–
–
–
–
–
–
–
–
Measures the effectiveness of training
Reduces course redundancy and unnecessary expenses
Provides objective benchmarks for validating skills
Makes long-range planning easier
Helps to manage professional development
Aids as a hiring tool
Contributes to competitive advantage
Increases productivity
Increases morale and loyalty
Chapter 1. Certification overview
3
򐂰 For Business Partners and consultants:
– Provides independent validation of technical skills
– Creates competitive advantage and business opportunities
– Enhances prestige of the team
– Contributes to IBM requirements for various IBM Business Partner
programs
Specific benefits may vary by country (region) and role. In general, after you
become certified, you should receive the following benefits:
򐂰 Industry recognition
Certification may accelerate your career potential by validating your
professional competency and increasing your ability to provide solid, capable
technical support.
򐂰 Program credentials
As a certified professional, you receive via e-mail your certificate of
completion and the certification mark associated with your role for use in
advertisements and business literature. You may also request a hardcopy
certificate, which includes a wallet-size certificate.
The Professional Certification Program from IBM acknowledges the individual
as a technical professional. The certification mark is for the exclusive use of
the certified individual.
򐂰 Ongoing technical vitality
IBM Certified professionals are included in mailings from the Professional
Certification Program from IBM.
1.1.2 Tivoli Software Professional Certification
Tivoli's professional certification program offers certification testing that sets the
standard for qualified product consultants, administrators, architects, and
partners.
The program also offers an internationally recognized qualification for technical
professionals seeking to apply their expertise in today's complex business
environment. The program is designed for those who implement, buy, sell,
service, and support Tivoli solutions and wish to deliver higher levels of service
and technical expertise.
Whether you are a Tivoli customer, partner, or technical professional wishing to
put your career on the fast track, you can start on the road to becoming a Tivoli
Certified Professional today.
4
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Benefits of being Tivoli certified
Tivoli certification gives the following benefits:
򐂰 Benefits to the individual
– IBM Certified certificate and use of logos on business cards
Note: Certificates are sent via e-mail. However, a paper copy of the
certificate along with a laminated wallet card can also be requested by
sending an e-mail to certify@us.ibm.com®.
– Recognition of your technical skills by your peers and management
– Enhanced career opportunities
– Focus for your professional development
򐂰 Benefits to the business partner
– Confidence in the skills of your employees
– Enhanced partnership benefits from the Business Partner Program
– Billing your employees out at higher rates
– Strengthens your proposals to customers
– Demonstrates the depth of technical skills available to prospective
customers
򐂰 Benefits to the customer
– Confidence in the services professionals handling your implementation
– Ease of hiring competent employees to manage your Tivoli environment
– Enhanced return on investment (ROI) through more thorough integration
with Tivoli and third-party products
– Ease of selecting a Tivoli Business Partner that meets your specific needs
Certification checklist
Here is the Certification checklist:
1. Select the certification you would like to pursue.
2. Determine which test(s) is required by reading the certification role
description.
3. Prepare for the test, using the following resources provided:
– Test objectives
– Recommended educational resources
– Sample/assessment test
Chapter 1. Certification overview
5
– Other reference materials
– Opportunities for experience
Note: These resources are available from each certification description
page, as well as from the Test information page.
4. Register to take a test by contacting one of our worldwide testing vendors:
– Thomson Prometric
– Pearson VUE (Virtual University Enterprises)
Note: When providing your name and address to the testing vendor, be
sure to specify your name exactly as you would like it to appear on your
certificate.
5. Take the test. Be sure to keep the Examination Score Report provided upon
test completion as your record of taking the test.
Note: After a test has been taken, your test results and demographic data
(including name, address, e-mail, phone number, etc.) are sent from the
testing vendor to IBM for processing (please allow 2–3 days for transmittal
and processing). Once all the tests required for a certification are passed
and received by IBM, your certificate will be issued.
6. Repeat steps three through five until all required tests are successfully
completed for the desired certification role. If additional requirements are
needed (such as an "other vendor" certification or exam), please follow the
instructions on the certification description page to submit these requirements
to IBM.
7. Once you have completed your certification requirements, you will be sent an
e-mail asking you to accept the terms of the IBM Certification Agreement
before receiving the certificate.
8. Upon acceptance of the terms of the IBM Certification Agreement, an e-mail
will be sent containing the following electronic deliverable:
– A Certification Certificate in .pdf format, which can be printed in either
color or black and white
– A set of graphic files of the IBM Professional Certification mark associated
with the certification achieved
– Guidelines for the use of the IBM Professional Certification mark
9. To avoid unnecessary delay in receiving your certificate, please ensure that
we have your current e-mail on file, by keeping your profile up to date. If you
6
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
do not have an e-mail address on file, your certificate will be sent via postal
mail.
Once you receive a certificate by e-mail, you may also contact IBM at
certify@us.ibm.com to request that a hardcopy certificate be sent by postal mail.
Note: IBM reserves the right to change or delete any portion of the program,
including the terms and conditions of the IBM Certification Agreement, at any
time without notice. Some certification roles offered through the IBM
Professional Certification Program require recertification.
1.2 IBM Tivoli Configuration Manager V4.2 Certification
We can categorize the certification process as follows:
򐂰 Job role description/target audience
A Tivoli Certified Consultant – Tivoli Configuration Manager V4.2 is a technical
professional responsible for planning, installation, configuration, operations,
administration, and maintenance of an IBM Tivoli Configuration Manager V4.2
solution. This individual will be expected to perform these tasks with limited
assistance from peers, product documentation, and support resources.
To attain the IBM Certified Deployment Professional - Tivoli Configuration
Manager V4.2 certification, candidates must pass one test.
򐂰 Required prerequisites
– Working knowledge of shell and PERL programming
– Working knowledge in SQL programming
– Basic understanding of Java™, JSP, and XML
– Strong working knowledge of operating systems (Windows® variations,
AIX®, Solaris, and Linux®)
– Basic understanding of OS and network security concepts
– Basic knowledge of networking concepts
– Basic install of DB2®, LDAP, WebSphere®, IBM HTTP Server, and JRE
– Use of LDAP DMT (Directory Management Tool)
– Use of DB2 Control Center
– Working knowledge of TCP/IP
– Basic understanding of third-party software installers (MSI, InstallShield,
and PDF)
Chapter 1. Certification overview
7
򐂰 Core requirement
In order to be certified you must select the following test:
– Test 786 - Tivoli Configuration Manager V4.2
•
Test 786 objectives
•
Test 876 sample test
•
Test 786 recommended educational resources
•
Approximate number of questions: 80
•
Duration in minutes: 120
•
Format: Multiple choice
•
Required Passing Score: 65 percent pass score or 52 correct out of 80
items correct answers
1.2.1 Test 786 objectives
This section explains the IBM Tivoli Configuration Manager 4.2 certification test
objectives.
Section 1: Planning
The following reviews planning:
򐂰 Given a Statement of Work, architecture document, and customer input,
conduct customer interviews and analyze the documentation so that
customer requirements are determined, with emphasis on performing the
following steps:
–
–
–
–
Conduct customer interviews.
Read architecture document.
Read customer documents.
Determine Tivoli naming conventions.
򐂰 Given a list of machines and their specifications, interrogate the machines
against the minimum requirements so that a list of machines to support the
Tivoli environment can be generated, with emphasis on performing the
following steps:
–
–
–
–
Identify machines involved.
Determine available disk space.
Determine available memory.
Determine CPU power.
򐂰 Given the Planning and Installation Guides, User Manuals, Release Notes,
and a list of machines, assess the software levels so that a list of machines
8
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
meeting the prerequisites and a list of machines to be upgraded and patched
can be generated, with emphasis on performing the following steps:
– Identify software prerequisites.
– Determine existing software levels.
򐂰 Given a set of network locations, protocols, and a network diagram, describe
the network topology so that a Tivoli infrastructure can be recommended, with
emphasis on performing the following steps:
– Determine physical network layout.
– Determine protocols to use.
򐂰 Given a list of servers and workstations and a network diagram, identify and
categorize the machines to be managed so that they can be grouped into a
logical endpoint list, with emphasis on performing the following steps:
– Identify machines to be managed.
– Identify groups of machines.
– Identify resources to scan.
򐂰 Given the customer's data collection requirements, a list of endpoints, and a
Tivoli infrastructure, determine the inventory requirements (scan frequency,
scan method, history tracking, MIFs to be collected, hardware/software data,
policy needs, and Wake-on-LAN requirements) so that a scanning
methodology and policy scripts can be generated, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
Consider hardware/software data to be scanned.
Determine inventory scan method.
Determine inventory scan frequency.
Determine policies needed.
Determine history tracking requirements.
Determine MIFs to be collected.
Determine Wake-on-LAN requirements.
򐂰 Given a list of software to be distributed, a delivery method, a list of
endpoints, and a Tivoli infrastructure, determine the software distribution
requirements so that a distribution architecture and methodology can be
determined, with emphasis on performing the following steps:
– Determine software to be distributed.
– Determine software packaging method.
– Analyze software requirements with respect to bandwidth usage and time
to distribute.
– Determine source hosts and depot sites.
– Determine candidates for software build via pristine install.
– Determine policies needed.
Chapter 1. Certification overview
9
– Document endpoint to directory user relationship.
– Determine eligible pervasive devices.
򐂰 Given a customer’s database environment, determine the database
requirements in order to identify the appropriate database sizing, tuning, and
RIM parameters, with emphasis on performing the following steps:
–
–
–
–
Calculate estimated size of database.
Select RIM(s) node(s).
Determine database index process.
Select appropriate database.
򐂰 Given an organization chart and business processes, describe the
organization of the administrators so that the necessary administrator groups
and roles can be determined, with emphasis on performing the following
steps:
– Identify logical groups of administrators.
– Identify roles of administrators.
– Identify policy regions to which admins require access.
򐂰 Given a company’s security policies and Tivoli security settings, create
appropriate administrator roles and Tivoli configuration functions so that the
IBM Tivoli Configuration Manager settings meet company security policies,
with emphasis on performing the following steps:
–
–
–
–
–
Define administrator roles.
Determine optimum oserv configuration settings.
Determine optimum endpoint configuration settings.
Determine access manager install.
Determine WebSeal install.
򐂰 Given a network diagram, firewall rules and policies, and DMZ architecture,
determine the firewall requirements so that inventory scans and software
distributions can be performed through the firewall(s), with emphasis on
performing the following steps:
– Determine machines separated by firewalls.
– Determine use of Tivoli Configuration Manager under DMZ.
– Determine management needs for machines.
򐂰 Given a network diagram, network administration policy, and customer
requirements, determine the multicast requirements so that a list of multicast
repeaters, targets, and configuration settings can be generated, with
emphasis on performing the following steps:
– Determine multicast targets.
– Determine multicast repeaters.
– Determine multicast addresses and parameters.
10
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 Given a list of software and inventory requirements, mobile devices, and
pervasive devices, determine Web requirements so that the Web access site,
installation method, and Web component database are configured for the list
of Web-enabled applications available to a subscriber list, with emphasis on
performing the following steps:
–
–
–
–
–
Determine install of Web components - Classic or SPBs.
Determine eligible software packages and inventory configs.
Determine eligible targets.
Determine cluster or single install.
Size DB2 for Web.
Section 2: Installation
Now we go over the installation.
򐂰 Given the set of prerequisite software CDs, install the prerequisite software
(including RDBMS, IBM HTTP Server, DB2 Data Warehouse, and
WebSphere Application Server) so that the software environment meets the
IBM Tivoli Configuration Manager prerequisites, with emphasis on performing
the following steps:
–
–
–
–
Install RDBMS.
Install IBM HTTP server.
Install DB2 Data Warehouse.
Install WebSphere Application Server.
򐂰 Given the IBM Tivoli Configuration Manager CDs and administrator access to
the appropriate hardware and the MDist2 database, choose the appropriate
installation method to install or upgrade the TMR server, Java components,
gateway and repeater hierarchy, MDist2, Firewall Toolkit, and endpoints to
produce a working Tivoli environment with MDist2 capability, with emphasis
on performing the following steps:
–
–
–
–
–
–
–
–
Locate media.
Ensure bidirectional name and address resolution.
Install/upgrade TMR server.
Install Java components.
Install MDist2.
Install Firewall Toolkit.
Create gateway(s)/repeater(s).
Install endpoints.
򐂰 Given a working Tivoli environment, the IBM Tivoli Configuration Manager
CDs, the inventory schema, and administrative access to the inventory
database, install or upgrade the inventory server, gateways, and Scalable
Collection Service so that all the necessary inventory components are
Chapter 1. Certification overview
11
installed on the correct machines in the Tivoli environment, with emphasis on
performing the following steps:
– Install/upgrade the Scalable Collection Service.
– Install/upgrade the inventory server.
– Install/upgrade the inventory gateway.
򐂰 Given a working Tivoli environment and the IBM Tivoli Configuration Manager
CDs, install or upgrade the Software Distribution components (including the
server, gateway, packaging, and desktop components) so that the
Configuration Manager GUIs can be launched and accessed, and all
necessary Software Distribution components are installed on the appropriate
machines in the Tivoli environment, with emphasis on performing the
following steps:
–
–
–
–
–
Install/upgrade Software Distribution server.
Install/upgrade Software Distribution gateway.
Install/upgrade Software Package Editor.
Install/upgrade Configuration Manager Desktop.
Install Pristine Tool.
򐂰 Given an Activity Planner schema, a Change Management schema, and a
working Tivoli environment, install the functions of Deployment Services
(including Change Management, Activity Planner, Resource Manager,
Directory Query, and Web components) so that all of these application
components are installed in the Tivoli environment, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
–
Install Change Manager.
Install Activity Planner.
Install Resource Manager.
Install device agents.
Install Web components.
Install Directory Query.
Install Access Manager.
Install Access Manager WebSeal.
Section 3: Configuration
Now we review the configuration:
򐂰 Given a working Tivoli environment, a network topology, and an MDist2
database, configure gateway Web access, repeater tuning parameters,
MDist2 RIM parameters, and the endpoint, task library, and profile manager
policy scripts so that the Tivoli environment meets the customer requirements
for distribution throughput, bandwidth control, and endpoint management,
with emphasis on performing the following steps:
– Build MDist2 RIM.
12
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
–
–
–
–
–
Tune repeaters.
Create and install endpoint policies.
Configure multicast.
Create task library, profile managers, and policy scripts.
Configure gateway Web access.
򐂰 Given a working Tivoli environment and an endpoint to directory user listing,
link endpoints to directory users and create Directory Query libraries and
Directory Queries, so that endpoints can be associated with users, with
emphasis on performing the following steps:
– Create Directory query library.
– Create Directory Query.
– Link endpoints to directory users.
򐂰 Given that inventory is installed and customer collection requirements have
been determined, tune collectors, install software signatures, and configure
RIM objects, custom queries, and scanners so that data can be collected from
endpoints, stored in the configuration repository, and matched against
defined software signatures, with emphasis on performing the following steps:
–
–
–
–
–
–
–
–
–
Build inventory RIM(s).
Tune data handler.
Tune collectors.
Add software signature.
Create inventory, subscription, and historic query library.
Configure custom tables in database.
Create custom query.
Configure DMI data to collect.
Create inventory policy scripts.
򐂰 Given that Software Distribution is installed and the customer’s software
distribution requirements have been determined, configure multicast support,
data moving service, Web interface, mobile support, and policy scripts so that
software can be distributed to targets in compliance with the customer’s
requirements, with emphasis on performing the following steps:
–
–
–
–
–
Configure multicast support.
Configure data moving service.
Configure software distribution mobile support.
Create software distribution policy scripts.
Configure software distribution Web interface.
򐂰 Given that the deployment services components have been successfully
installed, configure the RIMs, Web Gateway, device plug-ins, HTTP Server,
and WebSphere Application Server in order to provide working Web access
Chapter 1. Certification overview
13
and management for pervasive devices, with emphasis on performing the
following steps:
–
–
–
–
–
–
–
–
–
Build Activity Planner RIM.
Build Change Manager RIM.
Configure plug-ins.
Configure Web Gateway.
Register pervasive devices.
Create resource group policies.
Configure IBM HTTP Server.
Configure WebSphere Application Server/Tivoli TMR Web access.
Publish Web objects.
򐂰 Given a working Tivoli environment with software distribution, inventory, and
deployment services installed, test the managed nodes, gateways, endpoints,
and RIM objects so that endpoints can be managed through the framework
and databases can be accessed through the RIM, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
Test managed node.
Test gateway(s).
Test endpoint(s).
Test Change Manager RIM.
Test Activity Planner RIM.
Test inventory RIM(s).
Test MDist2 RIM.
򐂰 Given a working Tivoli Configuration Manager environment, TEC Server,
TEDW, and customer requirements, configure software distribution to send
events to TEC and integrate software distribution with TEDW so that Tivoli
Configuration Manager can generate reports and TEC events, with emphasis
on performing the following steps:
– Configure software distribution to send events to TEC.
– View Tivoli Configuration Manager reports in the Tivoli Enterprise™ Data
Warehouse.
Section 4: Operations, administration, and maintenance
Now we review operations, administration, and maintenance.
򐂰 Given a list of file packages and inventory profiles from Tivoli Software
Distribution V3.x and Tivoli Inventory V3.x, convert them to IBM Tivoli
Configuration Manager V4.2 inventory configuration profiles, software
packages, and SPBs, with emphasis on performing the following steps:
– Convert inventory profiles to inventory configuration profiles.
– Convert file packages to software packages.
14
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 Given IBM Tivoli Configuration Manager customer requirements, create
inventory resources (including policy regions, profile managers, and profiles)
so that inventory data can be collected from the customer environment, with
emphasis on performing the following steps:
–
–
–
–
–
Create inventory policy regions.
Create inventory profile managers.
Create and configure inventory profiles.
Select custom MIF collection profile settings.
Determine type of scan for pervasive devices.
򐂰 Given IBM Tivoli Configuration Manager customer requirements, create
software distribution resources (including policy regions, profile managers,
and profiles) so that software can be distributed to and removed from target
systems, with emphasis on performing the following steps:
– Create and configure software distribution profiles.
– Create software packages using the Java Package Editor, CLI, GUI, SIS,
or importing them.
– Launch the software distribution Java Package Editor and use it to build
packages on all supported operating systems.
– Export and modify software package blocks.
– Determine version and dependencies of a software package block.
– Create install, uninstall, undo, commit, and verify jobs.
– Configure advanced options on software distribution profiles.
򐂰 Given a working IBM Tivoli Configuration Manager V4.2 environment and
customer requirements, build reference models so that inventory scans and
software distributions can be applied to the subscriber lists enforcing the
software states and inventory data elements defined in the reference model,
with emphasis on performing the following steps:
– Create a reference model and assign subscribers.
– Add, change, and delete inventory scan elements.
– Add, change, and delete software distribution elements.
򐂰 Given customer requirements to schedule and coordinate activities, configure
the Activity Planner to define, submit, and schedule an activity plan that
meets customer requirements, with emphasis on performing the following
steps:
–
–
–
–
Use Activity Planner to define activity, set conditions, and assign targets.
List submittable activity plans.
Submit activity plan.
Schedule an activity plan for execution.
Chapter 1. Certification overview
15
򐂰 Given customer requirements to manage pervasive devices, create and
configure device object software packages and inventory profiles so that
software can be delivered and inventory information can be collected from
these devices, with emphasis on performing the following steps:
– Create and configure device object software package.
򐂰 Given a working IBM Tivoli Configuration Manager V4.2 environment and a
set of subscribers, distribute software and perform asset scans against
LAN-attached and mobile clients so that asset data is gathered and software
is installed or removed, with emphasis on performing the following steps:
–
–
–
–
Distribute software to desired targets and confirm success.
Distribute inventory configuration profile.
Execute an activity plan.
Configure endpoint-initiated scanner.
򐂰 Given active distributions and scans, control IBM Tivoli Configuration
Manager V4.2 activities to determine status, cancel activities, and
determine/alter the repeater path so that activities can be successfully
managed, with emphasis on performing the following steps:
–
–
–
–
–
–
–
–
–
Calculate disk space required for distribution.
Verify success of scan or distribution.
Report current status of a distribution.
Cancel a distribution.
Determine path that a distribution will follow.
Alter the path that a distribution will follow.
View status or details of activity plans.
Distribute a software package using multicast.
Move files/software from one endpoint to another.
򐂰 Given the framework and IBM Tivoli Configuration Manager V4.2 CLIs and
administrative access to the system, start and stop components so that
collectors, oservs, and endpoints can be effectively managed in the
environment, with emphasis on performing the following steps:
–
–
–
–
–
Start/stop oserv.
Start/stop endpoint.
Start/stop gateways.
Start/stop endpoint manager.
Start/stop collectors.
򐂰 Given an installed Tivoli environment including IBM Tivoli Configuration
Manager V4.2, perform the tasks necessary to uninstall Tivoli and remove
related information from the databases so that the systems are restored to the
pre-installation state, with emphasis on performing the following steps:
– Uninstall IBM Tivoli Configuration Manager V4.2.
– Remove information in database about removed endpoint.
16
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
– Restore from backup.
򐂰 Given error logs, database schemas, and CLI commands, describe the
troubleshooting procedures so that corrective action can be taken, successful
distributions can be achieved, RIM connections can be established, and the
oserv and other Tivoli components can be traced, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
–
–
–
–
Troubleshoot TMR and managed node installation.
Troubleshoot endpoint agent installation.
Solve RIM connection problems.
Debug distributions.
Generate oserv trace.
Trace a reference model.
Enable Web user interface tracing.
Troubleshoot Java install.
Review Scalable Collection Service.
Debug activity plan problems using appropriate log files.
Debug Change Manager problems using logs and traces.
1.3 Recommended resources for study
Courses and publications are offered to help you prepare for the certification
tests. The courses are recommended, but not required, before taking a
certification test. If you wish to purchase Web-based training courses or are
unable to locate a Web-based course or classroom course at the time and
location you desire, please feel free to contact one of our delivery management
teams at:
򐂰 Americas - tivamedu@us.ibm.com
򐂰 EMEA - tived@uk.ibm.com
򐂰 AP - tivtrainingap@au1.ibm.com.
Note: Course offerings are continuously being added and updated. If you do
not see the course(s) below listed in your geography please contact the
delivery management team.
1.3.1 Courses
Course names and/or course numbers vary depending on the education delivery
arm used in each geography. Please refer to the Tivoli software education Web
site to find the appropriate course and education delivery vendor for each
geography.
Chapter 1. Certification overview
17
General training information can also be found at IBM IT Training at:
http://ibm.com/training
Course title: IBM Tivoli Configuration Manager 4.2
IBM Tivoli Configuration Manager provides an integrated solution for managing
complex distributed enterprise environments. Working on top of IBM Tivoli
infrastructure, Configuration Manager integrates Software Distribution, Inventory,
and additional supporting services. This course is designed to cover the
fundamentals of Tivoli Configuration Manager. The information covered in this
course will provide you with the opportunity to master several key skills needed
to perform day-to-day administrative functions. You will also be introduced to
new terminology and concepts associated with administering Tivoli Configuration
Manager.
Course duration: Five days.
Course number : (TV170 - IBM Technical Education Services) | (TV107 Education Centers for IBM Software). Course numbers vary depending on the
education delivery arm used in each geography. Please refer to the Web site
below to find the appropriate course number according to the education delivery
vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld® "You Pass We Pay": This course is approved for IBM
PartnerWorld You-Pass, We-Pay.
Course title: IBM Tivoli Configuration Manager 4.2
IBM Tivoli Configuration Manager provides an integrated solution for managing
complex distributed enterprise environments. Working on top of IBM Tivoli
Management Framework, Configuration Manager integrates Software
Distribution, Inventory, and additional supporting services. This Web-based
course is designed to cover the fundamentals of Tivoli Configuration Manager.
The information covered in this course will provide you with the opportunity to
master several key skills needed to perform day-to-day administrative functions.
You will also be introduced to new terminology and concepts associated with
administering Tivoli Configuration Manager. In a separate module, this course
will present the fundamentals of Tivoli Management Framework, which is the
foundation of many Tivoli Enterprise products. Learning to use Tivoli
Management Framework will provide you with the basic skills needed to work
with Tivoli Configuration Manager. Knowledge of Tivoli Management Framework
terms, resources, and concepts is an important first step in your preparation for
success with Tivoli Enterprise products.
18
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Course duration: Thirty-two hours, self-paced.
Course number : (TIV69 - IBM Technical Education Services) | (TV113 Education Centers for IBM Software). Course numbers vary depending on the
education delivery arm used in each geography. Please refer to the Web site
below to find the appropriate course number according to the education delivery
vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is not approved for IBM
PartnerWorld You-Pass, We-Pay.
1.3.2 Publication
Before taking test 786 IBM Tivoli Configuration Manager V4.2 Implementation,
the recommended publications to review are IBM Tivoli Configuration Manager
manuals and redbooks.
IBM Tivoli Configuration Manager product manuals
You may want to refer to the following manuals:
򐂰 IBM Tivoli Configuration Manager: Introducing IBM Tivoli Configuration
Manager, GC23-4703
Provides an overview of IBM Tivoli Configuration Manager and its
components, and uses scenarios to highlight various processes.
򐂰 IBM Tivoli Configuration Manager: Planning and Installation Guide,
GC23-4702
Explains how to install, upgrade, and uninstall IBM Tivoli Configuration
Manager and its components in a Tivoli environment.
򐂰 IBM Tivoli Configuration Manager: User’s Guide for Software Distribution,
SC23-4711
Explains the concepts and procedures necessary for you to effectively use
the Software Distribution component to distribute software over local area
networks (LANs) and wide area networks (WANs).
򐂰 IBM Tivoli Configuration Manager: Reference Manual for Software
Distribution, SC23-4712
Explains advanced features and concepts needed to use and tailor the
Software Distribution component.
򐂰 IBM Tivoli Configuration Manager: User’s Guide for Inventory, SC23-4713
Chapter 1. Certification overview
19
Describes the Inventory component and the management tasks that you can
perform.
򐂰 IBM Tivoli Configuration Manager: Database Schema Reference, SC23-4783
Describes the IBM Tivoli Configuration Manager database tables.
򐂰 IBM Tivoli Configuration Manager: Messages and Codes, SC23-4706
Lists all of the messages produced by IBM Tivoli Configuration Manager.
򐂰 IBM Tivoli Configuration Manager: User’s Guide for Deployment Services,
SC23-4710
Provides information about the different services provided as part of Tivoli
Configuration Manager.
You may also follow the link below in order to reach the online publications of
IBM Tivoli Configuration Manager:
http://publib.boulder.ibm.com/tividd/td/tdprodlist.html#S
IBM Tivoli Configuration Manager Redbooks
The following are IBM Tivoli Configuration Manager related Redbooks:
򐂰 All About IBM Tivoli Configuration Manager Version 4.2, SG24-6612
IBM Tivoli Configuration Manager 4.2 is a new product that combines Tivoli
Software Distribution 4.1 and Tivoli Inventory 4.0 into a single product offering
with many new functions, such as integration with Enterprise Directories,
distribution across firewalls, and Device Management. This IBM Redbook
covers the complete functionality and features of IBM Tivoli Configuration
Manager 4.2 with many real-life scenarios and best practices. Some of the
major topics that are covered in the publication are:
–
–
–
–
–
–
–
–
–
LDAP integration
Web GUI
Device Management
Data Moving
Firewalls and IBM Tivoli Configuration Manager 4.2
Native packaging
Multicast
Inventory new features and integration with Software Distribution
Troubleshooting
This book will assist Software Distribution specialists with installing,
customizing, using, and troubleshooting IBM Tivoli Configuration Manager
4.2.
򐂰 Automated Distribution and Self-Healing with IBM Tivoli Configuration
Manager V 4.2, SG24-6620
20
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
This IBM Redbook covers a solution to implement an automated software
distribution and Self-Healing mechanism on top of IBM Tivoli Configuration
Manager Version 4.2. The solution described in this book (referred as the
Solution throughout he book) guarantees the availability of designated
software packages on workstations. The Solution is also backwards
compatible with IBM Tivoli Software Distribution Version 4.1 and Inventory
Version 4.0.
The Solution will extend the benefits of using IBM Tivoli Configuration
Manager Version 4.2 by reducing costs, increasing reliability, and providing
fast delivery. The scripts that make up the Solution are shipped with the book
(on an AS-IS basis), so you can customize the Solution according to your
needs.
We believe the Solution described in this book will be very useful for
customers who are planning to implement a software distribution
infrastructure or are already using IBM Tivoli Configuration Manager Version
4.2 and want to automate the software enforcement/Self-Healing process.
򐂰 Migration to IBM Tivoli Configuration Manager Version 4.2, SG24-6616
Tivoli Inventory and Tivoli Software Distribution have evolved to become
smarter, faster, and more efficient, since the earlier 3.6.X versions. IBM Tivoli
Configuration Manager Version 4.2 uses all the best features of these
post-3.6 versions and also adds new features and enhancements to create a
powerful deployment, change, and asset management suite. This book
explains both the business reasons and the technical implementation details
for migrating from Software Distribution and Inventory 3.6.X to IBM Tivoli
Configuration Manager Version 4.2.
The topics include:
– Business reasons for migration
– Functional and architectural differences between IBM Tivoli Configuration
Manager and 3.6.X versions of Software
– Distribution and Inventory
– Planning and methodology of migration
– Framework migration
– Migration scenarios
– Package migration
This book will help you in all aspects of migration from Software Distribution
and Inventory 3.6.X to IBM Tivoli Configuration Manager Version 4.2.
򐂰 Implementing Automated Inventory Scanning and Software Distribution After
Auto Discovery, SG24-6626
Chapter 1. Certification overview
21
This book describes a solution to provide readers with the ability to
automatically install endpoint code and perform inventory scans and required
software distributions on new workstations that have been discovered by IBM
Tivoli NetView®, reducing the time and effort it takes to manually gather and
maintain current information in a distributed environment. Using IBM Tivoli
Configuration Manager Version 4.2 and NetView Version 7.1.3, this solution
will benefit the reader by providing reliability, potential cost reduction, and
rapid time-to-value incentives, which free up administrators and allow them to
focus on actual IT needs.
We provide an overview of the high-level design and architecture, including
the different customer environments where this solution can be applied,
followed by implementation, scenarios, and extending the solution.
This book also covers the IBM Tivoli NetView Integration Module for
Configuration Manager (formerly called Tivoli Integration Pack for NetView)
implementation and scenarios.
This publication will assist customer and business partners’ support staff and
managers, and IBM systems engineers who are involved in Tivoli sales or
implementation services.
22
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2
Chapter 2.
Tivoli Management
Framework basics
This provides an overview of the Tivoli Management Framework concepts. It is
important to understand Tivoli Management Framework, because most of the
IBM Tivoli Configuration Manager services depend on the Framework.
We discuss the following in this chapter:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
“Components of the basic Tivoli architecture” on page 24
“Tivoli user interfaces” on page 27
“Tivoli resources” on page 29
“Authorization roles” on page 33
“Tivoli profiles” on page 35
“Multiplexed distribution services” on page 39
“Connecting multiple TMR regions” on page 49
“Endpoint login sequence” on page 55
“Firewall Security Toolbox” on page 64
“Installing Firewall Security Toolbox” on page 67
© Copyright IBM Corp. 2005. All rights reserved.
23
2.1 Components of the basic Tivoli architecture
The following are the components of the basic Tivoli architecture:
򐂰 Tivoli Management Region (TMR) is an entity that contains the Tivoli server
and its clients. A Tivoli Management Region contains three tiers of resources:
The Tivoli server, managed nodes and gateways, and endpoints, as shown in
Figure 2-1.
Figure 2-1 Tivoli Management Region
򐂰 Tivoli Management Region (TMR) Server includes the libraries, binaries, data
files, and the graphical user interface (GUI) (the Tivoli desktop) needed to
install and manage your Tivoli environment. The Tivoli server performs all
24
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
authentication and verification necessary to ensure the security of Tivoli data.
The following components comprise a Tivoli server:
– An object database, which maintains all object data for the entire Tivoli
region.
– An object dispatcher, which coordinates all communication with managed
nodes and gateways. The object dispatcher process is the oserv, which is
controlled by the oserv command. By default, oserv communicates in the
TMR on port 94. This port is configurable.
– An endpoint manager, which is responsible for managing all of the
endpoints in the Tivoli region.
Note: The TMR server should be dedicated to the task of managing the
TMR.
The TMR server must be up and available in order for the rest of the TMR to
function. For more information on increasing the fault tolerance of your TMR,
see the IBM Redbook, High Availability Scenarios with IBM Tivoli Workload
Scheduler and IBM Tivoli Framework, SG24-6632.
The machine that serves as the TMR server can also serve as a client (target
of management operations) in the TMR.
򐂰 Managed Node runs the same software that runs on a Tivoli server. Managed
nodes maintain their own object databases that can be accessed by the Tivoli
server. When managed nodes communicate directly with other managed
nodes, they perform the same communication or security operations that are
performed by the Tivoli server.
The difference between a Tivoli server and a managed node is that the Tivoli
server object database is global to the entire region, including all managed
nodes. In contrast, the managed node database is local to the particular
managed node. To manage a computer system that hosts the managed
node, install an endpoint on that managed node.
򐂰 Gateway controls communication with and operations on endpoints. Each
gateway can support thousands of endpoints. A gateway can launch methods
on an endpoint or run methods on behalf of the endpoint.
A gateway is generally created on an existing managed node. This managed
node provides access to the endpoint methods and provides the
communication with the Tivoli server that the endpoints occasionally require.
򐂰 Tivoli Management Agent (TMA or endpoint) is a target of management
operations in a TMR. An endpoint provides the primary interface for system
management. An endpoint is any system that runs the lcfd service (or
daemon), which is configured using the lcfd command.
Chapter 2. Tivoli Management Framework basics
25
Typically, an endpoint is installed on a computer system that is not used for
daily management operations. Endpoints run a very small amount of software
and do not maintain an object database. The majority of systems in a Tivoli
environment should be endpoints. The Tivoli desktop is not installed with the
endpoint software. If you choose to run a desktop on an endpoint, you must
install Tivoli Desktop for Windows or telnet to a UNIX®-managed node.
The TMA is implemented differently for different platforms. It is a process on
UNIX systems and a service on Windows NT® systems. By default, a TMA
will contact its gateway on port 9494, the port on which the gateway is
listening for TMAs. This port is configurable. By default, a TMA listens for
TMR communications on port 9495.
Figure 2-2 shows Tivoli server and client components communication.
Figure 2-2 Tivoli Server, managed node, and TMA communication
Sizing considerations for gateways: Sizing the endpoint gateways is an
important consideration when designing your Tivoli topology. The following
are the main factors to consider when sizing endpoint gateways:
򐂰 Number of endpoints
򐂰 Number of upcalls and downcalls
򐂰 Number of endpoint platform types that must be supported
26
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2.2 Tivoli user interfaces
Tivoli provides both a graphical user interface (GUI) and a command line
interface (CLI). The GUI is often referred to as the Tivoli Desktop. In addition to
the desktop and the CLI, there are Web-based views of certain Tivoli
management functions.
Depending on the operations you are performing, you use either the desktop or
the CLI. For example, to view the relationships of policy regions and profile
managers, use the desktop to visually display those relationships. The CLI can
be more useful to perform repetitive actions, such as encapsulating Tivoli
commands in a script.
2.2.1 Tivoli Desktop
The graphical user interface is called the Tivoli Desktop. Figure 2-3 shows the
initial view of Tivoli Desktop. It gets populated as you install Tivoli applications.
Figure 2-3 Tivoli Desktop
The Tivoli Desktop provides a graphical user interface (GUI) for administrators to
graphically view and control the Tivoli Management Environment® with a logical,
consistent layout across all Tivoli products.
The Tivoli Desktop is automatically installed on every UNIX-managed node. It is
invoked on UNIX systems via the tivoli command. You must run the tivoli
command from an X-Window session after sourcing the environment variables.
Chapter 2. Tivoli Management Framework basics
27
Tivoli Desktop for Windows is a separate program that must be installed
manually before an administrator can access the Tivoli Desktop on a Windows
NT-managed node. The Tivoli Desktop for Windows code is on Framework CD2.
It can be installed on any Windows-based system, even if it is not in the TMR. It
can be used to access the Tivoli Desktop of a UNIX-managed node as well as an
NT-managed node.
Note: The Tivoli Desktop for Windows requires you to specify a host, which
could be another machine.
2.2.2 Command line interface
The Tivoli command line interface (CLI) enables Tivoli system administrators to
execute Tivoli management functions via the command line provided by the
operating system. You can execute most CLI commands only from the TMR
server or managed nodes.
On UNIX, CLI commands are executed from the shell prompt or can be included
in scripts. On Windows, CLI commands are executed from the Windows NT
command prompt or can be included in batch files.
Some Tivoli CLI commands are actually shell scripts that must run on NT from
the bash shell, which is installed by Tivoli on every NT TMR server and managed
node. Most Tivoli CLI commands begin with a w.
If you are authorized to run the Tivoli desktop, you can also run CLI commands.
If you are not authorized to run the desktop, you cannot run CLI commands.
Note: The graphical Desktop is not completely equivalent to the CLI, although,
in general, they are two interfaces to achieve the same purpose.
Some actions can only be performed from the GUI (creating a collection, for
example), and some can only be performed from the CLI (restoring the
database, for example).
2.2.3 Navigating the Tivoli Desktop
Various elements in windows and dialogs assist the user, including pull-down
and pop-up menus, status lines and messages, buttons, check boxes, and
scrolling lists. Figure 2-4 on page 29 shows different options used for navigating
the Tivoli Desktop.
28
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-4 Navigating the Tivoli Desktop
2.3 Tivoli resources
Resource is a general term used to define objects, services, tasks,
administrators, managed nodes, and other items in the Tivoli environment.
A resource is a system, device, or service in a distributed environment.
Examples are workstations, software products, and administrators. A managed
resource represents system or network resources that Tivoli manages. Managed
resources are found only inside of policy regions. Figure 2-5 on page 30 shows
different managed resources in a Tivoli environment.
Chapter 2. Tivoli Management Framework basics
29
Figure 2-5 Different managed resources
To manage a specific type of resource, you must first install a Tivoli application
that is designed to manage that resource. Tivoli applications manage resources
from a single logical view.
Upon installation of Framework on the TMR server, the default Tivoli desktop
(Figure 2-3 on page 10) displays five icons, each of which represents a type of
Tivoli resource: The administrators, notices, a default policy region, the endpoint
manager, and the scheduler.
Administrator
A Tivoli administrator is a system administrator who has been authorized to
perform systems management tasks and manage policy regions. The
Administrator Collection is a container for all the Tivoli administrators.
Tivoli software products use administrators to delegate the use of the system
root account without giving those administrators the system password or
complete control. Most system administrators have a Tivoli administrator that
maps to their system account. However, users on multiple systems can use the
same Tivoli administrator. A Tivoli administrator is the person or group of people
each with a user account to access a computer system where Tivoli software
products are installed.
Notices
Notices are a resource that contains notes posted by Tivoli applications. These
notes inform the administrators of management functions performed in the Tivoli
environment.
30
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Policy region
A policy region is a container for managed resources that conform to the same
set of policies or rules. Upon installation of the TMR server, there will be one
default policy region, and initially the managed node on the TMR server will be
the only resource contained within it.
A policy region can be used to reflect the management and organization of a
distributed computing environment. It has two primary objectives:
򐂰 To enforce company rules and policies
򐂰 To enforce a security model or delegation of authority
It represents logical relationships tied to an organizational structure such as
divisions, departments, geographical locations, types of workstations, or
business functions.
Policy regions can be nested to provide hierarchical relationships; if a policy
region is contained in another policy region it is called a policy subregion.
Policy region hierarchy can be designed in different ways. Figure 2-6 shows
grouping by Tivoli products, Figure 2-7 on page 32 shows grouping by Tivoli
operating systems, and Figure 2-8 on page 32 shows grouping by departments.
Figure 2-6 Grouping by Tivoli product
Chapter 2. Tivoli Management Framework basics
31
Figure 2-7 Grouping by operating system
Figure 2-8 Grouping by department
Endpoint manager
The endpoint manager runs on the TMR server and maintains TMA and gateway
information.
The endpoint manager maintains an endpoint list that keeps track of every TMA
in a TMR and tracks the gateway associated with each TMA.
32
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
From the endpoint manager, you can view the gateways and their associated
endpoints. You can also create new gateways.
Scheduler
Scheduler is a resource that allows access to the scheduling queue to
manipulate scheduled jobs. The scheduler executes previously defined jobs at
predefined times, such as scheduling jobs to occur at specific times or within a
specified time frame, to repeat a specified number of times, at specified intervals,
or indefinitely.
2.4 Authorization roles
When root administrators create other administrators, they specify the resources
and authorization roles for the new administrator. The authorization roles
assigned to an administrator determine the management operations that the
administrator can perform. Authorization roles provide a set of privileges to Tivoli
resources. Authorization roles are mutually exclusive. Each role provides its own
set of privileges—one role does not provide privileges of any other role.
The possible authorization roles for administrators are as follows:
򐂰 super
Allows an administrator to connect and disconnect regions; perform
maintenance operations on the region; install managed nodes, products, and
patches; and so on. The super role is normally required for high-security
operations and is not typically assigned to many administrators.
򐂰 senior
Allows an administrator to create and define all Tivoli resources. The senior
role is required for configuration and policy operations, such as creating an
administrator, setting policy, or expiring notices.
򐂰 admin
Allows an administrator to perform day-to-day tasks and system
configurations. The admin role is required for general system management
operations, such as adding an item to a profile, distributing a profile, or
changing the message of the day.
򐂰 user
Allows an administrator to view information and resources with read-only
capability. The user role is required to bring up a Tivoli desktop and allows
limited operations that do not affect configuration information, such as
displaying configuration information.
Chapter 2. Tivoli Management Framework basics
33
򐂰 backup
Allows an administrator to create backups of Tivoli object databases. An
administrator must have the backup role in the region that contains the object
databases for the Tivoli server and managed nodes to be backed up.
򐂰 restore
Allows an administrator to restore Tivoli object databases from backup. The
administrator must have the restore role in the region that contains the object
databases for the Tivoli server and managed nodes to be restored.
򐂰 install-product
Allows an administrator to install new applications and products in the local
Tivoli region.
򐂰 install-client
Allows an administrator to install managed nodes within policy regions that
allow the managed node resource type.
򐂰 policy
Allows an administrator with both the policy and senior roles to create policy
regions. In addition, the administrator can add resource types to policy
regions and set up the policies that govern the policy region.
򐂰 Dist_control
Allows an administrator to control multiplexed distribution 2 (MDist 2)
distributions.
Note: Depending on the Tivoli products installed, other authorization roles
might be available.
2.4.1 Scope of authorization roles
For example, some operation requires the admin role. If an administrator has
only the super role, this administrator cannot perform these operations unless
this administrator also is granted the admin role.
Note: To ensure that senior system administrators can perform operations at
their authorization level and below, assign these administrators all
authorization roles below their current level. For example, to ensure that an
administrator with the senior role can perform all operations at the senior level
and below, assign this administrator the senior, admin, and user roles.
34
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Roles should be assigned based on the management operations specific to an
administrator. You should carefully plan how you are going to delegate system
management tasks. Tivoli Management Framework provides control and
flexibility in assigning management authority to various personnel. Carefully
consider and review the areas of responsibility for each Tivoli administrator when
assigning roles for various resources and in various Tivoli regions. For example,
Juan is to manage Documentation policy region. He should be assigned the
senior, admin, and user roles for this policy region. If Juan has administrative
needs for other policy regions or resources outside of his policy region, these can
be granted later.
Authorization roles can be granted at the resource level or region level.
Resource authorization roles
Granting roles at the resource level provides an administrator with authority to
resources across policy regions, the Scheduler, or the Administrators collection.
Administrators can have different roles for different resources. Resource
authorization roles can be assigned for many types of resources that appear as
icons on a Tivoli desktop. If an administrator has a resource role, that role applies
for all objects contained in that resource. For example, if John has the senior role
in the Marketing policy region, he also has the senior role for all resources in that
policy region.
Region authorization roles
Granting roles at the region level provides an administrator with authority over all
resources in the Tivoli region. If an administrator has an authorization role in a
Tivoli region, that same role applies for all resources in that region. For example,
if Isabella has the role admin in the region, she also has the admin role for all
resources in that region.
An administrator with the super or senior role in the Administrator collection can
create other administrators and assign them authorization roles. For security
reasons, use extreme care when assigning the super role in a Tivoli region.
2.5 Tivoli profiles
In large distributed networks, computer systems are frequently grouped
according to the type of work for which they are used. For example, computer
systems in an engineering group might be used to produce CAD drawings, while
those in an accounting group might be used to produce tax documents. With
Tivoli Management Framework, you can place common configuration information
for computer systems used for similar purposes in a centralized area. Doing so
Chapter 2. Tivoli Management Framework basics
35
makes it easier to access, manage, and duplicate resources. Profiles and profile
managers enable you to do this.
A profile is a container for a Tivoli application. Each application has its own type
of profile. The profile template is configured by a system administrator to manage
resources as desired. As an example, Figure 2-9 shows the Inventory Profile
icon.
Figure 2-9 Inventory Profile icon
Profiles are sent to target systems.You can apply a profile to a set of managed
resources in the TMR. This causes the management task to be sent to the target
resource, which is usually a computer system such as a managed node or TMA.
The Framework provides profile managers to associate profiles with their target
systems.
One profile can define configurations for multiple platforms. A profile can contain
only information related to the profile type (for instance, IBM Tivoli Monitoring),
but within each profile type, configuration information for multiple platform types
can be stored. For example, the User Administration profile can store a particular
user's account information for their UNIX and Windows accounts both in the
same profile record.
Figure 2-10 on page 37 is an example of a profile for the Inventory component of
the IBM Configuration Manager product. This allows you to scan machines for
hardware and software assets.
36
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-10 Inventory profile example
2.5.1 Profile managers and profile distribution
A profile manager is a container for individual profiles. It provides a place to
create and organize groups of profiles and to link subscribers, or recipients, to
them. A profile manager can contain multiple profiles of the same type, or it can
contain profiles of more than one type. Profile managers control the distribution
of profiles to subscribers. Profile managers are created within a policy region.
Subscribers to a profile manager can be in the same policy region as their profile
manager or in other policy regions.
A profile manager can be viewed logically as having two sections. One section
contains profiles and the other section contains subscribers. The set of profiles
contained in a profile manager might be of different types.
Framework delivers all profiles to subscribers. All applications use the same
method to propagate the profile data to the target systems. The mechanism is
provided by Framework, and it is called profile distribution. The target resources
are called subscribers.
Chapter 2. Tivoli Management Framework basics
37
As a result of profile distribution, profile data is copied to target systems and sent
to the appropriate application that will understand the configuration information
and apply it accordingly.
When a TMA receives a profile and does not have the corresponding application
loaded in its method cache, the application code will be downloaded from the
TMA's Management Gateway.
Figure 2-11 Management by subscription
Types of profile managers
Profile managers can operate in two modes: Database or dataless.
򐂰 Database mode
Enables a profile manager to distribute to any profile manager (dataless or
database), managed nodes, and NIS domains, but not to endpoints.
򐂰 Dataless mode
Enables a profile manager to distribute to managed nodes, endpoints, and
NIS domains, but not to other profile managers.
You select the mode for a profile manager when you create it. You can also
change the mode after it is created.
Note: If you want to subscribe profile managers to a certain profile manager,
the profile manager that is being subscribed to must be in database mode.
A policy region can belong to only one TMR. However, subscribers to a particular
profile manager might actually reside in another, interconnected, TMR. This
38
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
ability to subscribe resources across TMR boundaries means that a profile can
be distributed easily to hundreds or thousands of machines.
2.6 Multiplexed distribution services
The multiplexed distribution facility (MDist) is a Framework service to enable
distributions of large amounts of data to multiple targets in an enterprise. These
services are used by a number of Tivoli profile-based applications to maximize
data throughput across large, complex networks. MDist is most important for the
Software Distribution component of IBM Tivoli Configuration Manager because
of the large file transfers. MDist is configurable to control network load.
MDist improves data throughput using such techniques as the following:
򐂰 Parallel distribution to machines
򐂰 Automatic load distribution
򐂰 Use of repeater sites that accept data over slow links and redistribute it to
other machines on the local connection
For additional information refer to Chapter 11, “Distribution Management,” of the
Tivoli Management Framework User's Guide; and Chapter 6, “Multiplexed
Distribution Services,” of the Tivoli Management Framework Planning for
Deployment Guide.
MDist repeater sites are intermediate systems that receive a single copy of Tivoli
data and send it to other repeater sites or to target systems. This improves speed
by increasing parallelism. Management gateways use repeater software to
distribute to TMA clients. MDist repeaters must be managed nodes.
You need to consider the following facts concerning a repeater's range:
򐂰 A repeater's range is defined as the set of target systems that receive data
from the repeater.
򐂰 A target system should be assigned to only one repeater's range.
򐂰 One repeater can be in the range of another repeater.
Chapter 2. Tivoli Management Framework basics
39
Figure 2-12 Range of a repeater
The TMR server is a repeater by default. Understanding MDist behavior is
important because, under some circumstances, the default MDist behavior can
strain the resources of the TMR server or your network bandwidth.
򐂰 Single TMR environments: In a single TMR, MDist distributes for the TMR
server to all target machines in parallel, up to a default maximum of 100
machines at a time. The number of machines can be configured differently.
򐂰 Multiple TMR environments: When distributing data to machines in more than
one TMR, MDist distributes data in parallel to local machines and once to
other TMR server(s). A TMR server in another region is called a wan
repeater. The other TMR servers' MDist repeaters then redistribute the data
to the target machines.
TMR servers and managed nodes configured as management gateways are
automatically designated as repeaters. You may define additional repeater sites.
Configuration of repeaters is done by the single command called wrpt.
Note: Any system in the TMR that does not explicitly belong to the range of a
repeater will belong to the range of the default repeater (which defaults to the
TMR server).
40
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2.6.1 MDist and MDist 2
Tivoli provides two multiplexed distribution services: MDist and MDist 2.
򐂰 MDist: MDist performs a synchronous transfer of data through a configured
hierarchy of repeaters. The data is not stored in an intermediate location, so
the size of the data transfer can be quite large. Because the data are not
stored at the repeater, if a distribution fails, it must be restarted from the
beginning.
򐂰 MDist 2: MDist 2 is an extension of MDist to handle large-scale distributions.
MDist II transfers data asynchronously. It uses repeater depots to store the
data to ensure successful delivery. If the distribution is unsuccessful, it can
resume without starting from the beginning.
Beginning with Framework 4.1, MDist 2 has additional capabilities, including
multicast support to improve performance. You should use the wmdist command
to enable multicast and control profile distributions.
2.6.2 MDist 2 functions
The following are the functions of MDist 2:
򐂰 Distribution monitoring and control: In addition to checking the status of the
distribution, you can take action on it (pause, resume, or cancel) using the
GUI.
򐂰 Mobile computing support: This graphical interface allows users to download
and install distributions at their convenience.
򐂰 Disconnected endpoint support: Enables users to download and save
distributions in a local storage directory for installation at a later date.
򐂰 Roaming endpoint support: Enables endpoints to receive a distribution when
an endpoint migrates to a different gateway during distribution.
򐂰 Installation from CD or file server: Enables administrators to specify a CD or
file server to use rather than a repeater.
򐂰 Wake on LAN® (WOL) support: Enables administrators to send distributions
to powered off computers. If WOL is enabled, the machine will wake up to
receive the distribution.
򐂰 Multicast support: Enables system administrators to improve performance by
using parallel distribution.
Chapter 2. Tivoli Management Framework basics
41
2.6.3 MDist2 components
Figure 2-13 on page 43 illustrates the primary MDist2 components, which are:
42
Repeater manager
The Tivoli object that maintains configuration data for
all repeaters in the TMR. It also determines the
distribution path. There is one repeater manager per
TMR.
Repeater site
The intermediate client that receives a single copy of
data and sends it to another repeater site or target
clients.
Repeater depot
The storage site for MDist2 distributions. Every
repeater has a depot. Thus, data can be stored on any
repeater in the Tivoli environment. This storage
mechanism helps reduce network traffic for frequently
distributed data sets.
Repeater queue
The queuing mechanism for MDist2 distributions.
