Click here to load reader

Autosys Job Management - Unix User Guide

  • View
    11.943

  • Download
    8

Embed Size (px)

DESCRIPTION

Autosys Job Management - Unix User Guide

Text of