Every repeater has a queue. The distribution is
queued and its persistent information is kept as a local
file. This queuing mechanism includes a retry function
that enhances support for unreachable targets.
Distribution manager
The Tivoli object that updates status in the database.
There is one distribution manager per TMR. Thus,
each TMR keeps track of all distributions it launches.
GUI
The Java interface used to view status and control
distributions.
RIM
Stands for the RDBMS Interface Module. It is a
common interface Tivoli applications can use to store
and retrieve information from a relational database,
and is used to store MDist2 distribution data.
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-13 MDist 2 components
2.6.4 wmdist command
Configures repeaters and manages MDist 2 distributions. Here you can find
some important options of the wmdist command.
wmdist –I repeater_name wmdist –j depot_directory...
– I enables you to view detailed information about the distributions that the
repeater is currently processing, and obtains the ID for the distribution.
wmdist –k depot_directory...
– k removes one or more alternative depot directories.
wmdist –l [–a] [–idist_id] [–v]
This lists distribution status. The options are as follows:
򐂰 –a returns active distributions only.
򐂰 –i dist_id specifies the distribution ID. When no distribution ID is specified, the
command returns the status for all distributions.
򐂰 –v returns all information about the status. If you do not specify the –v option,
the command returns only the keyword value information.
wmdist –m dist_id [–t ep_label] [–n node_type] [state...]
This lists the messages for a distribution.
Chapter 2. Tivoli Management Framework basics
43
wmdist –q dist_id
This displays the nodes associated with a given distribution in an indented format
that indicates the route. Each node displayed is suffixed with its state. You can
also determine the distribution path for an active distribution.
wmdist [–f] –r dist_id | endpoint_id [endpoint_id...]
This resumes a paused distribution specified by dist_id, or resumes one or more
paused distributions by target specified by endpoint_id.
wmdist –R [rim_object]
This allows the user to change the RIM object used by the distribution manager
to store status. The default value is mdist2. Issuing this command without a value
prints the current value.
wmdist –s repeater_name [–C noprompt| nostart| nostop] [keyword=value.]
This configures a repeater (specified by repeater_name) using one or more of
the following keywords and values. If a value is not specified, the existing options
for the specified repeater are displayed. When no keyword value pairs are listed,
the command returns the configurations currently in use.
wmdist –T [database_purge_interval]
This sets the interval (in seconds) when completed distributions are deleted by
the distribution manager from the RIM database. Setting this interval allows the
distribution manager to delete completed or irrelevant distributions from the
database after a distribution request is submitted. Although a purge interval is
defined, the completed distributions are not deleted unless the defined interval
has elapsed and a distribution request was submitted. Issuing this command
without a purge interval prints the current setting. Setting the purge interval to -1
disables database purges. The default value is -1.
For the complete wmdist command function please refer to the Tivoli
Management Framework Reference Guide.
2.6.5 Using the Distribution Status console
The Distribution Status console, shown in Figure 2-14 on page 45, provides
administrators with real-time reporting and control of profile distributions.
Administrators can track the progress of a distribution, intervene (if necessary),
and analyze the details of a distribution. The console provides color-coded charts
and graphs to enable administrators to identify patterns and relationships in the
data. These views are helpful when identifying items of interest to be focused on,
such as unavailable targets, which prevent a distribution from completing
successfully.
44
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-14 Distribution Status Console
Viewing distribution status
You can submit a distribution and later check to see whether the distribution
completed on its targets. The database associated with MDist 2 enables you to
view the status of a distribution.
When you select a tab, the Distribution Details area of the console displays a
view. The sections that follow describe the following Distribution Details views:
򐂰 Status Chart
The Status Chart view displays a color-coded pie chart representing the
states of targets for a selected distribution. You can identify the overall status
of the distribution or move the cursor over a section of the chart to view the
total number of targets in that particular state. Distribution statistics are also
displayed, such as the date the distribution was started and the administrator
who started it.
Chapter 2. Tivoli Management Framework basics
45
Figure 2-15 Status Chart
򐂰 Time Spent Chart
The Time Spent Chart view displays a bar chart, which indicates the amount
of time spent in each stage of the completed distribution. This view displays
the minimum, average, and maximum amount of time (in seconds) a
distribution was in a given state.
46
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-16 Time Spent Chart
򐂰 Node Table
The Node Table view works the same way as the Distributions table.
However, instead of querying distribution status, it queries the states of
repeaters or endpoints associated with a specific distribution.
Chapter 2. Tivoli Management Framework basics
47
Figure 2-17 Node Table View
򐂰 Distribution Topology
The Distribution Topology view displays a tree view showing the data
structured as nodes and links. It allows you to see the path the profile will
follow. Nodes refer to repeaters and endpoints in the currently selected
distribution. Links show the relationship between the nodes in the distribution
hierarchy. These objects are color-coded so that you can quickly identify the
state of a node. The lines that link nodes in the hierarchy are also colored to
display relationships between connecting nodes.
You can use this view to gain an understanding of the distribution route and to
show relationships that help identify items to focus on. For example, you can
identify bottlenecks that prevent a distribution from completing and you can
also determine the distribution path for active distributions.
48
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-18 Distribution Topology View
2.7 Connecting multiple TMR regions
To meet the needs and demands of managing thousands of resources that are
geographically dispersed across networks, Tivoli Management Framework
enables you to logically partition your managed resources into a series of
connected Tivoli regions. Each region has its own server for managing local
clients and a set of distributed replicated services for performing management
operations. Regions can be connected to coordinate activities across the
network, enabling large-scale systems management and offering the ability for
remote site management.
During the connection process, each region is supplied with the following
information about the region to which it is being connected:
򐂰 Server name
򐂰 Region number
򐂰 Encryption level and password in use in the other region
This information is used when the remote region is registered in the local region.
When the regions are connected, an exchange of resource information can be
Chapter 2. Tivoli Management Framework basics
49
performed to make known the types and values of resources in the remote
region. After the initial information exchange, the information should be updated
on a regular basis.
Important: To connect two regions, each region must have a name that is
unique among all regions. If you attempt to connect a region that has the
same name as another region, the connection fails.
Any Tivoli product installed in two connected regions should be installed in
compatible versions in each region. Incompatible versions of a product do not
cause a connection to fail, but can cause operation problems at a later time.
However, you can connect two regions that do not have the same products
installed.
2.7.1 Benefits of connecting TMRs
Certain situations in a Tivoli environment can make the connection of two or
more TMRs necessary or desirable. These situations include the following:
򐂰 Decrease server load: The load on a single TMR server caused by network
activity, memory demands, or the number of clients can be lessened by
multiple TMRs.
򐂰 Localized system administration: Multiple TMRs enable local control with
more independence at different operational sites.
򐂰 Enhance security: An additional TMR can be used to restrict local
administrators’ access to certain machines within the enterprise. Also, an
additional TMR enables differing encryption levels within a Tivoli
environment.
With the super authorization role and the TMR password (if it exists), a Tivoli
administrator can connect or disconnect two or more TMRs.
2.7.2 Connection types
There are two types of connection types.
One-way region connections
In a one-way connection, only one region has knowledge of the other, so
information is passed from the managing system only. One-way connections are
useful where a central site is responsible for administering several remote sites,
but none of the remote sites need to manage resources at the central site or at
other remote sites. Each remote site could also have its own local operator who
might be responsible for managing day-to-day operations on local resources,
50
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
while the connection from the central site is used for more global updates across
the company, such as a new version of an application. Although one-way
connections are feasible, two-way connections are recommended.
Two-way region connections
Each Tivoli region involved in a two-way connection is aware of the existence of
the other. Information exchanges about system resources occur in both
directions. Two-way connections are useful in a variety of situations, such as a
very large local area network that is logically partitioned. By using two-way
connections, the management load is spread across multiple Tivoli servers. In
addition, two-way connections are needed to access and manage resources in
other regions.
2.7.3 Name registry
Each region contains a name registry, which serves as a region-wide name
service. It essentially maps resource names to resource identifiers and the
corresponding information.
The Tivoli name registry contains resource types, which contain instances of that
resource type. For example, ProfileManager is a resource type, and the Admin
profile manager is an instance of that resource type.
When a lookup for a resource occurs, it looks for a resource instance by name
and resource type (for example, it looks up the moria instance of the managed
node resource type).
Note: Information from remote TMRs must be updated regularly to maintain
accurate data.
2.7.4 Case study: Hub-spoke architecture
The Tivoli physical topology is primarily determined by the underlying network
topology and management system performance goals. In large network
environments, we recommend deploying your Tivoli environment using a
hub-spoke architecture. In a hub-spoke architecture, the Tivoli environment is
segmented into several TMRs. Each TMR can be responsible for directly
managing a different physical segment of the enterprise, serve a specific
business unit, or be organized by security access levels. The central TMR that
manages the other TMRs is called the hub, and the TMRs it manages are called
spokes.
Whether using a one-way or two-way connection between the hub and spoke
TMRs, the hub TMR server forms the central administration point from which all
Chapter 2. Tivoli Management Framework basics
51
managed functions are performed within a Tivoli environment. It is dedicated
primarily to high-level management functions, such as creating administrator
desktops and TEC consoles; creating, configuring, and distributing sentry
profiles to spoke servers; and other hub-wide management activities.
Spoke TMRs provide the direct control function for all endpoints in the Tivoli
environment. Spoke regions can be used to group managed nodes by physical
location in the network and to localize functions in order to improve network and
system performance. Generally, spoke TMRs are not used as entry points for
administrators. Tivoli Administrators can use either the hub TMR or any
managed node strategically placed in the design as an entry point into the Tivoli
Management Environment.
Figure 2-19 illustrates the hub-spoke architecture.
HUB TMR
SPOKE TMR
+ Gateway
TEC TMR
SPOKE TMR
+ Gateway
Figure 2-19 Hub-spoke architecture
The TEC server can be configured either as a managed node contained within
the hub TMR server or on a stand-alone TMR at the same management level as
the hub TMR server.
52
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
All managed systems (managed nodes, gateways, and endpoints) are spread
out into the Tivoli environment beneath spoke TMRs, as determined by function,
server load, or physical network location.
Managed nodes are still required in this environment. For example, managed
nodes can be used to support remote Tivoli Administrators desktops or to serve
for profile staging.
Endpoint gateways are installed throughout the Tivoli environment to host
endpoints. In this TME® hierarchy, all endpoint gateways are assigned to spoke
TMRs only.
Considerations when deciding on the design of the hub-spoke
Now we review considerations when deciding on the design of the hub-spoke for
TMR architecture.
TMR architecture
One of the most important factors for designing the hub-spoke TMR architecture
is the scalability limitations of the Tivoli environment:
򐂰 Number of endpoints
The number of endpoints managed by a single region has been increased to
tens of thousands. It has been shown in production environments that 20,000
endpoints can be managed by a single region. For organizations requiring
more than 20,000 endpoints to be managed, multiple regions are required.
The limit of 20,000 endpoints represents a threshold beyond which special
performance and tuning requirements might be needed. Therefore, use
multiple connected regions.
򐂰 Number of managed nodes
Generally, a single Tivoli server can support a maximum of 200 managed
nodes. However, use endpoints instead of managed nodes in most cases.
Endpoints are the preferred mechanism for managing your environment. The
introduction of endpoints greatly reduces the number of managed nodes in a
single region. A gateway installed on a managed node can perform all
communication and operations with thousands of endpoints. Endpoints
therefore have no direct communication with a Tivoli server.
In addition, the ability to perform maintenance functions such as database
checks are greatly inhibited by large numbers of managed nodes. If the
network contains more than 200 managed nodes, create multiple regions and
connect them.
Chapter 2. Tivoli Management Framework basics
53
Note: For performance reasons, in a multi-TMR environment it is important to
make sure that endpoints get connected to the designated TMR. The best was
to ensure that is to configure the endpoints to log in to specific gateways and
disable broadcasting.
Recommendations on creating policy regions in a hub-spoke
Now we review recommendations on creating policy regions in a hub-spoke for
TMR architecture.
TMR architecture
It is a good practice to create policy regions based on a Tivoli application (IBM
Tivoli Configuration Manager, IBM Tivoli Monitoring, and so on) only on the hub
TMR server. The subscriber policy regions then reside on the spoke TMR
servers. The subscribed policy regions contain the profile managers used for
distributing to endpoints. Organizing your policy regions in this manner enables
the hub server to be the central point of operations for each application and
associated functions.
This also avoids subscribing endpoints across TMR boundaries. If an endpoint is
subscribed across TMR boundaries, a new object is created in the object
database and the wchkdb command must track the object directly, causing
unnecessary transactions across TMR boundaries and server load. Instead, if
endpoints stay subscribed to their local TMR, the hub and spoke TMRs only
need to exchange resources, causing only an entry in the Tivoli Name Registry
(TNR) on the hub TMR.
See Figure 2-20 on page 55 for more details.
54
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
.
Hub TMR
DM_Appl.HUB.PR
Spoke TMR
WinNT_DM_Appl.HUB_PR
Win98_DM_Appl.HUB_PR
Subscribers_Spoke.PR
Subscribers_WinNT_Spoke.PR
Subscribers_Win98_Spoke.PR
Subscribers_WinNT_Spoke_PM
Figure 2-20 Subscription example in a hub-spoke model
2.8 Endpoint login sequence
An endpoint performs four types of logins: Initial, normal, isolated, and orphan.
First the initial login is performed, and then the normal login is performed.
For a normal login sequence, the endpoint logs into its assigned gateway and the
gateway acknowledges it. The initial login process is more complex. This
process establishes the endpoint as an active member of its Tivoli region by
assigning it to a gateway.
An endpoint is isolated when it cannot contact its assigned gateway. When that
occurs, it initiates an isolated login. In certain cases, an endpoint can become
orphaned when the endpoint manager no longer has an entry in its database for
the endpoint.
If the endpoint is unable to contact its assigned gateway, additional gateways are
provided through a list of login interfaces or gateway addresses. This list is
Chapter 2. Tivoli Management Framework basics
55
compiled by the endpoint manager, defined in the select_gateway_policy script,
or configured with lcfd command options.
Note: Depending on how your environment supports network address
translation (NAT), you might need to define the host names for gateways in
the select_gateway_policy script. The gateways defined through
select_gateway_policy or the lcfd command can be host names instead of
object identifiers (OIDs).
To facilitate the login process and endpoint communication, configure login
parameters during endpoint creation or with the lcfd command after installation.
For more information about the lcfd command and the select_gateway_policy
script, refer to Tivoli Management Framework Reference Manual, Version 4.1.1,
SC32-0806.
Figure 2-21 Endpoint login sequence
56
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2.8.1 Initial login without a select_gateway_policy script
The following are the phases of the initial login process of an endpoint:
򐂰 The endpoint establishes communication with a Tivoli region.
򐂰 The endpoint manager selects a gateway to which the endpoint is assigned.
򐂰 The endpoint receives its gateway assignment and performs a normal login to
the assigned gateway.
The first step in the initial login process for an endpoint is finding a gateway in the
Tivoli region. The endpoint cannot be managed until it becomes associated with
a gateway. The endpoint starts by sending an initial login packet to a gateway,
which acts as an intercepting gateway. An intercepting gateway handles
communication and login for the endpoint until it has an identity and is assigned
to a gateway. If no configuration options are set, either during installation or
during the startup of the lcfd service, the endpoint broadcasts for a gateway.
Because of network load, do not use broadcast as a means for endpoint login.
Instead, use lcfd –D bcast_disable=1 to disable broadcast and use lcfd –D
lcs.login_interfaces=address to specify a gateway.
Note: If your environment supports NAT devices that share IP address
assignments through dynamic timeslicing, ensure that the IP address
assignment time-out value is greater than the login_timeout and udp_interval
settings on the endpoint.
To summarize the initial login, the following are general parameters and default
time outs:
1. The endpoint uses a set of gateway addresses configured during installation
to establish a gateway to receive the endpoint login request.
– These gateway addresses are specified by the lcs.login_interfaces option.
– By default, the endpoint attempts to contact each of the gateways three
times with 5 minutes between each attempt. The attempts are specified by
the login_attempts option. The time between each attempt is specified by
the login_timeout option.
– If the endpoint is successful in contacting one of the alternate gateways,
endpoint policy scripts run.
2. If login fails to all the addresses in the lcs.login_interfaces list, the endpoint
broadcasts a request to log in (if broadcast is enabled).
3. If no gateways in the lcs.login_interfaces list respond or the broadcast login
request fails, the endpoint waits 30 minutes (the login_interval default of the
lcfd command) before beginning the login process again with step 1.
Chapter 2. Tivoli Management Framework basics
57
4. If the login is successful, the endpoint receives its identity in the Tivoli region
from the intercepting gateway along with the name of its assigned gateway.
5. When logged in, the endpoint performs a normal login to its assigned
gateway.
2.8.2 Initial login with a select_gateway_policy script
Defining the select_gateway_policy script provides the endpoint manager with an
ordered list of gateways. The endpoint manager attempts to contact each listed
gateway until it makes a valid connection. The first gateway to respond receives
the endpoint assignment.
The endpoint manager assigns a gateway and adds the endpoint information
and gateway assignment to its endpoint list. The endpoint manager establishes a
unique identity for the endpoint. The endpoint information is sent back to the
intercepting gateway. The intercepting gateway relays the assignment
information to the endpoint. The endpoint performs a normal login to its assigned
gateway.
1. The endpoint login request is intercepted by a gateway.
2. The gateway forwards the login request to the endpoint manager.
3. The endpoint manager refers to the select_gateway_policy script and
attempts to contact to gateways, for example, first gateway A and then
gateway B. If connection with gateway A fails and contact with gateway B is
successful, then gateway B becomes the assigned gateway for the endpoint.
Gateway A and gateway B are added to the lcs.login_interfaces list.
4. The endpoint manager returns the login assignment information to the
intercepting gateway. The intercepting gateway then relays the information to
the endpoint.
5. The endpoint logs into its assigned gateway. An interconnected Tivoli region
was created to redirect endpoint initial logins to their endpoint manager on the
Tivoli server in the local Tivoli region. This scenario can be common in large,
multi-site enterprises where thousands of endpoints are logging in to multiple
regions. A Tivoli region dedicated to redirecting endpoint logins can ensure
that endpoints log into gateways in their local region. Tivoli server A is the
redirecting Tivoli region and has the select_gateway_policy script defined.
Gateway A is local to Tivoli server B and is listed in the
select_gateway_policy script.
Note: Endpoints must be managed in their local Tivoli region.
58
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2.8.3 Normal login
After an endpoint is established as a member of its Tivoli region through the
initial login process, subsequent or normal logins occur. During a normal login,
communication takes place between the endpoint and gateway only. The
endpoint sends a login packet directly to its assigned gateway stored in the
lcf.dat file.
Because the gateway has the endpoint in its endpoint list, communication is
established immediately without contacting the Tivoli server or the endpoint
manager. The endpoint then performs the following operations:
򐂰 Writes current configuration information to the last.cfg file. This file is
overwritten each time the configuration changes.
򐂰 Stores connection information in the encrypted lcf.dat file.
򐂰 Listens for method calls. The endpoint is now fully managed by Tivoli
Management Framework.
The steps are:
1. The endpoint logs into the assigned gateway. The endpoint is immediately
established as a communicating member of the Tivoli network.
2. The endpoint manager is not contacted.
To summarize the normal login, the following are the general parameters and
default time outs:
1. Using the gateway list, which is given to the gateway by the endpoint
manager, the endpoint attempts to contact its assigned gateway. If this fails,
the endpoint attempts to contact any aliases of the assigned gateway. The
attempts are specified by the login_attempts option. The time between each
attempt is specified by the login_timeout option.
2. When the endpoint cannot contact its assigned gateway or aliases, the
endpoint enters isolation mode and uses a set of gateway addresses
(configured during installation) to contact a gateway to receive the endpoint
login request:
– These gateway addresses are specified by the lcs.login_interfaces option.
– By default, the endpoint attempts to contact each of the gateways three
times, with 5 minutes between each attempt. The attempts are specified
by the login_attempts option. The time between each attempt is specified
by the login_timeout option.
– If the endpoint is successful in contacting one of the alternate gateways,
endpoint policy scripts run.
Chapter 2. Tivoli Management Framework basics
59
3. If login fails for all the addresses in the lcs.login_interfaces list, the endpoint
broadcasts a request to log in (if broadcast is enabled).
4. If no gateways in the lcs.login_interfaces list respond or the broadcast login
request fails, the endpoint waits 30 minutes (the login_interval default of the
lcfd command) before beginning the login process again with step 1.
2.8.4 Isolated login
When an endpoint cannot contact its assigned gateway, the endpoint is
considered isolated. The following are some examples of how an endpoint can
become isolated:
򐂰 The gateway is down.
򐂰 There are problems with network connectivity to the gateway.
For the endpoint to be assigned quickly to a new gateway, each endpoint
receives a list of alternate gateways when it receives its initial gateway
assignment information. The list of alternate gateways can be defined in and
provided by the select_gateway_policy script. If the select_gateway_policy script
is not defined, the endpoint manager sends a list of up to five gateway addresses
to try.
If the endpoint loses contact with its assigned gateway, the endpoint goes
through a list of alternate gateways (and associated aliases) in its attempts to log
in. If the endpoint fails to log into any of the alternate gateways, the endpoint
sends another isolated login packet. The login process is similar to the initial
login process described in 2.8.1, “Initial login without a select_gateway_policy
script” on page 57, in that the gateway selection process is triggered. Also, the
lcs.login_interfaces list is replaced with a new list of gateways, instead of
appended with new gateways (as in the initial login).
To summarize the isolated login, the following are the general parameters and
default time outs:
1. When the endpoint cannot reach its assigned gateway, the endpoint uses a
set of gateway addresses configured during installation to contact a gateway
to receive the endpoint login request.
– These gateway addresses are specified by the lcs.login_interfaces option.
– By default, the endpoint attempts to contact each of the gateways three
times, with 5 minutes between each attempt. The attempts are specified
by the login_attempts option. The time between each attempt is specified
by the login_timeout option.
– If the endpoint is successful in contacting one of the alternate gateways,
endpoint policy scripts run.
60
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2. If login fails for all the addresses in the lcs.login_interfaces list, the endpoint
broadcasts a request to log in (if broadcast is enabled).
3. If no gateways in the lcs.login_interfaces list respond or the broadcast login
request fails, the endpoint waits 30 minutes (the login_interval default of the
lcfd command) before attempting to contact its assigned gateway again.
2.8.5 Orphan login
An endpoint is an orphan when the endpoint considers itself a member of a Tivoli
region; however, the endpoint manager and Tivoli name registry do not
recognize that the endpoint ever logged in. Thus, you will not be able to perform
any actions on those endpoints, such as software distributions or inventory
scans, until it rejoins the Tivoli region. Endpoints can become orphaned in the
following cases:
򐂰 When restoring the endpoint manager database where endpoints have joined
the region since the last backup was made
򐂰 By unintentionally deleting an endpoint from the endpoint manager database
using the wdelep command
The first case occurs when you have to restore the Tivoli server from a backup.
In most cases, backups are done on a regularly scheduled basis. After one of
these backups, it is likely that new endpoints will log into the region for the first
time. These new endpoints, therefore, are recorded in the endpoint manager, but
do not appear in the backup until the next scheduled backup occurs. When the
database is restored from the backup, the new endpoints are no longer
represented in the endpoint manager. The endpoints, however, still have the
endpoint service running.
The second case occurs when the wdelep command is run inadvertently, and the
endpoint service is not stopped and removed from the endpoint. Because the
endpoint service runs independently from the endpoint manager, the endpoint
does not know that the endpoint manager no longer knows about the endpoint.
Thus, the endpoint still considers itself part of the region. Until the endpoint
attempts an action that affects the endpoint manager, such as an upcall, the
endpoint will not know it is an orphan. If the endpoint attempts to log into its
assigned gateway, it fails and enters isolation mode.
You can also use allow_install_policy and select_gateway_policy scripts to
control how orphan endpoints are added back to the endpoint manager
database. For security of individual regions, the endpoint cannot be redirected to
another Tivoli region from its original one during the orphan login. Also, the
lcs.login_interfaces list is replaced with a new list of gateways (as in the isolated
login), instead of appended with new gateways (as in the initial login). To
Chapter 2. Tivoli Management Framework basics
61
summarize the orphan login, the following are the general parameters and
default time outs:
1. When the endpoint cannot reach its assigned gateway, the endpoint uses a
set of gateway addresses configured during installation to contact a gateway
to receive the endpoint login request:
– These gateway addresses are specified by the lcs.login_interfaces option.
– By default, the endpoint attempts to contact each of the gateways three
times, with 5 minutes between each attempt. The attempts are specified
by the login_attempts option. The time between each attempt is specified
by the login_timeout option.
– If the endpoint is successful in contacting one of the alternate gateways,
endpoint policy scripts run including any orphan endpoint parameters you
have specified.
2. If login fails for all the addresses in the lcs.login_interfaces list, the endpoint
broadcasts a request to log in (if broadcast is enabled).
3. If no gateways in the lcs.login_interfaces list respond or the broadcast login
request fails, the endpoint waits 30 minutes (the login_interval default of the
lcfd command) before attempting to contact its assigned gateway again.
2.8.6 Implementing policy scripts
The endpoint manager and gateway include the ability to use policy scripts to
perform certain actions at various stages of the endpoint login process. Endpoint
policy differs from default and validation policy in that policy objects are not
associated with the endpoint scripts.
The run time of these policy scripts affects the number and efficiency of logins
that the gateway and the endpoint manager can process at one time. For an
environment with a large number of endpoints, limit the number of commands
that are placed in the policy scripts, because commands might require long
periods of time and large amounts of processing resources to run. In certain
cases, the endpoint can become isolated after waiting too long for the gateway to
respond, which can impact endpoint manager performance.
For example, you have 1,000 endpoints logging into a gateway at approximately
9:00 a.m. Because the run time of the policy scripts takes longer to complete for
each login, additional logins have to wait for the preceding logins to complete.
When the preceding logins complete, the gateway and the endpoint manager are
available to process additional login requests. If you need to run Tivoli
commands in this context, use endpoint policy scripts to trigger tasks after login.
62
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
allow_install_policy policy script
This policy script controls which endpoints are allowed to log into the Tivoli
region. For example, you might not want endpoints from subnet 26 on this Tivoli
region. The default behavior of this policy allows endpoints to log in
unconditionally. You can also use this policy to perform any pre-login actions you
might need. For example, this policy can help filter duplicate logins to the
endpoint manager when the endpoint manager is overloaded with activity or
policy scripts are taking a long time to run.
The allow_install_policy script is run by the endpoint manager as soon as it
receives an endpoint initial login packet from an intercepting gateway. If the
policy script exits with a nonzero value, the login process is terminated
immediately. If the policy exits with a zero value, the login process continues.
select_gateway_policy policy script
This policy script, run by the endpoint manager, provides an ordered list of
gateways that should be assigned to an endpoint. The select_gateway_policy
script is run each time an endpoint login packet is forwarded to the endpoint
manager. The select_gateway_policy script overrides the default selection
process and should be used for a Tivoli environment with multiple gateways. If
an endpoint is isolated, the endpoint uses the list of alternate gateways, which
were provided by this policy script. This list is sent to the endpoint with the initial
login assignment information and after a migration or normal login.
The endpoint manager tries to contact each gateway in the order listed in the
policy script until it successfully contacts a gateway. The first gateway contacted
is the gateway to which the endpoint is assigned. The intercepting gateway is
also added to the end of the list in the policy script to ensure that the endpoint
has at least one definite contact. If the gateways listed in the script cannot be
contacted, the endpoint manager assigns the intercepting gateway to the
endpoint.
after_install_policy policy script
This policy script is run by the endpoint manager after the endpoint has
successfully been created. Because the script runs before the first normal login
of an endpoint, you cannot use it to run downcalls.
The policy is run after the initial login only; it is not run on subsequent logins of an
endpoint.
login_policy policy script
This policy script is run by the gateway and performs any action you need each
time an endpoint logs in. For example, this script can be configured to
automatically upgrade the endpoint software. The script is also useful for
Chapter 2. Tivoli Management Framework basics
63
checking changes to IP addresses and port numbers. When the gateway detects
changes, it notifies the endpoint manager. When the policy script exits with a
nonzero value, the endpoint login will not fail.
Note: The same login_policy policy script is run on all the gateways in a Tivoli
region.
2.9 Firewall Security Toolbox
Tivoli Enterprise Firewall Security Toolbox provides a solution for managing the
Tivoli network across firewalls without compromising security. You will find some
information about how to install and configure this feature of Tivoli Management
Framework.
2.9.1 Tivoli environment with a firewall
A simple Tivoli environment consists of the Tivoli server, a gateway, and
endpoints. The endpoints communicate with the Tivoli server through the
gateway and the gateway communicates with the Tivoli server.
On one side of the firewall, Firewall Security Toolbox provides an endpoint proxy
that connects to the gateway as if it were the endpoints. On the other side of the
firewall, the endpoints are connected to a gateway proxy, as if it were the
gateway. The gateway proxy and endpoint proxy communicate with each other
through the firewall. Figure 2-22 on page 65 shows a simple configuration with
one gateway proxy and one endpoint proxy.
64
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 2-22 A Tivoli environment with a single firewall
Just as multiple endpoints can connect to a single gateway and multiple
gateways to a single Tivoli server, multiple endpoints can connect to a single
gateway proxy and multiple gateway proxies can connect to a single endpoint
proxy.
The endpoint proxy emulates all the endpoints to the gateway that manages
them. The communications between these Tivoli components is based on a
Tivoli proprietary protocol over TCP/IP.
2.9.2 Tivoli environment with demilitarized zones
When a network includes several firewalls that separate demilitarized zones
(DMZs) of progressively lower security as they approach the Internet, the
configuration becomes more complex. Although the gateway proxy and endpoint
proxy continue to communicate with the endpoint and the gateway, respectively,
they no longer communicate directly across the multiple firewalls, because this
would defeat the purpose of having multiple firewalls in place.
Chapter 2. Tivoli Management Framework basics
65
Instead, Firewall Security Toolbox provides relays, which are installed between
the firewalls in DMZs. These relays pass on information to each other from one
DMZ to another and, finally, to or from the endpoint proxy and gateway proxy.
Figure 2-23 shows an example of this configuration.
Figure 2-23 A Tivoli environment with DMZ
2.9.3 Sending events across firewalls
TME adapters use endpoints to send events to the Tivoli Enterprise Console®
server through Tivoli connections. When a firewall separates the endpoint from
the Tivoli Enterprise Console server, the machines connect through the gateway
and endpoint proxies.
Machines that are not part of the Tivoli environment use non-TME adapters to
send events to the Tivoli Enterprise Console server through non-Tivoli
connections. When a firewall separates the non-TME adapter machine from the
Tivoli Enterprise Console server, Firewall Security Toolbox provides the event
sink, which sends the events to the Tivoli Enterprise Console gateway. The event
sink, which is installed on an endpoint outside the firewall, collects events sent
from non-TME adapters as if it were a Tivoli Enterprise Console server and
sends them to the Tivoli Enterprise Console server as though they were TME
events. The event sink can collect events from multiple non-TME adapters.
66
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
2.10 Installing Firewall Security Toolbox
You need to do the following to get started:
򐂰 Ensure that the components of Firewall Security Toolbox that will
communicate with each other directly have IP visibility of each other.
Depending on your configuration, these components can be the endpoint
proxy and gateway proxy, a proxy and a relay, or two relays. You can use
DNS if you have DNS configured. However, there is no requirement to use
DNS host names. The TCP/IP address works as well. TCP/IP connectivity is
required. If you use the DNS name of the machine, ensure that the DNS
name of the destination machine is resolved into its IP address.
򐂰 Before installing the software, ensure that you have the following information:
– The port number of the gateway that the endpoint proxy will use to
communicate.
– The host name or IP address of all the components that you are installing.
򐂰 Decide on some additional ports that the components will use to
communicate with each other:
– The endpoint proxy requires a range of ports used to emulate the
endpoints logged in through Firewall Security Toolbox.
– Gateway proxies require one port to receive traffic from the endpoint proxy
or relay and another port to listen for traffic from the endpoints.
– Relays require ports to receive traffic from the components with which
they connect, one for the parent and one for the children.
Use the following criteria to choose the port number:
򐂰 The port must not be used by other applications.
򐂰 The user account that you specify must have the privileges to use the port.
2.10.1 Installing on UNIX operating systems
The following sections describe the steps for installing the components on UNIX
operating systems. These operations need to be run as root user.
Installing a UNIX endpoint proxy
To install the endpoint proxy, follow these steps:
1. From the \EndpointProxy directory, go to the directory for the platform on
which the proxy will run.
2. Run the ./install.sh script.
Chapter 2. Tivoli Management Framework basics
67
3. Gateway port [default=9494]: Specify the TCP/IP port number of the gateway
on which it will listen for communication from the endpoint proxy as if it were
the endpoint. This is normally port 9494. Do not change this value unless the
gateway is known to be using a different listening port with the endpoint.
4. Endpoint proxy port: Specify the port number of the endpoint proxy machine
from which it listens for connections with the relay or gateway proxy.
Installing a UNIX gateway proxy
To install the gateway proxy, follow these steps:
1. From the \GatewayProxy directory, go to the directory for the platform on
which the proxy will run.
2. Run the ./install.sh script.
3. Port to listen on for TMA traffic [default=9494]: Enter the port number on the
gateway proxy that represents the gateway to the endpoints. The default is
9494.
4. Gateway proxy port: Specify the port number that the gateway proxy uses to
listen for connections from the relay or endpoint proxy.
Installing a UNIX relay
To install the relay, follow these steps:
1. From the \Relay directory, go to the directory for the platform on which the
relay will run.
2. Run the ./install.sh script.
Installing a UNIX event sink
To install the event sink, follow these steps:
1. From the \EventSink directory, go to the directory for the platform on which
the proxy will run.
2. Run the ./install.sh script.
3. Listening Port [default=9444]: Enter the port number on the endpoint where
the event sink will receive events.
2.10.2 Installing on Windows operating systems
Firewall Security Toolbox provides a self-extracting EXE file to install each
component on Windows operating systems.
68
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Installing a Windows endpoint proxy
To install the endpoint proxy, do the following:
1. From the directory that contains the Tivoli Endpoint Proxy\w32-ix86\
subdirectory, double-click the Tivoli Endpoint Proxy.exe file. The Tivoli
Endpoint Proxy InstallShield Wizard starts.
2. Gateway port: Enter the TCP/IP port number of the gateway on which it will
listen for communication from the endpoint proxy as if it were the endpoint.
The default is 9494 and should not be changed unless the gateway is known
to be using a different listening port with the endpoint.
Installing a Windows gateway proxy
The gateway proxy needs to be installed on a host that is in the DMZ where the
endpoints will be located. To install the gateway proxy, do the following:
1. From the directory that contains the gateway Proxy\w32-ix86\ subdirectory,
double-click the Tivoli Gateway Proxy.exe file. The Tivoli Gateway Proxy
InstallShield Wizard starts.
2. Gateway port: Enter the port number on the gateway proxy that represents
the gateway to the endpoints. The default is 9494.
Installing a Windows relay
You can install multiple instances of a relay on a single machine. To install the
first relay, do the following: From the directory that contains the Tivoli Relay
installation images, double-click the Tivoli Relay.exe file. The Tivoli Relay
InstallShield Wizard starts
Installing a Windows event sink
You must install the event sink on a endpoint. To install the event sink, do the
following:
1. From the directory that contains the Event Sink\w32-ix86\ subdirectory,
double-click the Tivoli EventSink.exe file. The Tivoli Event Sink InstallShield
Wizard starts.
2. Enter the port number on the endpoint where the event sink will receive
events. The default is 9444.
Chapter 2. Tivoli Management Framework basics
69
70
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
3
Chapter 3.
Tivoli Configuration
Manager fundamentals and
installation
This chapter provides an overview of IBM Tivoli Configuration Manager 4.2 and
the installation steps.
Although it is still possible to install most of the IBM Tivoli Configuration Manager
components with classical Desktop Installation methods or Software Installation
Services (SIS), IBM Tivoli Configuration Manager is shipped with a new
installation mechanism called Integrated Install, which simplifies the installation
of IBM Tivoli Configuration Manager components a lot.
The following topics will be covered:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
“IBM Tivoli Configuration Manager fundamentals” on page 73
“Creating a deployment plan for Tivoli Configuration Manager” on page 82
“How to deploy Tivoli Configuration Manager components” on page 83l
“Required roles for installation” on page 85l
“RDBMS considerations” on page 86
“RIM considerations” on page 89
“General pre-install checks, hints, and tips” on page 91
“Installation methods” on page 93
“Overview of Integrated Install” on page 93
© Copyright IBM Corp. 2004. All rights reserved.
71
򐂰
򐂰
򐂰
򐂰
72
“Server Install” on page 94
“Desktop Install” on page 97
“Web Gateway Install” on page 98
“Uninstallation of IBM Tivoli Configuration Manager” on page 100
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
3.1 IBM Tivoli Configuration Manager fundamentals
IBM Tivoli Configuration Manager controls software distribution and asset
management inventory in a multi-platform environment. It is designed for
configuration, distribution, change, version, and asset management in a
distributed computing environment. Working on top of Tivoli Management
Framework, Tivoli Configuration Manager provides an integrated solution for
managing complex distributed enterprise environments.
Using Tivoli Configuration Manager, you can:
򐂰 Scan hardware and software to determine which enterprise assets are part of
your inventory.
򐂰 Reduce the time and effort in installing and configuring your network
population by centralizing and automating the distribution of software across
your enterprise.
򐂰 Automate and schedule network operations.
򐂰 Monitor system and configuration changes.
򐂰 Manage the desired state of all elements of your network.
򐂰 Manage your enterprise environment across firewalls.
򐂰 Extend the scope of your managed network to include pervasive devices,
such as personal digital assistants (PDAs).
3.1.1 Tivoli Configuration Manager components and services
Tivoli Configuration Manager is an integrated software distribution and asset
management suite that comprises two main components, Software Distribution
and Inventory, and various services.
Software Distribution
Using the Software Distribution component, you can install, configure, and
update software remotely within your network, eliminating the need to update
software manually on numerous systems. You can:
򐂰 Distribute client/server applications, applications for desktops, laptops, and
pervasive devices across multi-platform networks.
򐂰 Update existing software with newer versions.
򐂰 Synchronize software on distributed systems.
The Software Distribution component is discussed in detail in 4.2, “Software
Distribution component” on page 138.
Chapter 3. Tivoli Configuration Manager fundamentals and installation
73
Inventory
Using the Inventory component, you can gather and maintain up-to-date
inventory information in a distributed environment quickly, accurately, and easily.
This helps system administrators and accounting personnel manage complex,
distributed enterprises.
Administrators and accounting personnel can perform the following tasks:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Manage all enterprise systems centrally.
Determine the installed software base.
Confirm a software distribution.
Supplement and replace physical inventory function.
Assist in procurement planning.
Check software requirements.
Control assets.
For example, you can combine inventory and software distribution operations to
determine if any critical files are missing, then re-establish the proper
configuration. After creating and deploying management-ready applications, you
can continually maintain the desired state of your systems by synchronizing
applications and system configurations on an enterprise scale.
The Inventory component is discussed in detail in 4.1, “Inventory component” on
page 102.
Activity Planner
Activity Planner is a deployment service that enables you to:
򐂰 Define a group of activities to be submitted as an activity plan.
򐂰 Submit or schedule the plan for running.
򐂰 Monitor the plan while it runs.
Activities are tasks that can be scheduled to be performed on a set of targets at
specified times. Operations can include software distribution, inventory
operations, and Tivoli tasks.
Activities contained in a plan can have dependencies associated with them that
define circumstances under which the activity should be run. The running of the
operation defined in the activity is performed by the application to which the
operation belongs. The group of activities forms the activity plan.
Activity Planner is made up of two components, the Activity Plan Editor and the
Activity Plan Monitor.
74
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Activity Plan Editor
You can use the Activity Plan Editor to:
򐂰 Manage a group of activities, originating from different applications, as a
single activity from a single machine in the network.
򐂰 Schedule the activity plan to run on a specific day and time, to repeat at
specific time intervals, or repeat indefinitely.
򐂰 Schedule activities to run at specific time intervals during the week.
򐂰 Set conditions on activities so that the execution of one activity is dependent
on the completion result of other activities.
򐂰 Save activity plans in a database to resubmit them at any future time.
Figure 3-1 shows the Activity Plan Editor.
Figure 3-1 Activity Plan Editor
Activity Plan Monitor
You can use the Activity Plan Monitor to:
򐂰 Submit activity plans to be run.
Chapter 3. Tivoli Configuration Manager fundamentals and installation
75
򐂰 View all submitted activity plans along with their status, start time, and
completion time.
򐂰 View the list of activities contained in the plan.
򐂰 View a graphical representation of the plan in the Activity Plan Editor window.
򐂰 For each activity, view the targets (gateways, depots) assigned to it.
򐂰 Perform operations such as pause, cancel, and resume.
򐂰 Restart an activity on an endpoint where the operation was unsuccessful.
򐂰 Delete the status information of a plan from the activity plan database.
򐂰 Launch the Distribution Status Console to monitor and control software
distributions submitted using the Activity Planner.
Figure 3-2 shows the Activity Plan Monitor.
Figure 3-2 Activity Plan Monitor
The Activity Planner component is discussed in detail in 5.1, “Activity Planner” on
page 164.
76
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Change Manager
Change Manager (previously called Change Configuration Manager) is a
deployment service that, together with Activity Planner, supports software
distribution, inventory, and change management in a large network.
Activity Planner is a prerequisite of Change Manager. Change Manager works
with the Activity Plan Monitor to manage specified groups of users, workstations,
or devices as single subscribers. Subscribers can be users, groups of users,
endpoints, a profile manager, the results of a query, or pervasive devices.
Change Manager uses reference models, which contain an association of
configuration elements and subscribers, to simplify the management of your
network environment.
Figure 3-3 shows the Change Manager.
Figure 3-3 Change Manager
The Change Manager component is discussed in detail in 5.2, “Change
Manager” on page 176.
Chapter 3. Tivoli Configuration Manager fundamentals and installation
77
Web Gateway
The Web Gateway component supports the Resource Manager deployment
service and the Web Interface (Web UI) deployment service.
The Resource Manager deployment service extends the traditional three-tier
Tivoli environment to a forth tier, thus providing software distribution, inventory,
and management of pervasive devices such as the Palm Pilot, Pocket PC, and
Nokia Communicator. (See “Resource Manager” on page 78.)
The Web Interface (Web UI) enables software distribution and inventory to be
initiated by users. By using the Web Interface, users can access a Web site and
install software on their own machine, or generate an inventory scan by
themselves. (See “Web Interface” on page 79).
The Web Gateway component is comprised of two elements:
򐂰 Web Gateway Database
򐂰 Web Gateway Server code
These elements are installed on an endpoint machine in the Tivoli environment.
The Web Gateway utilizes WebSphere technology, and provides improved
security by leveraging Access Manager for authentication and the HTTPS
protocol for secure communications.
Resource Manager
A Tivoli management region is a three-tier architecture, including servers,
gateways, and endpoints, that is created using Tivoli Management Framework.
By using the Resource Manager deployment service, you can extend the Tivoli
region to a fourth tier, pervasive devices, such as PDAs.
Resource Manager is made up of two sub-components: The Resource Manager,
which is installed on a Tivoli server; and the Resource Manager Gateway, which
is installed on a gateway that connects to an endpoint on which the Web
Gateway component has been installed.
You can use Resource Manager, together with the Software Distribution,
Inventory, and Web Gateway components, to perform the following operations:
򐂰
򐂰
򐂰
򐂰
78
Add or remove pervasive devices.
Provide access to devices for software distribution.
Provide access to devices for inventory operations.
Customize devices.
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Web Interface
The Web Interface deployment service is a browser-based tool that enables
remote management operations to be initiated by users on machines that do not
have the Tivoli Management Agent installed. The Web Interface is shown in
Figure 3-4.
Figure 3-4 Web Interface
Enterprise Directory Query Facility
The Enterprise Directory Query Facility is a deployment service that allows an
administrator to use information stored in enterprise directories inside a Tivoli
environment. The administrator can select a specific directory object, or
container of directory objects, as subscribers for a reference model or an activity
plan. The subscribers can then be targets for software distribution or inventory
scans.
The Enterprise Directory Query Facility enables you to access the information
contained in an enterprise directory server.
The Enterprise Directory Query Facility consists of directory query libraries and
directory queries. Directory query libraries reside in policy regions and are
created to contain directory queries. Directory queries enable you to find
Chapter 3. Tivoli Configuration Manager fundamentals and installation
79
information about the users or the workstations defined in the enterprise
directory server.
The following LDAP products are supported by the Enterprise Directory Query
Facility:
򐂰 IBM SecureWay® Directory Server
򐂰 Active Directory for Windows 2000
򐂰 Novell Directory Server for NetWare
The Enterprise Directory Query Facility is shown in Figure 3-5.
New type of subscriber:
Directory User
Active Directory
LDAP
Figure 3-5 Enterprise Directory Query Facility
The Enterprise Directory Query Facility is discussed in detail in 5.3, “Enterprise
Directory integration” on page 183.
80
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Data Moving
Data Moving is a Tivoli Configuration Manager component used to
send/retrieve/delete data from endpoint to endpoint or managed node without
creating a software package.
Data Moving is discussed in detail in 4.3, “Data Moving” on page 159.
Pristine Tool
Tivoli Configuration Manager supports pristine (machine with no operation
system) installations using a tool called Pristine Tool.
Pristine Tool Supports pristine installations of:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Windows 98 SE
Windows NT 4.0 Workstation
Windows 2000 Professional
Windows XP Professional
OS/2® Warp Server 4.0
OS/2 Warp Server for e-business 4.5
Figure 3-6 shows the Pristine Tool window.
Figure 3-6 Pristine Tool
Chapter 3. Tivoli Configuration Manager fundamentals and installation
81
The information is:
򐂰 Code Server Objects
Contains OS image + products (TMA) that needs to be mounted on the client.
򐂰 Configurations
For each code server object you can define multiple configurations:
–
–
–
–
–
OS information: Disk partition information and network settings
Additional device drivers
TMA install settings (response file)
Reference model (optional)
Boot diskettes for each configuration
The sequence of operations is as follows:
1. The new machine is booted from a special boot diskette.
2. OS images and TMA images are loaded from a Code Server and OS install is
started.
3. After OS install, Tivoli Endpoint is installed using a response file.
4. Synchronization with a reference model is performed (optional).
5. Normal software distribution operations can continue.
3.2 Creating a deployment plan for Tivoli Configuration
Manager
Creating a deployment plan is essential to creating and installing a configuration
management environment. The basic considerations for creating a deployment
plan for a Tivoli environment are provided in Tivoli Management Framework
Planning for Deployment. At a minimum, you need to gather the following
information before installing any software:
򐂰 Base hardware and software requirements for Tivoli Management Framework
and IBM Tivoli Configuration Manager. This information is provided in Tivoli
Management Framework Release Notes, GI11-0890, and IBM Tivoli
Configuration Manager Release Notes, GI11-0926.
򐂰 Whether the computer systems in your distributed network can support this
new software, whether these systems can be upgraded to meet your business
needs, or whether new systems need to be obtained.
򐂰 Which IBM Tivoli Configuration Manager components to install on which
computer systems in your distributed network to support your business needs
and whether they have additional third-party software requirements. This
82
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
information is provided in IBM Tivoli Configuration Manager Release Notes,
GI11-0926, and Introducing IBM Tivoli Configuration Manager, GC23-4703.
For each system where you plan to install components of IBM Tivoli
Configuration Manager, you should also provide the following information:
򐂰
򐂰
򐂰
򐂰
Host name
Operating system
Available memory and available disk space
Which components of IBM Tivoli Configuration Manager to install
3.3 How to deploy Tivoli Configuration Manager
components
There are many software components that are included in Configuration
Manager. When you plan your deployment, you will decide which components
you will need, and where each component will be used in your Tivoli
environment.
3.3.1 Distributed Configuration Manager components
Certain Configuration Manager components will be installed on either the Tivoli
server or managed node; some will be installed on both. Specific components
will be installed on gateway systems, while other components will require
installation on endpoints.
Of course, since the same system can be a Tivoli server, managed node,
gateway, and endpoint, all of the components may be installed on the Tivoli
server, with other selected components being installed on various managed
nodes and endpoints throughout your Tivoli environment.
3.3.2 TMR server configuration
In fact, some components must be installed on the TMR server, even if you are
not planning on using these components on this system. The IBM Tivoli
Configuration Manager Planning and Installation guide enumerates the
components that must be installed on the TMR server before any other
Configuration Manager components can be installed on other systems in the
Tivoli environment.
Here are the Configuration Manager components that must be installed on the
TMR server before deploying other components in your Tivoli environment. (Of
Chapter 3. Tivoli Configuration Manager fundamentals and installation
83
course, if you are not going to use the component in your Tivoli environment, you
do not need to install it on your TMR server.)
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Scalable Collection Service * (patch)
Inventory
Software Distribution
Activity Planner
Change Manager
Enterprise Directory Query Facility
Resource Manager
Web Infrastructure
Note: You must install the Scalable Collection Service patch before you install
the Inventory component. This patch is not required for the other components.
3.3.3 Components for managed nodes
Here are the Configuration Manager components that can be installed on
managed nodes.
Install these components on managed nodes if you plan on running an
administrative interface and/or CLI commands from the managed node (and in
the case of Software Distribution, on managed nodes that will be acting as
source hosts):
򐂰
򐂰
򐂰
򐂰
򐂰
Scalable Collection Service *(patch)
Inventory
Software Distribution
Activity Planner
Change Manager
Note: You must install the Scalable Collection Service patch before you install
the Inventory component. This patch is not required for the other components
3.3.4 Components for gateways
There are additional Configuration Manager components that must be installed
on Tivoli gateways if they are to participate in inventory scans or software
distributions.
Install the Scalable Collection Service patch on each gateway that:
򐂰 Connects to endpoints to be scanned by the Inventory component
򐂰 Is a repeater that will act as a collector
򐂰 Is a gateway that connects to the Web Gateway components
84
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Install the Inventory Gateway component on each gateway that will:
򐂰 Distribute Inventory profiles to endpoints.
򐂰 Recognize Inventory methods and download these methods to endpoints.
򐂰 Run methods to perform requested Inventory actions.
Install the Software Distribution Gateway on each gateway that will:
򐂰 Recognize Software Distribution methods and download these methods to
endpoints.
򐂰 Run methods to perform the requested Software Distribution operation.
3.3.5 Components for endpoints
These Configuration Manager components must be installed on endpoints:
򐂰 Tivoli Desktop for Windows
This includes interfaces for Activity Planner, Change Manager, Inventory, and
Software Distribution.
Note: You must install the Tivoli Desktop for Windows from the
Configuration Manager media (not the Framework media) in order to install
the additional software for the Configuration Manager component
interfaces. Or, if you have already installed Desktop for Windows from the
Framework CD, you can add the Configuration Manager components by
running the Desktop for Windows setup program from the Configuration
Manager CD, and choosing a customized installation.
򐂰 Software Package Editor
򐂰 Software Distribution Pristine Tool (Windows and OS/2 only)
򐂰 Web Gateway (Despite its name, this will not be installed on a Tivoli gateway)
򐂰 Web Interface (including Inventory and Software Distribution plug-ins)
3.4 Required roles for installation
The following table lists the required roles for installing Tivoli Configuration
Manager.
Chapter 3. Tivoli Configuration Manager fundamentals and installation
85
Table 3-1 Required roles for installing Tivoli Configuration Manager
Name of the operation
Required role
Install the installation images
directly from the CD images,
using the InstallShield wizard.
For UNIX and Linux: Root access
For Windows: A member of the Administrators
group
Install from the Tivoli desktop or
command line.
install_product or super Tivoli Framework roles in a
Tivoli region
Install using Tivoli Software
Installation Service.
User role plus one of the following Tivoli
administrator roles in a Tivoli region: super, senior,
or install_product
3.5 RDBMS considerations
Tivoli Configuration Manager stores data in an external Relational Database
Management System (RDBMS). The RDBMS server can be part of your Tivoli
environment, but that is not necessary as long as:
򐂰 There is TCP/IP connectivity between the RDBMS server and at least one
managed node system in the Tivoli environment.
򐂰 The system or systems in the Tivoli environment that will communicate with
the RDBMS system have client software for the RDBMS system installed and
configured to connect to the RDBMS system.
During the installation of Tivoli Configuration Manager, you can choose to create
five separate databases, or you can decide to create one database cm_db, which
will contain tables for each of the Configuration Manager components (Figure 3-7
on page 87).
86
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Component
Database
Activity Planner
planner (or cm_db)
Change Manager
ccm_db (or cm_db)
Distribution Status
mdist2 (or cm_db)
Inventory
Invtiv (or cm_db)
Pristine Manager
pristine (or cm_db)
Resource Manager
Invtiv (or cm_db)
Figure 3-7 Databases created by the installation program
These databases, known as repositories, are created in the RDBMS by running
SQL admin scripts. Tivoli provides sample SQL scripts in the FRESH/SQL/admin
directory of the Configuration Manager installation CD. These scripts will create
the various databases required by Configuration Manager. The scripts may not fit
your production environment as-is; make sure to review these scripts, and edit
them to meet your database requirements.
The values used in the SQL admin scripts are default values. The values can be
changed by editing the SQL admin script files.
If you are using the integrated server installation program, you can choose to
have the installation program create the configuration repository; in this case, you
do not need to explicitly run these SQL scripts.
Depending upon the RDBMS product, you may need to do some additional setup
outside of these scripts, such as create/catalog the database, or create operating
system accounts that the RDBMS will use. This is true whether you run the
admin scripts manually, or create the configuration repository using the
integrated server installation program. Check the contents of the SQL admin
scripts to determine what steps must be done before creating the repository. The
following example shows the cm_db2_admin.sql script, which is used if you opt
for one database creation (cm_db). Note the PRECONDITION statements. Also
note that table spaces are created by the script.
Example 3-1 db2 admin script
-- cm_db2_admin.sql
--
Chapter 3. Tivoli Configuration Manager fundamentals and installation
87
-- PRECONDITION: The default 'cm_db' database is created with the statement
-'create database cm_db', then catalogued on the client with the
statement
-'catalog database cm_db at node <server_node_name>'.
-The users invtiv, planner, tivoli and mdstatus are already created
-using the operating system user manager utility.
-This script is then run as the database administrator.
--- for single server, cm_db is the primary database with tablespace cm_ts
CREATE REGULAR TABLESPACE cm_ts
MANAGED BY DATABASE
USING (FILE 'cm_ts.dat' 1408M)
EXTENTSIZE 16;
CREATE TEMPORARY TABLESPACE cm_temp_ts
MANAGED BY DATABASE
USING (FILE 'cm_temp_ts.dat' 2500)
EXTENTSIZE 16;
-- logfile size
UPDATE DATABASE
UPDATE DATABASE
UPDATE DATABASE
in in 4k pages. Total log space is 176MB
CONFIGURATION FOR cm_db USING LOGFILSIZ
CONFIGURATION FOR cm_db USING LOGPRIMARY
CONFIGURATION FOR cm_db USING LOGSECOND
4096;
5;
5;
GRANT CREATETAB, CONNECT ON DATABASE TO USER invtiv;
GRANT USE OF TABLESPACE cm_ts TO USER invtiv;
GRANT CREATETAB, CONNECT ON DATABASE TO USER planner;
GRANT USE OF TABLESPACE cm_ts TO USER planner;
GRANT CREATETAB, CONNECT ON DATABASE TO USER tivoli;
GRANT USE OF TABLESPACE cm_ts TO USER tivoli;
GRANT CREATETAB, CONNECT ON DATABASE TO USER mdstatus;
GRANT USE OF TABLESPACE cm_ts TO USER mdstatus;
Note: You should consider tuning your database. This is not a simple task.
You need to know what you are doing and why you are doing it before
changing any database parameters. Each environment is different and needs
special consideration. The first thing you need to do is understand where the
bottleneck is. You will need to get help from your database administrator when
you try to tune your Inventory database (or any other Tivoli database) for best
performance. Hints about tuning can be found in the IBM Redbook All About
IBM Tivoli Configuration Manager 4.2, SG24-6612.
88
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
3.6 RIM considerations
A RIM host is a managed node where the RIM object is created. RIM objects are
created during installation. When deciding which managed nodes are to be RIM
hosts, consider the following requirements:
򐂰 The managed node must be local to the Tivoli region.
򐂰 The managed node must be preconfigured with the RDBMS client or server
software.
Notes: Do not install the RDBMS server software on the RIM host unless this
machine is designated solely for RDBMS usage and no other Tivoli
operations. When you add the number of transactions performed on the
RDBMS server to those performed on the RIM host, the number of overall
transactions might impact the optimal performance of your Tivoli environment
by exceeding network throughput.
RIM is installed as a Framework component. There is no separate installation
for RIM.
Figure 3-8 shows the RIM objects created for Configuration Manager by the
installation program, along with their corresponding database and the software
components that use it.
Component
Database
RIM object
Activity Planner
planner (or cm_db)
planner
Change Manager
ccm_db (or cm_db)
ccm
Distribution Status
mdist2 (or cm_db)
mdist2
Inventory
Invtiv (or cm_db)
invdh_1
inv_query
Pristine Manager
pristine (or cm_db)
pristine
Resource Manager
Invtiv (or cm_db)
trm (only if
inv_query is
not in local
Tivoli
management
region)
Figure 3-8 RIM objects created by the installation program
Chapter 3. Tivoli Configuration Manager fundamentals and installation
89
Although RIM objects are created during installation, you can create additional
RIM objects using the wcrtrim command, or by moving a RIM object from one
managed node to another using the wmvrim command.
You can also change the database information for a given RIM object using the
wsetrim command.
The syntax for the wsetrim command is given below:
wsetrim [–n name] [–d database] [–u user] [–H db_home] [–s server_id] [–I
instance_home] [–t instance_name] [–a application_label] [–m max_connections]
rim_name
Where:
򐂰 –a application_label changes the application label for the RIM object.
򐂰 –d database changes the name of the database or data source to which the
RIM object connects.
򐂰 –H db_home changes the path to the database home directory.
򐂰 –I instance_home (for DB2 only) changes the path to the DB2 instance for the
specified RIM object.
򐂰 –m max_connections changes the maximum number of connections between
the RIM object and the RDBMS.
򐂰 –n name changes the name of the RIM object to name.
򐂰 –s server_id changes the server ID for the database
򐂰 –t instance_name (for DB2 only) changes the name of the DB2 instance for
the specified RIM object.
򐂰 –u user changes the name of the database user that the RIM object uses.
To change the vendor for a RIM object, you must delete the object using the wdel
command and re-create it using the wcrtrim command.
Note: Vendor specification specifies the vendor of the RDBMS you are using
when creating the RIM object (one entry for each RDBMS system that is
supported by the Tivoli RIM component). Valid entries are as follows:
򐂰
򐂰
򐂰
򐂰
򐂰
DB2
Oracle
Sybase
Informix®
MS_SQL
Note that Microsoft® SQL is supported on Windows systems only.
90
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
To change the managed node for a RIM object, you can either move the RIM
object using the wmvrim command or delete and re-create the RIM object. To
change the label for a RIM object, you can either use the wsetrim –n command
or delete and re-create the RIM object. Also, you cannot set the database
password for an (RIM) object using the wsetrim command. You can use the
wsetrimpw command for this purpose.
The following example changes the database ID to inventory, the database user
to tivoli, the database home directory to /ORACLE, and the database server ID to
invdb2 for the inventory RIM object:
wsetrim -d inventory -u tivoli -H /ORACLE \ -s invdb2 inventory
3.7 General pre-install checks, hints, and tips
Once the deployment plan is done there are a number of things one needs to do
before installing IBM Tivoli Configuration Manager 4.2:
򐂰 Read the Tivoli Management Framework Release Notes, GI11-0890, and IBM
Tivoli Configuration Manager Release Notes, GI11-0926.
򐂰 Back up your Tivoli database (as well as perform any normal systems
backup).
򐂰 You need to have super or install_product roles for installing Tivoli
Configuration Manager V4.2 from the Tivoli Desktop or the command line.
򐂰 Do not use the C shell for installing on UNIX systems.
򐂰 Do not try to install across TMR boundaries. Always install applications in the
local TMR.
򐂰 If you have not created the Tivoli install directories prior to starting the
installation, remember to select that directories should be created. When the
dialog appears, the check box is not selected by default. This does not apply
to Integrated Server Install.
򐂰 On Linux systems, remote access is often disabled by default. Make sure that
you enable it before the install.
3.7.1 UNIX
The install process performs some space checking once the install gets going,
but you will save a lot of time if you check for adequate Tivoli code and database
file system space in advance. To make your system easier to manage, you may
want to define some new file systems for Tivoli. You have to ensure that your file
systems are large enough to contain all the Tivoli files (refer to the product
Chapter 3. Tivoli Configuration Manager fundamentals and installation
91
release notes and user manuals to determine file space requirements). Tivoli, by
default, will install most of its files into /var and /usr.
There are a number of reasons why you may want to set up specific Tivoli file
systems:
򐂰 You avoid problems where other applications may fill up space in /var and /usr
file systems.
򐂰 You can back up and restore individual file systems defined on your system,
although this may still be a little complex for Tivoli products.
򐂰 You can control the overall disk structure and layout.
Default directories created are:
/etc/Tivoli
This directory is small at install time and can be left as
part of the /etc file system.
/var/spool/Tivoli
Make a new file system for this and specify that it should
be mounted at system restart.
/usr/local/Tivoli
This is the largest of the directory trees created by Tivoli.
Create the file system and specify that it should be
mounted at system restart.
Tivoli will also write install and other logfiles to /tmp or the temporary directory
selected during Integrated Install.
3.7.2 Windows Systems on Intel® 486 or Pentium® systems
IBM Tivoli Configuration Manager 4.2 supports Windows NT 4.0 with Service
Pack 5 or later, Windows XP Professional, or the Windows 2000 family.
The drive where you want to install Tivoli must be formatted with NTFS. You can
check this from the My Computer window. Right-click the desired drive icon and
select Properties. The general page includes the file system type. You can also
check this from a command prompt with CHKDSK d: (where d: is the drive where
you will install Tivoli). You can convert a FAT file system to NTFS using the
convert utility. See the Windows online help for more information.
Tivoli files for Windows are, by default, stored under the \Tivoli directory on the
root of the selected drive. Tivoli will also write install and other logfiles to
%DBDIR%\tmp. You should verify through the Control Panel system applet that
you have sufficient swap space defined. Tivoli Framework 3.7.1 Planning for
Deployment Guide, GC32-0393, discusses this requirement.
92
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
3.8 Installation methods
You can install and upgrade the components of IBM Tivoli Configuration Manager
using any of the following different installation mechanisms:
򐂰 Using the Integrated Installation, which creates a new Tivoli management
region server (Tivoli server) and installs the appropriate IBM Tivoli
Configuration Manager components or upgrades the entire Tivoli
management region (Tivoli region) using activity plans.
򐂰 Using Tivoli Software Installation Service, where you select which products to
install on which machines.
򐂰 Using the Tivoli Desktop, where you select which product and patches to
install on which machine.
򐂰 Using the winstall and wpatch commands provided by Tivoli Management
Framework, where you specify which products and patches to install on which
machine.
򐂰 Using the Software Package Blocks. Before installing images from Software
Package Blocks, the Tivoli environment must be created and Tivoli
Configuration Manager must be fully deployed.
We will focus on the Integrated Installation.
3.9 Overview of Integrated Install
InstallShield Multi-Platform (ISMP) is part of Tivoli’s Install Imperative and IBM’s
install strategy, to achieve two major goals:
򐂰 Consistent install
򐂰 Simplified maintenance
The first principle helps achieve Tivoli’s goals by providing the customer with a
similar installation experience for each Tivoli product. The second principle
allows customers to apply maintenance (upgrades) to Tivoli products in a
consistent and simplified way.
For IBM Tivoli Configuration Manager 4.2 and 4.2.1, ISMP is being used in the
following scenarios:
򐂰
򐂰
򐂰
򐂰
Server Install
Upgrade Plan Generator
Desktop Install
Web Gateway Install
Chapter 3. Tivoli Configuration Manager fundamentals and installation
93
3.10 Server Install
The Server Install scenario starts from CD5 and should be used if:
򐂰 Tivoli Management Framework is not installed.
򐂰 Tivoli Management Framework exists at the 4.1 level but has a subset of
Configuration Manager 4.2 applications.
If current installation is not in one of these conditions, the installation is stopped
by the installation program.
Note: Because the Server Install program assumes no previous Tivoli
environment, your RIM Host must be the TMR server (since there are no other
systems in the region yet). You should move the RIM object from the Tivoli
server to another more suitable managed node once you have your Tivoli
environment established.
There are two installation types with the Server Install:
򐂰 Typical
򐂰 Custom
3.10.1 Typical Server Install
The advantage of Typical Server Install is you not have to specify as many details
during the installation when we choose this installation option.
When using this installation, the following components are installed, configured,
or created:
򐂰 Tivoli Management Framework.
򐂰 To support a single Server Installation, a Tivoli gateway, called hostname-gw
(for example, lab16036-gw) is also created on this machine. This gateway is
automatically configured as a repeater. The installation of Tivoli Management
Framework created the Tivoli Server.
򐂰 Resource Manager and Resource Manager Gateway.
򐂰 Enterprise Directory Query Facility with the default directory context as
directory.
򐂰 Scalable Collection Service. Scalable Collection Service is considered part of
Tivoli Management Framework, and is used to collect inventory scan results.
򐂰 Distribution Status Console. The Distribution Status Console tracks Software
Distributions and other profile distributions. The installation of the Distribution
94
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Status Console requires the following Java components (which are provided
by Tivoli Management Framework):
– Java 1.3 for Tivoli
– Java RDBMS Interface Module
– Java Client Framework for Tivoli
These Java components are used by several of the other IBM Tivoli
Configuration Manager components.
򐂰 The installation of the Distribution Status Console creates the mdist2 RIM
object.
򐂰 Activity Planner. This installation creates the Planner RIM object. This RIM
object can be on the Tivoli Server.
򐂰 Change Manager. This installation creates the ccm RIM object.
򐂰 Inventory and Inventory Gateway. The installation of the Inventory component
creates the inv_query and invdh_1 RIM objects.
򐂰 Software Distribution and Software Distribution Gateway.
򐂰 Software Package Editor.
This installation program can be used on all platforms supported as a Tivoli
Server. For details about which platforms are supported as a Tivoli Server, see
the Tivoli Management Framework Release Notes Version 4.1, GI11-0890
(comes with the product).
3.10.2 Custom Server Install
In the Custom Install, you have more options (but the installation is more
complex). Use the Custom Server Install if you would like to:
򐂰 Select components to install.
򐂰 Install additional languages.
򐂰 Choose the type of configuration for creating the RIM objects:
– None (creates the RIM object, but does not perform any database
configuration)
– Schema scripts only; tablespaces already created
– Default tablespaces and run schema scripts
򐂰 Configure the parameters for each RIM object (typical install uses cm_db
database name and default user accounts for all RIM objects).
򐂰 Configure Enterprise Directory Query Facility during the installation.
Chapter 3. Tivoli Configuration Manager fundamentals and installation
95
Note: With the typical installation, the Enterprise Directory Query Facility is
also installed, but you are not prompted for configuration values, and so must
configure this component later. When you choose the custom option, you will
be prompted for Enterprise Directory Query Facility parameters.
3.10.3 Starting the installation programs
Before starting the installation program, read the information about the
installation you are planning to perform. The general procedures for starting the
installation programs are as follows.
UNIX
From the /FRESH subdirectory of the IBM Tivoli Configuration Manager
Installation CD5, enter one of the following commands.
򐂰 If you do not have a Java Virtual Machine Version 1.3.1 on the system and
you want to download this software to the /tmp directory, enter:
./file .bin
Where file is the name of the file that starts the installation program. For each
UNIX operating system, there is a different installation program. For example,
for IBM AIX the installation program file will be setup_aix.bin.
򐂰 If you want to download the Java Virtual Machine to a directory other than the
/tmp directory, enter:
./file .bin -is:tempdir directory
Where directory is the directory to where you download the Java Virtual
Machine.
Note: You need at least 50 MB of free space in your tempdir directory.
򐂰 If you have a Java Virtual Machine on the system and do not want to use the
Java provided by Tivoli, then enter:
java -D is.external.home=path -jar setup.jar
Where path is the path to the setup.jar file that is located on the installation
CD under /FRESH subdirectory.
96
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Note: If the correct version of Java is not installed, the following message
appears at the beginning of the install:
#java -Dis.external.home=/img/cd5/FRESH -jar setup.jar -jar : illegal
argument
Usage: java [-options] class
Windows
From the /FRESH subdirectory of the IBM Tivoli Configuration Manager
Installation CD5, run the Setup.exe file.
3.11 Desktop Install
With IBM Tivoli Configuration Manager 4.2 you can now make a Tivoli endpoint a
fully operational Tivoli Console on the following Windows systems:
򐂰 Windows 2000
򐂰 Windows XP
򐂰 Windows Server 2003
The following components are installed on a Windows PC via Desktop Install:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Tivoli Desktop for Windows
Tivoli Java components
Distribution Status Console
Activity Planner GUI
Change Manager GUI
Inventory GUI
Software Package Editor
During the Desktop InstalI, ISMP synchronously runs the following activities
behind the scenes:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Install Desktop for Windows.
Temporary unpack Software Distribution disconnected commands (SPB).
Install a prerequisite SPB for environment setup.
Install all Java mandatory prerequisites.
Install selected applications.
Clean up the environment.
Chapter 3. Tivoli Configuration Manager fundamentals and installation
97
3.11.1 Starting the installation program
In order to start the Desktop Install, do the following on a Windows system:
1. Insert the IBM Tivoli Configuration Manager Desktop CD in the CD-ROM
drive.
2. Start the installation by running the setup.exe file.
Note: You need 120 MB of free disk space for Desktop Install.
3.12 Web Gateway Install
The Web Gateway Installation program uses SPBs to install Web Gateway
components (database and server). Other than SPBs, there is no other method
to install Web Gateway components.
With the Typical Installation the following components are installed:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Tivoli endpoint
Web Gateway database
Web Gateway Server
Web Infrastructure
Inventory plug-ins for Web Infrastructure
Software Distribution plug-ins for Web Infrastructure
The Custom Installation provides flexibility, as you can install any combination of
the listed components.
3.12.1 Web Gateway prerequisites
While you can install most prerequisite software on any system that is accessible
to the Web Gateway server, there are three components that must be installed on
the system that will become the Web Gateway server. The prerequisite
components that must be installed on the Web Gateway system are:
򐂰 IBM DB2
򐂰 IBM HTTP Server
򐂰 The IBM WebSphere server
Optionally:
򐂰 Access Manager and WebSeal must be installed and configured in the
environment to protect Web resources.
򐂰 If Access Manager is installed, configure the Java Runtime Environment
provided by Access Manager (PDJRTE).
98
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Refer to individual product manuals or the All About IBM Tivoli Configuration
Manager Version 4.2, SG24-6612, redbook for more information on installing
these prerequisites.
Notes: Prior to installing WebSphere Application Server, make sure that no
active existing services are using ports 900 and 9080 on the server on which
you install WebSphere.
In order to install Access Manager Base, you can use the
ezinstall_ldap_server program.
3.12.2 Starting the installation program
To start the Web Gateway installation program, do the following:
򐂰 From the IBM Tivoli Configuration Manager CD 4 for Web Gateway run:
– On UNIX
./file.bin for UNIX, where file is the name of the file that starts the
installation program. For each UNIX operating system, there is a different
installation program. For example, for IBM AIX the installation program file
will be setup_aix.bin.
– On Windows
Run the Setup.exe file.
3.12.3 Multiple endpoints installation
Tivoli Management Framework 4.1 now allows multiple endpoints installed on the
single system. This may come in handy in a test or sand box environment, as
well as environments with clustering for fault tolerance and high availability
requirements.
Here are some requirements and tips for installing multiple endpoints on the
same system:
򐂰 Each endpoint must be installed to a different directory. For example, the
defaults are:
– For Intel: c:\Program Files\Tivoli\lcf
– For UNIX: /opt/Tivoli/lcf
򐂰 We recommend following your company’s naming conventions to ensure that
proper access and security is allowed and given to the proper users. For
example, this may be a naming convention at your company:
– Intel: c:\Program Files\Tivoli\lcfHO - First installation
Chapter 3. Tivoli Configuration Manager fundamentals and installation
99
– Intel: c:\Program Files\Tivoli\lcfHORecovery - Second installation
– UNIX: /opt/Tivoli/lcfHO
– UNIX: /opt/Tivoli/lcfHORecovery
򐂰 The port number must be unique for communication purposes, and not
overlap.
򐂰 If your endpoint policy utilizes the ep_ipadd (5$), you must modify it
accordingly.
3.13 Uninstallation of IBM Tivoli Configuration Manager
For uninstallation of IBM Tivoli Configuration Manager you need to use the
wuninst command. The wuninst command is not specific to IBM Tivoli
Configuration Manager. It is used for all Tivoli Enterprise products. It is a wrapper
script that invokes product-specific uninstall scripts. This command removes the
component for the specified machines in your Tivoli environment or from the
entire local Tivoli region. To uninstall the component using the wuninst
command, you need to specify the component tag for that component.
The syntax for this command is as follows:
wuninst tag hostname... [-rmfiles]
Where:
򐂰 tag specifies the registered product tag for the Tivoli Enterprise product to
remove.
Tip: The list of these tags can be found in the IBM Tivoli Configuration
Manager Planning and Installation Guide, GC23-4702. You can also list the
registered product tags by running wuninst -list.
򐂰 hostname specifies the name of the managed node from which to remove the
product. If you specify the Tivoli server, the product is removed from all
managed nodes in the Tivoli region.
򐂰 –rmfiles indicates that all product files are to be removed from specified
managed nodes. When you do not specify this option, the command removes
the database entries only. When you issue this command from the Tivoli
server and specify this option, all entries for each managed node in the Tivoli
region are removed.
100
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
4
Chapter 4.
Inventory and Software
Distribution components
In this chapter we discuss the details of Inventory and Software Distribution
components. This chapter contains the following sections:
򐂰
򐂰
򐂰
򐂰
“Inventory component” on page 102
“Software Distribution component” on page 138
“Data Moving” on page 159
“Enterprise Data Warehouse integration” on page 161
© Copyright IBM Corp. 2004. All rights reserved.
101
4.1 Inventory component
One of the challenges in a network computing environment is keeping track of
the enterprise resources, such as hardware and software installed on each
machine. The Tivoli Configuration Manager Inventory component addresses this
problem by providing the means to gather hardware and software information
related to each system and then store that information in a relational database
(RDBMS).
The Inventory component of IBM Tivoli Configuration Manager gathers data
about hardware and software to help manage complex distributed client/server
enterprises. Inventory uses Framework service MDist and Scalable Collection
Service (SCS) for efficient, asynchronous distribution of profiles and the
collection of data across complex networks.
4.1.1 What is gathered by Tivoli Inventory
Here is some of the data Inventory can gather:
򐂰 Operating system
– Name
– Type
– Major/minor version
򐂰 Hardware
–
–
–
–
Memory (physical, virtual/paging, free, etc.)
Network card (manufacturer, model, address, etc.)
Processor (manufacturer, model, speed, etc.)
Disks (model, type, size, cylinders, etc.)
򐂰 Software
– Files (name, size, path, permissions, group, etc.)
– Software (description, version, name, size, etc.)
4.1.2 Inventory architecture
The following are the basic components that are involved in understanding the
Inventory architecture:
򐂰 TMR server : Tivoli Inventory is installed on the TMR server and is managed
from the database object repository on the TMR server. The TMR server
provides Inventory access to services and resources: Profile managers,
profiles, profile distribution, resource authentication and authorization, event
notification, tasks, jobs, and queries.
102
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 Tivoli Management Console: Tivoli Inventory is also installed on any
managed nodes that will run the Tivoli Desktop (X-Windows version) or the
Tivoli Desktop for Windows. To manage Tivoli Inventory using the graphical
interface or the command line interface (CLI), you must install Tivoli Inventory
on these Tivoli Management Consoles. These are normally desktop
machines (UNIX or NT/2000) installed as managed nodes and do not provide
services within the TMR (such as Management Gateways, RIM Hosts, etc.).
򐂰 Inventory Data Handler : This server is a managed node in the TMR with an
additional object/service installed (installed during Tivoli Inventory
installation). This service is responsible for and controls the following:
– Receives the scanned data information from the collectors (service on the
Inventory Gateways). This collector hierarchy follows the MDist 2 repeater
hierarchy used in distribution of large amounts of data (such as in
Software Distribution)—just in reverse. The data is collected and sent “up”
to the server, not distributed “down” to the targets.
– Sends the scanned data information to the Configuration Repository (via
the RIM host). The Data Handler manages the connection to the RIM
Host/RDBMS and efficiently loads the data into the Configuration
Repository. This offloads the TMR server from having to handle receiving
this scan data and forwarding it to the RIM Host.
򐂰 Inventory Configuration Repository: The database that contains the tables
and fields where the inventory information is stored. The configuration
repository resides within a Relational Database on the RDBMS server. Tivoli
Inventory supports many of the RDBMS vendors. Tivoli Inventory supports all
RDBMS vendors supported by Framework (see the Tivoli Management
Framework Release Notes for the latest versions supported).
Notes: The RDBMS server does not need to be on a managed node, but it
should be in the same network as the TMR server.
There must be a TCP/IP connection between the RIM host and the
RDBMS server.
򐂰 Inventory Gateway/Collector: To enable inventory scanning of TMAs, the
Tivoli Inventory Gateway software must be installed on all management
gateways. The Tivoli Inventory Gateway controls inventory-related processes
between the TMA and its management gateway. This includes:
– Sending the scan profile to the TMA (as well as any needed executables,
which are automatically downloaded to the TMA).
– Collecting the scan data and sending it to the Inventory Data Handler (to
be inserted into the RDBMS Configuration Repository via RIM).
Chapter 4. Inventory and Software Distribution components
103
򐂰 Inventory scanners: Software components that run on the target to gather,
process, and return inventory data.
򐂰 Inventory profile: Contains the parameters that define how the scanner
should behave, such as whether to do a hardware, software, or custom scan,
or all of them.
򐂰 Callback object: Serves as a backup for SCS. It is used when an endpoint
cannot forward data to its collector.
򐂰 Collection Table of Contents: Contains a set of header information that
describes the data and its destination, and the actual data itself.
To understand the Tivoli Inventory architecture better, let us examine step by step
a typical inventory scan scenario. Steps 1–2 are the distribution of the Inventory
profile through the MDist2 hierarchy. It is important to understand that this is an
asynchronous profile distribution to activate the scanner at the endpoints, which
means it does not wait for the return of data. This allows scans to proceed in
parallel across all targets of the profile distribution. In this way, MDist 2
distributions (in this case, Inventory profile distribution) can be monitored through
the Distribution Status Console or by using the wmdist command. This also
applies to Inventory profile distribution.
In steps 3–4 the endpoint receives the profile, scans the endpoint, and the MIF
files are created and parsed. After the MDist 2 distribution is successful, the
Scalable Collection Service takes over and sends the data to RDBMS. The
endpoint informs the collector on the gateway that the data is ready and requests
collection by sending its Collection Table of Contents (CTOC). CTOC includes
the data file name and size and the source and destination of the collection.
Depending on the configuration of your network, the data may then travel through
a hierarchy of collectors before arriving at the Inventory Data Handler.The data
remains in the collector’s depot until it receives confirmation that the upstream
collector has received the entire data bundle.
In steps 5–7 the Collector sends collections to the Data Handler. The Data
Handler decompresses and decodes the collection before it writes data into the
repository through one or multiple RIM interfaces.
In summary, once an inventory profile has been distributed to an endpoint, the
collection path for inventory data is endpoint → gateway collector → Inventory
Data Handler → RIM host → Configuration Repository.
104
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
TMR A
1
6
RD
Data Handler
7
RIM host
RDBMS
5
2
Gateway 1
Collector
Gateway 2
Gateway 3
Collector
Collector
4
CTOC Collection (*.dat file)
3
Figure 4-1 A typical Inventory collection scenario
Now let us see these components in more detail.
4.1.3 Collection Table of Contents
The data that the Scalable Collection Service transfers is called a collection.
Collections are divided into two parts: A set of header information called a
Collection Table of Contents (CTOC) that describes the data and its destination,
and the actual data itself. When a scan completes, the endpoint Inventory
Chapter 4. Inventory and Software Distribution components
105
method assembles the collection. It then uses an upcall to pass the CTOC to the
Collector process on the endpoint gateway. Once the Collector has registered the
CTOC for the collection it will execute a downcall back to the endpoint and
retrieve the data. The data contained in a CTOC is described in Table 4-1.
Table 4-1 CTOC information
106
CTOC value
Description
CTOC ID
A unique number identifying the collection.
Priority
Not used.
SOURCE_NAME
The name of the object label of the
machine that started the distribution.
SOURCE_OID
OID of the source object. This is the OID
of a object that requested the collection.
Initially this is the endpoint.
ORIGINATOR_OID
OID of the originating object ID. This value
is usually the endpoint OID that the scan
data belongs to.
SOURCE_METHOD
The method that requested the collection.
In the case of Inventory, it should always
be mc_get_data.
SOURCE_METHOD
The method (mc_get_data) that
requested the collection.
DEST_OID
This field is no longer used in Inventory
4.2. DEST_ID is used instead.
DEST_ID
This field is used to determine the OID of
the destination Data Handler object. The
field contains the region ID and Data
Handler object label. This information is
used to determine the OID of the Data
Handler.
DEST_METHOD
The method (mc_request_collection) that
will receive the data.
WRITE_COMPLETION_FILE
The full path of the DON file. The DON file
is created on the endpoint when the data
has been successfully collected by the
Collector.
DATAPACK
Data pack number.
inventory_scan_id
Inventory scan ID.
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
CTOC value
Description
inventory_num_results
Number of results.
inventory_opts
Used for unsolicited scans.
inventory_ctoc_version
Represents the application version.
Collection Status
The status of the CTOC file.
Retries
Indicates the count of the number of failed
attempts. This value is reset to 0 if
Collector/Data Handler is restarted. If this
value reaches the max retry, the Collection
Status field on the CTOC is set to false
and the CTOC is eventually discarded.
CTOC information is stored in a binary format. Therefore it cannot be viewed
using a text editor. The wcstat command can be used for viewing the CTOC
information. The command syntax is as follows:
wcstat -v CTOC ID collector
CTOC information and status are depicted in Example 4-1. You must, however,
know which Collector currently has the collection before you can check its status.
You can view CTOC information using the wcstat command and checking the
Collector’s queues.
Example 4-1 Output from the wcstat -v command
wcstat -q o @managed node:win-rptr01a
CTOC ID: c13707486641226774
CTOC Properties:
PRIORITY: 1
SOURCE_NAME: WIN-NTK-A
SOURCE_OID: 1370748664.4.21
ORIGINATOR_OID: 1370748664.12.522+#TMF_endpoint::endpoint#
SOURCE_METHOD: mc_get_data
DEST_OID: 1370748664.2.35#InvDataHandler#
DEST_ID: 1370748664#inv_data_handler#InvDataHandler
DEST_METHOD: mc_request_collection
WRITE_COMPLETION_FILE: C:\Tivoli\lcf\inv\SCAN\mcollect\INV00093.DON
DATAPACK: 613
Client Properties:
inventory_scan_id: 93
inventory_num_results: 1
inventory_opts: 0
inventory_ctoc_version: 16896
Collection Status: QUEUED_OUTPUT
Chapter 4. Inventory and Software Distribution components
107
#Retries: 0
4.1.4 Collection files
Collection data files are compressed binary data files assembled by the Inventory
method on the endpoint once the scan completes. The collection files contain the
scan data that will ultimately be inserted into the Inventory repository. These files
exist in the $LCFDIR\inv\scan directory on the endpoint and are named
INVxxxxx.dat. Once the Collector has the CTOC for a collection, it will execute a
downcall to the endpoint and retrieve the data file using an IOM channel. When
the Collector has received the collection data it creates a INVxxxxx.don. This file
indicates that the collection was successful. The Collector creates a subdirectory
(with the same name as the collection ID) in the depot directory and stores the
data file in that directory. It is not possible to view the content of the data file once
it has been assembled.
4.1.5 Inventory Collectors
A Collector is a multi-threaded process installed on a managed node or gateway.
Collectors store and forward collections to other Collectors or a Data Handler
(final Collector). Figure 4-2 on page 109 illustrates the three parts of a Collector:
Queues, depots, and the scheduler. You can also see how data is moved into the
input queue.
Note: You must have Scalable Collection Service installed on a managed
node in order to use it as a Collector.
108
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 4-2 Collector components and CTOC transfer
Collector components
There are three types of resources that are used to control flow of CTOCs and
Dat files between two Collectors or the Data Handler:
Queues
Used as temporary storage areas for CTOCs, and also
control the flow of CTOCs between Collectors or the Data
Handler.
Depots
A subdirectory created in the Collector’s run-time
directory used to store collection data.
Scheduler
Processes that control the timing and the flow of data.
Queues
Queues are areas in memory that the Collector uses to hold CTOCs for the
collections it is currently transporting. Each Collector has four queues:
򐂰 Input queue
򐂰 Output queue
Chapter 4. Inventory and Software Distribution components
109
򐂰 Error queue
򐂰 Deferred queue
Each queue has a checkpoint file used to back up a copy of the queue’s contents
to the file system. These files are stored in the SCS run-time directory.
Checkpoint files are binary files and are named checkpointGL_[queue]qfile.dat.
The checkpoint files are not the queues themselves, but are used by the
Collector process to restore the queue if it is stopped or killed. The Collector will
append a CTOC to the checkpoint file when it places it in the corresponding
queue. When a CTOC is removed from a queue, the Collector also removes it
from the corresponding file. Similar to the checkpoint files, a Collector maintains
a log file of all completed collections. This log file is named CTOC_log.dat, and it
is stored in the same directory as the checkpoint files. CTOC_log.dat also uses
the same binary format as the checkpoint files, and its contents can be viewed
with the wcstat command.
You can check the status of a Collector’s queues using wcstat. The syntax is:
wcstat -q queue collector
This gives essentially the same output as the wcstat -v command (described in
Example 4-2) for each CTOC in the queue.
Example 4-2 shows sample output from this command. You can also use wcstat
to read from the completed CTOC log file by using c for the queue option.
Example 4-2 Output from wcstat -q command
wcstat -q o @managed node:win-rptr01a
CTOC ID: c1370748664612628
CTOC Properties:
PRIORITY: 1
SOURCE_NAME: WIN-ARCH01A
SOURCE_OID: 1370748664.4.21
ORIGINATOR_OID: 1370748664.6.522+#TMF_endpoint::endpoint#
SOURCE_METHOD: mc_get_data
DEST_OID: 1370748664.2.35#InvDataHandler#
DEST_ID: 1370748664#inv_data_handler#InvDataHandler
DEST_METHOD: mc_request_collection
WRITE_COMPLETION_FILE: C:\Program
Files\Tivoli\lcf\inv\SCAN\mcollect\INV00100.DON
DATAPACK: 484
Client Properties:
inventory_scan_id: 100
inventory_num_results: 1
inventory_opts: 0
inventory_ctoc_version: 16896
110
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Collection Status: QUEUED_OUTPUT
#Retries: 0
When an endpoint finishes assembling a collection, it makes an upcall to pass
the CTOC to the Collector process on its gateway. The Collector places the
CTOC in its input queue and appends it to the checkpointGL_iqfile.dat
checkpoint file. The Collector then executes a downcall to the endpoint to retrieve
the scan data file. Once the Collector has placed the data file in the depot
directory it moves the CTOC from the input queue to the output queue and
adjusts the checkpoint files accordingly.
If the Collector is unable to retrieve the data file from the endpoint, it will move the
CTOC to the error queue and also append it to the checkpointGL_eqfile.dat file. If
a CTOC is added to the error queue, the Collector will retry the attempt as per
the max_input_retries parameter. This parameter can be configured using the
wcollect command. If all max_input_retries have been exhausted and the data
still cannot be collected, the Collector will continue to transfer the CTOC to
upstream Collectors. Error CTOCs will eventually reach the Data Handler, which
notifies the Status Collector and then discards them.
Once a CTOC is added to the output queue, the Collector will pass it to an
upstream Collector or Data Handler. The process then starts again with the
upstream Collector placing it in its input queue and executing a downcall for the
data file.
CTOCs are copied into the checkpoint files, which are stored in the run-time
location directory. The run-time location file system should have enough space to
store multiple CTOCs in the input, output, and error queues. The run-time
location can be set using the wcollect -l command. If you change the run-time
location you must stop the Collector using wcollect -h. If you have a collection in
the old run-time directory you must move the contents of the run-time and depot
directories to the new location. The unprivileged user account (user nobody on
UNIX or tmersrvd on Windows NT) must have read/write permission to the
run-time and depot directories. To change the run-time directory run the
commands shown in Example 4-3 on page 112.
Chapter 4. Inventory and Software Distribution components
111
Example 4-3 Changing run-time directory
wcollect -l c:/tivoli/mcollect @Gateway:win-rptr01a-gw
wcollect -h graceful @Gateway:win-rptr01a-gw
Performed 'graceful' halt of collector: @Gateway:win-rptr01a-gw.
wcollect -s @Gateway:win-rptr01a-gw
Started collector: @Gateway:win-rptr01a-gw.
Tips: Where possible, use a standard directory as a run-time directory on all
similar Collectors. Using a standard directory facilitates easy troubleshooting
and scripting.
If you reconfigure your repeater hierarchy, you need to remove the old
Collector information with the wcollect -r command.
Depots
Each Collector has a depot directory used to store scan data. This directory has
several subdirectories, one for each CTOC currently in the output queue. The
Collector depot also contains an index file called Index.dpo that contains a
reference to each collection’s data files. The structure of a depot is shown in
Figure 4-3 on page 113. If the depot is empty, the index file contains the
maximum size for the depot. The depot’s maximum size can be set using the
wcollect -z command. The syntax is:
wcollect -z depot size in MB collector.
112
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 4-3 Depot directory structure
The use of depots enables the store and forward mechanism of SCS. After a
CTOC is placed in the input queue of the upstream Collector, it will make a
downcall to the downstream Collector and retrieve the data file from its depot.
Depots should be located on a file system with plenty of free space and sizes
should be set to a large number. If an upstream Collector tries to retrieve a data
file and does not have enough room to store it in the depot, it will cause an error
and move the CTOC into the error queue. The depot directory is always a
subdirectory of the run-time location. In order to set the depot directory, you must
use the wcollect -l command to move the run-time location, as described in
“Queues” on page 109.
Chapter 4. Inventory and Software Distribution components
113
Scheduler
The Collector scheduler daemon is a multi-threaded process that sends and
receives CTOCs. Collector is responsible for moving data upstream to the Data
Handler. SCS allows you to set several Collector parameters controlling the
bandwidth and schedule that scheduler uses to transmit data.
The Collector process spawns input and output threads that move CTOCs from
one queue to the next and retrieve data files from downstream endpoints and
Collectors. SCS enables you to control the number of threads allocated to input
and output. Input threads process the CTOC in the Collector’s input or error
queue by retrieving the corresponding datapacks from a lower-level Collector or
endpoint. Output threads process the CTOC in the output queue of a Collector by
making a mc_request_collection upcall to transfer the CTOC to the input queue
of the next level Collector or Data Handler. You can change the number of
threads allocated to each of these queues. The same as changing the run-time
location, you need to restart the Collector for changes to take effect. Example 4-4
shows how to increase input threads to 20 using the wcollect -i command. You
can use the -o option to change the output threads.
Example 4-4 Changing input threads
wcollect -i 20 @managed node:win-inv01a
wcollect -h graceful @managed node:win-inv01a
Performed 'graceful' halt of collector: @managed node:win-inv01a.
wcollect -s @managed node:win-inv01a
Started collector: @managed node:win-inv01a.
Depot chunk size is used to control the size of each data stream that a Collector
sends during transmission of collections.
The threads’ values, combined with the depot chunk size, are used to throttle the
maximum amount of data being transmitted at any time. If a Collector has 20
output threads and its depot chunk size is set to 5 K, then it will transmit up to 20
simultaneous 5 K chunks of data using, a total of 100 K of bandwidth. The
Collector will continue transmitting at this rate as long as there is data in its
depot. If a slow wide area network (WAN) link exists between Collectors, the
output threads and depot chunk size should be set accordingly. The wcollect -c
command is used to set the depot chunk size, as illustrated in Example 4-5.
Example 4-5 Changing depot chunk size
wcollect -c 512 @Gateway:win-rptr01a-gw
wcollect -h graceful @Gateway:win-rptr01a-gw
Performed 'graceful' halt of collector: @Gateway:win-rptr01a-gw.
wcollect -s @Gateway:win-rptr01a-gw
Started collector: @Gateway:win-rptr01a-gw.
114
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
To view a Collectors configuration run the command illustrated in Example 4-6.
Example 4-6 Viewing Collector’s configuration
wcollect @Gateway:win-rptr01a-gw
Collector: @Gateway:win-rptr01a-gw
debug_level = FATAL (error messages only)
debug_log_size = 1 MB
runtime_location =
depot_size = 40 MB
depot_chunk = 512 KB
thread_idle_down_time = 60 seconds
thread_sleep_time = 5 seconds
max_input_threads = 5
max_input_retries = 10
max_output_threads = 5
retry_delay_time = 1 seconds
offlinks =
log_completed_ctoc = true
Important: Most Collector parameters require that you stop and start the
Collector in order for the changes to take effect.
4.1.6 Collection manager
Like endpoint manager, collection manager manages the routes used to move
data through the collection hierarchy. Collection manager runs on the TMR
server and holds a map of the collection hierarchy in memory. This map is really
just a copy of the repeater hierarchy, and is updated when collection manager
starts. The collection manager is queried for routing and formatting when a
CTOC in the output queue is processed by the output thread (assuming that the
route is not found in the Collector’s router cache). Once the OID of the next hop
has been determined, the mc_request_collection method is called on that
Collector.
Collection manager components
The route map is stored in memory and reloaded each time oserv restarts and
the collection manager loads. Collection manager route information for a specific
node can be reset using the wcollect -r command. If the repeater hierarchy
changes, wcollect -r should be issued against any node that changed ranges.
An example follows:
wcollect -r @ManagedNode:wininv01a
Chapter 4. Inventory and Software Distribution components
115
This will reset collection manager’s route information for a managed node named
wininv01a.
4.1.7 Data Handler
The Inventory Data Handler can be considered the final Collector in a Tivoli
Inventory collection system. Like Collectors, the Inventory Data Handler has a
depot and queues. However, the Inventory Data Handler unpacks and decodes
the data and sends it to the RIM rather than requesting collection from an
upstream Collector. Data Handler is also able to use multiple RIMs to insert data
into the Inventory repository.
Data Handler components
The Data Handler process inherits its attributes from the Collector process, so its
operation is very similar. One notable difference between the two processes is
the location of the run-time directory. Another is the restriction that you can only
have one Data Handler per TMR. The Data Handler is created automatically
when you install Inventory.
Since the Data Handler process inherits from the Collector process, the wcollect
command can be used to start and stop the Data Handler or change some
settings. Instead of specifying a managed node, you must specify the Data
Handler object as the target of the command. The following example illustrates
how to stop the Data Handler process using the wcollect command:
wcollect -h graceful @InvDataHandler:inv_data_handler
Creating the Data Handler
To create a Data Handler use the wcrtinvdh command. See Example 4-7.
Example 4-7 Creating the Data Handler
wcrtinvdh -d $DBDIR/inventory/stat_dir -n 15 -r 3 -s YES -t 30 -u YES
“win-inv01a”
Where:
-d
116
Specifies the location of the status directory. The default
location is $DBDIR/inventory/stat_dir on the managed
node where the Inventory Data Handler resides.
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
-n
Specifies the interval at which scan completion
notifications are sent. This option works in conjunction
with the –n option of the wsetinvglobal command (option
BUNDLE). The alternative notification option is -q, which
bundles according to the number of targets.
-r
Specifies the number of times the Inventory Data Handler
tries to write data to a RIM object. After the maximum
number of retries is reached, a failure notification is sent.
The default value is 5.
-s
Specifies whether the Inventory Data Handler stores
status information that can be restored in case of a
system failure.
-t
Specifies a value in seconds from which to calculate the
time-out period in seconds between retries of writes to a
RIM object. This time-out period works according to the
algorithm timeout*retry_count. For example, on the first
retry, with a time-out value of 30 seconds, the algorithm
sets the timer to 30 * 1 or 30 seconds. On the second
retry, the timer sets to 30 *2 or 1 minute. The default value
is 30 seconds.
-u
Specifies whether the Data Handler sends a notice to the
Inventory notice group when an unsolicited update of
scan data occurs. An unsolicited update is an update that
is not initiated by distributing a scan to an endpoint
remotely from another system.
win-inv01a
The label of the ManageNode where the Data Handler
object will be created. Notice that, unlike other SCS
commands, this command leaves out the managed node
specifier and just uses the name of the managed node
that Data Handler should be created on.
Chapter 4. Inventory and Software Distribution components
117
Tip: Data Handler does a great deal of processing during the Data Collection
process. Based on this fact we recommend that in large environments you
select a dedicated managed node as a Data Handler. This managed node
should have enough memory, CPU, and disk space to support the function of
a Data Handler. It is possible to move the Data Handler from one managed
node to the next by running the wmvinvdh command. The command syntax is
as follows:
wmvinvdh -t timeout_value managed_node
Where:
򐂰 -t specifies the number of seconds after which the command will wait
before it times out. If you do not specify this option the default of 120
seconds is used.
򐂰 managed_node specifies the managed node to which you want to move
the Inventory Data Handler. You must have Scalable Collection Service
installed on the managed node in order to use it as a Data Handler.
The Data Handler process has input and output threads, just like the Collector
process does. These threads can be manipulated using the wcollect -o or
wcollect -i commands. Data Handler input threads function essentially the
same way as Collector input threads. They receive CTOCs and data files.
Output threads function differently. They are used to unpack data and send it to
RIM. As described in “Scheduling collection using output threads” on page 126,
you can change Data Handler output threads to schedule data flow to the RIMs
the same way that you can change Collector threads to schedule data flow to
upstream Collectors.
Data Handler also contains queues and checkpoint files just like the Collector
process. It also has input, output, and error queues. For an explanation of
queues, queue operations, and checkpoint files please refer to “Collector
components” on page 109. The only operational difference between the Data
Handler queues and the Collector queues is the final destinations of the CTOCs.
When an error CTOC reaches the Data Handler error queue, it is sent to the
Status Collector. When a normal CTOC reaches the output queue, it is forwarded
on to RIM. The Data Handler uses the output error queue to store CTOCs that
require RIM retries.
The Data Handler process has a depot that is identical to the Collector process
depot. The Data Handler depot is located under the run-time location directory,
has an identical index file, and operates the same way. For more information on
Collector depots, refer to “Collector components” on page 109.
118
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
4.1.8 Status Collector
The SCS Status Collector is responsible for tracking the status of any Inventory
distributions that are ongoing in the TMR. The Status Collector runs as a
separate process, but is actually part of the Data Handler. The Status Collector
process runs on the same managed node as Data Handler and maintains
information for each node as to whether the inventory scan is successful,
pending, or failed.
Status is reported to the Status Collector from the Data Handler (remember that
they are actually two parts of the same object). The Data Handler process
passes a list of targets to the Status Collector process, and Status Collector
assigns the distribution a scan ID.
Note: The profile distribution ID in MDist2 is separate from the one in SCS.
MDist2 reports the results of Inventory profile distribution and scan completion
status.
SCS Status Collector reports the results of the data collection process. Use
the Status Collector result to verify whether data has been successfully
inserted into the Inventory repository.
From this point on, Status Collector lists all nodes as pending. As CTOCs from
the scans make their way to the Data Handler and are inserted into the database.
This information is passed from the Data Handler to the Status Collector. The
Status Collector process updates the endpoints’ status as either successful or
failed. In the event that a downstream Collector encounters a problem with either
the CTOC or the data file, it will add an error code to the CTOC and move it into
the error queue. The error CTOCs are also passed up to the Data Handler,
which, in turn, notifies the Status Collector. The Status Collector then updates
the endpoint’s status to failed.
The only exception to the above scenario is when an endpoint fails to send data
to the Collector process. In this instance, the endpoint will use repeater hierarchy
in reverse order to send the data to the Inventory Callback object. The Callback
object will then forward the data to the Inventory Data Handler for insertion into
the Inventory repository.
Status Collector components
Status Collector is a process that runs on the Data Handler managed node. It is
responsible for maintaining the directory called status_dir. status_dir is a
subdirectory of Data Handler’s run-time location directory. The status_dir
directory contains status information for all active inventory scans that are being
Chapter 4. Inventory and Software Distribution components
119
handled by the Data Handler process. There are two types of binary files inside
the status_dir directory. The first type is the scan ID file. This is a single file
named inv_scan_id.cfg. This file contains the last scan ID given out by the Status
Collector process. The scan ID number is incremented by one each time a collect
data enabled scan is distributed. The second type of file is the scan information
file. This file is named inv_scan_XX.cfg, where XX is the scan ID of a running
inventory scan. The Status Collector maintains one scan information file for each
running status-enabled inventory scan. The Status Collector uses the scan
information files to record the current status (pending, successful, or failed) for
each node involved in the scan. These files are deleted once the Data Handler
process reports that the scan is complete.
You can view status information for an active scan by running the wgetscanstat
command. This command contacts the Status Collector process and retrieves a
list of status-enabled inventory scans that are currently running. This is really a
formatted list of all of the scans that have scan information files in the status_dir
directory. The wgetinvstat command can be used with the -a switch to view all
information on currently running scans. Using the -p -f -s switches will show
which endpoints are pending, have failed, or were successful. This is illustrated in
Example 4-8.
Example 4-8 Output from wgetscanstat command
wgetscanstat -a -s -f -p
The following scans using the Inventory
Scan ID:
93 Profile
Scan ID:
100 Profile
Scan ID:
101 Profile
Scan ID:
102 Profile
Scan ID:
103 Profile
Scan ID:
104 Profile
Scan ID:
105 Profile
status collector are in progress:
name:
replace.SW.scan.NT.pf
name:
Custom.SIG.SW.scan.pf
name:
Initial.HW.scan.pf
name:
Initial.HW.scan.pf
name:
Initial.HW.scan.pf
name:
Initial.HW.scan.pf
name:
palm_scan.1.0
Tips: It is important to note that the status information returned by
wgetscanstat is only as good as what the Status Collector process has in its
status files. Since the Status Collector is only notified when a scan begins and
when the data is inserted into the database, everything in between will show
up as pending. The target is only successful once data has been inserted into
the repository.
4.1.9 Callback object
In the event that an endpoint cannot send scan data using the Collector
hierarchy, the endpoint will send data to the Callback object using the repeater
hierarchy. The Callback object will then forward the data directly to the Data
120
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Handler. The Data Handler unpacks and decodes the data before writing it into
the repository using one or multiple RIM objects. The Callback object collection
method serves as a backup. Figure 4-4 shows data flow in the case of Collector
failure.
Figure 4-4 Callback object data flow
Note: Callback object is only used when a failure is detected by the endpoint
and first level Collector, and not between Collectors.
Chapter 4. Inventory and Software Distribution components
121
Tip: In large environments we recommend moving the Callback object to a
different managed node than the TMR server, because in the event of a
Collector failure all scan data will be sent to the TMR server. This could easily
overwhelm the TMR server. The Callback object can be moved once created
by using the wmvinvcb command. The command syntax is as follows:
wmvinvcb -t timeout_value managed_node
Where:
򐂰 -t specifies the number of seconds after which the command will wait
before it times out. If you do not specify this option the default of 120
seconds is used.
򐂰 managed_node specifies the managed node to which you want to move
the Inventory Callback object. You must have Scalable Collection Service
installed on the managed node in order to use it as a Callback object.
Using multiple RIM objects
Starting with Inventory 4.0, Data Handler is now able to use multiple RIM objects
to place Inventory information in the Inventory database. RIM objects could be on
different managed nodes, which could increase performance.
Architecturally, each RIM object represents the termination point of a complete
data path from the Tivoli endpoint to the database. Setting the number of RIM
objects that you need depends on how many endpoints you plan to scan
simultaneously, and how much data you are collecting from each endpoint. You
should consider creating a new RIM object for the following reasons:
򐂰 To increase the number of connections to the RDBMS. The maximum number
of connections per RIM object is 16.
򐂰 To distribute the work performed by RIM objects across multiple systems. For
example, you can create RIM objects on separate managed nodes so that the
processing required by the RIM objects is divided between the two systems.
For RIM objects that the Inventory Data Handler uses, you must set the
application label and maximum number of RDBMS connections. You can set
these values using the wsetrim command. The following is the command syntax:
wsetrim [-a application_label] [-m max_connections]
Where application_label should be invdh for Data Handler.
122
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Important: The number of Data Handler output treads should match the total
number of RDBMS connections set for all RIM objects used by the Data
Handler. For example, if you have two RIM objects with five RDBMS
connections each, the recommended number of output threads for the
Inventory Data Handler is 10. (Default or out-of-the-box configuration is 5
output treads and one RIM object.)
All Data Handler RIM objects are used for inserting data into the repository.
We recommend that you use a separate RIM object for queries. The inv_query
RIM object is created by default for this function (in addition to invdh_1, which
is created for the Data Handler). Using separate RIM objects will prevent
queries from contesting with Data Handler for database access when you are
conducting inventory scans. The possibility still exists when running queries,
however, that Data Handler will have a table or row locked for inserting data
when your query tries to access it. In this case your query may return no
results, or incomplete results. For this reason you should try to schedule
database updates during off hours.
You might wonder what is the optimal number of RIM connections for a TMR.
Every RIM object consumes a certain amount of memory overhead, so it is best
to run with the fewest possible number of RIM objects per machine. Separating
RIM objects on separate RIM hosts divides the processing load, and increases
availability in case one of the RIM hosts go down. For example, if you have 10
connections to the database, the optimum setting with two machines configured
is such that each one runs a single RIM object.
Note: When forecasting how many endpoints can be scanned and the data
updated in the RIM database in a fixed period of time, the guideline for the
amount of time required (per endpoint) to collect scan data on a local area
network is two minutes on average for a full scan.
4.1.10 Managing data collection
In this section we give you guidelines for managing your data collection.
Planning considerations
Planning your Collector configuration carefully before you begin configuring your
Collectors is very a important step for creating an efficient collection data flow.
The following factors need to be taken into account when deciding on
configuration:
򐂰 WAN links’ peak hours.
Chapter 4. Inventory and Software Distribution components
123
򐂰 Repeater hierarchy.
򐂰 Anticipated scan data per gateway/Collector. Current system load for
repeaters intended to be used as Collectors.
– Disk space
– Memory
– CPU
򐂰 Data retention period per Collector.
Influences the amount of disk space required for storage of collection data.
򐂰 Data collection time slots. You should calculate the amount of time that is
available for data collection tasks. The following factors should be considered:
– Network off-peak period.
– Tivoli infrastructure availability.
– DB availability. To minimize errors ensure that the Inventory database is
available during the data insertion phase of the collection process.
Note: Ensure that database maintenance tasks that may hold locks on the
database do not conflict with the time that the Data Handler inserts data into
the repository.
Scheduling collection transmissions
The Collector process can store data for transmission at a later time. This allows
the Collector to schedule when data is transmitted over the network. This ability
can be useful in situations where endpoints need to be scanned during business
hours while machines are active, but data should not be transmitted until after
business hours. There are two methods of accomplishing this:
Offlinks
Using the wcollect command to tell a Collector to defer
collections from certain downstream Collectors
Output threads
Simulating an offlink by setting the output threads on the
downstream Collector to 0 so that it cannot send any data
Scheduling collection using offlinks method
In order to schedule collection transmissions, SCS gives you the ability to disable
the link to downstream Collectors. The wcollect command is used to manipulate
a Collector’s offlink list. When an upstream Collector receives a CTOC from a
downstream Collector, the upstream Collector will check its list of offlinks to
determine whether it should retrieve the data immediately or defer collection of
the data until later. If the downstream Collector is on the offlinks list, the upstream
Collector will move the CTOC from the input queue to the deferred queue. The
upstream Collector will not attempt to retrieve the data file from the depot of the
downstream Collector. The next time the upstream Collector process starts, it will
124
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
check the deferred queue against the offlinks list again to see if it can retrieve
data files for any of the CTOCs.
The wcollect command with the -x option sets the offlinks list. You can list the
object dispatcher IDs of the downstream Collectors to defer, separated by
commas. Always list the dispatcher numbers in numerical order. This is illustrated
in Figure 4-5.
Figure 4-5 Scheduling collection using offlinks
You can also disable a range of object IDs by using a dash. This should also be
done in numerical order. The same command is illustrated as follows:
wcollect -x “3-4” @managed node:win-inv01a
The -x option switches between the enabled and disabled connection. You may
have to first check the status of each connection before using this option. And like
most other Collector settings, you must stop and start the Collector for changes
to take effect. Example 4-9 on page 126 shows commands used to set offlinks.
Chapter 4. Inventory and Software Distribution components
125
Example 4-9 Setting offlinks example
wcollect -x “3,4” @managed node:win-inv01a
wcollect -h graceful @managed node:win-inv01a
Performed 'graceful' halt of collector: @managed node:win-inv01a.
wcollect -s @managed node:win-inv01a
Started collector: @managed node:win-inv01a.
To reset the offlinks list, specify wcollect -x with null string as the dispatcher
number. This would look as shown in Example 4-10.
Example 4-10 Resetting offlinks example
wcollect -x "" @managed node:win-inv01a
wcollect -h graceful @managed node:win-inv01a
Performed 'graceful' halt of collector: @managed node:win-inv01a.
wcollect -s @managed node:win-inv01a
Started collector: @managed node:win-inv01a.
To schedule collections simply place these commands in a script and create a
task and a job that runs the script. Schedule the job using the Tivoli Framework
Scheduler. Offlinks can only be set between Collectors.
Note: Offlinks cannot be used in the following situations:
򐂰 Between the endpoint and first Collector
򐂰 Between Data Handler and the RIM object
You can check the mcollect.log file to verify that offlinks are working. Use the
wcollect command to set the debug level to three on the Collector or Data
Handler with the offlinks list. At debug level three, the daemon process will write
a message in the mcollect.log logfile every time a CTOC is moved to the deferred
queue. The message is scheduler_offlink_test and contains the CTOC ID that
was deferred.
Scheduling collection using output threads
The second method mentioned above involves using output threads to stop
collection data from leaving the Collector. If the number of output threads is
changed to zero on the downstream Collector, it will have an effect similar to
setting an offlink on the upstream Collector. There are a few subtle differences
with this approach, however. If the number of output threads is set to zero on the
downstream Collector, it will not send CTOCs. This will cut off all collection flow
between Collectors until the number of output threads is increased. Also,
changing the number of input or output threads can be done at the Data Handler
as well as the Collector. This enables SCS to move data through the collection
126
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
hierarchy all the way to the Data Handler and hold it there. The Data Handler will
not attempt to place data in the database until you set its output threads to a
number. Using this technique, the Data Handler is prevented from attempting to
insert data into the database if the database is down for maintenance or being
heavily queried.
wcollect -o changes the number of output threads. As with setting the offlinks
list, the Collector must be restarted for this to take affect. This is illustrated in
Example 4-11.
Example 4-11 Setting output threads to zero: Collector
wcollect -o 0 @managed node:win-inv01a
wcollect -h graceful @managed node:win-inv01a
Performed 'graceful' halt of collector: @managed node:win-inv01a.
wcollect -s @managed node:win-inv01a
Started collector: @managed node:win-inv01a.
To stop data from leaving the Data Handler run the commands illustrated in
Example 4-12.
Example 4-12 Setting output threads to zero: Data Handler
wcollect -o 0 @InvDataHandler:inv_data_handler
wcollect -h graceful @InvDataHandler:inv_data_handler
Performed 'graceful' halt of collector: @InvDataHandler:inv_data_handler.
wcollect -s @InvDataHandler:inv_data_handler
Started collector: @InvDataHandler:inv_data_handler.
To re-enable collection transmissions these commands are simply reissued using
a value higher than 0 for the wcollect -o command.
As with offlinks, to schedule collections using this method, these commands
must be placed in a script, and the execution of that script must be scheduled
using the Tivoli Framework Scheduler.
Note: Remember that if this technique is being used to simulate an offlink, the
commands must be executed against the downstream Collector. If your
Collector output threads are not consistent across all Collectors you may need
to set different values when re-enabling collection.
4.1.11 Clearing the Collector
The IBM Tivoli Configuration Manager Inventory component provides an option
to cancel an inventory scan at different stages in the process. For various
Chapter 4. Inventory and Software Distribution components
127
reasons you may need to clear the collection before they reach the Inventory
repository. For example:
򐂰 If Collector’s data has become redundant
򐂰 Failure during profile distribution
The wcancelscan command cancels an active inventory scan. This command can
cancel a scan at the following points:
򐂰 During the profile distribution, before the profile reaches the endpoint
򐂰 For scans of pervasive devices at the Web Gateway component before the job
is processed
򐂰 As the data travels through the Collector hierarchy to the Inventory Data
Handler through SCS
򐂰 At the Inventory Data Handler
If scan data has been passed from the Inventory Data Handler to a RIM object,
that scan data cannot be cancelled. During a scan of multiple targets, the scan
data for each target reaches the Inventory Data Handler at different times.
Therefore, it is possible that the wcancelscan command could cancel the scan of
one target but not another. Example 4-13 demonstrates how to use this
command.
Example 4-13 wcancelscan command example
wgetscanstat
The following scans using the Inventory status collector are in progress:
Scan ID:
2
Profile name:
Initial.HW.scan.pf
wcancelscan -i 2
Starting to cancel Inventory
The cancel operation sent to
The cancel operation sent to
The cancel operation sent to
The cancel operation sent to
profile Initial.HW.scan.pf with scan ID 2.
Inventory status collector is complete.
MDistII manager is complete.
Scalable Collection Service is complete.
Inventory data handler is complete.
In Example 4-13 we used two commands. The first command, wgetscanstat,
gives us the list of all active scans. And wcancelscan with the -i option tells the
scan ID to cancel the scan. To cancel all active scans use the -a option.
Note: Using the wcancelscan command does not stop the endpoint from
completing the scan and data from flowing back to the Data Handler. The scan
data is discarded when it reaches the Data Handler.
128
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
4.1.12 Inventory collection scenarios
It is important to be able to identify exactly what information a Tivoli inventory
scan collects. Consider the following points about a Tivoli inventory scan:
򐂰 It is built to gather a specific set of inventory information.
򐂰 By default the inventory scan can collect data from a list of parameters.
򐂰 If additional installed inventory needs to be verified, a custom scan can be
configured using scripts to create the MIF file.
򐂰 An inventory scan can be modified to gather more or less information.
򐂰 A customer should review what can be gathered and select the pertinent
parameters.
򐂰 It should scan only for information that is pertinent to the customer’s situation
For example, if the customer does not care about the type of keyboard or mouse
on the systems, do not waste processing time and network bandwidth gathering
that information.
Note: Selecting only pertinent parameters will speed up scans, and save
processing and network bandwidth when retrieving data (thereby not retrieving
unwanted data).
Now, let us walk through a typical Tivoli Inventory profile distribution scenario
using the Tivoli Desktop.
First you need to create a inventory profile (InventoryConfig). You create an
inventory profile in a profile manager. Use profile managers to organize your
profiles into logical groups. You can either create an inventory profile in an
existing profile manager or create a new profile manager. For example, if you
want to use profile managers to organize Tivoli profiles according to function,
create a new profile manager named Inventory Profiles for all the inventory
profiles in a policy region. On the other hand, if you have profile managers that
organize targets according to operating system, you could create an inventory
profile in each profile manager. Each profile could include a script or executable
and scan instructions that are specific to the operating system of the systems in
the profile manager.
1. From the profile manager select Create → Profile (Figure 4-6 on page 130).
Note that you must have set InventoryConfig as a managed resource type for
the policy region in which the profile manager resides.
Chapter 4. Inventory and Software Distribution components
129
Figure 4-6 Inventory profile
2. Next, you need to configure the profile (Figure 4-7 on page 132).
The Global Properties window is used to set the distribution and data options for
the entire Inventory Profile. These options apply globally to all scans that this
profile distributes (that is, PC hardware, software, and custom scans, as well as
UNIX hardware, software, and custom scans).
In this window you can enter:
򐂰 Profile Name: Name of the current Inventory Profile.
򐂰 Distribution Options: What actions occur when you distribute a profile.
– Distribute configuration file and run scan: (Default) Distributes the
configuration file to the target endpoint, and then runs the scan on the
endpoint. Choose this option when you want to scan the endpoint
immediately.
– Distribute configuration file: Distributes the profile configuration file only,
does not run the scan on the endpoint.
130
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 Data Options: These options specify how the inventory data gathered by this
profile is stored in the configuration repository:
– Update with differences: (Default) Compares MIF files created during the
current distribution with those from the previous distribution and saves the
differences. Only data that has been added or changed since the last scan
is transmitted and stored in the configuration repository.
Data from previous scans that is not present in the current scan is deleted
from the configuration repository. No record of changes is kept unless
history tables are used. Select this option to reduce the amount of
information that is sent to the configuration repository.
– Replace with current results: Replaces existing data in the configuration
repository with the data gathered by this scan.
In the Global Properties Signatures window you specify the software signatures
stored in the configuration repository.
Note: Software signature is the set of unique information that identifies a
software application, such as the name, version, and file size of an application.
Inventory uses software signatures to determine which software packages are
installed on the machines you scan. When you run a software signature scan
on an endpoint, Tivoli Inventory distributes the software signatures to the
endpoint, and then compares each file on the endpoint to the list of software
signatures. When a file matches, the software signature data for that file is
sent to the configuration repository. Because only data for matching files is
sent, this scan returns less data to the configuration repository than scans for
basic file information or header information.
Similarly, a signature package is a logical grouping of two or more signatures.
During the Tivoli Inventory installation, over 19-K signatures are loaded into the
database. From this window, you can edit or display software signatures.
Finally the Global Properties Custom Filter window is used to view/edit the list of
entries in the custom filter stored in the configuration repository.
Chapter 4. Inventory and Software Distribution components
131
Figure 4-7 Configuring the Inventory profile
The next step is to customize what to scan. You can gather three sets of
information with Tivoli Inventory:
򐂰 Hardware scan: Collect data from a list of parameters.
򐂰 Software scan: Collect data from a list of parameters.
򐂰 Custom scan: Additional script to find other hardware/software.
There are different customization windows for PCs and UNIX and OS/400®. You
can also scan pervasive devices.
For both UNIC and PC software scans you have the Scan for File Information.
Here you can specify which directories and files will be included in the scan. You
also specify whether to use signature matching for installed products, use the
header information (for PCs only), or scan files for basic information.
For PCs, an alternative way to scan for file information is to use “Scan Registry
for Product Information” option. This initiates a scanner on the target endpoint.
This registry scanner will scan the registry of the MS Windows platforms for
information on installed products.
132
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
On UNIX, there is no registry scan option, but you can use Scan Operating
System for Product Information, which uses UNIX OS-specific commands to
gather product and patch information.
Note: Unlike hardware scans, software scans generally cannot be conducted
on both PC and UNIX computers with one profile. There are too many
differences between OS types in terms of directory structure, file naming
conventions, case sensitivity, and executable file distinction methods.
Separate profiles should therefore be created for them and housed in separate
Profile Managers whose targets are PC or UNIX, as appropriate.
All of your selections are reflected in the Summary of Profile Configuration
Settings window.
In the Distribution Options you can select the priority of the distribution and then
after selecting the targets, you distribute the profile (Figure 4-8 on page 134).
You need to have admin, senior, super, or the inventory_scan role to be able to
distribute Inventory profiles.
Note: The Tivoli Inventory profile utilizes the services of the Tivoli Framework
and specifically the MDist2 functionality for distributions. The main feature that
can be seen of MDist2 is the priority level selection presented to the user.
These priority levels will allow higher priority distributions to be transferred to
the targets first, and lower priority distributions (such as a full software
package install) would be delayed slightly as the higher priority distribution is
allowed access to the target.
Chapter 4. Inventory and Software Distribution components
133
Select the Priority
Select the targets
Figure 4-8 Profile distribution from the Desktop
Note: If you want to distribute an inventory profile to a number of endpoints,
but you want the distribution to fail for endpoints that have not received the
profile before a certain time, you can use the Advanced Options → Timeout
Settings from the upper-right part of the menu on the distribution dialog.
If you are using the command line (wdistinv command), you can use the
deadline parameter of this command.
You can configure Inventory to send information about events and errors that
result from an inventory profile distribution to which the following locations:
򐂰 Log file
򐂰 Inventory notice group
򐂰 Tivoli Enterprise Console
134
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
4.1.13 Custom scans
If none of the Tivoli-provided hardware scan methods gather the correct
information, an additional option is available. The custom hardware scan will
scan systems using a script written by the Tivoli Administrator to create a MIF
file. It will run after other scans complete before MIF files are read.
This script is OS specific for each target type. Use the following formats for each
operating system:
򐂰
򐂰
򐂰
򐂰
Shell - UNIX targets
BAT file - Windows targets
CMD - OS/2 targets
Scripts are not supported on NetWare
When distributing the profile to the target, the corresponding script will be run
depending on the target type (UNIX or PC). Note again that the script will need to
be written in a manner to run on each particular OS within these groups.
For example, the UNIX script must be written to run on Solaris, AIX, HP-UX, etc.,
for each target's supported platform to which the profile is distributed. Therefore
the script must check interpreter type and perform commands specific for that
interpreter type (use a case/switch statement).
Another example for the PC platform: The scripts must written for each target OS
(Windows 9x, NT, OS/2, etc.).
To maintain simplicity, multiple profiles (performing the same function) may be
used to cover each of the target platforms (custom scan script for each OS
interpreter). This can reduce the complexity of the scripts, and troubleshooting
problems when they occur.
Once you create the scan program to collect and write data to a custom MIF file,
you should do the following before you can use inventory to collect this data:
1. Set an inventory profile to read the custom MIF file during a profile
distribution.
2. Create tables in the configuration repository database to store the custom
information collected.
Tip: If you have added some custom tables to hold data from custom MIF files
and want data from these tables to be deleted whenever the data from the
relevant endpoints are deleted from the standard tables, add the custom
tables to the INVENTORY_TABLES table.
Chapter 4. Inventory and Software Distribution components
135
4.1.14 Isolated scans
An isolated scan is a scan of a system that is not in your Tivoli region. You can
use the wepscan, winviso, and wloadiso commands to run isolated scans. You
can also use an isolated scan method to scan unreachable and disconnected
endpoints. The system could even be disconnected from the network. You can
run isolated scans on supported Windows and UNIX systems except Linux for
S/390®.
Using the winviso command, you can copy to an endpoint all of the files
necessary to scan a disconnected system (libraries, executables, signatures, and
so on). You can then copy files from the endpoint to the disconnected system and
run an isolated scan on the disconnected system using the wepscan command.
This creates a .DAT file that contains the scan data. This .DAT file is created in
the $LCFROOT/inv/ISOLATED/depot directory. You must manually move the
.DAT file from the disconnected system to the endpoint. You can then run the
wloadiso command on the endpoint to send the scan data to the configuration
repository.
4.1.15 Querying inventory data
The Tivoli Management Framework query facility enables you to create SQL
statements to retrieve information gathered from inventory profile distributions.
The query feature consists of query libraries and queries. Query libraries reside
in policy regions and are created to contain queries. Each query is designed to
retrieve a specific set of information from a specific view or table in the
configuration repository. There are several pre-defined queries provided with
Configuration Manager. You can also create your own queries.
Inventory provides three sets of queries that access scan results in the
configuration repository:
򐂰 The inventory queries retrieve different sets of hardware and software
information from the configuration repository. For example, the
INVENTORY_HWARE query returns basic hardware information about all
machines.
򐂰 The pervasive queries retrieve different sets of hardware and software
information about pervasive devices from the configuration repository. For
example, PALM_CFG_QUERY returns configuration information for all Palm
OS devices.
򐂰 The subscription queries that are provided with Inventory return lists of
machines that meet the specifications of the query. For example, the
AIX_SUBSCRIPTION query returns a list of machines that have an AIX
operating system.
136
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
The query libraries and queries that are provided with Inventory are created
during the installation process.
Creating a query
When you create a query, you must specify the following on the Create Query
dialog (Figure 4-9 on page 138):
򐂰 Query Name: Name that is unique in the TMR
򐂰 Repository: Determines which tables and views you can use for the query
򐂰 Table/View Name: Table or view that you select determines which columns
you can use for the query
򐂰 Chosen Columns: Within the table or view that are to be retrieved
You can also specify one or more clauses for the query in the following ways:
򐂰 Where Clause section: To construct a SQL search clause that specifies which
information the query will return
򐂰 Additional Clauses section: To enter complete SQL clauses
In order to create a query you need to have admin, senior, or super authority in
the policy region in which the query is created. Similarly, to run a query you need
to have senior, super, Query_execute, or Query_edit authority.
Chapter 4. Inventory and Software Distribution components
137
Name must be unique in TMR
Select view or table name
Select columns to be returned
Selection criteria
• Used to limit results
• If no limit, will return all data
for given view/table and
columns
Figure 4-9 Creating a query
It is also possible to use the command line. Use the following commands:
򐂰 wcrtqlib to create a query library
򐂰 wcrtquery to create a query
򐂰 wsetquery to change a query
4.2 Software Distribution component
The number of network-based Microsoft Windows workstations has increased
tremendously over the past 10 years. With new client/server technologies,
operating systems and application programs have become larger and much
more complex. The process of installing and maintaining these new types of
systems has become tedious and time-consuming. End users cannot be
expected to be involved in this process, yet it is not cost-effective for an
enterprise to have skilled system management personnel to carry out all
installations. Another trend that is significantly changing software distribution is
138
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
mobile users. These users are no longer permanently connected to a network
and therefore pose some challenges for distribution of software.
Today’s software distribution issues are:
򐂰 High number of machines with different configurations and operating systems
򐂰 Systems located remotely
– Mobile users
– Limited resources (for example, bandwidth)
– Complex applications
Tivoli Software Distribution provides a centralized software management system
with which administrators can install and configure new applications, update
existing software with newer versions, and synchronize software on distributed
systems. The ultimate goal is to eliminate all human intervention at the target
workstation.
4.2.1 Components of Tivoli Software Distribution
The Software Distribution component comprises the following main elements:
򐂰
򐂰
򐂰
򐂰
򐂰
Software package
Source host
Software Package Editor
Pristine Tool
Web Interface plug-in
In the following sections you will find more details about these components.
Software package
A software package is defined as a file that contains a collection of objects and
actions to be performed on a target machine. This file is prepared prior to
distribution time. Actions in a software package fall into three separate
categories:
򐂰 Adding and removing objects: This category involves actions that add or
remove something from the target system. Examples include adding and
removing:
–
–
–
–
Files
Services
Registry keys
Device objects
򐂰 System actions: Several system actions are currently available for inclusion in
software packages. These include:
– Checking for disk space
Chapter 4. Inventory and Software Distribution components
139
– Restarting the target system
– Setting OS400 system values
– Inventory signature
򐂰 Program actions: This category includes the execution of a variety of types of
programs. A user-defined program may be executed on a target as well as
certain platform-specific executables such as:
–
–
–
–
–
–
InstallShield programs
Microsoft setup programs
IBM configuration, installation, and distribution (CID)
Solaris: Install Solaris package (Pkgadd and Patchadd)
Install AIX package (installp)
Install LINUX package (RPM)
Source host
This is the system on which software package definitions are stored. Any
machine in a Tivoli environment can be a source host, provided Tivoli
Management Framework and the Software Distribution component are installed.
Important: Any managed node that is not an OS/2 or NetWare managed
node can be used as a source host.
Software Package Editor
This is a Java-based graphical interface for creating and customizing software
packages. You can use the Software Package Editor to:
򐂰 Create a new software package.
򐂰 Modify an existing software package to create a new one.
򐂰 Generate a software package automatically using differencing technologies
(Autopack).
򐂰 Create a software package containing one of the following third-party native
installation packages:
–
–
–
–
–
–
–
Microsoft Systems Management Server package definition file
Microsoft Software Installer file
AIX package
Solaris Operating Environment package
Linux package
InstallShield
Configuration, installation, and distribution programs
You also use the Software Package Editor to arrange actions contained in the
software package in the order in which they are to be performed on the target
system.
140
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
There are two versions of the Software Package Editor:
򐂰 Tivoli Software Distribution Endpoint Package Editor
This version is installed on endpoints on which software packages will be
created and tested. All functionality is available with this version. A software
package file can be saved into any of the three formats using this editor. This
is also called the Java Endpoint Package Editor.
Note: For OS/400 Java Endpoint Package Editor is supported as a
preparation site only.
򐂰 Tivoli Software Distribution Package Editor
This version is installed on managed nodes and is primarily used for editing
existing software packages. Software package blocks cannot be created or
edited with this version. In addition, some functionality is not available with the
Software Package Editor installed on managed nodes. Certain tools to
automate the creation of software packages (AutoPack) and to make using
third-party software easier are not available with this editor.
Figure 4-10 shows the Tivoli Software Distribution Endpoint Package Editor.
Figure 4-10 Software Package Editor
Chapter 4. Inventory and Software Distribution components
141
Pristine Tool
This is a tool for creating a repository and storing diskette images for installing an
operating system remotely on a clean machine. The advantages of using the
Pristine Tool are:
򐂰 Preparation and installation can be performed at different times.
򐂰 Installation can be performed almost completely unattended.
򐂰 Synchronizing reference models can be performed automatically.
Web Interface plug-in
This is software that enables software distribution, change management, and
inventory operations to be performed across firewalls using the Web Interface
service.
4.2.2 Software distribution process overview
The four phases of the software distribution process are the following
(Figure 4-11):
򐂰
򐂰
򐂰
򐂰
Preparation and testing
Planning and administration
Delivery of necessary files
Software distribution operations are performed on the targets
Planning &
Administration
Tivoli Server
SD PrepSite
SD Server
Managed Node
Gateway
Delivery
Execution of
Software
Distribution
Operations
TMA
SD Source Host
Repeater
TMA
TMA
TMA
Figure 4-11 Four phases of software distribution process
We will cover these pahses in detail in the following sections.
142
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Preparation
&
Testing
Preparation and testing
Prior to distribution, a software package should be created and tested on a
system similar to the eventual target machines. The Software Package Editor is
Software Distribution's software packaging facility for creating and customizing
software packages. The Software Package Editor window displays a graphical
tree view of the software package and its contents.
The method of launching the Software Package Editor differs, depending on
whether it is launch from an endpoint or a managed node. For more detail, see
the User’s Guide for Tivoli Software Distribution, SC23-4711.
Notes: See the following notes:
򐂰 Before launching the Software Package Editor on a UNIX system, enable
host access to the X server by entering the xhost + command.
򐂰 Performance of the Software Package Editor can be degraded if remote
drives that were not accessible when the Software Package Editor was
launched have been mapped to the machine.
򐂰 In order to be able to create software packages, the absolute minimum
roles are user role in the TMR and super role in the policy region that the
packages are created.
򐂰 In order to create, clone, or delete the software package profiles, the
required role that a Tivoli administrator must have is admin, senior, or
super.
Different software package file types
There are three types of software package files:
򐂰 Software package block file (extension .spb)
–
–
–
–
Zipped file with all source files necessary for distribution included.
Contains files and commands.
Any zip software can be used to view its contents (for example, Winzip).
No need to collect files from the source host.
See Figure 4-12 on page 144.
Chapter 4. Inventory and Software Distribution components
143
SPB file
SP file
File_1
File_2
File_n
Figure 4-12 Software package block file
Note: Tivoli Software Distribution 3.6 and earlier versions used a file
package instead of the software package format. To migrate a file package
to a software package object, you must use the wfptosp command.
Similarly, a Tivoli Software Distribution V3.6 file package object can be
converted with the wfptosp command to a software package definition file.
Migration of file package blocks and Autopack are the same as the file
package definition file with the exception that no source files are required
since these formats contain source files. File package block to a software
package block migration must be done on the same platform on which it
was created. For example, if a file package was created on a Windows NT
platform, it must be migrated on a Windows NT TMR.
򐂰 Software package definition file (extension .spd)
– A text file that describes a software package.
– Contains a list of actions to be executed on the target.
– Can be updated with a text editor in place of using the Software Package
Editor.
– Can be manipulated with scripts.
– Files are collected from the source host at distribution time.
144
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
See Figure 4-13.
IBM Software Group | Tivoli software
The SPD File (cont.)
"TIVOLI Software Package v4.2.1 - SPDF"
package
name = "othello"
title = "Othello application"
version = "1.0"
web_view_mode = "hidden"
Signature of SPD
add win_registry_key
Add object
parent_key = "HKEY_LOCAL_MACHINE\SOFTWARE"
key = "OTHELLO"
add = y
override_permissions = n
Attribute value pair
…
end
end
26
Soft Bundle Technical Sales Training
© 2004 IBM Corporation
Figure 4-13 Software package definition file
򐂰 Software package file (extension: .sp)
– Internal binary version of the software package .
– Files are collected from the source host at distribution.
See Figure 4-14 on page 146.
Chapter 4. Inventory and Software Distribution components
145
SP file
Source Host
File_1
File_2
...
File_n
Figure 4-14 Software package file
The three different software package formats can be easily converted from one
format to another, as shown in Figure 4-15 on page 147.
The wconvspo command enables you to convert SPBs to SPs and vice versa. The
wimspo and wexpspo commands enable the conversion from SP to SPD and vice
versa, and from SPD to SPB and vice versa.
Creating a software package in built format ensures that the data in the software
package remain static between distributions at different times.
146
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
wexpspo/wimpspo
Build SPB from SPD
SPD
SPB
Export SPB to SPD
Cr
ea
te
Ex
po
rt
SP
fro
m
SP
to
S
wexpspo/wimpspo
SP
D
PD
SP
il
Bu
P
dS
ro m
Bf
po
Ex
SP
o
Bt
P
rt S
SP
wconvspo
Figure 4-15 Converting software packages from one format to another
Versioning
You can define a software package as versionable and specify whether it is a
refresh package or a patch.
Refreshes are not installed if a later version of the package is already installed.
Patches are not installed unless the version to which the patch applies is already
installed.
The default policy of Tivoli Software Distribution allows the following naming
format for software packages:
򐂰 sp_name^version, for example:
– office^1.0.0
– notes^1.2a
򐂰 sp_name.version, for example:
– office.1.0.0
– notes.1.2a
Software package name and version numbers are separated by a karat (^)
symbol or a dot (.). Version numbers, on the other hand, should be separated by
dots (Figure 4-16 on page 148).
Chapter 4. Inventory and Software Distribution components
147
Figure 4-16 Versioning
Dependencies
With software and hardware dependencies, you ensure that the package is
installed only if the necessary prerequisites are satisfied. You can define an
expression that makes the installation or removal of a software package
dependent on meeting hardware and software prerequisites. Figure 4-17 on
page 149 shows how you define the dependencies.
148
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 4-17 Dependencies
Variables
Variables can be used to express any attribute value of type string contained in
the software package, making a software package more generic for use on
different target systems. For example, it is not necessary to create several
software packages for different platforms. You can substitute the platform-specific
information with variables and use the same software package for distribution to
multi-platform networks.
Conditions
You set conditions on the actions contained in a software package or on the
entire software package. Using conditions, you define the circumstances under
which an action is executed. For example, you can specify which actions are to
be executed on Windows NT with Service Pack 5 target systems and which are
to be executed only on Windows NT with Service Pack 6 targets.
Valid operators are:
򐂰 Comparison operators: >, >=, <, <=, ==, !=
򐂰 Boolean operators: NOT, OR, AND
Chapter 4. Inventory and Software Distribution components
149
򐂰 Others: LIKE, CONTAINS
Disconnected command line
Before a software package is distributed, it should be tested. On preparation
machines on which the Tivoli Software Distribution Java Endpoint Package Editor
is installed, an administrator can use special disconnected commands to test any
operation Tivoli Software Distribution would perform on an endpoint. The testing
phase can also include testing in a practice TMR.
The Software Package Editor provides a set of disconnected commands
(Figure 4-18) that can be used to test the software package on the preparation
machine.
w d crtsp
C reate a n S P B file from an S P D file
w d u bldsp
E xp ort a n S P B file into S P D file
w d lssp
List contents of the local catalog
w d instsp
Install an S P B
w d rm vsp
R em ove an S P
w d cm m tsp
C om m it an S P
w d u ndosp
U ndo an S P In stall/R em ove
w d acptsp
A ccept an u ndo able In stall/R em ove
w d versp
V erify th e state of an S P
w d instsp
R un A uto P ack snapshots/diffe rences
w d setsps
R ecord ap plications not installed w ith
SD
Figure 4-18 Disconnected commands
Autopack
Many actions can happen during the installation of an application. Registry keys
may be added to a Windows system or a symbolic link might be added to a UNIX
system. Determining what actions take place when an application is installed can
be a difficult process. The autopack tool can automatically create a software
package for any application installed on a Windows 98, Windows NT, OS/2 3.x,
or UNIX platform.
Below is a summary of Autopack functions:
򐂰 A tool to automate the creation of software packages.
򐂰 Detects file and system changes made by the installation of an application
150
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 Can be accessed from the Software Package Editor on an endpoint or
command line
򐂰 Is not accessible from the Software Package Editor on a managed node
Planning and administration
Prior to delivery, some planning and administration tasks must be completed.
Profile managers, subscribers, and software distribution profiles must be created
and organized.
The software package created in the preparation and testing phase must be
imported into the Tivoli Management environment.
Plan and administer software distribution activities by:
1. Adding the software package profile to the managed resources of the policy
region
2. Creating software package profiles in the context of a profile manager
3. Importing a software package into a software package profile
4. Managing subscribers
5. Distributing the software package (change management operations)
Software package profile
The software package profile is created within a profile manager. Profile
managers act as containers for profiles and link the profiles to a set of resources
called subscribers. Tivoli supports software packages only in the context of
profile managers. Therefore, all tasks must be performed that involve setting up
profiles in a profile manager. This step is not necessary if the software package
was originally created or edited in the context of a Tivoli software package profile
using the Software Package Editor on a managed node.
States of a software package profile
As shown in Figure 4-19 on page 152, there are three states of a software
package profile: Empty, built, and not-built. The figure also shows the
corresponding icons that you will see in the Tivoli Desktop for each profile state
type.
Chapter 4. Inventory and Software Distribution components
151
§ Empty
A software package object just created
§ Built
A software package object built during the import
§ Not Built
A software package object not built during the import
Will be built at the time of distribution
§ The task of associating an SPD, SP, or SPB file with a software
package profile is called Import (wimpspo).
Figure 4-19 States of a software package profile
Note: When importing a software package file or software package definition
file into a software package object, the administrator can choose to build the
software package immediately or leave it not built. The advantages of creating
a software package in the not-built format are:
򐂰 You can revise the software package until the moment of distribution.
򐂰 It occupies a smaller amount of disk space.
If you use the non-built format, you need to take into consideration that data
may change on the source host, so subscribers may receive different data at a
different time. Software packages should always be imported into the built
state if you want to use the deporting functionality.
Delivery
After the planning and administration tasks have been completed, the delivery of
the necessary files begins.
The delivery step is performed by MDist 2. The steps of the software distribution
delivery phase are illustrated in Figure 4-20 on page 153.
152
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Tivoli
Server
1. Software distribution
request submitted
Tivoli Desktop
5. Return a
distribution ID
2. Route the request
to the source host
Standalone
Repeater
4. Return a
distribution ID
Source Host
3. Source host initiates the
distribution
Gateway/Repeater
6. Files
distributed to
endpoints
Endpoints
Gateway/Repeater
MDist 2
Endpoints
Figure 4-20 Steps of the software distribution delivery
The Software Distribution process uses the Framework’s MDist 2 service to
deliver the files to the endpoint target:
1. An administrator submits a request to the Tivoli management region server
from the Tivoli Desktop.
2. The Tivoli management region server routes the request to the appropriate
source host.
3. The source host begins the distribution process.
4. The source host returns a distribution identification number to the Tivoli
management region server.
5. The Tivoli management region forwards the distribution identification number
back to the administrator’s Tivoli desktop.
6. Files are distributed down to the endpoints.
The components in the figure are:
򐂰 Source host: A system that holds all the files referenced by software packages
in the not-built state. Software packages already in the built state (software
package blocks) will also reside on this system.
򐂰 Repeater : Receives a single copy of data and fans out the distribution to the
next tier of clients. In Tivoli Software Distribution, endpoint gateways are
automatically repeaters.
Chapter 4. Inventory and Software Distribution components
153
򐂰 Standalone repeater : A repeater that is not also a gateway.
Perform software distribution operations
The final phase of the software distribution process is the software distribution
operations performed on the endpoints (Figure 4-21).
Tivoli Software Distribution change management operations that you can perform
on software package objects are shown in Figure 4-21.
Figure 4-21 Software distribution operations
These operations fully automate distributing, installing, and maintaining software,
and are as follows:
򐂰 Install: The install operation performs the actions contained in the software
package. The actions executed by the install operation depend on the nature
of the action. For example, while the install operation of the Add file action
copies a file to the target file system, the install operation of the remove
154
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
registry key action removes a registry key from the target system Windows
registry.
򐂰 Remove: The remove operation reverses object-related actions that add
something. If a software package adds a file or registry key, the remove
operation will remove that file or registry key. Conversely, if the software
package has an action that removes a file, nothing will happen to replace that
file during the remove operation. Actions to be performed during a remove
action can be specified for program actions within the software package.
򐂰 Undo: Performing a remove operation does not necessarily return the system
to its previous state. For this reason, an undo operation is recommended
where system files are involved in distributions. Executing an install operation
in undoable mode creates a backup of everything necessary to return the
system back to its previous state. An undo operation cannot be executed for
an installed software package if it was not installed in undoable mode in the
first place. An administrator can determine if an installation was performed in
undoable mode by checking the state of the software package on the target.
Note: The machine must have adequate space to create the backup;
otherwise the installation will not occur.
򐂰 Accept: The accept operation discards the resources needed to undo the
previous operation (backup copy). The accept operation, which frees up
system resources, should be performed only when you are certain that you
will not need to undo the previous operation. After running an accept
operation, the previous operation is no longer undoable.
򐂰 Commit: An install or remove operation can be submitted in transactional
mode. In this case the operation is performed in two phases: The preparation
phase and the commit phase. During the preparation phase, each action in
the package prepares the conditions for the successful execution of the
requested operation, which reduces the risk of failure during the commit
phase. The commit operation causes all the updates established in the
preparation phase to take effect.
򐂰 Verify: The verify operation verifies the consistency of the software package
and the object on the target system. If the verify operation fails, the software
package is placed in an error state.
򐂰 Load: The load operation loads the software packages on a repeater depot
for subsequent distribution. This operation is valid for only built software
packages.
Chapter 4. Inventory and Software Distribution components
155
Note: A depot is a directory on the repeater that enables you to temporarily
or permanently store data segments associated with distributions on the
repeater. Every distribution flowing through a repeater is stored at least
temporarily in the depot. The location of the depot parent directory is set by
the rpt_dir repeater parameter. Use wmdist to view and set the parent
directory of the depot.
As mentioned, the load operation loads the software packages on a
repeater depot for subsequent distribution. You can also use the command
line for this purpose. The command to use is wldsp.
򐂰 Unload: The unload operation removes software packages from a repeater
depot. This operation is valid for only built software packages.
The software package state that results after an operation may vary based on the
history of the package, that is, depending on what operations, such as install,
have been previously performed on it. The state is represented by a
five-character string. The overall state of a software package is represented by
five letters (Figure 4-22 on page 157):
򐂰 *---- indicates the last operation that was performed on the software package,
either I (install) or R (remove).
򐂰 -*--- indicates the state of the software package, either P (prepared) or C
(committed).
򐂰 --*-- The undo state. The undo state can be one of three letters: P (prepared),
U (undoable), or R (restored).
򐂰 ---*- A B indicates a reboot was requested. A dash (-) indicates a reboot was
not requested. A D indicates that the software package was discovered using
the wdsetsps. An H means the software package is hidden because a newer
version of the software is installed in undoable mode.
򐂰 ----* An E indicates the software package is in error and might not work
properly. A C indicates that the state of the software package is changing.
156
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
States of a Software Package
Operation State
Undo state Reboot/Disc/Hidden
Flag
Install
Prepared
Prepared
Changing
Remove
Committed Undoable
Restored
-
IC--ICU-IP-BC
RCU-IC--E
IC-D-
ReBoot requested
D package was
discovered using
wdsetsps
H Hidden, following an
undoable install of a
newer version
In Error
-
An install has been committed.
An install has been committed and can be undone.
An install has been prepared and it will be committed
during the next reboot.
A remove has been committed, but it can be undone.
An install has been committed, but the software package is in error.
The software package was discovered by Inventory.
Figure 4-22 States of a software package
Install options
There are a number of install options when installing a software package and
software package blocks (see Figure 4-23).
Figure 4-23 Installation window for a software package block (left) and a software package (right)
Chapter 4. Inventory and Software Distribution components
157
Figure 4-23 on page 157 shows the installation window (when installing from the
Tivoli Desktop) for a software package block (left) and a software package (right).
Some of the important installation options are below:
򐂰 Delta Install: Creates a software package that contains only the delta
between the base software package and the software package to be installed.
By creating and distributing a delta software package, network traffic is
reduced.
򐂰 Label: Label of the distribution (can be seen from the wmdist -l command or
MDist GUI).
򐂰 Source: Distributes only source host files that have been modified since last
distribution time. This applies only to not-built software packages and to target
machines where the software package has already been installed and
committed.
򐂰 Repair : A distribution at some point may become damaged on the endpoint.
The distribution may have never successfully completed. Or the distribution
was originally successful but files were modified, deleted, or corrupted since
the distribution. A repair distribution is a distribution that includes only the files
necessary to repair the endpoint. The software package is built specifically for
the distribution. Since this is the case, only not-built software package objects
can be used to repair a damaged distribution.
򐂰 From Fileserver/CD: Rather than installing from the source host or from a
depot, a software package can be installed from a file server or from a CD.
The file server must not be a managed node.
First, a distribution image must be created using the wdepot command, which
can then be transferred to a file server or onto a CD.
Note: Installing from file server or CD options is useful if the endpoints are
at the end of a slow link. Using these options, you can separate the data
from the distribution itself and load the data on a dedicated file server or
CD located in the same location as the target endpoints.
򐂰 From Depot: Sends the software package from the depot.
򐂰 Disposable: Removes the software package block from the repeater depots
after the distribution is complete. This saves disk space on the repeaters and
reduces the need for you to manage the depot contents.
򐂰 Advanced Options: Sets the timeout setting or the notification settings of a
software package.
򐂰 Installing from a file server.
158
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
4.3 Data Moving
The Data Moving Service is a service that was introduced in Software
Distribution V4.1. The Data Moving Service enables the sending, retrieving, and
deleting of files from target systems.
Note: The Data Moving Service is supported on endpoints and users, but is
not supported on devices.
All data moving operations use the same software package object,
DataMovingRequests.1. This object contains certain standard information to be
used by all data moving operations, including logging options. If this object is not
available, no data moving operation can be performed from the CLI or the Activity
Planner. This object is normally created automatically, in the DataMovingProfile
profile manager within the default policy region, when you install Software
Distribution. However, you can create the object later by running the data moving
command, wspmvdata. This command has two options:
򐂰 -A: This creates the DataMovingRequests.1 object in a profile manager that
belongs to a region having SoftwarePackage as the managed resource.
򐂰 -p <profile manager>: This creates a DataMovingRequests.1 object in the
specified profile manager.
The Data Moving Service supports the following scenarios:
򐂰 Sending a file held in a central location to multiple destinations
򐂰 Retrieving a specific file from a series of locations and consolidating the
retrieved files in a single, central location
򐂰 Deleting a specific file from a series of locations
򐂰 Moving a set of files from one endpoint to a number of endpoints
So in essence, the following change management operations are available when
you use the data moving functions of software distribution: Send, delete, and
retrieve.
4.3.1 Using the Data Moving Service
To perform a Data Moving operation from the GUI, perform the following steps:
1. Open the DataMovingProfile in your policy region.
2. Right-click the DataMovingRequests.1 object to display a pop-up menu
(Figure 4-25 on page 160).
Chapter 4. Inventory and Software Distribution components
159
Figure 4-24 Data Moving Service dialog box
3. Let us assume we want to perform a send operation. Select the Send menu
item. The Data Moving Service Send Operation dialog is displayed
(Figure 4-24).
Figure 4-25 Data Moving dialog box
4. Fill in the dialog as appropriate and click Send to finish the operation.
160
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Note: These options are also available if you want to use the command line,
instead of the GUI. The command to use is wspmvdata.
4.4 Enterprise Data Warehouse integration
The Tivoli Enterprise Data Warehouse is included with IBM Tivoli Configuration
Manager V4.2. With Tivoli Data Warehouse, you can analyze historical trends
from various Tivoli and customer applications. The Tivoli Data Warehouse
infrastructure enables a set of extract, transform, and load (ETL) utilities to
extract and move data from Tivoli application data stores to a central repository.
Tivoli Configuration Manager loads a subset of its software distribution and
inventory data into the Tivoli Enterprise Data Warehouse. The following reports
will be provided with Tivoli Configuration Manager:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
Failed software distribution operations by package
Success rate for distribution operations by package
Software packages in a failure to verify status
Failed distribution operation by workstation
Distribution failures related to package size
Failed operations history by distribution ID
Software distribution operation results by subscriber
Software distribution operation results by network address.
The Tivoli Data Warehouse V 1.2 comes supplied with Crystal Enterprise
Professional Version 9 for Tivoli (limited use version) to analyze and deliver
out-of-the-box reports from the Tivoli Data Warehouse into the hands of
decision-makers using a Web browser.
Tivoli Data Warehouse provides the following report interfaces:
򐂰 Summary
򐂰 Health Check
򐂰 Extreme Case
In order to integrate IBM Tivoli Configuration Manager V4.2 with the Tivoli
Enterprise Data Warehouse you need to install the IBM Tivoli Configuration
Manager Warehouse Pack using the Warehouse Install program. The
recommended way for this is to select Application Installation Only in the Setup
Type window during the installation of the Tivoli Enterprise Data Warehouse.
Chapter 4. Inventory and Software Distribution components
161
162
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
5
Chapter 5.
Deployment Services
This chapter provides an overview of IBM Tivoli Configuration Manager 4.2
Deployment Services.
The following topics will be covered in this chapter:
򐂰
򐂰
򐂰
򐂰
“Activity Planner” on page 164
“Change Manager” on page 176
“Enterprise Directory integration” on page 183
“Resource Manager and pervasive devices” on page 191
© Copyright IBM Corp. 2004. All rights reserved.
163
5.1 Activity Planner
The Activity Planner is an IBM Tivoli Configuration Manager feature that enables
you to define a group of activities in an activity plan, submit the plan to be
executed, and monitor the execution of the plan.
Activities are single operations that are performed on a set of targets at specified
times. These can include Software Distribution operations, inventory scans, and
Framework Task Library tasks.
Activities contained in a plan can have dependencies associated with them that
define the circumstances under which the activity should be executed. The
execution of the operation defined in the activity is performed by the application
to which the operation belongs. The group of activities forms the activity plan.
Activity Planner, together with its components, is fully integrated into Tivoli
Management Framework. A dedicated RIM interface, called planner (by default),
is used to store and retrieve operation status and configuration information for
plans and embedded activities on an RDBMS database.
You can use the Activity Planner to perform the following tasks:
򐂰 Manage a group of activities, originating from different applications, as a
single activity from a single machine in the network.
򐂰 Schedule the activity plan to run on a specific day and time, or to be repeated
at specific time intervals, days of the week, or days of the month.
򐂰 Schedule the plan to repeat indefinitely.
򐂰 Schedule activities to run at specific time intervals during the week.
򐂰 Set conditions on activities so that the execution of one activity is dependent
on the completion result of other activities.
򐂰 Save activity plans in a database to resubmit them at any future time.
򐂰 View a list of all submitted activity plans and retrieve information such as
completion status of a specific activity plan, activity, or an activity for a
specified target.
򐂰 Perform operations on activities and activity plans, such as cancel, pause,
resume, and restart.
5.1.1 Activity Planner components
The Activity Planner components are:
򐂰 Activity Planner server: Installed on the Tivoli server.
164
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 The Activity Planner User Interface which consists of the following:
– Activity Plan Editor (APE)
– Activity Plan Monitor (APM)
The Activity Plan Editor is used to create activity plans, and the Activity Plan
Monitor is used to monitor these plans.
򐂰 RDBMS: RIM object planner. Used to store:
– The definitions of the activity plans
– The status of the submitted activity plans
򐂰 Activity Plan Monitor administrator: It is used internally by the Activity Plan
Monitor engine and added during the installation of the Activity Planner,
swd_admin_regionname, login tivapm.
5.1.2 Roles required for the Activity Planner
The tasks you can perform using the Activity Plan Editor, Activity Plan Monitor,
and CLI are restricted by the Tivoli management region roles assigned to you.
Depending on the operations you are required to perform, you can have one or
more of the following roles:
򐂰
򐂰
򐂰
򐂰
APM_Admin
APM_Edit
APM_Manage
APM_View
Note: At least the Tivoli Framework role user is required to use the Activity
Planner.
5.1.3 Types of activities
An activity plan is a group of operations or tasks performed on a set of targets at
a scheduled time. A single operation or task in an activity plan is called an
activity. Activities can perform:
򐂰 Software Distribution operations
򐂰 Inventory scans
򐂰 Management Framework Task Library tasks
Activities can also be dependent upon the result of other activities.
5.1.4 Activity Plan Editor
You launch both the Activity Plan Editor and the Activity Plan Monitor GUIs from
the Tivoli desktop (Figure 5-1 on page 166).
Chapter 5. Deployment Services
165
Figure 5-1 Activity Planner GUIs
Double-click the Activity Plan Editor icon to open up the Activity Plan Editor.
To define an activity using the Activity Plan Editor, specify the following:
򐂰
򐂰
򐂰
򐂰
򐂰
The name of the activity
A brief description of the activity
The type of operation the activity will perform on a set of targets
Properties related to the type of operation
Targets of the activity (if not specified at the activity plan level)
Activities that perform Tivoli Software Distribution operations are represented in
the Activity Plan Editor main window by an icon that displays a box with an
inserted CD-ROM.
Activities that perform Tivoli Management Framework tasks are represented in
the Activity Plan Editor main window by an icon that displays a timer, a schedule,
and a pencil.
Activities that perform Tivoli inventory scan tasks are represented in the Activity
Plan Editor main window by an icon that displays a magnifying glass.
166
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 5-2 shows a sample activity plan.
Figure 5-2 Sample activity plan
You can save activity plans that you prepared using the Activity Plan Editor as
any of the following:
򐂰 Drafts, if they are not yet complete
򐂰 Templates, if they are complete
򐂰 XML files
Note: You can also use this format when creating an activity plan with a text
editor. It is also possible to start creating your activity plan from the GUI, save
it as XML file, and than perform additional changes on the XML file.
Draft plans and templates are stored in their respective repositories in the activity
plan database, but only templates are made available for submission.
Assigning targets to an activity plan
In addition to endpoints, users and devices could be the targets of an activity
plan.
Chapter 5. Deployment Services
167
You can assign targets at the activity level or at the activity plan level. However, if
you assign targets for each individual activity, you cannot specify targets at the
activity plan level. If you assign targets at the activity plan level, the targets apply
to all of the contained activities, and no other targets can be specified at the
activity level.
You can assign targets in one of the following ways:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
A list of target names
A file name containing a list of target names
An inventory subscriber
A query library subscriber
A directory query library
Variables
A profile manager
Tivoli Configuration Manager V4.2 introduced a dynamic target resolution
capability. If this feature is enabled, the targets for an activity will be resolved
when the activity is started and not when the activity plan is submitted. For
example, when a query directory is used to select the targets of an activity, the
query directory will be executed when the activity is submitted.
Conditioning the execution of activities
The execution of an activity can be dependent upon the result of the execution of
one or more activities in the same activity plan.
Assume that an activity plan consists of two activities, Activity A and Activity B. A
condition can be set on Activity B, the conditioned activity, related to the outcome
of the execution of Activity A, the conditioning activity, that dictates when Activity
B is executed on its targets. You can condition the result of the execution of
Activity A on all its targets using one of the following classifications:
򐂰 Completion: The execution of Activity B is performed when the operation
defined in Activity A completes, regardless of whether it completes
successfully or with an error.
򐂰 Success: The execution of Activity B is performed only if the operation defined
in Activity A completes successfully with no error.
򐂰 Failure: The execution of Activity B is performed if the operation defined in
Activity A fails with an error.
The execution of Activity B depends on the completion of Activity A on all of the
targets defined in Activity A. The operation specified in Activity B is executed
when Activity A has completed execution on all its targets.
168
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
A completion percentage of targets can be specified. For example, you can
specify to execute Activity B when Activity A has completed executing on 50
percent of its targets.
Note: If you want an activity plan to stop if there is a software distribution
error, the stop on error setting should be warning for the activity plan.
In addition to conditioning the execution of Activity B based on the result of
Activity A, you can specify the targets on which the specified result must occur.
You can specify one of the following:
򐂰 All: The execution of Activity B depends on the execution of Activity A on all
of the targets defined in Activity A. The operation specified in Activity B is
executed when Activity A has completed execution on all its targets. A
completion percentage of targets can be specified.
򐂰 Target: The execution of Activity B on target X depends on the execution of
Activity A on target X. The operation specified in Activity B is executed on
target X when Activity A has completed execution on target X, without waiting
for the remaining targets to complete.
Note: Conditioning by target is not supported for users and devices.
򐂰 Depot: The execution of Activity B on a set of targets sharing the same depot
depends on the execution of Activity A on the specified depot. The operation
specified in Activity B is executed on target X when Activity A has completed
execution on the specified depot.
Note: Conditioning by depot is available only if the conditioning activity is a
Load, Unload, or Task Library activity, and if the conditioned activity is
addressed to endpoints sharing the specified depot.
You can define a final activity in the plan that is executed when all other activities
in the plan have either completed or have been canceled.
Sorting activities in order of execution
You can also sort activities in the order in which they start. To do this select Edit
-> Sort Activity from the Activity Plan Editor window. Only activities without
conditions can be sorted. Conditioned activities have a predefined order of
execution and cannot be modified using the Activity Sort dialog, which is shown
in Figure 5-3 on page 170.
Chapter 5. Deployment Services
169
Figure 5-3 Sort Activity dialog
Scheduling when to execute an activity
You can schedule activities to run on specific days of the week and within a
specified time frame such as only during the day, during the night, on weekdays,
or weekends. To do this right-click an activity in the Activity Plan Editor window
and select Execution Windows. The execution window (Figure 5-4 on
page 171) enables you to specify a time frame, at the activity level, within which
the activity is to be executed. You can specify more than one execution window
for each activity.
Note: The time refers to the time on the managed node where the plan is
created.
170
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 5-4 Execution window
5.1.5 Activity Plan Monitor
An activity plan saved as a template can be accessed using the Activity Plan
Monitor GUI and submitted for execution. The plan is then stored in a submitted
state in the activity plan database. Only plans stored as templates or plans in the
submitted state can be accessed.
Activity Plan Monitor collects information about:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
A list of submitted plans
The activities for each plan
Target information
Plan or activity detailed status
Activity status for a specific target
Start date/time of the plan
Complete date/time of the plan
For each plan or activity, the possible statuses are:
򐂰 Successful/started/waiting/held by condition
򐂰 Paused/pause pending/resume pending
򐂰 Cancel pending/canceled/failed
Chapter 5. Deployment Services
171
Activity Plan Monitor is launched from the Tivoli Desktop. Figure 5-5 shows the
steps to submit a plan. Select Plans -> Submit from the menu of the Activity
Plan Monitor window to submit a plan. The Select plan for submission dialog box
is displayed.
Figure 5-5 Activity Plan Monitor - Plan submission
The General page is displayed by default. Before submitting the plan for
execution you can edit the attributes that were defined at the time the plan was
created. The modifications are applied only to the current submission instance
and have no effect on the template
If you click the Execution Time tag, you can specify an execution time at the
plan level as opposed to activity level, which was discussed in “Scheduling when
to execute an activity” on page 170.
An activity plan can be scheduled to run more than once. Select the Frequency
tab for this purpose. You can specify to repeat the execution of a plan in days,
months, at a specific date interval, or a time interval. When you specify to
execute an activity plan recursively, each time the plan is executed, an instance
of the plan is submitted for execution. The reference point from which the
recursion begins is the start not before time specified on the Execution Time
page.
172
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Finally in the Plan Submission Parameters notebook you can define new
variables, change values previously assigned to variables, and specify the
targets for the plan to be submitted. From the Plan Properties notebook, select
the Variables tab for specifying a variable.
Monitoring the execution
You can use the Activity Plan Monitor to pause, resume, cancel, and restart
activity plans, activities, and targets for plug-ins that support this option, by
performing the following steps:
1. From the Activity Plan Monitor window (Figure 5-6), select an activity plan, a
target, or an activity.
2. Select either the Pause, Resume, Restart or Cancel option from the Selected
menu.
Figure 5-6 Monitoring the execution
The Activity Plan Monitor GUI will provide an overview of the status of each
activity of a submitted plan. This GUI will not provide any details about the MDist
2 distribution, such as a time spent chart or a distribution topology graph.
However, a button on the Activity Plan Monitor GUI will automatically launch the
MDist 2 GUI, showing the details for the activity that was selected in the Activity
Plan Monitor GUI below.
Chapter 5. Deployment Services
173
Figure 5-7 Launching MDist 2 GUI from the Activity Plan Monitor GUI
Updating the status of an activity plan
You can set the Activity Plan Monitor to automatically update and display the
current status of all plans and activities, or have the Activity Plan Monitor update
upon request. The data displayed in the window is reloaded with the current data
in the activity plan database.
Deleting submitted activity plans
Using the Activity Plan Monitor, you can delete the status of a submitted plan, or
a specific instance of a recursive plan that has completed, from the list of activity
plans displayed in the main window of the Activity Plan Monitor.
Cleaning up the database
To eliminate plans from the activity plan database that have been submitted and
completed, you can use the Activity Plan Monitor to schedule a cleanup
operation. You can use the force option to eliminate plans in states other than
completed states. Cleanup operations can be scheduled to occur at any of the
following times:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
174
Immediately
One time only on a specific day and at a specific time
Particular days of the week
Particular days of the month
A date interval
A time interval
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
To define the plans you want to remove, you can specify any of the following
options:
򐂰
򐂰
򐂰
򐂰
Plans with a particular status (canceled, failed, successful)
Days elapsed since plans completed
Days elapsed since plans started
Plans with a specific age
When all the cleanup parameters have been set, the Activity Plan Monitor relies
on the Tivoli Management Framework Scheduler to perform the cleanup.
5.1.6 Activity Planner commands
The CLI interface is a textual interface that you use to manage an activity plan in
the activity plan definition file format and manage the activities defined in the
activity plan. An activity plan definition file is a file in Extensible Markup
Language (XML) format. The XML file is made up of components called
elements. Tags are used to describe elements. A start tag marks the beginning
of an element, and an end tag marks the end of the element. Elements can
contain other elements. The element that contains all of the other elements is
known as the root element. The elements that are contained in the root element
are called subelements and they also may contain other subelements.
The activity plan definition file makes use of this structure to define activity plans.
The root element in this file begins with the <activity_plan> tag and ends with the
</activity_plan> tag. The information nested between these tags defines what
type of element it is. This information is called the element-type name. The
elements and subelements specified in the activity plan definition file define
information such as:
򐂰
򐂰
򐂰
򐂰
Activities to be performed
Time of execution of the plan
Plan recursion information
Target systems of a plan or activities
The commands used by the Activity Planner are categorized below.
The following commands are used to name the activity plans:
򐂰 wcntpln controls the execution of a specified activity plan or the activities
contained within it.
򐂰 wsubpln submits an activity plan to the Activity Planner engine for execution.
򐂰 wupdpln updates an activity plan that has been submitted, but has not yet
started.
򐂰 wgenpln, after a failure, generates a new plan containing only the failed
activities for all failed nodes
Chapter 5. Deployment Services
175
The following commands are used to monitor activity plans:
򐂰 wdelstat removes the status of a submitted plan.
򐂰 wmonpln displays the status for all activities in an activity plan.
򐂰 wsfdpln sets filters to automatically remove completed activity plans from the
activity plan database.
The following commands manage the Activity Planner database:
򐂰 wapmfltr specifies one or more filters to be applied to plans, targets, or
activities.
򐂰 wdelpln removes an activity plan from the activity plan database.
򐂰 wexppln exports an activity plan stored in the activity plan database in the
activity plan definition file XML format.
򐂰 wimppln imports a specified activity plan in XML file format into the activity
plan database.
򐂰 wlstpln returns a list of the activity plans maintained in the activity plan
database.
򐂰 wunlockpln displays a list of locked plans and unlocks plans currently locked.
5.2 Change Manager
The Change Manager component of Tivoli Configuration Manager V4.2 together
with Activity Planner supports software distribution management and change
management in a large network environment.
Change Manager works with Activity Planner to manage specified groups of
users, workstations, or devices as single subscriber entities.
The core concept of Change Manager is the reference model. A reference model
associates configuration elements with subscribers. Configuration elements
define hardware and software requirements. Subscribers can be users, groups of
users, or the workstations or devices they use. After defining a reference model,
an activity plan can be generated, including all the tasks needed to ensure that
the subscribers of the reference model will meet all the requirements of the
configuration elements.
Reference model structure
The Change Manager reference model structure, as shown in Figure 5-8 on
page 177, represents the relationships between the software and hardware
requirements of different categories of users in your organization. The reference
model is made up of component models organized in a hierarchical structure.
176
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
The root level defines requirements that are common to all users, and the child
models define additional specific requirements that apply only to a particular
group of users.
All
Employees
Support
Staff
Software
Developers
Managers
C++
Developers
Endpoints
Endpoints
Java
Developers
Endpoints
Figure 5-8 Reference model structure
Configuration elements
Configuration elements are associated with each reference model and use the
concept of desired state to define the hardware and software requirements of
subscribers to the reference model. For each registered plug-in, a configuration
element is uniquely and completely identified by the name/desired state pair. The
configuration elements available depend on the set of plug-ins you have
registered. When you want to add a configuration element to a reference model,
you must specify the element’s name and the desired state. The only exception
to this is when you want to add an InventoryData element. InventoryData
elements do not require you to specify a desired state because this element only
checks for information and has no desired state to reach. Configuration elements
defined for models at the top of the hierarchy are inherited by those lower in the
hierarchy. The types of configuration elements are:
򐂰 Software Distribution elements: A Software Distribution (SWD) element
represents the Software Distribution element as defined in the Tivoli Software
Distribution environment. Change Manager retrieves the software package
current status from the Tivoli configuration database and produces the
actions necessary to reach the desired state.
Chapter 5. Deployment Services
177
򐂰 Inventory data elements: An Inventory data element verifies the reference
model against the Inventory database, for example, for hardware
requirements or sets of requirements. To create an Inventory element, you
define an expression that includes, for example, one or more hardware
characteristics, such as physical memory size, and software characteristics,
such as installed software.
򐂰 Inventory scan elements: An inventory scan element enables you to perform
software and hardware scans of subscriber machines. To create an inventory
scan element, you define a profile that includes one or more scan
characteristics.
A SWD element can be made conditional on a software dependency. A software
dependency is defined as one of the following:
򐂰 Prerequisite, where the changes required by the element are only made if the
dependency condition is true
򐂰 Exrequisite, where the changes required by the element are not made if the
dependency condition is true
򐂰 Corequisite, where the changes required by the element can only be made as
part of a sequence that includes the requirement defined in the dependency
condition
Selecting subscribers
Configuration Manager provides multiple ways to select subscribers:
򐂰 Specifying a CSV (Comma Separated Value) file
򐂰 Specifying a Profile Manager
򐂰 Specifying individual targets
򐂰 Defining an SQL query on the Tivoli Inventory configuration database
򐂰 Enterprise Directory Query Facility: Selecting reference model subscribers
using a directory query
The subscribers to a reference model are the workstations, devices, and users
that you want to be configured to match the hardware and software requirements
defined for the model.
Figure 5-9 on page 179 shows how to select subscribers.
178
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 5-9 Selecting subscribers
Differencing mechanism
Change Manager creates required actions by using a differencing mechanism
(Figure 5-10 on page 180) that compares the current state of each element on
the specified subscribers with the desired states defined in the reference model.
The Change Manager differencing mechanism produces the actions necessary
to arrive at the desired state for each element on each target assigned to it, in the
form of an activity plan. The activity plan contains a list of actions necessary to
attain the desired state and is submitted to the Activity Planner or imported to the
Activity Planner database for scheduling.
Chapter 5. Deployment Services
179
Reference Model
Differencing
Activity Planner
Figure 5-10 Differencing mechanism
Change Manager includes two functions that use a differencing mechanism to
produce a list of the actions required to bring subscribers to the desired state
defined in a reference model. These functions are Preview Activity Plan and
Submit Activity Plan.
When you preview or submit an activity plan, the differencing mechanism creates
an activity plan listing all the actions requested to move the configuration
elements to their desired state. The Preview function simply displays the activity
plan in a window so you can preview the changes that are going to take place.
The Submit function allows you to set other Activity Plan Manager (APM) specific
parameters before it submits the plan to APM for processing.
By default Change Manager synchronizes a reference model to create the
associated activity plan by considering all the configuration elements specified in
the model and creating the actions related to those elements. However, the full
synchronization feature allows you to perform a further step in the
synchronization process.
In general, Change Manager synchronization creates the requested actions
related to the listed elements as in the default behavior. When it does this, it also
creates a new set of actions related to all the elements already present on the
selected subscribers though not listed in the current reference model, in order to
revert the state of such elements.
In the case of Software Distribution elements, reverting means to uninstall, or to
remove the software element, or package, from the target machine. This does
not necessarily mean that such actions will all involve actual remove actions. The
required action will depend on the actual state of the package on the target
machine. Thus, for a Software Distribution element, when you select the full
synchronization option, Change Manager creates a set of actions to remove from
the subscribers all the software packages not listed in the reference model being
synchronized.
180
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
5.2.1 Sample Change Manager scenario
One very useful feature of Change Manager is to be able to create a reference
model from a target. Let us walk through this scenario:
1. Launch the Change Manager GUI from the Tivoli Desktop. You can also use
wccmgui command to start the Change Manager graphical user interface from
the CLI.
2. From the Edit menu, select Create reference model from target
(Figure 5-11).
Figure 5-11 Creating reference model from target
3. The Properties dialog box is displayed (Figure 4). On the Properties dialog
box, the availability of the Hardware and Software check boxes and their
associated configuration elements depends on the plug-ins you have
registered.
4. In the Name text box, enter the name you want to give the new reference
model. Optionally, you can also enter version and description information in
the Version and Description text boxes.
5. If the new model is to be a new root model, select the Create new root check
box.
6. In the Target name field, enter the name of the target from which you are
creating the new reference model.
7. Use the radio buttons below the Target name field to specify the appropriate
target type. If you selected the endpoint subscriber type, you can browse the
endpoints. If you selected the device type, the navigator is disabled since it is
Chapter 5. Deployment Services
181
not possible to navigate the individual device instances. If you selected the
user type, the navigator displays the association between a user and the
related endpoint.
8. Select the Hardware check box if you want the new model to perform checks
on the selected hardware configuration elements from the target. If you select
this check box, you must also select the specific hardware elements you want
included.
9. Select the Software check box if you want the new model to include all the
target's software configuration elements.
10.Click OK. Change Manager creates the new reference model with the name
you specified in the Name field.
Figure 5-12 Creating reference model from target
11.When you have finished building the reference model, you can export it to an
XML file format. In this format, you can read the file and edit it in any standard
text or XML editor and reimport the file to Change Manager.
To export a reference model to xml format, perform the following steps:
1. Go to the main Change Manager window (Figure 5-11 on page 181), and
from the File menu select Export. The Export settings dialog box appears, as
shown below.
182
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 5-13 Exporting a reference model
2. In the Reference model definition file (XML) field, enter the name you want to
give the XML file.
3. Select the Include inherited elements check box if you want to export
elements the model inherited from the parent model. Select the Export
single reference model check box if you want to export only the selected
reference model itself and no child models. These check boxes are optional,
so you can select one, both, or neither. If you select neither check box, the
model is exported with its child models, and without elements inherited from
the parent model.
4. Click OK. The reference model is exported in XML format to the specified file.
Next you need to select the subscribers for your reference model.
Modifying reference models
After you have created and saved a reference model, you can make changes to
it to reflect new requirements. For example, once a reference model has been
used to generate the actions required to bring subscribers to a required state,
you can change the requirements by adding or modifying configuration elements.
Note: When using the Change Manager, if you remove the parent reference
model, children reference models are automatically removed.
5.3 Enterprise Directory integration
Enterprise Directory Services enable a Tivoli administrator to access information
stored in an directory server, for example, a Windows 2000 Active Directory
server. The information in the directory server can be used to select specific
Chapter 5. Deployment Services
183
targets for Activity Plan Monitor activities or subscribers for Change Manager
reference models.
The information in the directory server is retrieved using the Lightweight
Directory Access Protocol (LDAP). The LDAP protocol uses TCP/IP and is
optimized for read performance.
Currently, Directory Query Services support the following three directory servers:
򐂰 Windows 2000 Active Directory
򐂰 Novell Directory Server for NetWare Version 6
򐂰 IBM SecureWay Directory Server Version 4.1
The Tivoli Resource Manager component is used to retrieve information about
the users and the associated endpoints from the LDAP server. After the
installation of the Tivoli Resource Manager, the directory schema scripts are
available on the TMR server to be copied and executed on the LDAP server.
Once these scripts are run on the LDAP server, the Enterprise Directory schema
is changed to accept Tivoli attributes, such as:
򐂰 tmeObjectId
򐂰 tmeObjectLabel
򐂰 tmeTrmId
Also, After a successful installation of the Tivoli Enterprise Directory Query on
the TMR server, three new resources are created. They are:
򐂰 QueryUserInfo
򐂰 QueryDirectory
򐂰 QueryDirectoryLibrary
Users are associated with endpoints in a one-to-one relationship and the
mapping is stored in the LDAP server. Resource Manager enables you to view
the association between a user and an endpoint.
Tivoli Resource Manager enables you to distribute software packages, using
Software Distribution, to the endpoints that are associated with users by
distributing the profile to a Resource Group of users. Similarly, you can distribute
an Inventory profile to a Resource Group of users to scan the endpoints
associated with the users.
After the Directory Query Services product has been installed on the Tivoli
management region server, the directory server schema has to be modified. This
has to be done manually on the directory server.
Note: The directory server requires no specific Tivoli software; it does not
have to be a managed node or Tivoli endpoint.
184
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
The directory schema has to be modified using the ldifde command (which is
available on the directory server) and an LDAP Data Interchange Format (LDIF)
file. The LDIF template file is provided on the Tivoli management region server in
$BINDIR/TAS/QueryDir/SCRIPTS. The template file has to be edited, and the
correct directory context has to be provided.
After running the ldifde command on the directory server, the Enterprise
Directory schema is changed to accept three new attributes: tmeObjectId,
tmeObjectLabel, and tmeTrmId. These attributes will be used to link directory
users to Tivoli endpoints (tmeObjectId and tmeObjectLabel) or Tivoli Resource
Manager devices (tmeTrmId).
5.3.1 Exchanging data with a directory server
In order to exchange data with a directory server, a DirectoryContext object
should be used. A DirectoryContext object is comparable to a RIM object. The
DirectoryContext object contains the settings needed to access the directory
server, just like a RIM object contains the settings to connect to an RDBMS.
Connections to the directory server are always initiated from the directory server
(RIM can use different RIM hosts). The installation of the Directory Query Facility
creates one default DirectoryContext object named directory. Other
DirectoryContext objects can be created later; these can be used to access
different directory servers.
Note that the Tivoli Resource Manager uses the directory DirectoryContext
object hardcoded (this setting cannot be changed).
5.3.2 Manipulating DirectoryContext objects
DirectoryContext objects are managed using the command line interface; no GUI
is available to create, configure, or remove DirectoryContext objects.
The wcrtdirctx command is used to create a directory query context.
The syntax is:
wcrtdirctx [-i] -s server -u user -c naming_context [-f provider] [-p port] [-P
ssl_port] [-S y|n] [-k keystore_path] directory_context_name
Where:
򐂰 i input
Specifies that the password must be read from standard input.
򐂰 s server
Chapter 5. Deployment Services
185
Specifies the server.
򐂰 u user
Specifies the directory server administrator or a user with equivalent
authority.
򐂰 c naming_context
Specifies the naming context to use for the search.
򐂰 f provider
Specifies the java class name that identifies the directory access protocol.
The default is "com.sun.jndi.ldap.LdapCtxFactory".
򐂰 p port
Specifies a server port for a non-secure connection. If not specified, the
default value 389 is used.
򐂰 P ssl_port
Specifies a server port for a secure (SSL) connection. If not specified, the
default value 636 is used.
򐂰 S y|n
Enables the Secure Sockets Layer (SSL) between the directory server and
the Tivoli region. Y specifies enable, n specifies do not enable. If not
specified, SSL is disabled.
򐂰 k keystore_path
Specifies the path of the keystore containing the certificates used during an
SSL connection. If you specify this option you must also specify the
keystore_path password.
򐂰 dirquery_context_name
Specifies the name of the new directory query context.
For example, to create a directory query context named firea3ctx for a
connection to a Novell server directory:
wcrtdirctx -s armando.enterprise.com -u cn=admin,o=context1 -c o=context1 -p
389 novellctx
In this example port 389 is the TCP port for LDAP service. cn= and dc= is
standard syntax for LDAP queries. o=context1 is the Novell directory context for
users of the Novell Directory domain.
After the DirectoryContext object has been correctly configured, the wmanagedir
command can be used to update the information of the Enterprise Directory. This
command is used to link Tivoli endpoints to directory users. An endpoint can only
186
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
be linked to one user, and a user can only be linked to one endpoint (one-to-one
relationship).
The purpose of linking endpoints to users is to be able to retrieve Tivoli endpoints
from the Enterprise Directory, based on information contained in the Enterprise
Directory. This is done using directory queries, for example, a directory query
that selects all endpoints of users in the marketing department.
For more information on wmanagedir and other Enterprise Directory integration
commands refer to IBM Tivoli Configuration Manager: User's Guide for
Deployment Services, SC23-4710.
5.3.3 Directory query libraries and query directories
Directory query libraries and query directories are similar to Inventory query
libraries and queries. A directory query library is a collection of directory queries.
A query directory enables you to find information about users or endpoints
defined in the Enterprise Directory.
Query directories can be used to retrieve any available “data” from the Enterprise
Directory or they can be used to select “subscribers.” The subscribers queries
can be used to specify the targets for an Activity Plan Monitor activity or to select
the subscribers for a Change Manager reference model.
Before you can create a query directory, you must create a directory query
library. A directory query library is used to group similar query directories.
Directory query libraries can be created from the GUI or by using the
wcrtdirquerylib command as shown in Figure 5-17 on page 191. Directory
query libraries are created within a policy region, and the administrator creating
the library requires the super or the senior authorization role on the policy region.
Chapter 5. Deployment Services
187
CLI: wcrtdirquerylib
Figure 5-14 Creating a directory query library
After creating the directory query library, a Directory Query can be created from
the GUI or by using the wcrtdirquery command (authorization role admin,
senior, or super). See Figure 5-15.
Figure 5-15 Creating a directory query
188
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Note: The scope scrolling list in Figure 5-15 on page 188 specifies the point in
the directory tree hierarchy at which you begin the search. Possible values
are:
򐂰 object
The search if performed only on the specified object
򐂰 one level
The search if performed on one level of the tree
򐂰 subtree
The search if performed on the specified tree and on all the descendent
directories
Unlike Inventory queries, query directories cannot be used to set the subscribers
of a profile manager or to select the targets for a Tivoli profile distribution
(software package profile, Inventory profile, Monitoring profile, and so on). Query
directories can only be used to select the targets of an Activity Plan Monitor
activity or to select the subscribers of a Change Manager reference model. If you
want to create a “subscriber” Directory Query, you should at least specify the
tmeObjectId and the tmeObjectLabel.
Integration with the Activity Planner
Figure 5-16 on page 190 shows an example of using a query directory to select
the targets of an Activity Planner activity.
Chapter 5. Deployment Services
189
Query is executed when plan is
submitted or when activity is submitted.
Figure 5-16 Integration with the Activity Planner
When selecting the query directory, the user can specify when the query should
be executed:
򐂰 When the plan is submitted
򐂰 When the activity is started
For testing purposes, the query can be executed using the Get result button. It is
important to note that you should always select the “tmeObjectLabel” in the
attributes section. The attribute you select is the actual data that will be passed to
the activity for determining the targets.
Integration with the Change Manager
Figure 5-17 on page 191 shows the usage of a directory query to select the
subscribers of a Change Manager reference model. With Change Manager, you
have the possibility to include or exclude the targets selected by the query
directory. This option is not available with Activity Planner.
190
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Directory query is executed when the
reference model is synchronized.
Figure 5-17 Integration with the Change Manager
5.4 Resource Manager and pervasive devices
Resource Manager, a service that runs on the Tivoli server, extends the Tivoli
Management Framework to manage various types of resources. Resource
Manager adds a fourth tier of resources to the three-tier Tivoli architecture of
Tivoli server, gateway, and endpoint. Resources can be pervasive devices or
users.
Chapter 5. Deployment Services
191
Figure 5-18 Pervasive Devices Integrated in a Tivoli Environment
Resource Manager enables you to manage resources in your Tivoli environment.
Resources can be users and pervasive devices, such as Palm devices, Nokia
9200 Communicator series devices, and Windows CE devices. You can keep
track of devices in your environment and customize their settings from a central
location. You can also distribute software to and scan inventory of pervasive
devices and the endpoints associated with users.
Resource Manager, which is installed on the Tivoli server, maintains a master
database of the pervasive devices that are managed by the resource gateways.
Resource gateways are endpoints that have applications that extend the Tivoli
endpoint to manage pervasive devices. In Tivoli Configuration Manager 4.2.1,
the only supported resource gateway is Web Gateway. Gateways that have the
Resource Manager gateway component installed connect the Tivoli server with
the resource gateways. Each resource gateway maintains an independent Web
Gateway database. Resource Manager notifies the Web Gateway databases of
any changes to the master database and vice versa.
192
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
For example, when you create or delete a device in the Resource Manager
database, Resource Manager notifies the Web Gateway database on the
endpoint managing the device to update its database. When a new device
connects, it is automatically enrolled and Web Gateway notifies Resource
Manager to update its database.
Note: As a resource type, the Pervasive_Device resource type is used for
pervasive devices.
5.4.1 Choosing where to install the Resource Manager components
On the Tivoli management region server install the Resource Manager
component. On managed nodes, install the Resource Manager Gateway
component. Install the Resource Manager Gateway component on any gateway
that communicates with endpoints where the Web Gateway component is
installed. This component relies on a RIM object and relies on configured
tablespace in the trm repository. The Resource Manager component is also used
to manage the users defined in an LDAP server.
5.4.2 Web Gateway installation
This installation program installs:
򐂰 The Web Gateway components (database and server) to perform device
management
򐂰 The Web Interface components (the interface and component plug-ins) to
perform configuration management operations from a Web browser
򐂰 Did you create the dmsadmin and dmsuser system accounts on this
computer system?
– Yes
– No
If you selected No, you must create these system accounts in order to properly
install Web Gateway.
5.4.3 Web objects
The Configuration Manager Web Interface allows Web users to perform
operations using Web objects. Web objects can be:
򐂰 Software packages
򐂰 Inventory profiles
򐂰 Reference models
Chapter 5. Deployment Services
193
Before a Web object can be used, it has to be published. This process grants
access rights to those users who want to access the object, and copies it to a
server from where it can be accessed by means of the Web.
To publish and unpublish Web objects use the wweb command (there is no GUI
equivalent, so this must be from a CLI). This command allows you to give access
to a specified Web object to one user, several users, a list of users, or to grant
unrestricted access to all users.
The Tivoli Web Gateway component maintains a list of enrolled devices.
Scalable Collection Service is used to return notification of resource
management operations.
5.4.4 Registering the resource types
To register the resource types with which you will work, run a script to start each
type. These scripts are installed in the directory $BINDIR\TRM, when you install
Resource Manager.
򐂰 RegisterUser.sh
To start the User resource type. You must have Enterprise Directory Query
Facility installed before you run this script.
򐂰 RegisterPervasive.sh
To start the Pervasive resource type.
5.4.5 Associating endpoints with the resource gateway
You need to associate only endpoints that are resource gateways and that have
devices connected to them. To associate endpoints with the resource gateway,
use the wresgw add command. For example, to associate a resource gateway of
the type Web Gateway with the endpoint rvargas, enter the following:
wresgw add rvargas -C TWG
To manage resource gateways from any managed node in interconnected
regions, you must run the wresgw add command from each region.
5.4.6 Enrolling pervasive devices
When you connect a device to a PC, it is registered in the Web Gateway
database. With automatic enrollment, these resources are automatically
registered in the Resource Manager database. Devices must be registered in the
Resource Manager database (enrolled or created) to enable them to be
managed in the Tivoli environment.
194
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
5.4.7 Installing and configuring devices for resource manager
You will find instructions for installing and configuring devices to work with Web
Gateway and Resource Manager.
Installing the device agent for Nokia 9200 Communicator
The Nokia 9200 Communicator series devices include the Nokia 9210
Communicator, the Nokia 9210i Communicator, and the Nokia 9290
Communicator.
Web Gateway supplies a device agent and plug-in for the Nokia 9200
Communicator series devices. The plug-in resides on the Web Gateway server.
The device agent resides on a host PC. For management tasks, a Nokia 9200
Communicator series device is connected to a host PC through a serial or
infrared connection.
For a Nokia 9200 Communicator series device, Nokia supplies a management
application called PC Suite. This application is installed on the host PC. Some
synchronization tasks you can do with the PC Suite application are the following:
򐂰 Share data between the host PC and the device.
򐂰 Back up files from the device to the host PC.
򐂰 Copy and move files between the host PC and the device Nokia also supplies
as an add-on application to PC Suite called Administrator Suite.
Administrator Suite provides the following:
򐂰 A programming interface used by the device agent.
򐂰 A graphical user interface to set values for configuration parameters for a
Nokia 9200 Communicator series device. The values are saved in XML
format in a configuration file on the host PC. The configuration file can be sent
to Nokia 9200 Communicator series devices as a software distribution job
with Web Gateway or sent directly from PC Suite.
5.4.8 Installing the device agent for Windows CE devices
Windows CE devices are those devices that use the Microsoft Windows CE for
the Handheld PC Professional Edition, Version 3 operating system. These
include handheld PC, pocket-type, or sub-notebook devices for sales and service
personnel, mobile business professionals, and other field personnel who need
access to their network or the Internet
Such devices require the plug-in for Windows CE and device agent for Windows
CE. The plug-in and device agent perform system management tasks and
communicate with each other by using HTTP.
Chapter 5. Deployment Services
195
Communicating with the host PC
To establish communications between your Windows CE device and the host
PC, you must install Windows CE Services with ActiveSync on the host PC.
Once Windows CE Services is installed on the host PC, you are prompted to
create a partnership with your Windows CE device using a serial cable
connection.
5.4.9 The user ID of palm devices
The ROM serial number of Palm devices is used as the user ID for the device.
However, if the ROM does not have a serial number, then the user name of the
device is used as the user ID. If you change the user ID on devices without a
serial number, the device appears to be a new device and requires enrollment.
5.4.10 Inventory scans on pervasive devices
When you want to do an inventory scan on pervasive devices, the global
properties options do not apply to scans of pervasive devices, and also scan
differences cannot be obtained for pervasive devices. On the other hand,
hardware, software, and configuration information may be obtained.
196
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
6
Chapter 6.
Multicast concepts and
implementation
This chapter discusses various concepts and implementation methodology for
the new multicast feature with Tivoli Management Framework 4.1.
In early IP networks, a packet could be sent to either a single device (unicast) or
to all devices (broadcast). A single transmission destined for a group of devices
was not possible. However, during the past few years a new set of applications
has emerged. These applications use multicast transmissions to enable efficient
communication between groups of devices. Data is transmitted to a single
multicast IP address and received by any device that needs to obtain the
transmission. This chapter describes how multicast functionality will be
incorporated into MDist2, the Tivoli Management Framework’s bulk data
distribution service, and in what network environments it will be useful.
The performance potential of using multicast for bulk data transfer is extremely
appealing. Today, using one-to-one TCP connections, MDist2 must resend a
distribution’s data to every target. This means that distribution times scale
linearly with the number of targets. Distributing to a hundred endpoints will take
one hundred times longer than distributing to a single endpoint.
By using UDP broadcast packets, multicast allows multiple targets to read the
same data stream. A multicast server only sends the data once, regardless of the
number of receivers. For example, MDist2 distributing a large application of 100
© Copyright IBM Corp. 2004. All rights reserved.
197
Mbytes to 100 endpoints would take about 5.6 hours (assuming the default
bandwidth of 500 Kbytes/sec). Using multicast, this same distribution could be
done in less than 3.5 minutes.
Not only is the distribution time decreased, but network traffic is also decreased
by the same ratio. This is useful for customers sending data to multiple targets
over satellite, on slow network links, or wanting to conserve bandwidth.
This chapter discusses the following topics related to multicast:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
198
Reliable multicast protocol
Hyper Delivery (RMTP) flow
Distributed depot service
Endpoint multicast receivers
Multicast scenarios
Multicast limitations
Troubleshooting multicast
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
6.1 Reliable multicast protocol
Raw multicast uses UDP packets, which can be lost if the network or a receiver
is busy. If multicast is being used for audio or video streaming, an occasional
dropped packet is normally acceptable. However, for file transfer, the data must
arrive undisturbed to every target. To make multicast reliable, the server must
rebroadcast every packet not received by a client.
The Tivoli multicast solution uses the Hyper Delivery, which adopts Reliable
Multicast Transport Protocol (RMTP) Version 2 as the base for its reliable
multicast protocol.The IBM Tokyo Research Laboratory and Nippon Telegraph
and Telephone Corporation (NTT) developed RMTP through joint research.
RMTP clients keep track of which packets they have received. When all of the
bulk data has been received, each client sends the server its list of dropped
packets. The server receives this list from every target, takes the union of
dropped packets, and sends them again.
Figure 6-1 Multicast and the network
The overhead incurred for reliability causes distribution times to depend on the
number of receivers. However, if the number of dropped packets is small, the
overhead is only a fractional increase of the distribution time per receiver.
Chapter 6. Multicast concepts and implementation
199
Multicast packets are targeted at a multicast group, which is a combination of an
IP address and port number. Multicast uses the class D IP addresses in the
range of 224.0.0.0 to 239.255.255.255. To receive multicast data, a receiver
must join the multicast group. During the join process the receiver’s router or
switch is contacted and told to forward multicast traffic for that group. Users
wishing to use multicast must have their network hardware (routers and
switches) multicast enabled. Tivoli Management Framework uses the registered
multicast address 224.0.1.18 (tivoli-systems.mcast.net) to listen for the multicast
advertisements.
The headers of UDP datagrams carrying multicast traffic contain a time to live
(TTL) setting. The TTL setting is the number of routers that will forward the
packet before it is discarded. In other words, TTL is a mechanism for determining
the scope of a transmission. Unlike a unicast address, a multicast address can
extend through the entire network. The value contained in this field is
decremented at each hop.
6.2 Hyper Delivery (RMTP) flow
Here is a brief synopsis of how the communication takes place between the
multicast sender and multicast receiver. In our case the sender is the managed
node repeater or the gateway repeater, and the receiver could be the TMA or any
type of repeater. Figure 6-2 on page 201 shows the Hyper Delivery
communication flow between the sender and receiver. On the left is the multicast
sender and on the right is the multicast receiver.
We have also listed some of the multicast parameters along with the flow.
Complete multicast parameters are discussed later in “Configuring repeaters for
multicast” on page 205.
1. Receiver: RMTPOpenReceiver() is the first API called in the receiver
programs. This is run when the receiver is started. Subsequent API calls will
use the connection identifier, which is assigned by this API.
2. Receiver: RMTPConnectReceiver() waits for a connection request (CONN
packet) from a sender.
3. Sender: RMTPOpenSender() is the first API called in the sender programs.
Subsequent API calls will use the connection identifier, which is assigned by
this API. This is run when a distribution is sent.
Note: The above function names, like RMTPOpenReceiver and rest of the
API calls, are not Tivoli methods and they do not show up in odstat. These
are just programming calls, and are shown here for simplicity of data flow
description.
200
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Figure 6-2 Hyper Delivery handshake
4. Sender: RMTPConnectSender() requests a connection to the receivers by
sending a CONN packet.
Depending on the value of the repeat parameter, the sender will send multiple
copies of each control message. The default is 2.
The sender will resend the CONN request to retry the receivers depending on
two parameters, connrtry and connwtout, but each resend is driven by
multiple sends decided by a repeat value.
Connrty specifies the number of times that a multicast sender will rebroadcast
the connection message to the receivers. The default is set to 5.
Connwtout specifies how long the sender waits before retry. The default is 2
seconds (2000 milliseconds).
Chapter 6. Multicast concepts and implementation
201
So, a sender will resend CONN requests every connwtout ms. It will do this
connrty times or until it hears from all the receivers. The sender repeats this
same pattern for CONN (connrtry/connwtout), POLL (pollrtry/dtwtout), and
RELEASE (relrtry/relwtout).
5. Receiver: On receiving a connection request, it calls RMTPAcceptConnection
(). RMTPAcceptConnection () sends a CACK using the source address
parameter (specified by returnIP on the sending gateway) to support an
alternate reply path to the sender. For example, the sender's IP address of
the terrestrial uplink may be different from the one of the downlink for a
one-way satellite network.
6. Sender: On receiving the CACK, sender will now start sending data. The data
to be transmitted is divided into messages that are messagesize bytes long,
except in the case of the last message, which may be smaller than this. Each
message is divided into blocks, which are defined by blocksize. Confirmation
of receipt (sender POLL, receiver ACK/NACK) and retransmission (if
necessary) is done after sending each message. The default message size is
90 Mbytes.
7. Sender: After sending all blocks in a message, the sender polls receivers and
waits for a response from each receiver. The response is either ACK
(received all blocks) or NACK (requesting missing blocks).
8. If the sender has not received ACK/NACK from all receivers before the
timeout specified by dtwtout (default is 3000 milliseconds), it again polls
receivers from which no response was received, if any. The polling is
repeated for up to pollrtry (default is 5) times. Receivers that still have not
responded will be ignored thereafter.
9. Sender: If the sender has received NACK(s), another transmission of data
blocks occurs in the same way as the initial data transfer, but only missing
blocks are transmitted again. The number of transmissions is up to dtrtry
(default is 10), including the initial one.
10.Sender: After the sender has successfully sent all of the messages, or has
reached dtrtry, the sender requests connection release to receivers that
responded with ACK. The timeout value to wait for a response (RACK) is
relwtout (default 2000 milliseconds) and the number of retries is up to relrtry
(default is 5) including the initial one.
11.If there are multiple messages, the transmission sequence above is repeated
for each message.
202
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
6.3 Distributed depot service
On managed nodes, the depot server, a new TMF service, will send and receive
multicast. The depot server is capable of reading and writing to the existing
MDist2 depot.
Figure 6-3 shows the depot server.
Receive
Multicast
Gateway /
Repeater
Depot Server
Send
Multicast
MDist 2
Depot
Managed Node
Figure 6-3 Depot server
The depot server is divided into various components:
򐂰 Multicast Sender: We are using the Hyper Delivery reliable multicast transport
protocol (RMTP) developed by IBM Japan for sending bulk data. The sender
can broadcast to other depot servers or directly to endpoints.
򐂰 Multicast Receiver: Allows the depot server to receive broadcasts from other
depot servers.
򐂰 MDIST2 Depot: Local storage of bulk data. It can read and write from an
MDist2 repeater depot. Location is decided by the rpt_dir value on the
repeater.
The depot server is enabled on the managed node, which is a repeater, using:
wmdist -s repeater_name repeater_multicast=TRUE
This configures a managed node repeater to send multicast data. This command
also works for gateway repeaters, which you will need if you want to use
multicast to load a gateway’s depot.
Chapter 6. Multicast concepts and implementation
203
The gateway repeater is multicast enabled running (explained in more detail in
6.4, “Endpoint multicast receivers” on page 208):
wmdist -s repeater_name endpoint_multicast=TRUE
This is for the gateway to send multicast to endpoints. If you want it to receive
multicast, then you need to do the previous repeater_multicast configuration.
Note: In order to use multicast, you must install Java 1.3 for Tivoli and Tivoli
Java Client Framework 4.1 on the managed node/gateway.
Once enabled, the depot server will be started at boot time and remain running.
There are two more options with wmdist regarding multicast, which are explained
in “Configuring repeaters for multicast” on page 205.
In a typical business scenario there may be many branch offices distributed
around the country, or the world. If the IT department in the company’s
headquarters needs to distribute software to each branch office, multicast can be
employed to keep the distribution time to a minimum.
If each branch office has a managed node in it, the source host (the Tivoli Server
in the headquarters building that initiates the distribution) can multicast the
distribution by way of a high-speed link (for example, a satellite link) to MDist2
depots on managed nodes at each branch office.
As with unicast, managed nodes that multicast to endpoints must be configured
as gateways. The depot services running on the gateway in each branch office
listen for multicast broadcasts. When a multicast broadcast is received by a
depot service, the service writes the distribution to an existing MDist2 depot on
the gateway. Once the data is in the MDist2 depot, it can be multicast or unicast
to all of its endpoints over the LAN in the branch office. The depot service sends
a multicast message, a UDP broadcast, to advertise the distribution. The
advertisement contains a description of the data being sent and the endpoints
that should receive it. Multicast receivers listen for these advertisements to
determine which distributions they should receive.
Each distribution requires a separate distribution process; you cannot load
MDist2 depots and deliver to endpoints in a single step. The first distribution
sends the package from the source host to the gateways (or repeaters). The
second distribution sends the package from the gateway to one or more
endpoints (or in the case of a repeater, to another gateway). If an MDist2 depot is
not functioning when the distribution is sent to it, there is currently no provision to
retry the multicast distribution. Instead, retries can be manually performed using
a unicast distribution to the endpoints that did not receive the original multicast
distribution.
204
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
6.3.1 Configuring repeaters for multicast
Configuring a repeater for multicast involves the wmcast and wmdist commands.
Use the wmdist command to enable the repeater for multicast distribution. Use
the wmcast command to set the configuration parameters for multicast
distributions.
For complete details on the commands and keywords used throughout this
section, refer to the Tivoli Management Framework Reference Manual.
To enable a repeater for multicast, use the wmdist -s command with the
following keywords:
repeater_multicast
Whether the repeater sends distributions to other
repeaters using multicast. The default is FALSE.
endpoint_multicast Whether the repeater sends distributions to endpoints
using multicast. The default is FALSE.
default_multicast
Back-level applications that use MDist2 but do not have
the multicast distribution option built in can take
advantage of multicast if this parameter is set to TRUE.
This will cause that application to send all distributions
from the specified repeater using multicast first. If the
distribution fails then it will attempt to do unicast
depending on the fail_unavailable settings.
fail_unavailable
When set to TRUE, repeater will not attempt a unicast
retry for endpoints that failed to receive multicast. The
default is False. This option is hidden and does not show
up. This parameter is also for back-level applications and
only relevant to gateway repeaters.
The wmcast command sets repeater properties for MDist2 multicast distributions.
The defaults provided are designed for use in most LAN environments. However,
if a repeater sends multicast over both fast and slow links, configure multicast
repeater settings for the slowest link.
wmcast –s repeater_name [keyword=value...]
The settings are:
򐂰 backofftm=time_in_milliseconds
Specifies the back-off time in milliseconds. When receivers acknowledge
receipt of a multicast advertisement, the receiver waits for a random time
interval between 0 ms and the number of ms specified by this keyword before
responding to the sender. This reduces congestion. As you add more
receivers, this number might need to be increased to improve performance.
The default is 100.
Chapter 6. Multicast concepts and implementation
205
򐂰 blocksize=size_in_bytes
Specifies the size of the block, in bytes, that the sender uses when writing
data to the network. The size specified must be less than 65535 bytes. The
default is 1460 bytes, which is the Maximum Transmission Unit (MTU) for
Ethernet transmissions.
򐂰 connrtry=retry_count
Specifies the number of times that a multicast sender will rebroadcast the
connection message to the receivers. The default is 5.
򐂰 connwtout=milliseconds
Specifies the time, in milliseconds, that a multicast sender waits for receivers
to accept a connection. The default is 2000.
򐂰 dtrtry=retry_count
Specifies the number of times that a multicast sender will resend dropped
packets to receivers. The default is 10.
򐂰 dtwtout=time_in_milliseconds
Specifies the time, in milliseconds, that a receiver will wait before timing out if
the data transmission is interrupted. The default is 3000.
򐂰 ifrcvaddr=address...
Specifies a list of IP addresses that the receivers use when listening for
multicast packets. Separate multiple addresses with semicolons (;) and
enclosed in double quotation marks (“...”). The default is 0.0.0.0.
򐂰 ifsrcaddr=address
Specifies the IP address of the source host interface that is used to send
multicast packets. The default is 0.0.0.0.
򐂰 mcadvert=address
Specifies the address for multicast messages. If you set mcadvert to
something other than the default, the endpoints must log out and relog in or
disable and enable to listen to the other address for multicast advertisements.
The default is 224.0.1.118, which is the IANA-registered address for Tivoli
multicast.
򐂰 mchigh=highest_address
Specifies the highest address to be used to send multicast data. When the
server is ready to send multicast data, the server selects an address between
mclow and mchigh to find an address that is available for multicast data
traffic. If the first address checked is being used for sending multicast data,
the address is incremented and the next address is monitored for activity.
This continues until an available address or mchigh is reached. The default is
224.2.255.255.
206
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 mclow=lowest_address
Specifies the lowest address to be used to send multicast data. When the
server is ready to send multicast data, the server selects an address between
mclow and mchigh to find an address that is available for multicast data
traffic. If the first address checked is being used for sending multicast data,
the address is incremented and the next address is monitored for activity.
This continues until an available address or mchigh is reached. The default is
224.2.128.0.
򐂰 mc_netload=bytes_per_second
Specifies the speed, in bytes per second, that the repeater will send multicast
distributions. The default is 500000.
򐂰 mc_debug_level=trace_level
Specifies the trace level.
–
–
–
–
0: Records no trace information
1: Records exceptions only
2: Records general trace information
3: Records all implemented tracing
Trace levels are incremental. The trace logs are written locally on each
repeater to $DBDIR \mcast.log. The default is 1.
򐂰 pollrtry=retry_count
Specifies the maximum number of times that a multicast receiver will poll
receivers to determine their final status. The default is 5.
򐂰 port=port_number
Specifies the port number to use for multicast advertisements and multicast
data. The default is 9499.
򐂰 rcvbufsz=size_in_bytes
Specifies the size, in bytes, of the receive buffer of the UDP socket. The
default is 250,000.
򐂰 relrty=retry_count
Specifies the number of times that a multicast receiver will broadcast the
connection-release message to receivers. The default is 5.
򐂰 relwtout=time_in_milliseconds
Specifies the time, in milliseconds, that the sender will wait for the receiver to
release the connection after all data is transmitted. The default is 2000.
򐂰 repeat=count
Specifies the number of times that the server sends the same control packets.
This can be increased if packet drop affects performance. The default is 2.
Chapter 6. Multicast concepts and implementation
207
򐂰 returnIP=address
Specifies the IP address of the server that the receivers communicate with. In
satellite configurations, for example, the server-to-receiver traffic is a satellite
link, and the receiver-to-server traffic is generally a telephone line; the return
IP address will be different from the IP address of the source. The default is
0.0.0.0.
򐂰 sndbufsz=size_in_bytes
Specifies the size, in bytes, of the send buffer of the UDP socket. The default
is 250,000.
򐂰 ttl=count
Specifies the time-to-live integer. The integer indicates the number of times a
packet can be forwarded by routers. When a packet is passed through a
router, this integer is decremented; when it reaches zero, the packet is
dropped. Specify a number larger than the number of routers between the
multicast sender and receiver. The default is 5.
6.4 Endpoint multicast receivers
Enabling multicast on a gateway will cause a new multicast client to run on every
endpoint that belongs to the gateway. The multicast client will be started as an
endpoint boot method when the LCFD logs into the gateway. The multicast client
will run continually, listening for multicast distributions. If a gateway login fails (for
example, the machine is disconnected from the network), the client will not be
started. When a gateway is first configured for multicast, you will be given the
option to start the endpoints for multicast. If the endpoints are not enabled for
multicast they will not start until the next time the endpoints log into the gateway.
To enable multicast receivers on the endpoints one must issue the following
command, which will enable the gateway repeater for multicast and also the
endpoints.
wmdist -s repeater_name endpoint_multicast=TRUE
When this command is run the first time, it will ask you whether you would like to
start the multicast receivers on all the endpoints connected to this gateway.
When a multicast distribution occurs, the depot server sends a multicast
message advertising the distribution. The advertisement will contain a
description of the data being sent and the endpoints that should receive it.
Clients listen for these advertisements to determine which distributions they
should receive.
208
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Receive
Multicast
Multicast
Client
LCFD
Spawn
Software
Distribution
File
Cache
TMA
Figure 6-4 Endpoint multicast receivers
The multicast client stores the entire distribution in a local file on the endpoint.
This means that the endpoint should have enough free disk space to store the
distribution twice—once for the data cached in the local file and once for the data
as it is being installed.
The transfer of bulk data occurs before any downcalls are performed. Eliminating
downcalls before the transfer of data will improve performance.
For this release, the data transfer is also done without the participation of the
application. This means that neither the application nor the user has the ability to
refuse the transfer of data. Later, when the application is run, it still has the
option of not installing the data. The only negative impact is that disk space may
be consumed temporarily.
Checkpoint restart does not occur for multicast distributions. The depot server
always sends the entire distribution.
Endpoints marked as mobile will not receive multicast distributions unless the
distribution is hidden or the mandatory date has passed. Mobile users will
continue to use the mobile GUI and receive distributions through unicast
connections.
After the bulk data has been moved to endpoints through multicast, the repeater
will invoke the application's endpoint method. Instead of receiving data from the
Chapter 6. Multicast concepts and implementation
209
gateway, the MDist2 endpoint library will read data from the local file. The local
file will be deleted when all of the data has been read. Results will be returned as
in a normal MDist2 distribution.
The download of application method binaries will still occur through unicast
connections.
Retries for endpoints that fail to receive a multicast distribution will use the
normal MDist2 unicast retry mechanisms of retrying every X minutes for Y
minutes (default is every 15 minutes for an hour) or when the agent logs into the
gateway.
6.4.1 Configuring endpoint to receive multicast
By default, all endpoints can receive multicast distributions. The settings that an
endpoint uses for receiving multicast distributions are stored in the last.cfg file of
an endpoint.
These settings can be modified using the wep set_config command with the
following keywords:
depot_dir
This is a new parameter for multicast depot; the directory
where multicast distributions are stored until they are
installed. The default is $LCF_DATDIR/depot. For
example, to set the multicast temporary depot location to
/tmp on a UNIX endpoint called test, run the following
command: wep test set_config depot_dir=/tmp
log_threshold
The level of detail written to trace files for the endpoint.
The default is 1. Multicast log is integrated into the lcfd
log; by changing the log_threshold we also change the
logging level for mcast.
For details about the wep command, refer to the Tivoli Management Framework
Reference Manual Version 4.1, SC32-0806.
Note: Note that the endpoint version level must be 41000 or higher to support
multicast.
210
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
6.5 Multicast scenarios
With this release of Tivoli Management Framework, multicast may be used
between managed nodes to load MDist2 depots or between a gateway and its
agents. We will discuss three possible scenarios for multicast:
1. Preloading MDist2 depots with multicast
2. Multicast from gateways to Tivoli Management Agents
3. Use of multicast when the receiver and sender addresses are different on the
repeaters using multiple network interface cards (NICs)
The scenarios described below will not go into detail about creating a package,
but will focus on how multicast can be used to do Software Distribution.
6.5.1 Preloading MDist2 depots with multicast
Send a large distribution to endpoints connected to many different gateways.
The gateways may be connected through a satellite link or slow connections. In
this scenario, a significant performance improvement and bandwidth reduction
can be obtained by preloading the distribution's data into the gateways' MDist2
depots using multicast.
Source Host
Gateway or
Managed Node Repeater
Multicast
MDist 2 Repeater
MDist 2 Repeater
MDist 2 Repeater
Gateway or
Managed Node
Gateway or
Managed Node
Gateway or
Managed Node
MDist 2
Depot
MDist 2
Depot
MDist 2
Depot
Figure 6-5 Preloading MDist2 depots with multicast
The user's network must support multicast traffic from the source host to all of
the gateways. The source host must be a managed node running either a
Chapter 6. Multicast concepts and implementation
211
managed node repeater or a gateway. Both the sending and the receiving
repeater must have repeater_multicast=TRUE.
The final step of moving the data to endpoints is accomplished by a second
distribution that uses the pre-stored data in the gateway depots. The second
distribution may use multicast or unicast to send data to the gateway's agents.
In this example we have a Windows 2000 Advance Server TMR server
(win-tmr01a), which is also the source host. We will load software package
Tivoli_JRIM^4.1 to three Microsoft Windows NT/2000 gateways using multicast.
We do not want the distribution to attempt any unicast if multicast fails.
Figure 6-6 Loading depot using multicast
We have selected the database profile manager (pkgs.swd.apps.pm.a) to be
able to distribute to the specified managed nodes. The network is multicast
ready.
212
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
We have also enabled all the gateways to be multicast ready. 6.3, “Distributed
depot service” on page 203, explains how to enable repeaters for multicast.
Perform the following steps to the load the MDist2 depots using multicast:
1. From your Tivoli Desktop right-click the profile, as shown in Figure 6-6 on
page 212.
2. Click Load, which should bring up the Load software package window.
3. After configuring the distribution and selecting subscribers, click Advance
Options and select Distribution Settings, as shown in Figure 6-7 on
page 214.
4. This brings up the Distribution Settings widow. By default under the Multicast
Management, Enable Multicast is unchecked. To enable multicast you will
have to check the box, which will also check Retry Unicast. Because in our
example we do not want to retry unicast, you should uncheck Retry Unicast,
which will cause the distribution to fail if multicast fails.
Chapter 6. Multicast concepts and implementation
213
Figure 6-7 Configuring depot load for multicast
5. After making the selections, click Set and Close, followed by Load and
Close. This will cause the software package to be loaded to the respective
depots using multicast.
Note: If a multicast distribution is attempted to a single endpoint, then unicast
will be used irrespective of the distribution mode. You can still multicast to a
single repeater.
Command line
Loading of depot using multicast can also be achieved via command line by
using wldsp with -l is_multicast [ t | f ] set to t. Setting the
enable_multicast token to t enables the retry_unicast token. To disable and
unicast attempt you have to set the retry_unicast to f. This option can be used
only if the enable_multicast option is set to t. For more detailed information
214
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
regarding wldsp please refer to IT Configuration Manager Reference Manual for
Software Distribution 4.2, SC23-4712.
6.5.2 Multicast from gateways to Tivoli Management Agents
Multicast can be used to send data from the Tivoli Management Gateway to its
TMAs. As seen in Figure 6-8, we have a simple gateway-to-endpoints multicast.
For endpoints to receive multicast distributions, the steps mentioned in “Endpoint
multicast receivers” on page 208 should be followed to enable multicast on
receivers and endpoints.
Gateway Repeater
Multicast
TMA
TMA
TMA
TMA
TMA
TMA
Figure 6-8 Gateway multicast to endpoints
To explain the scenario of multicast between gateway and endpoints we will use
the Data Moving service to show how a large file of 135 MB is sent to multiple
endpoints from a source host that is a gateway. The gateway is an AIX 5.1 box
serving multiple endpoints. The target boxes that will receive the distributions are
Windows 2000 Professional desktops. Each desktop has a single endpoint
running. We will use only five endpoints for our target distribution.
The gateway has a zipped file, data4.zip, which is located in a user-defined
directory, /usr/local/Tivoli/file_source. The file size is approximately 135 MB, and
has to be placed in the C:/TEMP directory on the target.
The network has been multicast enabled, and we verified that all the target
endpoints are multicast enabled and listening by doing a simple multicast ping
using the wmcast -p option.
The Data Moving service provides the capability to perform data distribution, with
send, retrieve, and delete capabilities, between managed nodes and endpoints.
However, for this example we focus on the send option.
Chapter 6. Multicast concepts and implementation
215
Data Moving operations can be managed in an activity plan, using the Activity
Plan Editor. We will store our plan as a draft template.
All Data Moving operations are referenced with a single, logical software
package object reference known as DataMovingRequest.1. This consistent
object helps prevent database cleanups and maintenance issues after
distributions.
Step-by-step information on how Data Moving was used to distribute a file
through the multicast follow:
1. From the Tivoli Desktop click Activity Plan Editor. This will bring up the
Activity Plan Editor using the same user login that was used to open the
desktop.
2. As shown in Figure 6-9, click the Software Distribution icon under Activities
to create a Data Move activity.
3. This brings up the Activity Properties window, as shown in the same figure.
Give it a name of your choice. We call it Data_Moving_Multicast_Send. Give
it a description of your choice.
4. Select the operation to be performed, which is Send.
Figure 6-9 Gateway to endpoint multicast: Activity Plan Editor
216
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
5. Click Properties and this will bring up the Send Properties window, as seen
in Figure 6-10 on page 218.
6. The Send Properties window is divided into multiple folders. Under
Applications Options, key in the:
a. Data Origin Source Host: Select the source host that is our gateway,
aix-tmr1b.
b. File Name: data4.zip.
c. Data Moving Objects: File Path at origin: /usr/local/Tivoli/file_source. File
path at destination: C:/TEMP.
d. Under Distribution Options, right at the bottom you should see Multicast
Management. Click Enable Multicast and leave Retry unicast checked.
e. Click OK to save the send properties and the next OK for the Activity
properties.
Chapter 6. Multicast concepts and implementation
217
Figure 6-10 Gateway-to-endpoint multicast: Send properties
218
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7. Now that we have tuned our distribution parameters, we should see our
distribution icon in the planer. The next step is to select our Windows 2000
desktop endpoints as targets for the distribution.
8. Right-click the icon, which now has the label of
Data_Moving_Multicast_Send.
9. Select Targets, which brings up the Select Target window, as seen in
Figure 6-11.
10.As we want the endpoints to be our targets, we will leave the default value of
Endpoints for Target Types for Browsing.
11.Under the Target Selection list, click Insert and this should bring up the
Select target window as shown in Figure 6-11. By clicking Target List you can
bring up the endpoint list to select your endpoints.
12.Save the targets by clicking OK in all the target windows.
Figure 6-11 Gateway-to-endpoint multicast: Select targets
Chapter 6. Multicast concepts and implementation
219
13.Once done, the activity plan is complete and we need to save the plan name.
Select the icon and click View from the top menu and select Plan Properties.
Give it a plan name. We gave it the name Data_Move_Plan. This is the name
you select to submit the plan.
14.Now to submit the plan we need to click the Activity Plan Monitor from the
desktop. This brings up the Tivoli Software Distribution - Activity Plan Monitor
as seen in Figure 6-12.
15.Click Plans -> Submit and select the plan.
16.The zip file data4.zip will now be multicast to all our target endpoints.
Figure 6-12 Gateway-to-endpoint multicast: Activity Plan Monitor submission
6.6 Multicast limitations
In this chapter we have shown the new multicast option now available and how it
can benefit you in your environment by speeding distributions and avoiding
220
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
network congestions. But, with all the benefits come a few limitations and
concerns one must consider before using multicast.
1. While data is being sent through multicast, a pause or cancel action will have
no effect. The command will not take effect until after multicasting has
finished.
2. While data is being sent through multicast, the wmdist -I command will not
show the progress of the transfer. Instead you will see an arbitrary number
identifying that this distribution is multicast. Example 6-1 shows an example.
3. Software Distribution will be used to preload depots similarly to the way it is
done today, but with multicast enabled. Multicasting to agents will be done in
Software Distribution by enabling the distribution's multicast flag. When using
multicast, bulk data is moved to the endpoint before invoking the application.
For Software Distribution, this means that its prerequisite checking (for
example, checking available disk space or if the application has already been
installed) happens after the bulk data has been stored on the endpoint. If
Software Distribution later decides it should not install the application, the
bulk data was transferred needlessly. However, the only adverse side effect
of this is the temporary consumption of disk space.
Example 6-1 Multicast distribution status and ID
# wmdist -I aix-tmr1b
Repeater: aix-tmr1b
Jobs in SEND queue:
Jobs in RECEIVE queue:
2
0
=== Session Information ===
Low:
available = 40
Medium: available = 9
High: available = 5
used = 0
used = 1
used = 0
=== Distribution Information ===
External Id:
Internal Id:
Label:
Priority:
Application:
Target:
Target:
Target:
Target:
1375372617.152
1375372617.152
jcf.1
(install)
3
Software Distribution
WIN-MUR-01
win-bkp03b
winarch01b
WIN-MUR-02
State:
State:
State:
State:
WAITING
WAITING
WAITING
WAITING
0%
0%
0%
0%
(0/0)
(0/0)
(0/0)
(0/0)
Chapter 6. Multicast concepts and implementation
221
Target: WIN-MUR-03
State: WAITING 0% (0/0)
Target: WIN-MUR-04
State: WAITING 0% (0/0)
Target: WIN-MUR-05
State: WAITING 0% (0/0)
=== Distribution Information ===
External Id:
Internal Id:
Label:
Priority:
Application:
1375372617.152
1375372617.1.578#1028222779
jcf.1
(install)
3
Software Distribution
Target: aix-tmr1b
State: RECEIVING 0% (0/0)
4. By nature, as mentioned earlier, multicast is a UDP-based protocol, and
networks need to be configured to allow multicast to flow. This definitely is a
concern in a firewall environment. If you wish to use multicast through
firewalls then you will have to configure the firewall to pass multicast packets
in both directions (from sender to receiver for bulk data, from receiver to
sender for acknowledgements). Multicast uses at least two multicast groups
(IP address + port):
– Multicast advertisements, which in our case use 224.0.1.18 + 9499.
– Actual distribution, which will be decided by the mclow and mchigh values
configured under wmcast. By default this range is from 224.2.128.0 to
224.2.255.255.
5. The data sent through multicast is not encrypted and should be used under
secure networks.
6. Because multicast is cached on the endpoint prior to processing, the endpoint
must have twice the distribution size in free space.
6.7 Troubleshooting multicast
This section covers a few tips on how to troubleshoot issues related to
distributions through multicast. It tells where the logs are placed and how to
increase and decrease the debug levels of multicast logs.
6.7.1 Repeater multicast log
The Distributed Depot service, as mentioned earlier, is capable of reading and
writing to the MDist2 depot. This causes the initial logging of any distribution to
be registered to the MDist2 logs, but once the handle is passed to multicast it
then spawns the logging to its own multicast log. To get the best logging for
MDist2 calls we need to change the repeater’s logging level.
222
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
If the managed node is a repeater then the MDist2 log is written to the rpt2log in
the database directory. The logging level can be set using the following
command:
wmdist -s repeater_name debug_level=number
Where 0 is the least information and 9 is most information. The default is set to 3.
If the repeater is a gateway, then the gateway’s gatelog provides the necessary
MDist2 logs. Setting the gateway to debug level 9 would give the most
information regarding MDist2. The gateway’s debug level can be set using the
following command:
wgateway gateway_name set_debug_level number
It is recommended to set the gateway to debug level 9 when dealing with Mdist2
issues.
The new logfile for the multicast depot server is placed in the $DBDIR/mcast.log.
This log provides detailed information regarding multicast depot communication.
The logging level for multicast can be set using:
wmcast -s repeater_name mc_debug_level=number
Where the number ranges from 0 to 3. The default is set to 1.
򐂰
򐂰
򐂰
򐂰
0: No logging
1: Exception logging
2: Most logs including exceptions
3: Most logs plus the entry, exit, and exceptions
6.7.2 Endpoint receiver log and structure
Once the endpoint logs into the gateway that has endpoint_multicast=TRUE in
its wmdist parameters, the endpoint is now multicast enabled. To know if the
endpoint is running multicast, a process called mcast_receiver is running on the
endpoint. The endpoint also created two new directories under the
$LCF_DATDIR:
򐂰 mcast
򐂰 depot
The depot directory is the location for the multicast receiver depot. This can be
changed using the depot_dir parameter in the last.cfg.
The multicast logs are included into the lcfd.log for convenience. The logging
level for the multicast log is also tied to the lcfd.log, as mentioned in “Configuring
endpoint to receive multicast” on page 210. $LCF_DATDIR/last.cfg should have
log_threshold=3.
Chapter 6. Multicast concepts and implementation
223
To check if endpoints are listening for multicast, the following command can be
used to do a multicast ping:
wmcast -p repeater name
This will send a multicast advertisement to the endpoints and check if they are
received.
6.7.3 Best practices and tips
Here are some best practices and tips for multicast:
򐂰 “Hyper Delivery (RMTP) flow” on page 200 will help when looking at the
multicast logs to match the communication between the sender and receivers.
򐂰 For software package profiles that target mobile endpoints, to receive
multicast distributions the distribution must be marked as hidden.
򐂰 Multicast is not supported on Tivoli Firewall Security Toolbox or multiple
endpoints on a workstation.
򐂰 Router configuration must be discussed with a customer before deciding on
using multicast in a customer environment. You need to make sure that
routers are configured to allow multicast.
򐂰 When the repeater is sending data you will see the Send MC_DT method in
the mcast.log. Usually during large distributions this is a good indicator of
data being sent if the mcast.log is tailed.
򐂰 You could also use the netstat command to check if UDP packets are
flowing across the system by running the following command.
netstat -s -p UDP
򐂰 If the advertisement address is changed on the repeater, then it needs to be
changed on all the receivers’ endpoints too. We recommend leaving the Tivoli
default advertisement address as 224.0.1.18, as it is registered with the
IANA.
򐂰 The time-to-live integer for multicast is set to 5 by default. If you have multiple
routers between your receiver and target, then you may have to change this
value. You can use Trace Route to determine how many hops are between
the sender and receiver.
224
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7
Chapter 7.
Troubleshooting IBM Tivoli
Configuration Manager
IBM Tivoli Configuration Manager 4.2 aims to make distributed systems and
application management relatively easy. It achieves this through a consistent
interface and the use of models, such as management by subscription. While the
systems administrator can perform many tasks with relative ease, the code Tivoli
provides to achieve those tasks is extraordinarily complex. With the solid
foundation of the Tivoli Management Framework, this complexity can remain
largely masked from the administrator. However, with such a sophisticated set of
products, there will be occasions when those designing, testing, and
implementing Tivoli solutions will encounter situations that are not resolved by
reference to product manuals alone.
In problem-solving situations, you need to understand what is going on between
the product components, what messages and trace output means, and what
extra actions you can take to try to resolve a problem.
The following troubleshooting topics are discussed in this chapter:
򐂰
򐂰
򐂰
򐂰
򐂰
Generic problem determination outline
Trouble shooing Framework 4.1
Autotrace
Troubleshooting Software Distribution
Troubleshooting MDist2
© Copyright IBM Corp. 2004. All rights reserved.
225
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
226
Troubleshooting Activity Planner
Troubleshooting Change Manager
Troubleshooting Web Gateway and Device Management
Troubleshooting Web User Interface
Troubleshooting Enterprise Directory Integration
Troubleshooting Inventory
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.1 Generic problem determination outline
If you start to receive errors and you have questions about the cause, this
generic outline for problem determination may help. If you have a scenario that
you can recreate, the following is a generic list of steps to perform to gather
documentation.
To obtain an overall picture of what is being passed by oserv:
1. Do odadmin odlist to determine the number of managed nodes and
interconnected TMRs.
2. Do odadmin alone to get information, such as the port range restrictions (if
any), or other oserv parameters like Single Port BDT in place.
3. Do odadmin environ get to determine the environment the oserv is using.
4. To gather data from each suspected machine:
a. Log on as root and as a Tivoli root administrator. This helps ensure you
are not experiencing authority problems.
b. Run the following commands:
odadmin trace objcalls
odadmin trace services
c. Recreate the problem on every involved machine, including the TMR
server.
d. Do odstat -v > odstat.txt.
e. Do wtrace -jHk $DBDIR >wtrace.txt (or %DBDIR% for Windows).
f. Collect the above files plus oserv.log and any useful system logs.
5. Once tracing has been done or the problem determined, you could turn
tracing back to the default of tracing only errors.
odadmin trace off
odadmin trace errors
The trace should help you determine the failing objcall.
Note: Leaving tracing on for objcalls and services could cause performance
impact on the oserv. For troubleshooting you could leave it on until a problem
is determined and then turn tracing back to the default.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
227
7.2 Troubleshooting Framework 4.1.1
IBM Tivoli Configuration Manager 4.2 is comprised of various products and there
are various logs available within the product. In this section we focus on Tivoli
Management Framework logs related to Inventory and Software Distribution.
When you are troubleshooting problems with Tivoli Management Framework,
there are a number of important commands that will help you. The three most
commonly used when tracing oserv are:
odadmin
Lists the managed nodes in a TMR and configures
different aspects of how the Tivoli object dispatcher
(oserv) communicates, such as defining IP addresses and
interconnected regions. If you run odadmin without any
options, the default is odadmin odlist command, which
gives information about oserv options.
odstat
Lists currently running methods and method histories.
tmstat
Lists the current status of transactions and locks.
wtrace
Formats the odtrace.log, which is created when tracing
objcalls, services, or errors (tracing is invoked with
odadmin trace options).
Additional logs can be found in the database directory, which is locatable through
the following variable names:
򐂰 $DBDIR on UNIX
򐂰 %DBDIR% on Windows NT/2000/2003 or OS/2
The database directory contains other files that can be used as debugging tools:
epmgrlog
Endpoint manager log
gatelog
Gateway log
odb.log
Tivoli database transaction log
gwdb.log
Tivoli Gateway database transaction log
oservlog
Error log of the Object Dispatcher (oserv)
odtrace.log
The file that the wtrace command reads and translates
On a TMA endpoint, there is also a logfile in the /lcf/dat/xx path.
lcfd.log
Endpoint log
In some cases, you may need to get into the more complex area of direct
manipulation of the Tivoli object database. You can hand-run methods, identify
method source files, and so on.
228
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
For more information on these Framework commands and logs refer to Tivoli
Framework V 4.1.1, Maintenance and Troubleshooting Guide, GC32-0807.
7.3 Autotrace
In Tivoli Management Framework 4.1 the Autotrace feature has been
incorporated for various components. Autotrace is a "flight recorder" type trace
tool, which means it is designed to run all the time in a product's production
environment with minimal performance impact. Autotrace is a third-party tool
incorporated by Tivoli for troubleshooting. The software is originally developed by
The Kernel Group Inc. (TKG).
The data collected by Autotrace represents the execution of the program itself
and can be used to determine control flow. Function entry and exit are recorded
with the parameters passed and the return codes given.
Autotrace has a minimal impact on the performance of a process. Because of
this, we can deploy code with Autotrace built in. This removes the need for debug
code to be shipped for many cases of problem determination. Each trace hook
can be set to be active or not.
It captures all traces in memory for maximum performance. Trace buffers are in
shared memory, which allows trace to be captured to a file even when the Tivoli
product abends suddenly.
Autotrace has a concept of a trace ID. Autotrace associates each unique function
signature with a number called the trace ID. The number and types of
parameters, the return type, and the file the function is found in make up the
function signature. IBM keeps a database of these trace IDs. The trace IDs are
remembered across releases so that we can accurately report the data from
snap files across different versions of the executables.
It also allows for dynamic control over the parts of a program that are being
traced at any given time. Trace data collection is as simple as running a
command to save a trace buffer snapshot, which can then be analyzed later,
either locally or remotely, with the interactive tools provided.
The Autotrace Trace Profiler analyzes one or more snap files and produces a
summary output detailing which program functions were called, how often they
were called, and provides overall statistics. The Trace Profiler can be used to
determine what the First Failure Data Capture set of functions needs to be.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
229
Note: Reading the data collected from Autotrace requires access to the Tivoli
source code and database. One should do the required tracing only if
requested by a Tivoli representative.
7.4 Troubleshooting Software Distribution
In this section we share troubleshooting techniques for the Software Distribution
component. We provide a general approach for diagnosing distribution problems.
The internals, architecture, and diagnostic techniques for all major components
of Software Distribution will also be reviewed because understanding the process
flow of each component is very useful when troubleshooting a problem.
7.4.1 General troubleshooting
The problem determination steps should be based on the process flow of the
components of the products so that the point of failure could be determined and
rectified.
For Software Distribution, there are three main components in the process flow.
These are the Framework infrastructure, the endpoint, and the software package
profile. The Framework infrastructure needs to be reviewed first since distribution
of any profiles will not work without it. Then the endpoint needs to be checked
that it is in working order. The last thing to check is the Software Distribution
profile and its associated spd or spb.
The Framework environment is the infrastructure used by Software Distribution,
so the first thing to check is that the Framework environment is functioning
correctly. You must check that all required Software Distribution components and
prerequisites have been correctly installed and configured on the Tivoli Server
and gateways. You need to check that functions of the Tivoli Server, all gateways,
and managed nodes are all functioning correctly. A wping of the managed node
may indicate that the managed nodes are up and running but does not
necessarily mean that it is functioning correctly. You can test this by pushing out
other types of profiles, like Inventory profile, to endpoints other than the suspect
endpoints. A failure here would indicate a problem with the Framework
environment. The gatelog of the gateway, the oservlog, and the mdist log would
need to be reviewed at a increased trace level. Refer to the 7.2, “Troubleshooting
Framework 4.1.1” on page 228, to further determine the cause of the problem.
With the checking of the condition of the endpoint, besides checking that it is
running, you should push out other types of profiles, like Inventory or even other
software package profiles, to check that it is functioning correctly. If this is failing,
the problem could be with the endpoint. If more than one endpoint is
230
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
encountering the problem, check for any set pattern. For examples, all the
problematic endpoints serviced by the same gateway or the same profile are
failing on all these endpoints. The problem then could be with the gateway or the
profile. For problems with the gateway and endpoint, refer to 7.2,
“Troubleshooting Framework 4.1.1” on page 228, to further determine the cause
of the problem.
With the Framework infrastructure and the endpoint in working order, the problem
could be with the software package profile or the software package. Test the
software package profile by distributing to a known working endpoint. A failure
here could indicate that the problem could be with the profile or the software
package. The best source of information of the distribution is in the software
package logfile and the Software Distribution trace files. Review these logs to
determine the cause of the problem.
The settings of the software package profiles should be checked, and how those
settings or options can affect the operations on the endpoints. One of the things
to watch out for is with nested software packages. A Software Distribution to a
group of endpoints failing with an error like failed cm_status check could be
due to one of the nested packages being already installed on one of the targeted
endpoints. Using the force or ignore options should allow the distribution to
complete. Refer to the IBM Tivoli Configuration Manager User’s Guide for
Software Distribution, SC23-4711, for the requirements and implications of using
these options.
There can be times where the installation of the software package is successful
but the status in the log does is not correctly indicate this. This can occur with
user_program defined as the final action, which has an indefinite timeout or a
manual reboot of the target required. This is due to the records of the states of
the software packages in the Inventory database being out of sync with the
endpoints’ catalogs, which hold the states of the software package. You will need
to run wsyncsp to reconcile the information.
The other sections in this chapter detail how to enable tracing and which logfiles
need to be reviewed for the different components.
7.4.2 Check the log
In general, the first step in troubleshooting is to consult the logfile, which contains
more information than a Software Distribution notice group entry or an e-mail
sent about the software package operation. Log files provide a detailed list of
successful or failed attempts to distribute software packages for each endpoint.
The append_log keyword keyword is set in the software package definition file.
Check this file to verify that the append_log keyword is set. If it is, the logfile will
contain information about software package operations.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
231
The default location of the logfile is on the TMR server under directory structure
$BINDIR/. ./swdis/work. However, it is possible to generate a logfile on a specific
managed node with the log_host_name attribute in the SPD file that specifies the
label of the managed node, typically the host name, where the logfile is
generated.
The default name for the log is package-name^package-version.log. You can
specify the logfile’s location on any managed node or target in the Package
Properties dialog from the Software Package Editor. To change the location of
the logfile using a software package definition file, update the log_file_path
attribute.
We recommend that you generate a detailed log on the endpoint that records
each action in the software package and the results of change management
operations on the package. The target logfile is set with the log_object_list
stanza in the SPD file, and the location keyword that identifies the path name or
subdirectory. If the directory does not already exist, it will be created. The logfile
will also be SPname.SPversion.log or SPname^SPversion.log, the same as for
the logfile name on the TMR or designated managed node. IBM Tivoli
Configuration Manager, by default, will overwrite the logfile with each new
distribution of the software package.
7.4.3 Check the Distribution Status Console
To check the Distribution Status Console you will need to:
򐂰 Determine which targets are failing.
򐂰 Determine if repeaters are failing.
򐂰 Determine the status of different distributions:
– Waiting
– Interrupted
– Receiving
Consulting the Distribution Status Console is a good way to get a graphical
representation of what the status is of all the systems involved in a distribution.
By using the Distribution Status Console, you can determine which targets or
repeaters did not receive the distribution.
A PAUSED status for the distribution could be for endpoints operating in mobile
mode. Check the login_mode of the endpoint by running wep endpoint_label. If
the target endpoint is not running in mobile mode and you did not pause the
distribution, continue further troubleshooting by checking the software package
logfile, mdist log, gatelog, and the lcfd.log to determine the point of failure.
232
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.4.4 Make sure that Tivoli Framework is functional
To make sure that Tivoli Framework is functional:
򐂰 Suspect this problem if the endpoint was previously able to receive
distributions, and suddenly is unsuccessful.
򐂰 Make sure the oserv is running on gateways.
򐂰 Verify the setup of endpoints.
Of course a distribution will fail if gateways are not receiving the distribution or if
endpoints are not connected to gateways. If a particular endpoint suddenly can
no longer receive distributions, then Framework is a good place to check for
problems. Run the Framework command odadmin odlist to confirm that all
systems are connected. Use the wping command to confirm that the oserv is
running on a particular gateway.
Note: Do not forget that you have to have both name and reverse name
resolution for Tivoli Managed Nodes to communicate. If you are having
reverse mapping problems, add the IP address-to-host name maps to DNS.
Also recommended is to add data to the /etc/hosts file and use /etc/hosts as a
DNS fallback.
Do the following to verify the setup of endpoints:
򐂰 Verify the endpoint connection.
򐂰 Verify endpoint configuration settings.
򐂰 Verify the gateway log.
The wep command can provide a list of all endpoints in a TMR and their assigned
gateways, retrieve and set endpoint information, migrate an endpoint from one
gateway to another, and update any endpoint data changes within a TMR. This
command also can list information in the endpoint list that is maintained by the
endpoint manager.
The wadminep command set with the view_config_info option lists the
configuration settings for a particular endpoint.
After configuring a gateway, you can set the set_debug_level option with the
wgateway command to track information about the gateway. The wgateway
command lists gateway object identification numbers, names, and status within a
TMR.
The wgateway debug_level debug_level command sets the level of message
information that is logged by the gateway. The default is 0, which provides
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
233
information on Error messages. 8 (maximum level) provides the most verbose
information on upcall and downcall activity.
Tips: One particular case is when you have reinstalled an endpoint, but the
endpoint does not seem to be able to log into the Tivoli environment. To
correct this problem you need to delete the previous endpoint using the wdelep
command.
If your endpoints have problems contacting their gateway first check whether
your endpoints can see their gateway by using the ping command.
7.4.5 Check for MDist2 problems
Software Distribution uses MDist2 for distributions and the distribution
information can be found in the MDist2 Distribution Manager’s log distmgr.log,
which is located in $DBDIR. You can set the trace level to the maximum level by
running wmdist -D 9. Review this log for any possible causes and rectify it.
Review the MDist2 settings to ensure that they are within range and the time-out
settings have not been exceeded.
Many distribution problems are caused by problems transmitting the package
along the chain of repeaters to the endpoints that are the targets of a distribution.
Failures occur, for example, because a connection is lost between an endpoint
and its gateway, a distribution times out because of performance problems, or a
user program fails or does not complete.
Common MDist2 problems
The following list provides some examples of distribution failures that are
symptoms of problems with the distribution network of repeaters, gateways, and
endpoints:
򐂰 You can successfully distribute a software package to one endpoint but a
distribution to multiple endpoints fails.
Ensure that the repeaters are optimized and configured correctly.
򐂰 You have network storms.
Use the wmdist command to examine the MDist2 parameters and to change
them if necessary. In particular, check the value of the max_sessions_high,
max_sessions_medium, and max_sessions_low parameters, which set the
number of allowable connections: High-priority (default: 5), medium-priority
(default: 10), and low-priority (default: 40) connections, respectively.
234
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 You can no longer distribute to an endpoint to which you previously were able
to send distributions.
Ensure that the endpoint is connected to its gateway and is active.
򐂰 Distribution times out.
If the distribution times out, check the values for send and execute timeout set
using the wmdist command.
Note: All distributions have an absolute maximum time limit, after which
they will be reported as expired. The default time limit is 72 hours.
򐂰 Distribution takes longer than expected.
You can use the wmdist -I gateway/repeater name command to monitor the
progress of loading the software package at each repeater (it gives the
number of bytes transferred and the percentage complete). If you decide that
performance is bad, you may decide to change the way in which your network
is configured (netload).
The alternative wdepot command checks on the existence of a package at a
depot, and thus may be useful if the level of completion is of no interest to
you.
You may also consider configuring a machine that is continually used as a
source host as a repeater. By configuring the source host as a repeater, you
can tune the communication parameters of the machine so that the software
package is routed directly from the source host to its gateway. This saves time
and network load.
Note: Use the wmdist -s rptname debug_level command to change the
information level from the repeater log or gateway log. The value ranges from
0–9. The log name is $DBDIR/rpt2log.
򐂰 If the system is a repeater, the default is 3.
򐂰 If the system is a gateway, the default is 0.
For example, the wmdist -s test debug_level 9 command changes the
information level on the test system to 9. The log is written in the
$DBDIR/rpt2log file.
7.4.6 Troubleshooting the software package
Check the software package definition file (SPD):
򐂰 Use if you suspect the software package itself is the problem, such as if other
SP distributions succeed.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
235
򐂰 The SPD file provides details of the software package in one look.
򐂰 Use the wgetspat command to get the attributes of the software package.
Note: The minimum authorization role required to retrieve the attributes for a
specified software package object is user.
The SPD file allows for setting all possible properties and options in a readable
text format, including those only available using an import or export. The SPD file
can be considered the instructions or control file defining actions and how they
are performed.
There are three ways to obtain the software package definition file, which is given
a suffix of .spd, for example, SPname.SPversion.spd, by convention:
򐂰 Java Endpoint Software Package Editor -> File -> Save as and save the
package, selecting .spd as the suffix (or extension).
򐂰 The wexpspo command, which allows for exporting content of a software
package to either a file or standard out.
򐂰 Tivoli Desktop -> SP profile, right-click Export.
The wgetspat command extracts the attributes of the SP object, which may be
quite useful in debugging a problem. Some of the relevant attributes to review
for diagnosing a problem are the settings for:
– stop_on_error
Specifies whether to stop (fail) a distribution to an endpoint when any error
(fatal or non-fatal) occurs.
– backup_fmt
Specifies whether and where to back up any files being overwritten by the
files distributed in the software package.
– list_path
Specifies where to write a list of files distributed to an endpoint.
– prog_env
Sets the environment for the configuration programs on an endpoint. (This
keyword applies to UNIX and Windows NT/2000 platforms only.)
– log_file
Specifies the file to which log information is written.
– log_host
Specifies the machine on which the logfile resides.
236
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.4.7 Software Distribution traces
Traces provide more detailed information about packaging or distributions
enabled for the specific component related to the failure or failed Software
Distribution operation. Therefore, traces may be taken on the server, source host,
endpoint, preparation site, or disconnected CLI.
On endpoints the trace level is set in the Software Distribution base configuration
file, swdis.ini, located in the system directory on the target system for the
respective OS platform:
򐂰
򐂰
򐂰
򐂰
Windows: \winnt\ or \winnt40\
OS/2: \os2\
NetWare: sys:\System
UNIX:
/etc/Tivoli/ (global for root user)
$HOME/.swdis/ (local / private for non-root user)
Important: Setting the trace level using swdist.ini works only for endpoints,
starting with IBM Tivoli Configuration Manager Version 4.2. New with IBM
Tivoli Configuration Manager Version 4.2, there is a command, wswdcfg, to set
trace information on the Software Distribution servers and managed nodes.
The syntax follows:
wswdcfg –s trace_level= 0, 1, .....6
wswdcfg –h hostname
This command is not applicable for endpoints, where swdist.ini should be
used.
There is also another troubleshooting command that is new with IBM Tivoli
Configuration Manager Version 4.2: wmsgbrowse. It is used for investigating the
Notification Manager queue (browse the message queue, filter it, find
undelivered messages, etc.) in order to understand the problem.
For details on both of these troubleshooting commands please refer to the IBM
Tivoli Configuration Manager Reference Manual for Software Distribution
Version 4, SC23-4712.
The trace level by default is zero (as seen in Example 7-1) or none, which really
indicates no tracing or that tracing is, in effect, disabled. The new trace level
takes effect on the next distribution or execution.
Example 7-1 swdis.ini
[#SERVER]
product_dir=/usr/local/Tivoli/bin/swdis
working_dir=/usr/local/Tivoli/bin/swdis/work
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
237
backup_dir=/usr/local/Tivoli/bin/swdis/backup
trace_level=0
trace_size=1000000
report_threads_limit=10
inventory_rim_name=inv_query
autopack_dir=/usr/local/Tivoli/bin/swdis/autopack
staging_dir=usr/local/Tivoli/bin/swdis/service
user_file_variables=/usr/local/Tivoli/bin/swdis/swdis.var
import_libraries=spd,libscimp
[aix-tmr01b]
product_dir=/opt/Tivoli/swdis/1
working_dir=/opt/Tivoli/swdis/1/work
backup_dir=/opt/Tivoli/swdis/1/backup
trace_level=0
trace_size=1000000
send_timeout=300
autopack_dir=/opt/Tivoli/swdis/1/autopack
staging_dir=opt/Tivoli/swdis/1/service
user_file_variables=/opt/Tivoli/swdis/1/swdis.var
import_libraries=spd,libecimp
inventory_scan_file=/opt/Tivoli/lcf/inv/SCANNER/sd_scan.nfo
There is no maximum size of each trace file; the default size per type is
1,000,000 bytes. When the trace_size specified is reached, the first trace file is
overwritten. For example, the trace files can be written from spo1.trc up to
spo9.trc (sp01.trc, sp02.trc, etc.), and if the specified maximum size is reached
and sp09 gets full, sp01.trc is overwritten (unless the trace_style keyword is
activated).
The trace file depends on the machine role for the installed component. The
trace files themselves are created initially, with trace_level = 0, zero byte, until the
trace_level is increased. Example 7-2 shows the swdist.ini file with the trace level
set to 5.
Example 7-2 Listing in swdis.ini on endpoint
C:\WINNT>type swdis.ini |more
[3B-053]
speditor_dir=C:\Tivoli\swdis\1\speditor
product_dir=C:\Tivoli\swdis\1
working_dir=C:\Tivoli\swdis\1\work
backup_dir=C:\Tivoli\swdis\1\backup
profile_dir=C:\Tivoli\swdis\1\work\profiles
trace_level=5
trace_size=1000000
send_timeout=300
autopack_dir=C:\Tivoli\swdis\1\autopack
staging_dir=Tivoli\swdis\1\service
238
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
user_file_variables=C:\Tivoli\swdis\1\swdis.var
inventory_scan_file=C:\Tivoli\lcf\inv\SCANNER\sd_scan.nfo
[#MOBILE]
speditor_dir=C:\Tivoli\swdis\1\speditor
product_dir=C:\Tivoli\swdis\1
working_dir=C:\Tivoli\swdis\1\work
backup_dir=C:\Tivoli\swdis\1\backup
profile_dir=C:\Tivoli\swdis\1\work\profiles
trace_level=5
trace_size=1000000
send_timeout=300
autopack_dir=C:\Tivoli\swdis\1\autopack
staging_dir=Tivoli\swdis\1\service
user_file_variables=C:\Tivoli\swdis\1\swdis.var
inventory_scan_file=C:\Tivoli\lcf\inv\SCANNER\sd_scan.nfo
It may be worthwhile to erase any existing trace files to ensure a good capture for
recreation or diagnosis.
򐂰 Software Distribution trace levels
–
–
–
–
–
–
–
0: None (default)
1: Fatal
2; Error
3: Warning
4: Information
5: Verbose
6: On L3/Development request only
򐂰 Software Distribution trace flags
–
–
–
–
[F]: Fatal Failure
[E]: Error
[W]: Warning
[I]: Information
Here is a summary of the logfiles at the different locations.
򐂰 Server (spo_core.exe)
– tmesdis*.trc
CLI
– spo*.trc
•
•
Import/export
Requests to source host
򐂰 Source Host (spd_eng.exe)
– spde*.trc
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
239
•
•
Import/export
Build
– mdist*.trc
MDist2 interfaces
򐂰 Endpoint/PrepSite (spd_eng.exe)
– tmesdis*.trc
CLI
– spde*.trc
•
•
Build (prep.site)
Execution
– autopck*.trc
autopack (prepsite)
7.4.8 Troubleshooting Data Moving
Below you will find the Data Moving log and trace files.
Data Moving logfile
The log and trace settings for Data Moving are the same as for Software
Distribution software packages.
The DataMovingRequestxxx.log
The DataMovingRequestsXXX.log is located under the working_dir designation
in the swdis.ini file on the TMR server; for example, on an AIX TMR server under
the path /usr/local/Tivoli/bin/swdis/work/. The logfile records information
regarding Data Movement operations and distributions.
Data Moving trace files
tmesdisxx.trc, swdmgrxx.trc, and spoxx.trc are located on the TMR server. They
report all the traces associated with the wspmvdata command. These files are
unique in the case of interconnected TMRs when the Tivoli Software Distribution
Server component is installed after the interconnection.
spde*.trc resides on the source host and endpoint. It records diagnostic
information about the import, export, build, and execution processes.
240
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.4.9 Troubleshooting Mobile Computing
We will cover the Mobile Computing process flow and log and trace files for
Mobile Computing to help you in diagnosing problems associated with the
Software Distribution to mobile workstations.
Mobile Computing configuration, log, and trace files
For troubleshooting the server side, you set the trace level of the MDist2
Distribution Manager with wmdist -D 7 (0-9). If you are using a UNIX TMR
server, you can watch the trace in real time with tail -f $DBDIR/distmgr.log.
To watch what is happening on the gateways, set the trace level of the gateway
with wgateway $gateway set_debug_level 7 (0-9). You can watch the trace in
real time with tail -f $DBDIR/gatelog on the UNIX gateway concerned.
For tracing the Mobile Computing environment on the endpoint, you have two
options. Setting logLevel=4 (0-4) in Mobile.cfg generates trace information for the
Mobile Agent. Setting guiLogLevel=4 (0-4) generates trace information for the
Mobile Console. In both cases the trace information is written to Mobile.log
located in $LCF_DATDIR/Mobile/Mobile.log.
Also, setting the trace level of the endpoint can be informative. Add
log_threshold=5 to $LCF_DATDIR/last.cfg and restart the endpoint. The trace
information is written into $LCF_DATDIR/lcfd.log.
7.4.10 Troubleshooting pristine installations
Here are the pristine logfiles.
Pristine logfiles
The Pristine Tool is a utility for assisting customers with customizing a native OS
installation.
The log information related to each installed operating system component is
located on the code server under the path ImageSharingDrive\log\ as it is
created by the operating system.
There is no logfile generated at the server for the TMA installation. However,
when the login_policy is run, a logfile is generated named pristine.log.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
241
7.4.11 Troubleshooting discovering and synchronization
Log information for the discovering and synchronization features can be collected
through the following processes:
򐂰 Discovering
The logfile associated with the software package
򐂰 Synchronization
The wsyncsp.logfile created in the working directory, reported in the swdis.ini
file
7.4.12 Change Management Status summary
Change Management (CM) Status is a handy way to understand the current
status of the package. Table 7-1 is a summary of the Change Management
Status information.
Table 7-1 Change Management Status summary
Operation
State
Undo state
Reboot state
Flag
Install
Prepared
Prepared
ReBoot
requested
Changing
Remove
Committed
Undoable
Discovered
In Error
Restored
Hidden
-
-
-
The statuses are:
242
Pos 1 - Operation
Indicates the last operation that was performed on the
software package, either I (install) or R (remove).
Pos 2 - State
Indicates the state of the software package, either P
(prepared) or C (committed).
Pos 3 - Undo state
If the SP is in an undo state, there will be a letter in the
third position of the five-character sequence, which can
be P (prepared), U (undoable), or R (restored), or
otherwise a dash (-) if undo state does not apply.
Pos 4 - Reboot
A B indicates a reboot was requested. A dash (-) indicates
a reboot was not requested.
Pos 5 - Flag
An E indicates the software package is in error and may
not work properly.
ICU--
Install has been committed and can be undone.
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
IP-BC
Install has been prepared and will be committed during
the next reboot.
RCU--
Remove has been committed but can be undone.
IC--E
Install has been committed, but the SP is in error (the
application may not work properly).
IC-D-
The software package has been added with use of the
wdsetsps command.
IC-H-
The software package has been superseded by a
versionable package installed in undoable mode.
In summary, the overall state of a software package is represented by a
sequence of five letters.
7.5 Troubleshooting Activity Planner
Below you will find detailed information about Activity Planner processes, and log
and trace files.
7.5.1 Activity Planner processes
You may find below the internals of APM processes:
APM_core
All the APM threads are generated by a single process
called APM_core.
Executer
The operations submitted through the Task Library and
SWD plug-ins are managed by the executer thread.
APMHandler
The APMHandler thread manages all the APM work,
together with the executer. The APMHandler also
determines if an activity in an activity plan is eligible to
start.
APMain
The APMain thread initializes APM, starts the executer
and APMHandler, and then waits for new requests.
Requests are then queued to the APMHandler.
7.5.2 Activity Planner configuration file
The APM configuration file, apm.ini, sets the AP logfile and trace files size,
location, and debug level. AP log and trace files are generated at the TMR
server. All the logfiles and traces are created on the server side, and on the
managed node only for the GUI component. The apm.ini file is created at
installation time.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
243
The table below shows the location of the AP configuration file, apm.ini, for the
operating system.
Table 7-2 Location of apm.ini, APM configuration file
File name
OpSys
Path
apm.ini
UNIX
/etc/Tivoli
apm.ini
NT/W2000
$SystemDrive\WINNT
A sample apm.ini file is shown in Example 7-3.
Example 7-3 Sample apm.ini
;APM configuration file
[DEFAULT]
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
log_max_file=100000
log_level=5
plugin_download=enabled
log_file=apmlog
TME_Host=morbidelli
TME_User=tivapm
[MAIN]
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
[HANDLER]
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
[EXECUTER]
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
[APMCLI]
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
[APMEDITOR]
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
plugin_download=enabled
[MONITOR]
enable_auto_update=true
auto_update_interval=180
244
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
trace_level=0
working_dir=C:\Tivoli\bin\w32-ix86\..\w32-ix86\..\apm
trace_size=1000000
plugin_download=enabled
Tip: A new command, wtrcapm, can be used to change or view the current log
and trace settings for the activity plan engine components. For example, the
following changes the value of trace_level key in the [HANDLER] session in
apm.ini file to 3.
wtrcapm –H –s trace_level=3
7.5.3 Activity Planner logfiles
Table 7-3 summarizes the logfiles for AP.
Table 7-3 Location of APM logfiles
Log type
File name
OpSys
Path
AP Monitor
apmon.log
UNIX
/tmp/
AP Monitor
apmon.log
NT/W2000
$SystemDrive\WIN
NT\
AP Editor
apmed.log
UNIX
/tmp/
AP Editor
apmed.log
NT/W2000
$SystemDrive\WIN
NT\
APM General
apmlog*
UNIX
working_dir in
apm.ini
APM General
apmlog*
NT/W2000
working_dir in
apm.in
APM Internal
apm.log
UNIX
/tmp/
APM Internal
apm.log
NT/W2000
$SystemDrive\
Example 7-4 shows the APM logfiles on our UNIX TMR server.
Example 7-4 APM logfiles
eastham> pwd
/tmp
eastham> ls -al ap*.*
-rw------- 1 root
-rw-r--r-- 1 root
-rw-r--r-1 root
system
nobody
system
735094 Mar 07 06:10 apm.log
204 Mar 01 15:43 apm_uninst.log
22334 Mar 06 18:51 apmed.log
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
245
-rw-r--r--rw-r--r-eastham>
1 root
1 root
nobody
system
37 Mar 01 15:37 apmmn_uninst.log
22839 Mar 06 17:05 apmon.log
The logs are:
򐂰 APM general log: apmlog
Records operational level messages for APM, including plan submission and
completion. It is created by default.
򐂰 AP Monitor log: apmon.log
Specific for the Activity Planner GUI.
򐂰 AP Editor log: apmed.log
Contains log information specific to the AP Editor.
򐂰 APM internal log: apm.log
Contains all information related to the APM_core functionality. It records all
APM calls made to its IDL interface. It also records all the JVM initialization
and completion messages. It is not generated by default.
To generate and record to the APM internal log, apm.log, an APM environment
variable, __APM_DEBUG__, must be enabled through the use of the Framework
command odadmin environ set, or by setting a system environment variable. An
example on usage of the odadmin environ get / odadmin environ set
command follows (Example 7-5) to enable the APM environment variable,
__APM_DEBUG__.
Example 7-5 odadmin environ example
eastham>
eastham>
eastham>
eastham>
15382
26368
28916
odadmin environ get >/tmp/environ
echo __APM_DEBUG__=1>>/tmp/environ
odadmin environ set </tmp/environ
ps -e | grep -i APM
- 0:09 APM_core
- 0:00 apmmonl
- 0:00 apmmonl
30234
- 0:00 apmeditl
32258
- 0:00 apmeditl
eastham> kill 15382
246
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.5.4 Activity Planner trace files
All APM trace files are located in the /apm/ subdirectory under product_dir
designation in the swdis.ini on the TMR server. Example 7-6 shows the APM
trace files on our UNIX TMR server.
Example 7-6 APM trace files
eastham> pwd
/usr/local/Tivoli/bin/swdis/apm
eastham> ls -al
total 10880
drwxr-xr-x 2 root
system
drwxr-xr-x 5 root
system
-rw-r--r-1 root
system
-rw-r--r-- 1 root
system
-rw-r--r-1 root
system
-rw-r--r-1 root
system
-rw-r--r-- 1 root
system
-rw-r--r-1 root
system
-rw-r--r-- 1 root
system
-rw-r--r-1 root
system
-rw-r--r-1 root
system
-rw-r--r-- 1 root
system
-rw-r--r-- 1 root
system
-rw-r--r-- 1 root
system
-rw-r--r-1 root
system
-rw-r--r-- 1 root
system
512
512
1000042
259
1000004
1000083
2635
1000021
5187
1000071
34647
292027
100024
416
84063
170
Mar
Feb
Feb
Mar
Feb
Mar
Mar
Mar
Mar
Feb
Mar
Mar
Feb
Mar
Feb
Mar
07
05
27
07
27
04
07
05
07
05
07
07
10
07
01
06
06:00
14:57
16:35
06:05
16:33
15:03
06:00
16:43
06:00
13:16
06:00
06:00
19:00
06:00
12:25
21:01
.
..
APDefault0.trc
APDefault1.trc
APDefault2.trc
APExecuter0.tr
APExecuter1.tr
APMCli0.trc
APMCli1.trc
APMHandler0.tr
APMHandler1.tr
APMMain0.trc
apmlog0
apmlog1
logs.tar.Z
repqueue.dat
The files are:
APDefault0.trc
Contains all trace messages related to threads not
tracked in the other files. It is considered a general trace
file.
APExecuter.trc
Reports all traces associated with the executer thread that
manage the operations submitted at the Task Library and
SWD plug-ins.
APHandler.trc
Contains all the traces associated with the APMHandler
thread.
APMain.trc
Records the main thread traces, which involves
initialization of APM, starting of the executer, and the
APMHandler.
APMCli.trc
Contains the traces related to the CLI execution.
APMonitor.trc
This trace file records traces associated with the use of
the Activity Plan Monitor.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
247
APEditor.trc
This trace file records traces associated with the use of
the Activity Plan Editor.
Setting the GUI trace level
To set the trace level for the Activity Planner GUI press the F2 button to display
the Update trace level dialog and type the new value in the Insert new trace level
text box. Possible values are numbers between 0 and 5; the default level is 0.
Note: If you do not have write access to the folder where the GUI traces are
written, the trace information is written to the user’s home directory.
Valid values for trace and log levels are:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
0 (none)
1 (fatal)
2 (error)
3 (warning)
4 (information)
5 (verbose)
The default value for trace_level is 0; no trace is generated unless the trace level
is modified.
The default value for log_level is 5; all messages are logged unless the log_level
is modified.
7.6 Troubleshooting Change Manager
In this section we will cover Change Manager, or Configuration Change Manager
log and trace files, and how to customize them.
7.6.1 Change Manager configuration file
The location of the CM configuration file, confccm.xml, for each operating system
is listed in Table 7-4.
Table 7-4 Location of CCM configuration file
248
File name
Operating system
Path
confccm.xml
UNIX
/etc/Tivoli/
confccm.xml
NT/W2000
$SystemDrive\WINNT\
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
The CM configuration file is organized in stanzas that define CM implements
such as elements, dependencies, and security.
The CM configuration file can be customized to add new Java classes to change
the current implementation, in such a case where the user decides to add new
elements different from those currently supported.
The confccm.xml configuration file can be customized to set the debug level for
the CM traces.
All log and trace files are created on the TMR server.
7.6.2 Change Manager logfiles
The CM logfile records the same information as is contained in the ccm_apm*.trc
file, except only those entries generated by the C code of CCM_core are
executable. It is not generated by default. When enabling CM, the environment
variable, __CCM_DEBUG__, with use of the Framework command odadmin
environ set, or set as a system variable, the appropriately named logfile,
ccm.log, is created. However, it may be necessary to kill or recycle CM for the
environment variable setting to actually take effect.
The location of CM logfile, ccm.log, is shown in Table 7-5.
Table 7-5 Location of CM logfile
File name
OpSys
Path
ccm.log
UNIX
/tmp/
ccm.log
NT/W2000
$TMPDIR
7.6.3 Change Manager trace files
CM trace files are located under the directory specified in the working_dir
parameter of the swdis.ini file on the TMR server.
򐂰 ccm*.trc
The ccm*.trc trace file contains all of the actions performed using the CM GUI.
For example:
–
–
–
–
Creation of a reference model
Import of a reference model
Export of a reference model
Preview operation
It is located on the TMR server and those managed nodes where the CM GUI
is installed. It is located under $(working_dir).
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
249
򐂰 ccm_apm*.trc
The ccm_apm*.trc trace file contains all the actions performed by CCM_core
when other applications, such as APM, SD WEB UI, and Pristine, interact with
CM.
All of the traces tracked by the Java code executed by the APM Java Virtual
Machine are reported in this file. Examples of what is recorded include:
– Submit operations for APM
– CM answer to a WEB UI request
– CM synchronization operation for pristine machines
The ccm_apm*.trc trace file is located only on the TMR server.
򐂰 ccm_webxxx.trc
Contains the history of all operations performed by the Change Manager
engine when interacting with the new WEB UI 4.2 on the Application Server.
򐂰 ccm_clixxx.trc
Contains the history of all the operations performed using the CM command
line as well as the operations performed when Change Manager interacts with
the Activity Planner to download the plug-in information.
You can set the trace level to determine the level of detail recorded for each
operation. The trace file is only created if the trace_level keyword is set to
greater than zero (default is zero). Trace values are as follows:
–
–
–
–
–
–
0 (none)
1 (fatal)
2 (error)
3 (warning)
4 (information)
5 (verbose)
You can set the trace level using the wtrcccm command. Alternatively, you can
use the Change Manager GUI and press the F2 key. When you press the F2 key,
the Update trace dialog box displays, and you can enter a new value in the New
trace level text box.
Also, trace_size determines the maximum number of records that can be written
to the file (default is 1000000).
250
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.7 Troubleshooting Web Gateway and Device
Management
Here are some typical problems when using the Web Gateway and Device
Management.
Resource Manager problems
A general failure when trying to register the resource type could be due to a
communication failure with the Web Gateway or the Web Gateway is not
functioning. These errors should show up in the TRMRDBMS.log and
TRMResourceManager.log in the $DBDIR directory. There are also other
TRM*.logs for the various components of Resource Manager on the TMR server
under the $DBDIR directory. Review the appropriate log relating to the problem
you are encountering to further determine the cause of the problem. The logs for
the various components of Resource Manager are:
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
򐂰
TRMDGMAppMgr.log
TRMDGMAppMgrUI.log
TRMDGMDowncalls.log
TRMDGMRegistry.log
TRMGroup.log
TRMGroupUI.log
TRMRDBMS.log
TRMResourceManager.log
TRMResourceManagerUI.log
TRMUserDB.log
TRMUserUI.log
Log information can be changed by setting the variable in the Tivoli environment
(odadmin environ get/set):
TRM_DEBUG_LEVEL = (LEVEL_DBG_MIN/LEVEL_DBG_MID/LEVEL_DBG_MAX)
TRM_MAX_LOG_SIZE = log files max size
TRM_LOG_PATH = path to store log files
7.7.1 Tracing the Web Gateway
On the Web Gateway, locate the traceConfig.properties file in the directory
app_server_dir/installedApps/dmsserver_hostname_DMS_WebApp.ear/dmserv
er.war/WEB-INF/classes.
To turn on tracing, change EnableTrace=false to EnableTrace=true.
The other components that need to be turned on (true) are
traceEnable.dmserver and traceEnabled.twgapi.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
251
Depending on the situation, your support representative may request turning on
tracing for the other components.
If the servlets are not running, start them to put the new trace settings into effect.
If the servlets are running, do one of the following to put the new trace setting into
effect without restarting the servlets:
򐂰 On any Tivoli Web Gateway (TWG) machine, perform the following:
server -app dmserver -trace set -host dmserver_hostname
򐂰 On any TWG UNIX machine, perform the following command:
./server.sh -app dmserver -trace set -host dmserver_hostname
򐂰 From any machine with a browser, go to the following URL:
http://dmserver_hostname/dmserver/TraceServlet?trace=set
The output files of the tracing are DMS_stdout.log, DMS_stderr.log, and
DMSMsg1.log, which are located in the app_server_dir/log directory. The default
for the Windows installation is C:\WebSphere\AppServer\log.
You should also provide the ApiServlet.log in the /tmp directory to your support
representative.
7.8 Troubleshooting Web User Interface
In this section we cover troubleshooting the Web User Interface. First let us see
some common problems associated with the Web User Interface.
7.8.1 Common Web User Interface problems
Some common Web User Interface problems are detailed below.
򐂰 Web Interface login problems
– An unsuccessful login when doing a login to the WEB UI could be due to
the security level of the browser being set too high.
Reduce to a lower security level and test again.
– The login was successful but encountered a Java or ActiveX error
message and the Operations Console does not show.
The supported Java plug-in for the browser may not have been installed.
– The login is successful but no pop-up window is shown to download the
two sets of files for the Web Interface.
The Java plug-in for the browser has not been installed.
252
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
򐂰 Unable to publish Web objects.
Before publishing any Web objects, you must make sure the following are up
and running:
– Gateways servicing the endpoints, which have Web Gateway components
installed
– Endpoints on the Web Gateway Servers
– Primary and secondary Web Gateway Servers
– DB2 server
– DB2 client
– Web Server
– WebSphere Application Server
– Access Manager
– WebSEAL server
Check the logfile DMS_stdout.log and make sure that the log has the
following entry, which indicates that the Web Gateway Server has started
successfully: WSVR0023I: Server DMS_AppServer open for e-business.
An insufficient authorization error when using the wweb command normally
indicates that the Tivoli Administrator does not have the WebUI_Admin role.
A Profile not found error when running wweb under Windows could be due
to an extra caret (^) missing when specifying the profile name. For example,
the profile mysoftware^1.0 needs to be specified as @mysoftware^^1.0 when
running wweb under Windows.
A general oserv error could indicate a problem with the gateway that services
the endpoint that has the Web Gateway component installed. Restart the
gateway with the wgateway command and test again.
The wweb command completed with a distribution ID when publishing a
software package but does not show up on the Web Interface. Check the file
package_name.log in the ../swdis/work directory of the Tivoli Server for the
results of the publishing of the software package. The users file in
../swdis/work should contain the list of the users that the Web objects are
published for.
On the endpoint where the Web Gateway Server is located, the outcome of
the publishing of the software packages is recorded in the file called results
located in the ..\swdis\1\ directory. Check this file for any error messages. The
file called users contains the list of users that have access to the published
Web objects.
Enable the tracing and review the DMS_stdout.log for errors. You may have to
enable more components for tracing depending on the situation. Publishing to
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
253
an invalid user ID will fail and the log should reflect that. Refer to 7.8.2,
“Tracing the Web User Interface” on page 255, for enabling tracing.
򐂰 Memory usage is increasing dramatically over time, causing the Tivoli Web
Gateway application server to fail.
Disable JIT for the Java Virtual Machine to circumvent this behavior.
Note: JIT stands for just-in-time compiler. It is a code generator that
converts Java bytecode into machine language instructions.
If that will not solve the problem, check if you are running too many inventory
jobs, since running a lot of inventory jobs on Red Hat Linux or Microsoft
Windows platforms might increase memory usage dramatically,
򐂰 Problems with software package installation:
– Error in downloading attachment in the Operations Console. This error is
not seen in the software_package.log.
The Web Gateway Server could be down or the host name of the Web
Gateway Server cannot be resolved. Make sure that you can resolve both
the short and FQDN of the Web Gateway Server and perform the install
again.
– DISSE0082E Error decoding software package object. It could be
corrupted, or not a valid object.
This error can be seen in both the Operations Console and in the
software_package.log located on the Tivoli Server in the ../swdis/work
directory. You will encounter this corrupt file error if you have used an IP
address instead of the host name of the WebSEAL server in the URL to
get to the Web Interface. Make sure the host name and short name of both
the WebSEAL server and Web Gateway Server can be resolved. Use the
host name of the WebSEAL server in the URL for the WEB UI Interface,
log in again, and redo the install of the software package.
– In the dynamic resource group of the type User, the Query Selection group
box on the Resource Group Members dialog is grayed out.
Run the update_trm_query.sh script on the Tivoli server.
򐂰 Problems with the inventory scan.
Inventory scan completed successfully but not data in the RDBMS database.
Check the mcollect.log on the gateways and the trace file for the
TWG-MCollect. Refer to 7.10, “Troubleshooting Inventory” on page 256, on
Inventory mcollect to debug the failed collection.
254
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
7.8.2 Tracing the Web User Interface
You can use wwebcfg to set the tracing parameters for the Web User Interface.
The output trace files, WebUI*.trc, are located in the $DBDIR/WebUI directory.
The available parameters for wwebcfg are:
product_dir
working_dir
trace_size
trace_level
򐂰
򐂰
򐂰
򐂰
The default for product_dir is $DBDIR/WebUI and $DBDIR/WebUI/work for
working_dir. The default trace_size is 1000000 and when the trace file size
reaches this size, a new file is created.
The trace_level can be set from 0 to 6. Your support personnel may request a
higher level depending on the situation.
Table 7-6 Settings for trace_level
trace_level
Specifies
0
No traces
1
Level fatal
2
Level error
3
Level warning
4
Level info
5
Level verbose
6
Maximum level
Tracing Software Distribution WEB UI plug-in
Set the trace_level parameter of wswdcfg to a level by running:
wswdcfg -s trace_level=9
The traces (*.trc) are located on the TMR server (by default) in the $product_dir
directory, which is specified in the [#SERVER] section of the swdis.ini file. The
swdis.ini is located on C:/WINNT for the Windows Tivoli Server and /etc/Tivoli for
the UNIX TMR server.
In the $product_dir, the spo*.trc and spde*.trc should have traces of the
publishing of software packages to TWG. The swdmgr*.trc should have the
results of the publishing.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
255
The swd traces directory can be changed using the product_dir parameter.
wswdcfg -s product_dir=trace_dir
Tracing for the Web Gateway
See 7.7.1, “Tracing the Web Gateway” on page 251.
Trace files of the endpoint on the Web Gateway Server
Locate the swdis.ini, which is located in C:/WINNT for Windows installation and
etc/Tivoli for UNIX installation. Set the trace_level to level 6 (trace_level=6) in the
endpoint section of the swdis.ini file.
The trace files spde*.trc will be located in the $product_dir as specified in the
swdis.ini file. When software packages are published to the TWG, these files
should have the traces in them.
7.9 Troubleshooting Enterprise Directory Integration
Most of the issues involved in troubleshooting revolve around making sure the
connection to the LDAP server is working and that the access to the context is
correct.
You can check this by setting a trace on the TMR server. For example:
odadmin environ set DQ_TRACE=max_size (MB)
The trace files are written to $DBDIR on the TMR server. DirQueryCli0 contains
the CLI trace, and DirQueryEngine0.trc contains the engine trace.
Sometimes the problem is a port issue. For Directory Integration, the
communication takes place through a socket listening on port 9090. If this port is
reserved for other applications, we suggest that you change it, setting the
variable DQ_PORT to a different value.
The command to use is again:
odadmin environ get/set
7.10 Troubleshooting Inventory
This section covers important information required to troubleshoot inventory
scans. It is important that you understand the basic tasks and the logfiles used in
order to troubleshoot effectively.
256
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Table 7-7 contains a summary of the logfiles we will be discussing in this chapter.
Table 7-7 Log file information
Component
Path
Log file
name
Default
log
level
Debug
level
Endpoint Upcall and downcall
information
$LCFDIR/dat/1.
lcfd.log
1
3
Endpoint scan engine Inventory profile
information
From directory where the
wepscan command was run.
Created by wepscan -d
command.
sa_config.log
N/A
3
Endpoint scan engine Scan data
From directory where the
wepscan command was run.
Created by wepscan -d
command.
sa_results.lo
g
N/A
3
Endpoint scan engine Debug information
From directory where the
wepscan command was run.
Created by wepscan -d
command.
INV_SA.LOG
N/A
3
Hardware scan library Debug information
$LCGFDIR\inv\Scan.
libInvHW.log
N/A
N/A
Gateway Upcall and downcall
information
$DBDIR.
gatelog
3
6
RIM object
SQLstatements and DB
return codes
$RIM_DB_LOG
“Created by wrimtrace.”
invdh_1_rim.l
og
N/A
INFO|ER
ROR
Data Handler Debug information
$DBDIR/inventory/data_handler.
mcollect.log
1
3
Collector Debug information
$DBDIR/mcollect.
mcollect.log
1
3
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
257
Component
Path
Log file
name
Default
log
level
Debug
level
Endpoint Upcall and downcall
information
$LCFDIR/dat/1.
lcfd.log
1
3
Endpoint scan engine Inventory profile
information
From directory where the
wepscan command was run.
Created by wepscan -d
command.
sa_config.log
N/A
3
Endpoint scan engine Scan data
From directory where the
wepscan command was run.
Created by wepscan -d
command.
sa_results.lo
g
N/A
3
Endpoint scan engine Debug information
From directory where the
wepscan command was run.
Created by wepscan -d
command.
INV_SA.LOG
N/A
3
Hardware scan library Debug information
$LCGFDIR\inv\Scan.
libInvHW.log
N/A
N/A
Gateway Upcall and downcall
information
$DBDIR.
gatelog
3
6
RIM object
SQLstatements and DB
return codes
$RIM_DB_LOG
“Created by wrimtrace.”
invdh_1_rim.l
og
N/A
INFO|ER
ROR
Inventory GUI log
information
Unix: $DBDIR directory.
PC Systems: $DSWIN directory.
Note: You need to open the
inv_gui.sh file in a text editor on
the system on which you are
using the GUI, This file is located
in $BINDIR/TME/INVENTORY.
Change the DEBUG variable to 2
from 0. No files are generated by
deafult value, which is 0.
DEBUG3
(Unix)
InvGuiDebug
.log (PC
Systems)
0 (no
files
created)
2
7.10.1 Enabling logging and tracing
The lcfd.log at debug level 3 contains important endpoint activity information.
From there you can see the upcalls made by the endpoint, as well as downcalls
258
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
make by the gateway to the endpoint. Depending on the type of problem you are
troubleshooting, you may elect to only have certain traces enabled. For the
purpose of this exercise we will enable all the traces.
Setting endpoint debug level
To enable endpoint debugging level 3, do the following from the endpoint:
1. Change the log_threshold line in the $LCFDIR/dat/1/last.cfg file to
log_threshold=3.
2. Save the updated last.cfg.
3. Restart the lcfd service. Open a command line on the endpoint and run the
commands in Example 7-7.
Example 7-7 Restart the lcfd service
net
The
The
net
The
The
stop lcfd
Tivoli endpoint
Tivoli endpoint
start lcfd
Tivoli endpoint
Tivoli endpoint
service is stopping.
service was stopped successfully.
service is starting.
service was started successfully.
Setting Collector logging
Mcollect.log debug level 3 is the highest log level and is the most widely used for
troubleshooting. It can, however, generate a very large logfile in a short amount
of time and will wrap every time it reaches the maximum debug_log_size. You
should only set the debug level to three when troubleshooting. The Collector
must be stopped and started, as illustrated in Example 7-8, when changing the
debug level.
Once these commands are executed, simply view or tail -f the SCS logfile.
Remember to set logging back to level 1 after you finish.
To enable Collector debugging run the command shown in Example 7-8. All
commands are in bold.
Example 7-8 Enabling Collector debug level
wcollect -d 3 @Gateway:win-rptr01a-gw
wcollect -h graceful @Gateway:win-rptr01a-gw
Performed 'graceful' halt of collector: @Gateway:win-rptr01a-gw.
wcollect -s @Gateway:win-rptr01a-gw
Started collector: @Gateway:win-rptr01a-gw.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
259
Setting Data Handler logging
Setting the Data Handler debug level is similar to setting the Collector, except
instead of specifying a Collector, you specify the Data Handler object, as
illustrated in Example 7-9.
Example 7-9 Enabling Data Handler debug level
wcollect -d 3 @InvDataHandler:inv_data_handler
wcollect -h graceful 3 @InvDataHandler:inv_data_handler
Performed 'graceful' halt of collector: @InvDataHandler:inv_data_handler.
wcollect -s @InvDataHandler:inv_data_handler
Started collector: @InvDataHandler:inv_data_handler.
Setting the gateway debug level
A number of interesting messages can also be viewed in the gatelog file. If you
are tracing SCS, you should set the gateway debug level to 9. Be sure to set it
back to default when you are done tracing.
The gateway logfile is called gatelog and is located in $DBDIR. This file contains
information on downcalls, upcalls, and cache misses, and thus can be very
useful when troubleshooting Inventory. Use the wgateway command to set the
debug level of the gatelog file. Since you must restart the gateway, make sure
there are no active distributions in progress.
The commands in Example 7-10 set the gateway debug level to 9 on a gateway
named win-rptr01a-gw.
Example 7-10 Setting gatelog to debug level 9
C:\Tivoli>wgateway win-rptr01a-gw set_debug_level 9
C:\Tivoli>wgateway win-rptr01a-gw restart
Setting the RIM trace
The RIM logfile contains very useful information when troubleshooting
database-related problems. From the RIM log you can see what database calls
are being made from the Data Handler to the RIM interface and what is returned
by the database.
To enable RIM trace do the following:
1. From the RIM host managed node run the following command:
odadmin environ get>c:\environ_rim.txt
2. Edit the c:\environ_rim.txt file by adding the following line:
RIM_DB_LOG=c:/temp/invdh_1_rim.log
260
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
3. Set the RIM_DB_LOG environment variable:
odadmin environ set < c:\environ_rim.txt
4. Enable tracing on Data Handler RIM object:
wrimtrace invdh_1 "INFORMATION|ERROR"
5. Kill all RIM_vendor_Agent processes that are running on the RIM host
managed node, as shown in Example 7-11.
Example 7-11 Killing the RIM agent process
ntprocinfo|grep -i agent
1980 RIM_Oracle_Agent WIN-INV01A\tmersrvd
ntprocinfo -k 1980
08/06/2002 10:02:09
RIM tracing is now enabled and will be tracing all invdh_1 RIM object calls.
Notes: The RIM log can grow and fill up disk space very quickly at
INFORMATION:ERROR. Be sure to set it back to no tracing when you are
done tracing by running the following command:
wrimtrace invdh_1 "TRACE_OFF"
To troubleshoot RIM connection problems, the RIM_vendor_Agent can be
started manually. On Unix, however, DB2 and Informix RDBMS systems
require setting the shared library path first.
Troubleshooting on the endpoint
The wepscan command has two debug options, -c and -d. These options provide
effective troubleshooting tools when diagnosing endpoint-specific problems.
򐂰 The -c option reads the profile configuration file (config.dmp) and writes
results into a text file sa_config.log. config.dmp is created on the endpoint
when the profile is distributed to it.
򐂰 The -d option has three levels (1–3). The three levels are as follows:
– 1: Logs error messages.
– 2: Logs error and warning messages.
– 3: Logs error and warning messages and debugging information.
(Debugging information is not available from NetWare or OS/2 endpoints.)
Depending on the log level used, the following files will be created. All these
logs will be saved in the same directory from which you ran wepscan.
– sa_results.log: Contains the scan data in ASCII format.
– sa_config.log: The same logfile that is created using the -c option.
Chapter 7. Troubleshooting IBM Tivoli Configuration Manager
261
– INV_SA.LOG: Contains debugging information. It is identical to the logfile
that is created using the wdistinv command and inv_ep_debug keyword.
If you used the -s option, this logfile is sent to the Inventory Data Handler.
You can also create these logfiles by creating an environment variable on your
system named WEPSCAN_DEBUG. Set this environment variable to a value of
1, 2, or 3. These values correspond to the options you specify with the -d option.
When using the -d option, the libInvHW.log is created. This file contains more
detailed debug information of the Hardware Scan Library. It is very useful when
troubleshooting hardware scan related problems. At this point in time there is no
similar logfile for the software scan library.
262
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
8
Chapter 8.
Certification exam
objectives
This chapter describes the certification exam objectives and contains the
following sections:
򐂰
򐂰
򐂰
򐂰
“Planning section” on page 264
“Installation section” on page 266
“Configuration section” on page 268
“Operations, administration, and maintenance section” on page 270
© Copyright IBM Corp. 2005. All rights reserved.
263
8.1 Planning section
In this section we discuss planning.
򐂰 Given a Statement of Work, architecture document, and customer input,
conduct customer interviews and analyze the documentation so that
customer requirements are determined, with emphasis on performing the
following steps:
–
–
–
–
Conduct customer interviews.
Read architecture document.
Read customer documents.
Determine Tivoli naming conventions.
򐂰 Given a list of machines and their specifications, interrogate the machines
against the minimum requirements so that a list of machines to support the
Tivoli environment can be generated, with emphasis on performing the
following steps:
–
–
–
–
Identify machines involved.
Determine available disk space.
Determine available memory.
Determine CPU power.
򐂰 Given the Planning and Installation Guides, User Manuals, Release Notes,
and a list of machines, assess the software levels so that a list of machines
meeting the prerequisites and a list of machines to be upgraded and patched
can be generated, with emphasis on performing the following steps:
– Identify software prerequisites.
– Determine existing software levels.
򐂰 Given a set of network locations, protocols, and a network diagram, describe
the network topology so that a Tivoli infrastructure can be recommended, with
emphasis on performing the following steps:
– Determine physical network layout.
– Determine protocols to use.
򐂰 Given a list of servers and workstations and a network diagram, identify and
categorize the machines to be managed so that they can be grouped into a
logical endpoint list, with emphasis on performing the following steps:
– Identify machines to be managed.
– Identify groups of machines.
– Identify resources to scan.
򐂰 Given customer's data collection requirements, a list of endpoints, and a
Tivoli infrastructure, determine the inventory requirements (scan frequency,
scan method, history tracking, MIFs to be collected, hardware/software data,
policy needs, and Wake-on-LAN requirements) so that a scanning
264
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
methodology and policy scripts can be generated, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
Consider hardware/software data to be scanned.
Determine inventory scan method.
Determine inventory scan frequency.
Determine policies needed.
Determine history tracking requirements.
Determine MIFs to be collected.
Determine Wake-on-LAN requirements.
򐂰 Given a list of software to be distributed, a delivery method, a list of
endpoints, and a Tivoli infrastructure, determine the software distribution
requirements so that a distribution architecture and methodology can be
determined, with emphasis on performing the following steps:
– Determine software to be distributed.
– Determine software packaging method.
– Analyze software requirements with respect to bandwidth usage and time
to distribute.
– Determine source hosts and depot sites.
– Determine candidates for software build via pristine install.
– Determine policies needed.
– Document endpoint to directory user relationship.
– Determine eligible pervasive devices.
򐂰 Given a customer’s database environment, determine the database
requirements in order to identify the appropriate database sizing, tuning, and
RIM parameters, with emphasis on performing the following steps:
–
–
–
–
Calculate estimated size of database.
Select RIM(s) node(s).
Determine database index process.
Select appropriate database.
򐂰 Given an organization chart and business processes, describe the
organization of the administrators so that the necessary administrator groups
and roles can be determined, with emphasis on performing the following
steps:
– Identify logical groups of administrators.
– Identify roles of administrators.
– Identify policy regions to which admins require access.
򐂰 Given a company’s security policies and Tivoli security settings, create
appropriate administrator roles and Tivoli configuration functions so that the
Chapter 8. Certification exam objectives
265
IBM Tivoli Configuration Manager settings meet company security policies,
with emphasis on performing the following steps:
–
–
–
–
–
Define administrator roles.
Determine optimum oserv configuration settings.
Determine optimum endpoint configuration settings.
Determine access manager install.
Determine WebSeal install.
򐂰 Given a network diagram, firewall rules and policies, and DMZ architecture,
determine the firewall requirements so that inventory scans and software
distributions can be performed through the firewall(s), with emphasis on
performing the following steps:
– Determine machines separated by firewalls.
– Determine use of Tivoli Configuration Manager under DMZ.
– Determine management needs for machines.
򐂰 Given a network diagram, network administration policy, and customer
requirements, determine the multicast requirements so that a list of multicast
repeaters, targets, and configuration settings can be generated, with
emphasis on performing the following steps:
– Determine multicast targets.
– Determine multicast repeaters.
– Determine multicast addresses and parameters.
򐂰 Given a list of software and inventory requirements, mobile devices, and
pervasive devices, determine Web requirements so that the Web access site,
installation method, and Web component database are configured for the list
of Web-enabled applications available to a subscriber list, with emphasis on
performing the following steps:
–
–
–
–
–
Determine install of Web components - Classic or SPBs.
Determine eligible software packages and inventory configs.
Determine eligible targets.
Determine cluster or single install.
Size DB2 for Web.
8.2 Installation section
In this section we discuss installation.
򐂰 Given the set of prerequisite software CDs, install the prerequisite software,
including RDBMS, IBM HTTP Server, DB2 Data Warehouse, and WebSphere
Application Server so that the software environment meets the IBM Tivoli
266
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Configuration Manager prerequisites, with emphasis on performing the
following steps:
–
–
–
–
Install RDBMS.
Install IBM HTTP server.
Install DB2 Data Warehouse.
Install WebSphere Application Server.
򐂰 Given the IBM Tivoli Configuration Manager CDs and administrator access to
the appropriate hardware and the MDist2 database, choose the appropriate
installation method to install or upgrade the TMR server, Java components,
gateway and repeater hierarchy, MDist2, Firewall Toolkit, and endpoints to
produce a working Tivoli environment with MDist2 capability, with emphasis
on performing the following steps:
–
–
–
–
–
–
–
–
Locate media.
Ensure bidirectional name and address resolution.
Intall/upgrade TMR server.
Install Java components.
Install MDist2.
Install Firewall Toolkit.
Create gateway(s)/repeater(s).
Install endpoints.
򐂰 Given a working Tivoli environment, the IBM Tivoli Configuration Manager
CDs, the inventory schema, and administrative access to the inventory
database, install or upgrade the inventory server, gateways, and Scalable
Collection Service so that all the necessary inventory components are
installed on the correct machines in the Tivoli environment, with emphasis on
performing the following steps:
– Install/upgrade the Scalable Collection Service.
– Install/upgrade the inventory server.
– Install/upgrade the inventory gateway.
򐂰 Given a working Tivoli environment and the IBM Tivoli Configuration Manager
CDs, install or upgrade the Software Distribution components, including the
server, gateway, packaging, and desktop components, so that the
Configuration Manager GUIs can be launched and accessed, and all
necessary Software Distribution components are installed on the appropriate
machines in the Tivoli environment, with emphasis on performing the
following steps:
–
–
–
–
–
Install/upgrade Software Distribution server.
Install/upgrade Software Distribution gateway.
Install/upgrade Software Package Editor.
Install/upgrade Configuration Manager Desktop.
Install Pristine Tool.
Chapter 8. Certification exam objectives
267
򐂰 Given an Activity Planner schema, a Change Management schema, and a
working Tivoli environment, install the functions of Deployment Services
including Change Management, Activity Planner, Resource Manager,
Directory Query, and Web components so that all of these application
components are installed in the Tivoli environment, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
–
Install Change Manager.
Install Activity Planner.
Install Resource Manager.
Install device agents.
Install Web components.
Install Directory Query.
Install Access Manager.
Install Access Manager WebSeal.
8.3 Configuration section
In this section we discuss configuration.
򐂰 Given a working Tivoli environment, a network topology, and an MDist2
database, configure gateway Web access, repeater tuning parameters,
MDist2 RIM parameters, and the endpoint, task library, and profile manager
policy scripts so that the Tivoli environment meets the customer requirements
for distribution throughput, bandwidth control, and endpoint management,
with emphasis on performing the following steps:
–
–
–
–
–
–
Build MDist2 RIM.
Tune repeaters.
Create and install endpoint policies.
Configure multicast.
Create task library, profile managers, and policy scripts.
Configure gateway Web access.
򐂰 Given a working Tivoli environment and an endpoint to directory user listing,
link endpoints to directory users and create Directory Query libraries and
Directory Queries, so that endpoints can be associated with users, with
emphasis on performing the following steps:
– Create Directory query library.
– Create directory query.
– Link endpoints to directory users.
򐂰 Given that inventory is installed and customer collection requirements have
been determined, tune collectors, install software signatures, and configure
RIM objects, custom queries, and scanners so that data can be collected from
268
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
endpoints, stored in the configuration repository, and matched against
defined software signatures, with emphasis on performing the following steps:
–
–
–
–
–
–
–
–
–
Build inventory RIM(s).
Tune data handler.
Tune collectors.
Add software signature.
Create inventory, subscription, and historic query library.
Configure custom tables in database.
Create custom query.
Configure DMI data to collect.
Create inventory policy scripts.
򐂰 Given that Software Distribution is installed and the customer’s software
distribution requirements have been determined, configure multicast support,
data moving service, Web interface, mobile support, and policy scripts so that
software can be distributed to targets in compliance with the customer’s
requirements, with emphasis on performing the following steps:
–
–
–
–
–
Configure multicast support.
Configure data moving service.
Configure software distribution mobile support.
Create software distribution policy scripts.
Configure software distribution Web interface.
򐂰 Given that the deployment services components have been successfully
installed, configure the RIMs, Web Gateway, device plug-ins, HTTP Server,
and WebSphere Application Server in order to provide working Web access
and management for pervasive devices, with emphasis on performing the
following steps:
–
–
–
–
–
–
–
–
–
Build Activity Planner RIM.
Build Change Manager RIM.
Configure plug-ins.
Configure Web Gateway.
Register pervasive devices.
Create resource group policies.
Configure IBM HTTP Server.
Configure WebSphere Application Server/Tivoli TMR Web access.
Publish Web objects.
򐂰 Given a working Tivoli environment with software distribution, inventory, and
deployment services installed, test the managed nodes, gateways, endpoints,
and RIM objects so that endpoints can be managed through the framework
and databases can be accessed through the RIM, with emphasis on
performing the following steps:
– Test managed node.
– Test gateway(s).
Chapter 8. Certification exam objectives
269
–
–
–
–
–
Test endpoint(s).
Test Change Manager RIM.
Test Activity Planner RIM.
Test inventory RIM(s).
Test MDist2 RIM.
򐂰 Given a working Tivoli Configuration Manager environment, TEC Server,
TDW, and customer requirements, configure software distribution to send
events to TEC and integrate software distribution with TDW so that Tivoli
Configuration Manager can generate reports and TEC events, with emphasis
on performing the following steps:
– Configure software distribution to send events to TEC.
– View Tivoli Configuration Manager reports in the Tivoli Data Warehouse.
8.4 Operations, administration, and maintenance
section
In this section we discuss operations, administration, and maintenance.
򐂰 Given a list of file packages and inventory profiles from Tivoli Software
Distribution V3.x and Tivoli Inventory V3.x, convert them to IBM Tivoli
Configuration Manager V4.2 inventory configuration profiles, software
packages, and SPBs, with emphasis on performing the following steps:
– Convert inventory profiles to inventory configuration profiles.
– Convert file packages to software packages.
򐂰 Given IBM Tivoli Configuration Manager customer requirements, create
inventory resources, including policy regions, profile managers, and profiles
so that inventory data can be collected from the customer environment, with
emphasis on performing the following steps:
–
–
–
–
–
Create inventory policy regions.
Create inventory profile managers.
Create and configure inventory profiles.
Select custom MIF collection profile settings.
Determine type of scan for pervasive devices.
򐂰 Given IBM Tivoli Configuration Manager customer requirements, create
software distribution resources, including policy regions, profile managers,
and profiles so that software can be distributed to and removed from target
systems, with emphasis on performing the following steps:
– Create and configure software distribution profiles.
– Create software packages using the Java Package Editor, CLI, GUI, SIS,
or importing them. Launch the software distribution Java Package Editor
and use it to build packages on all supported operating systems.
270
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
– Export and modify software package blocks.
– Determine version and dependencies of a software package block.
– Create install, uninstall, undo, commit, and verify jobs.
– Configure advanced options on software distribution profiles.
򐂰 Given a working IBM Tivoli Configuration Manager V4.2 environment and
customer requirements, build reference models so that inventory scans and
software distributions can be applied to the subscriber lists enforcing the
software states and inventory data elements defined in the reference model,
with emphasis on performing the following steps:
– Create a reference model and assign subscribers.
– Add, change, and delete inventory scan elements.
– Add, change, and delete software distribution elements.
򐂰 Given customer requirements to schedule and coordinate activities, configure
the Activity Planner to define, submit, and schedule an activity plan that
meets customer requirements, with emphasis on performing the following
steps:
–
–
–
–
Use Activity Planner to define activity, set conditions, and assign targets.
List submittable activity plans.
Submit activity plan.
Schedule an activity plan for execution.
򐂰 Given customer requirements to manage pervasive devices, create and
configure device object software packages and inventory profiles so that
software can be delivered and inventory information can be collected from
these devices, with emphasis on performing the following step:
– Create and configure device object software package.
򐂰 Given a working IBM Tivoli Configuration Manager V4.2 environment and a
set of subscribers, distribute software and perform asset scans against
LAN-attached and mobile clients so that asset data is gathered and software
is installed or removed, with emphasis on performing the following steps:
–
–
–
–
Distribute software to desired targets and confirm success.
Distribute inventory configuration profile.
Execute an activity plan.
Configure endpoint initiated scanner.
򐂰 Given active distributions and scans, control IBM Tivoli Configuration
Manager V4.2 activities to determine status, cancel activities, and
determine/alter the repeater path so that activities can be successfully
managed, with emphasis on performing the following steps:
– Calculate disk space required for distribution.
– Verify success of scan or distribution.
Chapter 8. Certification exam objectives
271
–
–
–
–
–
–
–
Report current status of a distribution.
Cancel a distribution.
Determine path that a distribution will follow.
Alter the path that a distribution will follow.
View status or details of activity plans.
Distribute a software package using multicast.
Move files/software from one endpoint to another.
򐂰 Given Framework and IBM Tivoli Configuration Manager V4.2 CLIs and
administrative access to the system, start and stop components so that
collectors, oservs, and endpoints can be effectively managed in the
environment, with emphasis on performing the following steps:
–
–
–
–
–
Start/stop oserv.
Start/stop endpoint.
Start/stop gateways.
Start/stop endpoint manager.
Start/stop collectors.
򐂰 Given an installed Tivoli environment including IBM Tivoli Configuration
Manager V4.2, perform the tasks necessary to uninstall Tivoli and remove
related information from the databases so that the systems are restored to the
pre-installation state, with emphasis on performing the following steps:
– Uninstall IBM Tivoli Configuration Manager V4.2.
– Remove information in database about removed endpoint.
– Restore from backup.
򐂰 Given error logs, database schemas, and CLI commands, describe the
troubleshooting procedures so that corrective action can be taken, successful
distributions can be achieved, RIM connections can be established, and the
oserv and other Tivoli components can be traced, with emphasis on
performing the following steps:
–
–
–
–
–
–
–
–
–
–
–
272
Troubleshoot TMR and managed node installation.
Troubleshoot endpoint agent installation.
Solve RIM connection problems.
Debug distributions.
Generate oserv trace.
Trace a reference model.
Enable Web user interface tracing.
Troubleshoot Java install.
Review Scalable Collection Service.
Debug activity plan problems using appropriate log files.
Debug Change Manager problems using logs and traces.
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
A
Appendix A.
Lab exercises
This appendix provides lab exercises for the related chapters. You need to first
download the SG243946.zip, which has the necessary files for these exercises.
Refer to Appendix B, “Additional material” on page 349, for instructions to
download this zip file.
© Copyright IBM Corp. 2005. All rights reserved.
273
Introduction
In the these exercises we have used ITCM 4.2, but you can also use ITCM 4.2.1
if you prefer. Lab 1 contains installation instructions for getting all the support
applications plus ITCM 4.2. up and running on a single box. All the other labs can
be used as reference during a demo of a self-study guide.
The lab setup is two Windows 2000 Server or Professional machines for each
group. The machines are called TivoliServer and WindowsTarget. TivoliServer
will serve as a Source Host, Tivoli Server, and endpoint; and WindowsTarget will
serve as a second target endpoint in the exercises. We will install endpoints on
both machines and these endpoints will have the same names as the machines.
Most of the IBM Tivoli Configuration Manager 4.2 installation will be done on the
TivoliServer machine.
274
IBM Tivoli Configuration Manager Certification Guide
LAB 1 Using Integrated Install method to install a Tivoli
Server
In this lab we use the Integrated Install method to install a Tivoli Server.
What this exercise is about
This exercise will give you the possibility to deploy a Tivoli Server using the new
integrated installation method. During the exercise you will be guided through all
the steps required to install a Tivoli Server and all the ITCM standard
components.
What you should be able to do
At the end of the lab, you should be able to install a Tivoli server with all IBM
Tivoli Configuration Manager (ITCM) components using the ISMP method.
Required materials
Before you start the exercises, you should make sure you have access to the
following software:
򐂰
򐂰
򐂰
򐂰
Framework 4.1 or 4.1.1 Installation CD1
Framework 4.1 or 4.1.1 Installation CD2
ITCM 4.2 or 4.2.1 Installation CD
ITCM 4.2 or 4.2.1 Server CD
Note: We have used ITCM 4.2.1 for implemening these labs. If you use ITCM
4.2.0, you will not see Figure A-10 on page 286 in the installation of ITCM
(since this step was new with ITCM 4.2.1). Other than that, all lab instructions
are applicable to ITCM 4.2.0 as well.
Exercise instructions
This exercise should be done after reviewing Chapter 3, “Tivoli Configuration
Manager fundamentals and installation” on page 71.
Preface
DB2 V8.1 has already been installed on your Windows 2000 Server with the
following options:
򐂰 DB2 database home: c:\Program Files\SQLLIB
򐂰 Instance owner: db2admin
򐂰 Instance: DB2
Appendix A. Lab exercises
275
򐂰 Instance home: c:\DB2
Install your Tivoli Server with all ITCM modules
To install:
1. Log onto your TivoliServer machine as Administrator. Open a DB2 Command
Window by selecting Start → Programs → IBM DB2 → Command Window.
2. Using the command window, create a database to be used with ITCM. In this
exercise, we will use a common database for all ITCM modules:
db2 create database cm_db
3. Execute the script to create the table space:
db2 connect to cm_db
cd c:\temp
db2 -f cm_db2_admin.sql -o -t -z c:\temp\cmdb.log
exit
4. Create five new Windows 2000 user accounts for the default ITCM users:
planner, invtiv, mdstatus, pristine, and tivoli. Make all users part of the
Administrators group and give them tivoli as password. To create a user,
select Start → Programs → Administrative Tools → Active Directory
Users and Computers.
Note: If you are using Windows 2000 Professional, use the link Start →
Settings → Control Panel and then select Users and Passwords.
5. Now it is time to start the integrated installation. Use the Windows Explorer to
go to the <ITCM images>\CD5\ directory of the ITCM code installation
directory. Double-click setup.exe. This will start the InstallShield wizard
installation.
6. Select English as installation language. Click OK.
276
IBM Tivoli Configuration Manager Certification Guide
Figure A-1 Installation welcome screen
7. Click Next on the installation welcome screen.
8. Accept the license and click Next again.
Appendix A. Lab exercises
277
Figure A-2 Destination Directory
9. Click Next to accept the default destination directory.
278
IBM Tivoli Configuration Manager Certification Guide
Figure A-3 Type of installation
10.Select Custom installation.
11.A Typical installation will install all ITCM components but not configure
Directory Query. If you choose the Custom option, it is possible to select what
parts to install and to provide some configuration options. You also have the
option to configure the Directory Query component.
12.In a Typical installation, one common database, cm_db, will be created for all
components. In a Custom installation, you have the option to create separate
databases, but in our installation we will create only one database, which is
cm_db.
13.Click Next.
Appendix A. Lab exercises
279
Figure A-4 Selecting components
14.Select the components to install. Use the default of all selected. Click Next.
15.Click Next for Additional Languages. Do not specify any additional languages.
Note: Your instructor has probably not added the Language CD for ITCM,
so you will not be able to add additional languages.
16.In a Typical installation the installer will run all SQL scripts to create the table
spaces, all tables, and views. When you run the custom installation you have
the option to defer the execution of the scripts. Maybe your database
administrator wants to create custom table spaces in different locations with
different sizes.
280
IBM Tivoli Configuration Manager Certification Guide
Figure A-5 Specify the repository configuration
We created the table spaces in step 3. Now we only want to run the schema
scripts. Select the option to Run schema scripts only.
17.Click Next.
Appendix A. Lab exercises
281
Figure A-6 RDBMS and RIM information
Next, you will get a number of windows, one for each RIM object, where you
specify the information needed for RIM to connect to the RDMBS.
For all these windows, perform the following changes:
a. Change the database name to cm_db.
b. Enter the RIM password as tivoli.
Leave the rest as default.
18.Click Next.
282
IBM Tivoli Configuration Manager Certification Guide
Figure A-7 Specify user ID and password
19.For tivapm use the password tivoli. Click Next.
20.Fill in the rest of the RIM Information (similar to step 17).
21.For Enterprise Directory Query Facility, do not configure anything. Click Next.
Appendix A. Lab exercises
283
Figure A-8 Review the settings
22.Review the installation settings. Click Next to start the copy process.
284
IBM Tivoli Configuration Manager Certification Guide
Figure A-9 Select how to manage product images
During this process, you will have to specify the location of the software. Ask
your instructor for this location. Select Verify local depot and enter the
location of the images (ask your instructor for this location).
Note: If you receive a message window saying that the Integrated
Installation program could not locate a program, specify the correct
directory that has the .IND file for that component.
Appendix A. Lab exercises
285
Figure A-10 Components to install
23.Select Run All in the following Installation Step window. Note that this window
gives you a last chance before the installation to change the selected
components to install. You would not get this window if you had selected the
Typical installation instead of Custom.
286
IBM Tivoli Configuration Manager Certification Guide
Figure A-11 After Tivoli Management Framework installation
After completion of the installation, the Tivoli Management Framework system
will ask you to reboot the machine.
24.Click Finish to reboot the machine.
Appendix A. Lab exercises
287
Figure A-12 Installation continues after reboot
Installation will continue from where it was, after the reboot.
25.Click Run All to continue to install. If any of these steps fails installation will
stop and that particular step will get Error status. You can check the errors by
clicking that line with the right mouse button and going to Properties.
288
IBM Tivoli Configuration Manager Certification Guide
Figure A-13 Received error for registering APM plug-ins
If you receive an error while the system is registering plug-ins for Activity
Planner, right-click the Windows desktop and select New → Shortcut. Fill in
cmd /k%systemroot%\system32\drivers\etc\tivoli\setup_env.cmd for the
shortcut and name it Tivoli CLI.
26.Double-click the new shortcut. You should see the message Tivoli
environment variables configured.
27.Open a command window and set the Tivoli environment and type the
following commands;
bash wstopapm -f
bash wstartapm
28.After APM starts, right-click the line where you get an error, and set the status
to Ready and click Run All again.
Appendix A. Lab exercises
289
Figure A-14 Review the components installed successfully
29.When all components have been installed successfully, click Finish.
30.Double-click the new shortcut. You should see the message Tivoli
environment variables configured.
31.Type the following Tivoli command:
odadmin odlist
32.Restart the Tivoli Server oserv process:
odadmin reexec
33.Verify that six RIM objects have been created using:
wlookup -ar RIM
34.Test one of the RIM objects using:
wrimtest -l mdist2
35.Cancel out of the session by typing x.
36.Verify the installed Tivoli products and patches using the wlsinst command:
wlsinst –ah
290
IBM Tivoli Configuration Manager Certification Guide
Exercise review/wrap-up
In this exercise, you have learned how to install a Tivoli Server and all the
required ITCM components using the new integrated installation method.
Appendix A. Lab exercises
291
LAB 2. Using Integrated Install method to install a Tivoli
server
In this section we use the Integrated Install method to install a Tivoli server.
What this exercise is about
In this exercise, you will learn how to install the Tivoli Desktop and ITCM GUIs.
With the introduction of ITCM 4.2, the different GUIs that used to require a
managed node can now be installed on endpoints or even on machines with no
Tivoli Agent. ITCM provides a "desktop" CD that contains a number of Software
Package Blocks; these can be used to install the APM, CCM, Editor, MDist2, and
Inventory GUIs on Windows endpoints.
In this exercise, we will install these GUIs on one of our Windows 2000 Servers.
What you should be able to do
At the end of the lab, you should be able to install a Tivoli Desktop with all ITCM
components using the ISMP method.
Introduction
The Integrated Desktop installation can be used to install the Tivoli Desktop and
all the ITCM administrative GUIs. You can only run this on Windows NT and 2000
systems.
Required materials
For this exercise, you need access to ITCM Desktop for NT Version 4.2 or 4.2.1
CD.
Exercise instructions
This exercise should be done after reviewing Chapter 3, “Tivoli Configuration
Manager fundamentals and installation” on page 71.
Preface
All exercises of this chapter depend on the availability of specific equipment in
your classroom.
292
IBM Tivoli Configuration Manager Certification Guide
Installing the Desktop
To install:
1. Log into your TivoliServer machine as the Administrator user.
2. From the ITCM Desktop CD, launch the setup.exe (ask your Instructor for the
location of the CD).
3. Select English as the installation language.
4. Accept the license agreement.
5. Select Tivoli Management Framework 4.1.1.
Figure A-15 Installing the Desktop
6. Click Yes for the default destination directory and click Next.
7. When you receive the following window, click Finish to finish the installation.
Appendix A. Lab exercises
293
Figure A-16 Review the installation steps
8. Test the desktop. Log into your TivoliServer as the Administrator user.
9. Start the MDist2 GUI from the Tivoli Desktop. Have a look at the "c:\Program
Files\Tivoli\Desktop" directory. Where is the CMD file to launch the Inventory
GUI located?
Install an endpoint on both of your Windows machines
Now you will install endpoint first on your Tivoli Server machine and then on your
Windows Target machine. Start the endpoint installation from Framework CD2 by
running \LCF\WINNT\setup.exe. Use all the default options.
1. In the Advanced Settings, remember to make sure your endpoint logs into the
gateway on your Tivoli Server.
Note: Substitute your Tivoli Gateway name in the following figure; do not
forget that when the Integrated Install program creates a gateway, it uses
the following syntax for the name: <Tivoli Server name-gw>. Click Next.
294
IBM Tivoli Configuration Manager Certification Guide
Figure A-17 Port settings
2. Reboot the NT machine when you finish.
3. Also install the endpoint on the Windows Target machine, with the same
settings. Note that endpoint names are same as the machine names.
Exercise review/wrap-up
In this exercise, we have covered the new method to install the Tivoli Desktop
and the Tivoli administrative GUIs. We also installed endpoints on our lab
machines.
Appendix A. Lab exercises
295
LAB 3. Create an Inventory profile and run a hardware
scan
In this section we create an Inventory profile and run a hardware scan.
What this exercise is about
In this exercise, we create a hardware scanning profile and perform an initial
scan of both of your Tivoli endpoints.
What you should be able to do
At the end of the lab, you should be able to configure an InventoryConfig profile.
Required materials
None.
Exercise instructions
This exercise should be done after reviewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
Create a hardware profile with SMBIOS capabilities
To create a hardware profile with SMBIOS capabilities:
1. Start the Tivoli Desktop on your Tivoli Server machine.
2. Log into your Tivoli Server as the Administrator user using the Tivoli Desktop.
3. Create a new policy region for Inventory and name it pr.itcm.inv.
4. Right-click the new policy region and select ManagedResources. Assign
ProfileManager and InventoryConfig as valid ManagedResources.
296
IBM Tivoli Configuration Manager Certification Guide
Figure A-18 Policy region
5. Open the new policy region and create a new dataless ProfileManager named
pm.itcm.inv.hw.
Figure A-19 Profile Manager creation
Appendix A. Lab exercises
297
6. Open the new ProfileManager and subscribe all your Tivoli endpoints to the
new ProfileManager. To do so, right-click the ProfileManager, select
Subscribers, and move the endpoints to the Current Subscribers window.
7. Create a new InventoryConfig profile. Select Create → Profile from the
profile manager menu and select the InventoryConfig resource. Name the
profile ic.hw.
8. Right-click the new profile and select Properties. The Inventory Configuration
Java GUI will start. Customize the profile as follows:
a. For PC and UNIX, deselect Software scanning.
b. Check the hardware configuration. Click Configure.
Figure A-20 Hardware Scanner
9. We do not want to collect IPX and USB Device information, so deselect them.
Leave all other options at the default.
10.Click OK to close the Inventory Configuration window.
8.4.1 Distribute the profile
To distribute the profile:
1. Right-click the profile and select Distribute.
298
IBM Tivoli Configuration Manager Certification Guide
2. Select Advanced Options → Timeout Settings from the top menu.
3. Note that you can enable Wake on LAN from the profile in Inventory. Close the
Timeout Settings window.
4. Select all your endpoints and distribute the profile.
5. Check the distribution status from the command line:
wmdist -al
wgetscanstat -a
6. Check the data that was collected. Run the Queries from the installed query
library. Open the default policy region: <Tivoli server>-region.
Figure A-21 Inventory query
7. Open the INVENTORY_QUERY query library and execute some of the new
queries to find out what data is collected.
Appendix A. Lab exercises
299
Figure A-22 Edit Query
300
IBM Tivoli Configuration Manager Certification Guide
Figure A-23 Contents of Query
Appendix A. Lab exercises
301
LAB 4. Create an Inventory profile and run and cancel
the software scan
In this section we discuss the creation of an Inventory profile and run and cancel
the software scan.
What this exercise is about
In this exercise, we will learn how to perform a software scan and how to cancel
the collection process of a software scan.
What you should be able to do
At the end of the lab, you should be able to:
򐂰 Configure an InventoryConfig profile.
򐂰 Run the wcancelscan command.
Required materials
None.
Exercise instructions
This exercise should be done after reviewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
Create an Inventory profile for software scan
To create an Inventory profile for a software scan:
1. Open the pr.itcm.inv policy region and create a new dataless ProfileManager
named pm.itcm.inv.sw.
2. Open the new ProfileManager and subscribe all your Tivoli endpoints to the
new ProfileManager.
3. Create a new InventoryConfig profile. Select Create → Profile from the
profile manager menu and select the InventoryConfig resource. Name the
profile ic.sw.
4. Right-click the new profile and select Properties. The Inventory Configuration
Java GUI will start.
5. Customize the profile as:
– Disable all hardware scans.
302
IBM Tivoli Configuration Manager Certification Guide
– For PC software, select to run a file scan. Configure the scan options as
shown in Figure A-24.
6. Disable all hardware scans.
7. For PC software, select to run a file scan. Configure the Scan options as
shown in Figure A-24.
Figure A-24 Scan Configuration
8. Also customize the profile to scan for .exe and .com files in the Program Files
directory only.
9. Close the profile.
Distribute the profile and cancel the distribution
To distribute the profile and cancel the distribution:
1. Log into the Tivoli Server as Administrator.
2. Distribute the profile from the command line:
wdistinv -l inv_ep_debug=3 @InventoryConfig:ic.sw
3. Verify that the distribution has started.
# wmdist –al
4. Name Distribution ID Targets Completed Successful Failed.
Appendix A. Lab exercises
303
Example: A-1 Example
ic.sw 1709678678.3
# wgetscanstat -a
Scan ID:
Distribution ID:
Profile name:
Start time:
Elapsed time:
Clients completed:
Clients pending:
1
0(
0%)
0( 0%) 0( 0%)
3
1709678678.3
ic.sw
01/22/2004 02:41:56 AM
0 Days 0 Hours 0 Minutes 13 Seconds
0
1
5. Now cancel the scan. (you can also use wcancelscan -i scan_id to cancel a
separate scan):
# wcancelscan –a
6. Start to cancel Inventory profile ic.sw with scan ID 4.
7. The cancel operation sent to Inventory status collector is complete.
8. The cancel operation sent to MDistII manager is complete.
9. The cancel operation sent to Scalable Collection Service is complete.
10.The cancel operation sent to Inventory data handler is complete.
11.Verify that the collection has been cancelled:
# wgetscanstat -a
12.No scans using the Inventory status collector are in progress.
13.Verify that no software data has been received into the repository.
14.Run the NATIVE_SWARE_QUERY from the INVENTORY_QUERIES
QueryLibrary.
15.Now distribute the Profile again. Do not cancel the scan, and verify that data
was collected by running the NATIVE_SWARE_QUERY and
INVENTORY_SWARE query.
304
IBM Tivoli Configuration Manager Certification Guide
LAB 5. Create a Custom Query with where clauses
In this section we discuss creating a Custom Query with where clauses.
What this exercise is about
In this exercise, we will see how we can create a Custom Query with where
clauses. We will create a query that searches the Inventory data for Windows
machines with higher than 128 MB memory.
What you should be able to do
At the end of the lab, you should be able to create a Custom Query with where
clauses.
Required materials
None.
Exercise instructions
This exercise should be done after reviewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
Create a query library
To create a query library:
1. Create a query library called custom queries in the <Tivoli Server>-region.
Select Create → Query Library from the <Tivoli Server>-region.
2. Enter Custom_Queries in the name field.
3. Click Create & Close.
Create a query
To create a query:
1. Create a custom named High_Memory in the Custom Queries query library.
Select Create → Query from the menu.
2. Enter High_Memory in the name field.
3. For the repository, select inv_query.
Appendix A. Lab exercises
305
4. Click the ellipses (…) next to the Table/View Name field and select the
INVENTORYDATA view.
5. Move the TME_OBJECT_ID and TME_OBJECT_LABEL from the Available
Columns to Chosen Columns.
6. Click the ellipses (…) to the right of the Column Name field in the Where
Clause panel.
7. Select the PHYSICAL TOTAL_KB column name, and then click the Close
button.
8. Select >= from the drop-down menu next to the Column Value field in the
Where Clause panel.
9. In the Column Value field, enter 131102 for 128 MB memory (128 * 1024).
10.Click Add.
11.Select only the Windows machines for this query, such as OS_TYPE =
“Microsoft 2000”. (Tip: This step is similar to the previous step where you
have selected the where clause for PHYSICAL TOTAL_KB.) Ask your
instructor if you need help.
12.When you finish, click Create & Close.
13.Run the query and see if your workstations are listed.
306
IBM Tivoli Configuration Manager Certification Guide
LAB 6. Create and install software packages for
Windows
In this section we create software packages for Windows and experiment with
installation options.
What this exercise is about
In the this exercise we first define and install a simple Windows application called
Redbooks. We will use the Software Package Editor to define the package to be
distributed. We will save the package as a Software Package Block (spb) in order
to consolidate files and actions required to install it in a zip file. Next, we will use
the disconnected CLI to test the package on the preparation machine. Then we
will distribute the Software Package Block to our second endpoint. After that, we
will experiment with different installation options. Finally, we will prepare a
package called Ntprocinfo with advanced configuration options, such as Add
Links, Registry Keys, and Text File objects, and install it on our endpoints.
What you should be able to do
At the end of the lab, you should be able to:
򐂰 Install the Software Package Editor using the ISMP installation method.
򐂰 Install a software package with various options.
Required materials
For this exercise you need to access to:
򐂰 ITCM Desktop installation CD (CD 3)
򐂰 Redbooks directory of the SG243946.zip
򐂰 NTprocinfo directory of the SG243946.zip
Exercise instructions
This exercise should be done after reviewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
Install the Software Package Editor
First, we will install the Software Package Editor on one of our Windows
endpoints. Log onto one of your Windows endpoints as Administrator. From the
ITCM Desktop CD, launch the setup.exe. (Desktop installation is on CD 3. Ask
your Instructor for the location of the CD.)
Appendix A. Lab exercises
307
The InstallShield wizard will start. Follow the installation process, make sure you
select the English language, accept the license agreement, and select the
Software Package Editor component to be installed. (All the other components
were already installed.)
After the installation finishes, you will have two new icons on your Windows
desktop, one to launch the Software Package Editor GUI and one icon to launch
a CMD where the Software Distribution environment is source (allowing the use
of the SWD CLI).
Create a simple package
To create a simple package:
1. On your Windows 2000 machine, create a folder called C:\SWPKGs. This is
where we will store our software packages.
2. From your Windows endpoint, start the SP Editor GUI. Double-click the
Software Package Editor icon.
3. Click OK to select a General Package.
4. Select the package called NoName and change it to Redbooks.
5. Click the Add Directory icon (under Add Object). Configure as shown in
Figure A-25 on page 309.
308
IBM Tivoli Configuration Manager Certification Guide
Figure A-25 General Package properties
6. Click the Advanced button. Check Descend Directories to include all files in
the C:\LabFiles\Redbooks directory. Leave Create Directories checked.
7. Click OK for both windows.
8. Select Edit → Properties.
9. Click Condition to add the following package installation condition: Choose
os_name from the variable list and set the following Condition to install the
package: os_type == 'Windows 2000'.
10.Click OK for both windows.
11.Save the package as both a software package and a software package block.
12.Choose File → Save As and type C:\SWPKGs\Redbooks.sp and
C:\SWPKGs\Redbooks.spd. Be sure to change the bottom pull-down menu to
indicate either sp or spb when saving to a particular software package type.
Appendix A. Lab exercises
309
Test the software package
Before installing the software package on a production machine, the software
package should be tested. Do the following on the Tivoli Server to confirm that
the software package works by installing it using disconnected commands:
1. Select Start → Programs → Software Distribution → SWDIST ENV to start
the SWDIST ENV, where you can use disconnected commands.
2. Install the software package block with the wdinstsp command:
wdinstsp c:\SWDPKGs\Redbooks.spb
3. List the software packages installed on the machine and confirm that
Redbooks.spb is listed.
4. Confirm that PDF files have been added to the c:\SWPKGs directory.
Import the software package
Before installing the software package, it must be imported into a Tivoli Software
Package profile. This action puts the software package into the Tivoli database
as a managed resource. Now you will import the package in the not-built format.
1. From the Tivoli Desktop, open the pr.itcm.swd policy region.
2. Open the SDLABs profile manager.
3. From the menu, select Create Profile.
4. Name the profile Redbooks^1.0 and click Create and Close. Notice that the
icon created is an empty box, which is considered to be an empty software
package.
5. Customize the Import window similar to Figure A-26 on page 311 (substitute
your endpoint and source host name).
Note: Unchecking the Build check box creates the software package in the
unbuilt state.
310
IBM Tivoli Configuration Manager Certification Guide
Figure A-26 Software Package Import
6. Click Import & Close when you are finished.
Install the software package
To install:
1. Right-click the Redbooks^1.0 profile and select Install.
2. Select your Windows Target endpoint as the subscriber.
3. Click Install & Close.
Appendix A. Lab exercises
311
Verify the distribution was successful
ITCM provides many ways to confirm that a distribution was successful. We will
experiment with some of these.
򐂰 First check the default log as shown below. Logs by default are located on the
TMR server. Go to <Tivoli BINDIR>\swdis\work\Redbooks^1.0.log. You
should see that the software package status as IC.
Example: A-2 Default log
Software Package: "Redbooks^1.0"
Operation:
install
Mode:
not-transactional,not-undoable
Time:
2004-01-23 04:28:55
Log File:
vasfi:C:\PROGRA~1\Tivoli\bin\swdis\work\Redbooks^1.0.log
=================
vasfi:
DISSE0074I Operation successfully submitted. Distribution ID is 1709678678.13.
=================
Software Package: "Redbooks^1.0"
Operation:
install
Mode:
not-transactional,not-undoable
Time:
2004-01-23 04:29:02
=================
vasfi:
DISSE0155I Distribution ID: `1709678678.13'
DISSE0029I Current software package status is 'IC---'.
DISSE0001I Operation successful.
=================
򐂰 The second way is to check the Distribution Status icon on the Tivoli Desktop
or by using wmdistgui from the command line. Select By Distribution Name
and choose Redbooks^1.0.
312
IBM Tivoli Configuration Manager Certification Guide
Figure A-27 Distribution Status
򐂰 The third method is to use the Verify feature. From the Tivoli Desktop,
right-click the Redbooks^1.0 profile and select Verify.
Click Verify and Close.
If the verify operation finds an error, it puts the status of the package in the error
state of Installed-Committed-Error (IC..E); to see if it is successful, use the
wdlssp command. You need to launch the Software Distribution environment
(SWDIS ENV) first with the command. Example A-3 is a sample.
Example: A-3 IC state
---------------------------------------DISSE0164I Name
: Redbooks
DISSE0165I Version
: 1.0
DISSE0166I State
: IC------------------------------------------
Install software package in transactional mode and commit
installation
Manually delete the two redbook PDF files from the c:\SWPKGs directory. Install
the software package onto your machine using the following procedure:
1. Right-click the Redbooks^1.0 profile and select Install.
2. Under the Advanced Options (on the top), select Operation Modes.
3. Select Yes under Transaction Options.
4. Click Set & Close.
Appendix A. Lab exercises
313
5. Select Force in the checks section. You need to force the installation, since
the software package state is IC.
6. Choose your Windows Endpoint as the target of the distribution.
7. Click Install and Close.
8. Check that the state of the software package is IP (Installed-Prepared) using
the CM_STATUS_QUERY query.
Note: This could also be achieved using the wdlssp command.
9. To run the query open up the CM_STATUS_QUERY from the
INVENTORY_QUERY query library and run the query as shown in
Figure A-28.
Figure A-28 Edit Query screen
10.You should see the status of the Redbooks^1.0 software package as IP.
314
IBM Tivoli Configuration Manager Certification Guide
Figure A-29 Run Query
11.Go to the SDLABs profile manager again and right-click Redbooks^1.0.
12.Commit the installation by selecting Commit.
13.Confirm that the state of the package is now IC and the files have moved to
the SWPKGs directory.
Note: Alternatively, you could achieve the same results from the CLI with:
wrunquery CM_STATUS_QUERY
Appendix A. Lab exercises
315
Figure A-30 Query results
Undo an installation
Now we will undo the installation of Redbooks^1.0.
1. Right-click the Redbooks^1.0 profile.
2. Right-click the Redbooks^1.0 profile and select Install.
3. Select Force.
4. Select your Windows Endpoint as the target.
5. Under the Advanced Options (on the top), select Operation Modes.
6. Select Yes under the Undoable section.
7. Click Set & Close.
8. Click Install and Close.
9. Check that the state of the software package is ICU
(Installed-Committed-Undoable).
10.Right-click the Redbooks^1.0 profile and select Accept to accept the
distribution.
11.Check that the state of the software package is IC (Installed-Committed).
316
IBM Tivoli Configuration Manager Certification Guide
Repair a damaged distribution
During verification of a software package, you may find that the distribution was
corrupted and the software package is in an error state. Instead of completely
redistributing the application, you can distribute what is necessary to fix it.
1. Install Redbooks^1.0 on your Windows Target Endpoint again (if it is not
already installed).
2. Delete one of the PDFs in the C:\SWPKGs directory.
3. Perform a verification operation on the Redbooks^1.0 package.
4. Confirm that the package’s state is IC..E.
5. Now repair the distribution. Right-click the Redbooks^1.0 profile. Select
Install.
6. Select Repair in the changes section.
7. Select for Windows Endpoint as the target.
8. Click Install & Close.
9. Confirm that the package is once again in the IC state.
Add links, registry keys, and text file objects
Now we will create a software package that installs a program with links, registry
keys, and text file objects.
1. From your Windows Endpoint, start the SP Editor GUI. Double-click the
Software Package Editor icon.
2. Click OK to select a General Package.
3. Select the package called NoName, and change it to NTProcinfo.
4. Click the Add Directory icon (under Add Object) and customize as in
Figure A-31 on page 318. When finished, select Advanced and select the
Descend directories check box to include all source files and
sub-directories, if any.
Appendix A. Lab exercises
317
Figure A-31 Directory Properties
5. Click OK to save and return to the add directory dialog. Click OK.
6. Next we will add an object to create a shortcut to the NTproclist application on
the Windows desktop. From the package drop-down menu select Insert →
Add Object → Windows shell folder.
7. In the Location field, click the right mouse button and then select
all_users_shell_desktop from the list. Click OK to place a link on the
Windows desktop.
318
IBM Tivoli Configuration Manager Certification Guide
Figure A-32 Windows Shell Folder Properties
8. Click OK to save.
9. From the Windows Shell folder drop-down menu, select Insert → Link.
Customize as follows:
– Display name: NTprocinfo
– Command: C:\ntprocinfo.exe
10.Click Advanced. Customize as follows:
– Working directory: c:\temp
– Icon location: $(system_drive)\LabFiles\NTprocinfo\awt.ico
11.Now we will add a key that contains the version of the Ntprocinfo application
to the Windows registry.
12.From the package drop-down menu, select Add Object → Windows
registry. Customize as follows:
–
–
–
–
Hive: HKEY_LOCAL_MACHNE
Parent key: SOFTWARE
Key: NTprocinfo
Class: Blank
13.Click OK.
Appendix A. Lab exercises
319
14.From the above Windows registry drop-down menu, select Insert → value.
Customize as follows:
– Name: Version
– Data: 1.0
15.Finally, we will add an entry to the c:\Winnt\Tivoli\lcf\1\lcf_env.cmd file. In
order to do this, we must first define a Text File object in our package. Again,
right-click the NTprocinfo package and select Insert → Add Object → Text
File. Fill in c:\Winnt\Tivoli\lcf\1\lcf_env.cmd.
16.Right-click the new file object, select Insert → Line, and input the following
values:
– Text: REM: Ntprocinfo is running on this system
– Position: End
17.Now we will save the package as a software package. From the File menu
select Save as and select the directory c:\SWPKGs.
– File name: ntprocinfo
– File of Type: Software Package Block (sp)
18.Click Save.
Now we will install the software package on our second Windows Endpoint.
1. Open the Tivoli Desktop as Administrator.
2. Open the pr.itcm.swd policy region. Create a dataless ProfileManager called
pm.swd.NTprocinfo and subscribe your Windows Endpoint (non-MN
machine).
3. From the Profile Manager, create a software package called Ntprocinfo^1.0.
4. From the software profile drop-down menu, select Import.
5. On the Import panel, choose the Endpoint Machine and then type your
Endpoint name. Click …. to browse the file at the location
C:\SWPKGs\Ntprocinfo.spb.
6. Enter the source host name <Your_Tivoli_server>.
7. Click Import & Close.
8. Install the software package on your other Windows Endpoint. Right-click and
select Install. Accept all the default values and select your other Windows
Endpoint as a target.
9. Look at the distribution log ${BINDIR}/../swdis/work/NTprocinfo.1.0.log on
your Tivoli Server to verify the distribution. You should see an icon on your
desktop called Ntprocinfo. (It is a small program used to browse Windows
processes.)
320
IBM Tivoli Configuration Manager Certification Guide
LAB 7. Creating a software package using AutoPack
In this section we create a software package using AutoPack.
What this exercise is about
In this exercise, we will use AutoPack to create a software package. We will
install the WinZip software.
What you should be able to do
At the end of the lab, you should be able to create and install software using the
AutoPack option.
Required materials
The images are located in the Winzip directory of the SG243946.zip.
Exercise instructions
This exercise should be done after rewiewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
Creating an AutoPack
On your Tivoli Server, start the Software Package Editor by double-clicking the
Software Package Editor icon on the desktop.
1. Select AutoPack Technology and click OK.
2. Click Next to start the AutoPack Guided Process.
3. Under General Options, be sure to monitor the C: drive.
4. Explore the other options, but leave the defaults.
5. Start the first snapshot.
6. Next, install Winzip by launching c:\LabFiles\winzip80.exe. Install the
application in c:\winzip. Complete the installation (select express setup).
7. Start the second snapshot from the AutoPack Guided Process.
8. When AutoPack Guided Process creates the package, change the name to
Winzip and the Version to 8.0.
9. Have a look at the software package and delete any unwanted objects. Make
sure you understand the meaning of each object in the package.
Appendix A. Lab exercises
321
10.Before saving the software package specify a log file on the target machine.
Select Edit → Properties → Logfile → c:\logs.
11.Save the package as Software Package Block in c:\spb.
12.Now create a new software package for the WinZip application and install it
on your other Windows Endpoint. Create a new ProfileManager
(pm.swd.winzip). Create an empty software package (winzip^8.0).
13.Import the SPB. Subscribe your Windows Endpoint.
14.Install the winzip^8.0 software package.
15.Verify that WinZip was correctly installed (by using the MDist 2 GUI, log file, or
the wmdist command).
322
IBM Tivoli Configuration Manager Certification Guide
LAB 8. Verifying the status of a software package
In this section we verify the status of a software package.
What this exercise is about
In this exercise, we look up the status of the Redbooks Package and we will
verify whether the application is still correctly installed.
What you should be able to do
At the end of the lab, you should be able to run a QUERY to verify whether an
application is correctly installed.
Required materials
None.
Exercise instructions
This exercise should be done after rewiewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
1. Bring up the Tivoli Desktop as Administrator and open the default policy
region (hostname-region).
2. Open the INVENTORY_QUERY QueryLibrary.
3. Right-click the CM_STATUS_QUERY query and select Run Query.
4. Verify the status of the Redbooks application on your Windows Target. The
status should be IC---- (Installed Committed).
5. Alternatively, you could achieve the same results from the CLI by running:
wrunquery CM_STATUS_QUERY
Appendix A. Lab exercises
323
LAB 9. Using the Activity Planner
In this section we use the Activity Planner.
What this exercise is about
The purpose of this exercise is to give the student the opportunity to configure
and use the functionalities of the Activity Planner (AP) included with ITCM 4.2.
What you should be able to do
At the end of this lab, you should be able to:
򐂰 Register the Activity Planner plug-ins.
򐂰 Use Inventory scans and software packages in AP activities.
Required materials
None.
Introduction
In this exercise, we will first check the RIM object and RDBMS schema needed
for the Activity Planner. Next, we will assign the necessary roles to our Tivoli
Administrator, allowing him to use all AP functionality. We will also verify the AP
Administrator settings.
Before creating an activity plan, we will register the AP plug-ins. In the first
activity plan, we will use an Inventory Scan for one of the activities.
Exercise instructions
This exercise should be done after rewiewing Chapter 5, “Deployment Services”
on page 163.
AP - RIM and RDBMS configuration
If the Activity Planner server component was installed using the new ISMP
installation mechanism, the RIM object and the database schema were created
during the installation. If Activity Planner was installed using SIS or the "classic"
Tivoli installation mechanism, the RIM object and database schema must be
created manually. If you have successfully installed the product using ISMP, just
read through this exercise and verify the different steps. Log into the Tivoli Server
324
IBM Tivoli Configuration Manager Certification Guide
as Administrator user. Verify whether a RIM object for AP already exists by
running:
wlookup -ar RIM
The name of the RIM object for APM should be planner.
If it does not exist, use the wcrtrim command to create a new RIM object named
planner. Ask your instructor for the correct RIM settings of your DB2 installation.
1. Verify the correct functioning of the RIM object using:
wrimtest -l planner
You should get output similar to Example A-4.
Example: A-4 wrimtest output
Resource Type : RIM
Resource Label : planner
Host Name
: vasfi
User Name
: planner
Vendor
: DB2
Database
: cm_db
Database Home : C:\Program Files\Sqllib
Server ID
: tcpip
Instance Home : C:\Program Files\Sqllib\DB2
Instance Name : DB2
Opening Regular Session...Session Opened
RIM : Enter Option >
2. Cancel out of the session using x.
Assigning AP roles and verifying the AP Administrator
Now we will assign the necessary roles to our Tivoli Administrator, allowing him
to use all AP functionality. We will also verify the AP Administrator settings. Open
the Tivoli Desktop as Administrator. Double-click the Administrator collection.
1. Right-click the Root Administrator and select Edit TMR Roles. Assign all the
APM roles to the Root Administrator. Move the roles to the left and click
Change & Close.
2. Now right-click the swd_admin_regionname Administrator and select Edit
Logins. This Tivoli Administrator was added by the AP installation. What is
the login name for this Administrator (default value is tivapm)? Do not change
the settings.
3. Verify that APM is working correctly:
wapmgui ed
Appendix A. Lab exercises
325
4. You should get a message saying that activity plan database is empty.
Registering the AP plug-ins
Now we see the registered plug-ins for AP from the CLI (they were registered
during the Integrated Installation). Use the wapmplugin command to list the
registered plug-ins for AP:
wapmplugin -l
How many plug-ins are registered? All four plug-ins (TaskLibrary, Inventory,
OSElement, and Software Distribution) should be registered.
Launch the AP editor GUI on your Tivoli Server:
wapmgui ed
Which activities can you add to a plan? Does this correspond to the registered
plug-ins? (It should.) Note that the number of registered plug-ins will depend on
the installation order. For example, if Inventory is installed after AP, the Inventory
plug-in should be automatically registered.
Creating a simple Activity Plan
In this step, we will create an Activity Plan that includes an Inventory scan. We
will create an Activity Plan with two activities according to the following
specifications:
򐂰 Plan name: PlanA.
򐂰 Plan Targets: Our two Windows Endpoints.
򐂰 Activity InventoryScan: Inventory scan using ic.hw profile.
Activity RedbookPDFs: Install Redbooks^1.0. This activity can only start when
the InventoryScan is complete.
1. Launch the AP editor GUI using the apmedit.bat file located in c:\Program
Files\Tivoli\Desktop\Console or on the Tivoli Desktop. Log in as the
Administrator user on the Tivoli Server.
2. Select View → Plan Properties. In the General tab, fill in the plan name,
PlanA, and a description of your choice.
3. Next, select the Targets tab. In the Included Targets section, select Profile
Subscriber as the target selection type and click Insert. Click the (…) button
and then select SDLab.
326
IBM Tivoli Configuration Manager Certification Guide
Figure A-33 Adding Subscriber
4. Click Add to add the SDLabs. Then click OK.
Figure A-34 AP Propeties
5. Click OK again; this will return you to the main AP editor window. Now we will
add the first activity. Click the Inventory Task activity icon. Fill in the values
shown in Figure A-35 on page 328.
Appendix A. Lab exercises
327
Figure A-35 Activitiy Properties
6. Then click Properties. Select the ic.hw InventoryConfig profile (click ...).
328
IBM Tivoli Configuration Manager Certification Guide
Figure A-36 Inventory Scan
7. Explore the different settings, but leave the default values. Return to the main
window (click OK twice).
8. Next, we will add the second activity. Click the Software Distribution activity.
Name the activity RedbookPDFs. Click Properties. Select the Redbooks^1.0
software package.
Appendix A. Lab exercises
329
Figure A-37 Selecting software package
9. In the Application Options tab, change the Checks option to Force.
10.Select the User Notification Settings tab. Enable the User Notification
settings and fill in values of your choice.
11.Next, select the Distribution Options tab. Change the Priority to High.
12.Now add a condition on the RedbookPDFs activity. Right-click the activity and
select Condition. Add a condition so that this activity will only start if the
InventoryScan activity is complete.
330
IBM Tivoli Configuration Manager Certification Guide
Figure A-38 Adding Condition
13.Will the RedbookPDFs activity start if the InventoryScan activity fails on one
node and succeeds on the other node?
14.Click OK. Now save the plan as a Template. What is the difference between
Template and Draft?
Figure A-39 Activity Plan Editor
15.Close the AP editor GUI and open the APM monitoring GUI (apmmon.bat
file).
Appendix A. Lab exercises
331
16.From the APM monitor, select Plans → Submit. Submit PlanA with the
default settings.
17.Monitor the progress of the plan until it completes.
Figure A-40 Activity Plan Monitor
Exercise review/wrap-up
In this exercise, we have configured the Activity Planner component of ITCM
4.21, including the RIM configuration, the RDBMS schema creation, the AP
plug-in registration, and assigning the AP authorization roles.
332
IBM Tivoli Configuration Manager Certification Guide
LAB 10. Using Change Manager
In this section we use Change Manager.
What this exercise is about
The purpose of this exercise is to give the student the opportunity to configure
and use the functionalities of the Change Manager (CM) included with ITCM 4.2.
What you should be able to do
At the end of the lab, you should be able to:
򐂰
򐂰
򐂰
򐂰
Register the Change Manager plug-ins.
Create a Reference Model using an existing Tivoli Endpoint as a template.
Customize a Reference Model.
Use the Change Manager command line interface.
Required materials
None.
Introduction
In this exercise, we will first verify the RIM object and RDBMS schema needed
for Change Manager. Next, we will assign the necessary roles to our Tivoli
Administrator, allowing him to use all CM functionality.
Before creating a Reference Model, we will register the CM plug-ins for Inventory
and Software Distribution. We will create a Reference Model using an existing
Tivoli Endpoint as a template. We will add an Inventory scan to this Reference
Model and use the new command line interface of CM to perform a number of
operations on this Reference Model.
Exercise instructions
This exercise should be done after rewiewing Chapter 5, “Deployment Services”
on page 163.
Configuring RIM and RDBMS for Change Manager
First, we will verify the RIM object needed for CM and we will create the CM
database schema. If the CM component is installed using the new ISMP
installation mechanism, the RIM object and the database schema will be created
Appendix A. Lab exercises
333
during the installation. If CM was installed using SIS or the "classic" Tivoli
installation mechanism, the RIM object and database schema must be created
manually. If you have successfully installed the product using ISMP, just read
through this exercise and verify the different steps.
1. Log into the Tivoli Server as the Administrator user. Verify whether a RIM
object for CM already exists:
wlookup -ar RIM
2. The name of the RIM object for CM should be ccm. If it does not exist, use the
wcrtrim command to create a new RIM object named ccm. Ask your
instructor for the correct RIM settings of your DB2 installation.
3. Verify the correct functioning of the RIM object using:
wrimtest -l ccm
4. You should get output similar to Example A-5.
Example: A-5 wrimtest output
Resource Type : RIM
Resource Label : ccm
Host Name
: vasfi
User Name
: tivoli
Vendor
: DB2
Database
: cm_db
Database Home : C:\Program Files\Sqllib
Server ID
: tcpip
Instance Home : C:\Program Files\Sqllib\DB2
Instance Name : DB2
Opening Regular Session...Session Opened
RIM : Enter Option >
5. Cancel out of the session using x.
6. Verify that CCM is working correctly:
wlstrmod
7. You should get an error message saying no reference models are in the CM
database.
Assigning CM roles
In this step, we will assign the necessary roles to our Tivoli Administrator,
allowing him to use all CM functionality. Open the Tivoli Desktop as the
Administrator user. Double-click the Administrator collection.
334
IBM Tivoli Configuration Manager Certification Guide
Right-click the Root Administrator and select Edit TMR Roles. Assign all the
CCM roles to the Root Administrator, if they are not already assigned. Move the
roles to the left and click Change & Close.
Registering the CM plug-ins
Now we will register the plug-ins for CM from the CLI. Log in as the Administrator
user to your Tivoli Server.
1. Use the wccmplugin command to list the registered plug-ins for CM:
wccmplugin -l
2. How many plug-ins are registered? If four plug-ins are registered
(InventoryScan, SoftwareDistribution, InventoryData, and OSElement), skip
to the next exercise.
3. We want to register at least the following plug-ins for our exercise:
InventoryScan and SoftwareDistribution. The plug-ins can be registered using
scripts that are located in $BINDIR/TME/CCM/SCRIPTS.
4. Have a look at the scripts reg_swd_plugin.sh and reg_invscan_plugin.sh.
Execute both scripts.
5. Again, list the registered plug-ins using:
wccmplugin -l
This time, you should see the InventoryScan and SoftwareDistribution plug-ins.
Creating a Reference Model using an existing Endpoint
ITCM allows the creation of Reference Models based on existing Endpoints. In
this step, we will create a new Reference Model, based on one of our Windows
Endpoints.
1. From your Windows 2000 Server, launch the CM GUI:
wccmgui
2. Log in as the Administrator user on the Tivoli Server.
3. Select Edit → Create reference model from target. Fill in the settings as
shown below. Fill in the name of one of your Windows Endpoints in the Target
Name. Using these settings, we will add elements to our reference model for
all software that is installed on the target node and Inventory elements for the
memory size. Click OK.
Appendix A. Lab exercises
335
Figure A-41 Reference Model Properties
4. Have a look at the new Reference Model elements. You should see elements
similar to the ones in the following figure.
336
IBM Tivoli Configuration Manager Certification Guide
Figure A-42 List of subscribers
5. Save the reference model. We will customize the model more in the next step.
Customizing the Reference Model
Now we will customize the Reference Model we have just created. We will add an
Inventory Scan and a software package to the Reference Model. We will
synchronize the Reference Model with our Windows Endpoints using the CLI.
1. In the ACME Reference Model, double-click the Redbooks^1.0 element.
Change the desired state from IC--- to -----, meaning we do not want to have
Redbooks^1.0 installed on our subscribers.
Appendix A. Lab exercises
337
Figure A-43 Software Distribution element
2. Click OK. Now we will add a child reference model named ACME_sales.
Right-click the ACME^1.0 model and select Create reference model. Create
a new reference model using the settings shown in Figure A-44 on page 339.
338
IBM Tivoli Configuration Manager Certification Guide
Figure A-44 Adding elements
3. Click OK. Now we will add two elements to the ACME_Sales model. First, we
will add an Inventory scan. In the Element section, right-click and select Add
→ Inventory Scan Element.
Appendix A. Lab exercises
339
Figure A-45 Adding Inventory Scan element
4. Select your InventoryConfig profile named ic.hw. Can you specify distribution
options for this profile? (For example, can you specify an expiration date?)
5. Finally, we will set the subscribers for our reference model. Select the
Subscribers tab, then right-click and select the Inventory subscriber.
6. Select only Windows 2000 machines, as in the following figure. Note that this
is a dynamic subscription; the targets will be resolved at the execution time.
340
IBM Tivoli Configuration Manager Certification Guide
Figure A-46 Reference Model
Save the Reference Model.
Submitting the Reference Model
We will now submit and synchronize the reference model.
1. Click Activities → Submit.
2. Choose the options in the following figure to submit the plan. Why did we
select Full Synchronization?
Appendix A. Lab exercises
341
Figure A-47 Selecting Activity Plan
3. CM will create a XML plan. What are the activities contained in the preview
XML plan? Is this what you expected? After reviewing the plan, click OK to
submit it.
4. Track the status of the submitted plan from the Activity Plan Monitor. You
should see it as successful.
Figure A-48 Activity Plan Monitor
342
IBM Tivoli Configuration Manager Certification Guide
LAB 11. Using Data Moving Service
In this section we use the Data Moving Service.
What this exercise is about
The purpose of this exercise is to give the student the opportunity to explore the
functionalities of the Data Moving Service included with ITCM.
What you should be able to do
At the end of the lab, you should be able to:
򐂰 Use the Data Moving Service GUI.
򐂰 Recursively send an entire directory tree using the wspmvdata command.
򐂰 Use the reserved tokens of the Data Moving Services.
Required materials
The images are located in the Datamoving directory of the SG243946.zip.
Introduction
In this exercise, we will first explore the Data Moving Service GUI.
We will use the GUI to delete a file from a target Tivoli Endpoint. Next, we will use
the wspmvdata command to recursively send an entire directory, including all files
and subdirectories, from a Tivoli Endpoint to another Tivoli Endpoint. Finally, we
will use the new reserved tokens ($(MAX) and $(MIN)) to send a specific file from
a source directory to a target machine.
Exercise instructions
This exercise should be done after rewiewing Chapter 4, “Inventory and Software
Distribution components” on page 101.
Using the Data Moving Service GUI to delete a file
Verify that the DataMovingRequests.1 SoftwarePackage profile is created in your
TMR (it is created when SD Server is installed).
1. From the Tivoli CLI, execute:
wlookup -ar SoftwarePackage
Appendix A. Lab exercises
343
2. If the package is not present, it can be created using the wspmvdata
command. The profile should be located in your "main" policy region
(<TMR_Server>-region) in a ProfileManager named DataMovingProfile.
Open the DataMovingProfile ProfileManager.
3. Subscribe both of your Windows Endpoints to this ProfileManager.
4. Right-click the DataMovingRequests.1 profile and select Delete.
5. The file that has to be deleted is c:\LabFiles\Datamoving\To_Del.txt.
6. Select both of your Windows Endpoints and click Delete & Close.
7. Use the wmdist command or the MDist2 GUI to follow up on the status of the
DataMovement operation.
8. Verify that the file was deleted on your target machines.
Recursively sending a directory
In this step, we will use Data Moving Services to send an entire directory,
including subdirectories and files, from a Tivoli Server Endpoint to Windows
Target Endpoint. The recursive capability and the Endpoint-to-Endpoint send are
features that were available with ITCM 4.2.
1. Log into your Tivoli Server as the Administrator user. Use the wspmvdata
command to send the directory “c:\LabFiles\Datamoving\data", including all
files and subdirectories, to your Windows Target Endpoint. The data should
be placed in the /tmp directory on the target Endpoint.
2. Verify the MDist2 distribution by using the wmdist command or the MDist2
GUI. How many targets are in the distribution?
3. Verify that the entire directory, including files and subdirectories, was copied.
344
IBM Tivoli Configuration Manager Certification Guide
LAB 12. Using Multicast to install a software package
In this section we use Multicast to install a software package.
What this exercise is about
The purpose of this exercise is to explore the new Multicast capability of MDist2.
What you should be able to do
At the end of the lab, you should be able to:
򐂰 Configure MDist2 repeaters for Multicast.
򐂰 Install a software package using Multicast.
Required materials
For this exercise, you need to access to Multicast directory of the SG243926.zip.
Introduction
In this exercise, we will configure and use the new Multicast functionality of
MDist2. We will compare the performance of a traditional MDist2 distribution with
a Multicast distribution. We will first create a simple software package with a size
of 50 MB. We will distribute this profile twice to both of our Endpoints. First, we
will distribute the software package without Multicast, then we will use Multicast
and compare the results. This will allow us to see the advantage of using
Multicast.
Exercise instructions
This exercise should be done after rewiewing Chapter 6, “Multicast concepts and
implementation” on page 197.
Preface
This exercise depends on the network configuration of the classroom. If the
network does not allow Multicast packets to be sent from one machine to
another, this exercise will not work. If all machines are in a single subnet there
should be no problem. If, however, your machines are on separate subnets
connected through routers, these routers must be Multicast enabled.
Appendix A. Lab exercises
345
Configuring the repeaters for Multicast
On your Tivoli Server, verify the Multicast settings of the MDist2 repeater on your
Tivoli Server using the wmdist command. From the Tivoli CLI type:
wmdist -s <TMR_Server>
Note that all the Multicast settings are disabled by default.
1. Enable the endpoint_multicast setting on your Tivoli Server. Use the wmdist
command to change this setting to TRUE. You will be asked whether you want
to start the Multicast receivers on all the endpoints connected to the Tivoli
Server gateway. Specify y to start the Multicast receivers on the Endpoints.
Wait until all the Multicast receivers on the Endpoints have been started.
2. Verify that on your Endpoints a new process is running named
mcast_receiver. Use the Windows Task Manager to verify this. Also, you can
have a look at the lcfd.log file on your Endpoints and verify that the
mcast_receiver has started.
3. Now we will have a look at the Multicast settings of our repeater. Use the
wmcast command to verify the settings of your Tivoli Server:
wmcast -s <TMR_Server>
4. What is the value of the mcast_advert setting? This is the address that the
server will use to advertise Multicast distributions. On your Windows Target or
Tivoli Server endpoint, locate the file:
<LCFDAT_DIR>\mcast\mcast_receiver.cfg
5. Open the file using a text editor. What is the value of MCADDR? Does it
correspond to the mcast_advert setting in the previous exercise? (It should.)
6. On your Tivoli Server, change the mc_debug_level to 2. Use the wmcast
command to do this. (Have a look at the man page if you are not sure how to
do this.) After changing the debug level, you have to restart the oserv on the
Tivoli Server:
odadmin reexec
7. What is the value of the MDist2 net_load setting on your Tivoli Server? What
is the value of the Multicast mc_netload setting on the Tivoli Server. Are they
the same?
Note: The wmcast command has a (non-documented) setting (-p) that
allows you to "Multicast ping" the endpoints connected to a gateway. Check
that your Endpoints are "Multicast reachable":
wmcast -p <Tivoli_Server>
8. Finally, have a look at the Multicast log file on the Tivoli Server:
346
IBM Tivoli Configuration Manager Certification Guide
$DBDIR/mcast.log
Creating the software package
To create the software package:
1. Log in as the Administrator user on your Tivoli Server and open the Tivoli
Desktop. (Tip: There is a new command, wdtmsg, that allows you to display a
pop-up message when the desktop is launched; feel free to test this now.)
2. Go to the pr.itcm policy region and create a new dataless ProfileManager
named pm.mcast.
3. Open the new ProfileManager and subscribe all your endpoints to the new
ProfileManager. Create a new software package profile named sp_50MB.1.0.
4. Right-click the new software package profile and select Import. The SPB file
is located in c:\LabFiles\multicast\50MB.spb. Build the SPB on the Tivoli
Server in the c:\SWPKGs directory.
5. Have a look at the properties of the software package, right-click, and select
Properties. Launch the Software Package Editor and have a look at the
contents of the software package. To which target directory is the 50 MB file
being sent?
Distributing the software package without using Multicast
First, we will distribute the software package without using Multicast.
1. Use the Tivoli Desktop to distribute the software on both Endpoints.
2. Follow-up on the distribution status using the wmdist command (various
options shown below).
Example: A-6 wmdist command
wmdist
wmdist
wmdist
wmdist
-l
-I <TMR_Server>
-q <Dist_Id>
-l -i <Dist_Id> -v
3. How long did it take to distribute the 50 MB to all three machines (this can be
verified using wmdist -l -i <Dist_Id> -v)? What was the setting of the
net_load parameter on the Tivoli Server? How long should it take theoretically
to distribute the 50 MB to two targets using unicast?
8.4.2 Distributing the software package using Multicast
Now distribute the software package again, but this time using Multicast.
Appendix A. Lab exercises
347
1. When installing from the Tivoli Desktop, use the following options:
–
–
–
–
–
Software package: sp_50MB.1.0.
Targets: Both endpoints.
Multicast enabled.
Do not retry failed distributions using unicast.
Force the distribution. (Why?)
2. How long did it take to distribute the 50 MB using Multicast? What was the
setting of the mcast_netload? How long should it take theoretically to
distribute the 50 MB to two targets using Multicast?
3. Launch the MDist2 GUI and log in as the Administrator user on the Tivoli
Server. Compare both distributions (Time Spent, Node Table, and so on)
using the MDist2 GUI.
348
IBM Tivoli Configuration Manager Certification Guide
B
Appendix B.
Additional material
This Redpaper refers to additional material that can be downloaded from the
Internet as described below.
Locating the Web material
The Web material associated with this Redpaper is available in softcopy on the
Internet from the IBM Redbooks Web server. Point your Web browser to:
ftp://www.redbooks.ibm.com/redbooks/SG243946
Alternatively, you can go to the IBM Redbooks Web site at:
ibm.com/redbooks
Select the Additional materials and open the directory that corresponds with
the redbook form number, SG243946.
Using the Web material
The additional Web material that accompanies this Redpaper includes the
following files:
File name
SG243946.zip
Description
Zipped files required for the lab
© Copyright IBM Corp. 2005. All rights reserved.
349
System requirements for downloading the Web material
The following system configuration is recommended:
Hard disk space:
Operating System:
100 MB minimum
Windows/Linux/Unix
How to use the Web material
Create a subdirectory (folder) on your workstation, and unzip the contents of the
Web material zip file into this folder.
350
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Related publications
The publications listed in this section are considered particularly suitable for a
more detailed discussion of the topics covered in this Redpaper.
IBM Redbooks
For information on ordering these publications, see “How to get IBM Redbooks”
on page 352. Note that some of the documents referenced here may be available
in softcopy only.
򐂰 All About IBM Tivoli Configuration Manager Version 4.2, SG24-6612
򐂰 High Availability Scenarios with IBM Tivoli Workload Scheduler and IBM Tivoli
Framework, SG24-6632
򐂰 Migration to IBM Tivoli Configuration Manager Version 4.2, SG24-6616
򐂰 Implementing Automated Inventory Scanning and Software Distribution After
Auto Discovery, SG24-6626
򐂰 Automated Distribution and Self-Healing with IBM Tivoli Configuration
Manager V 4.2, SG24-6620
Other publications
These publications are also relevant as further information sources:
򐂰 IBM Tivoli Configuration Manager: Introducing IBM Tivoli Configuration
Manager, GC23-4703
򐂰 IBM Tivoli Configuration Manager: Planning and Installation Guide,
GC23-4702
򐂰 IBM Tivoli Configuration Manager: User’s Guide for Software Distribution,
SC23-4711
򐂰 IBM Tivoli Configuration Manager: Reference Manual for Software
Distribution, SC23-4712
򐂰 IBM Tivoli Configuration Manager: User’s Guide for Inventory, SC23-4713
򐂰 IBM Tivoli Configuration Manager: Database Schema Reference, SC23-4783
򐂰 IBM Tivoli Configuration Manager: Messages and Codes, SC23-4706
© Copyright IBM Corp. 2005. All rights reserved.
351
򐂰 IBM Tivoli Configuration Manager: User’s Guide for Deployment Services,
SC23-4710
򐂰 Tivoli Management Framework Reference Manual, Version 4.1.1, SC32-0806
Online resources
These Web sites and URLs are also relevant as further information sources:
򐂰 The IBM Professional Certification Program Web site
http://www.ibm.com/certify/index.shtml
򐂰 Tivoli software education Web site
http://ibm.com/training
򐂰 IBM Tivoli Configuration Manager on-line publications
http://publib.boulder.ibm.com/tividd/td/tdprodlist.html#S
How to get IBM Redbooks
You can search for, view, or download Redbooks, Redpapers, Hints and Tips,
draft publications and Additional materials, as well as order hardcopy Redbooks
or CD-ROMs, at this Web site:
ibm.com/redbooks
Help from IBM
IBM Support and downloads
ibm.com/support
IBM Global Services
ibm.com/services
352
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Index
A
accept operation 155
Activity Plan
Editor 75, 165
Monitor 75, 171, 173
types 165
Activity Planner 74, 164, 189
commands 175
components 164
configuration file 243
log files 245
processes 243
Roles 165
trace files 247
troubleshooting 243
ApiServlet.log 252
apply maintenance 93
authorization roles 33, 35
Autotrace 229
dynamic control 229
First Failure Data Capture 229
Trace buffers 229
Trace ID 229
Trace Profiler 229
B
bandwidth 114
Best practices
Multicast 224
browser 252
C
Callback object 116, 119–120
caret 253
Certification
benefits 3
checklist 5
Exam Objectives 263
IBM Professional Certification Program 2
process 7
test objectives 8
Tivoli Certification 4
© Copyright IBM Corp. 2005. All rights reserved.
Change Management Status summary 242
Change Manager 77, 176, 190
configuration file 248
trace files 249
checkpoint file 110
Checkpoint restart 209
checkpointGL_iqfile.dat 111
CM status summary 242
Code Server 241
Collection
clearing 128
data files 108
Manager 115
Manager components 115
scheduling 124
Collector 111, 124
Collection Manager 115
components 109
configuration 123
CTOC 124
debugging 259
deferring collections 124
depot chunk size 114
depot directory 112
disable a range of object ID 125
downstream 124
first Collector 126
input or error queue 114
Inventory Collectors 108
offlinks list 124
process 111
Queues 109
router cache 115
scheduling transmissions 124
setting offlinks 126
upstream 124
vieving configuration 115
Command
wcancelscan 128
wcollect 111, 116, 124
wconvspo 146
wcrtdirctx 185
wcrtinvdh 116
wcrtqlib 138
353
wcrtquery 138
wcstat 107, 110
wdelep 61
wdistinv 262
wep set_config 210
wepscan 136
wexpspo 146
wfptosp 144
wgetscanstat 128
winviso 136
wloadiso 136
wmanagedir 186
wmcast 205
wmdist 205
wmvinvdh 118
wmvrim 90
wresgw add 194
wsetquery 138
wsetrim 122
wspmvdata 159
wweb 194
commit phase 155
Configuration elements 177
consistent install 93
Courses 17
Creating
Data Handler 116
deployment plan 82
Query 137
CTOC 112–113
custom scans 135
D
Data collection
tasks 124
time slots 124
Data Handler 114
components 116
creating 116
troubleshooting 257
Data Moving 81
log file 240
Service 159
trace files 240
troubleshooting 240
Data Retention 124
datapacks 114
debug level 259
354
debug level 3 258
deferred queue 110, 125
Delta Install 158
demilitarized zones 65
deploying components 83
deployment plan 82
Deployment services 91
Depot 42
chunk size 114
directory 111
server 203
depot chunk size 114
device management troubleshooting 251
differencing mechanism 179
Directory query libraries 187
distmgr.log 234
Distribution Status Console 44, 232
Distribution Topology view 48
dmsadmin 193
dmsuser 193
E
Endpoint 25
log 228
Manager 115, 233
policies 100
endpoint
login sequence 55
Enterprise Directory
Query Facility 79
Services 183
Enterprise Directory Integration
trace 256
troubleshooting 256
error queue 110–111
ETL 161
events 66
F
Firewall Security Toolbox 64
flight recorder 229
Framework 4.1 229
Autotrace 229
FRESH subdirectory 96
G
gatelog 260
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
gateway logfile 260
gateways 25
General troubleshooting 230
Generic problem determination 227
H
Hub TMR 52, 54
hub-spoke architecture 51
Hyper Delivery 200
I
IBM Certification Agreement 6
initial login process 57
input queue 109
install operation 154
Installation
Desktop Install 97
Java Virtual Machine 96
Multiple endpoints 99
Server 94
TMR server 94
Web Gateway 98
installation
methods 93
installing
endpoint proxy 69
event sink 68–69
Firewall Security Toolbox 67
gateway proxy 68–69
relay 68–69
required roles 85
Integrated Desktop Install
Change Manager GUI 97
Components to install
Activity Planner GUI 97
Distribution Status Console 97
Inventory GUI 97
Software Package Editor 97
Tivoli Desktop for Windows 97
Tivoli Java components 97
Integrated Install
benefits 93
Integrated Desktop Install 97
Integrated Endpoint Install 98
Multiple Endpoints Installation 99
overview 93
Server Install 94
installation programs 96, 99
Typical Install 94–95
Integrated Installation
hints and tips 91
Installation types for ITCM 93
Java Virtual Machine 96
pre-install checks 91
Interface
command line interface 27–28
intermediate client 42
Inventory
architecture 102
Configuration Repository 103
Data Handler 103, 116
Gateway / Collector 103
profile 104, 129
queries 136
repository 119
scan 196
scan methods 132
scanners 104
Inventory component 74, 102
Collector logging 259
log files 256
RIM trace 260
troubleshooting 256
troubleshooting on the endpoint 261
ISMP 93
isolated
login 60
scans 136
ITCM components 83
J
Java
1.3 for Tivoli 95
Client Framework for Tivoli 95
interface 42
RDBMS Interface Module 95
L
lcfd service 259
lcfd.log 258
LDAP
troubleshooting 256
load opretation 155
lower level Collector 114
Index
355
M
Managed nodes 25
map of the collection hierarchy 115
mc_request_collection 115
Mcollect 259
mcollect.log 126
MDist 39, 41
MDist2 41
Depot 203
problems 234
MDist2 components 42
Distribution manager 42
GUI 42
Repeater Depot 42
Repeater manager 42
Repeater queue 42
Repeater site 42
Mobile Computing
configuration files 241
log files 241
trace files 241
multicast 199, 215
broadcasts 204
distributions 210
limitations 220
log 222
receiver 203, 208
sender 203
multiple RIM objects 122
multiple TMR regions. 49
multiplexed distribution facility 39
multi-threaded process 108
N
name registry 51
native OS installation 241
netstat 224
netstat -s 224
network interface cards 211
nobody 111
Node Table view 47
normal login 59
Notification Manager 237
O
odadmin 260
environ 260
odlist 227
356
offlinks
list 125
method 124
offlinks list 125
off-peak period 124
one-way connection 50
Operations Console 254
orphan login 61
oserv 233
output
queue 109
thread 114, 126
output threads 126
P
Palm devices 192
Pearson VUE 6
Pervasive devices 191, 196
policy region 31, 54
policy scripts 62
after_install_policy 63
allow_install_policy 63
implementing 62
login_policy 64
pristine tool 81, 142
pristine.log 241
profile manager 37
Profile managers 38
Profiles 36
publications 19
Q
query directories 187
queue 110, 114
Queues 109
queuing mechanism 42
R
RDBMS considerations 86
RDBMS Interface Module
See RIM
read data from Autotrace 230
Receiver 111
Redbooks Web site 352
Contact us xiv
region connection types 50
remove operation 155
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
repeater depot 42
repository 120
Resetting offlinks 126
Resource
Manager 78, 191, 193
Manager Gateway 94
types 194
retry function 42
RIM 42
agent process 261
considerations 89
host managed node 261
log 261
object 185
RIM_DB_LOG 261
Rim_vendor_Agent 261
runtime directory 112
S
Scalable Collection Service 105
Scenarios
multicast 211
Multicast from gateways to Tivoli Management
Agents 211
Pre-loading MDist2 depots with multicast 211
receiver and sender address is different 211
scheduler 33, 108, 114
scheduling activities 170
SCS 105, 119
select_gateway_policy 56, 58, 63
Setting Collector logging 260
Setup.exe 97
simplified maintenance 93
single server installation 94
slow wide area network 114
Software Distribution 139
component 73
components 139
delivery 152
process 142, 153
Software package 139
Autopack 150
block file 143
conditions 149
definition file 144
dependencies 148
Editor 140, 232
file 145
profile 151
Variables 149
Version 147
Source host 140
spoke TMR 53–54
Status Chart view 45
Status Collector 118–119
storage mechanism 42
store and forward collections 108
swdis.ini 256
synchronous 97
T
Task Library 243
Thomson Prometric 6
Time Spent Chart view 46
time-to-live integer 224
Tivoli
administrator 30
architecture 24
Certification benefits 5
Data Warehouse interfaces 161
Desktop 27
Enterprise Data Warehouse 161
Framework Scheduler 126–127
Management Console 103
Management Framework 94
Management Region
See TMR
Name Registry 54
resources 29
software education 17
tmersrvd 111
TMR 42
Toubleshooting
Syncronization 242
trace 237
Troubleshooting
Activity Planner 243
APM 243
append_log keyword 231
Autotrace 229
backup_fmt 236
base configuration file 237
Change Manager 248
cm_status 231
Collector 259
Data Handler 260
Index
357
Data Moving 240
default name for the log 232
e-mail 231
Enterprise Directory Integration 256
gateway log 233
Inventory 256
list_path 236
log_file 236
log_file_path 232
log_host 236
log_host_name 232
log_object_list 232
logs
epmgrlog 228
gatelog 228
gwdb.log 228
odb.log 228
odtrace.log 228
oservlog 228
MDist2 234
Mobile Computing 241
notice group entry 231
object identification number 233
odadmin odlist command 233
pristine 241
pristine installation 241
prog_env 236
Resource Manager problems 251
set_debug_level option 233
Software Distribution traces 237
Software Package 235
software package 235
stop_on_error 236
Tivoli Software Distribution 230
trace_size 238
user_program 231
wadminep command 233
Web Gateway and device management 251
Web User Interface 252
wep command 233
wexpspo command 236
wgateway command 233
wgetspat command 236
wping command 233
two-way connection 51
unicast 204
uninstallation 100
unload opretation 156
Upstream Collector 111
V
verify operation 155
view_config_info 233
W
wchkdb 54
wcollect 114
wcollect -h 111
wcollect -l 111
Web Gateway 192–193, 251
component 78
Install 98
troubleshooting 251
Web Interface 79
Web Interface service 142
Web objects 193
Web User Interface
DISSE0082E error message 254
inventory scan problems 254
login problems 252
Profile not found error 253
software package installation problems 254
tracing 255
tracing WebUI plug-in 255
Troubleshooting 252
troubleshooting 252
unable to publish web objects 253
Web-based courses 17
wgateway 260
wmdist 41, 43
wmsgbrowse 237
wrimtrace 261
wrpt 40
wswdcfg 237
wsyncsp 231
wsyncsp.log 242
U
undo operation 155
358
Certification Study Guide for IBM Tivoli Configuration Manager 4.2
Back cover
Certification Study Guide
for IBM Tivoli
Configuration Manager 4.2
Helps you to get
ITCM certified
Explains the
certification path
and prerequisites
Includes sample test
questions and
answers
This IBM Redpaper is a study guide for IBM Tivoli
Configuration Manager Version 4.2 and is aimed at the people
who want to get IBM Certifications in this specific product.
The IBM Tivoli Configuration Manager Certification, offered
through the Professional Certification Program from IBM, is
designed to validate the skills required of technical
professionals who work in the implementation of the IBM
Tivoli Configuration Manager Version 4.2 product.
This Redpaper provides a combination of theory and practical
experience needed for a general understanding of the subject
matter. It also provides sample questions that will help in the
evaluation of personal progress and provide familiarity with
the types of questions that will be encountered in the exam.
This publication does not replace practical experience, nor is
it designed to be a stand-alone guide for any subject. Instead,
it is an effective tool that, when combined with education
activities and experience, can be a very useful preparation
guide for the exam.
®
Redpaper
INTERNATIONAL
TECHNICAL
SUPPORT
ORGANIZATION
BUILDING TECHNICAL
INFORMATION BASED ON
PRACTICAL EXPERIENCE
IBM Redbooks are developed by
the IBM International Technical
Support Organization. Experts
from IBM, Customers and
Partners from around the world
create timely technical
information based on realistic
scenarios. Specific
recommendations are provided
to help you implement IT
solutions more effectively in
your environment.
For more information:
ibm.com/redbooks
Download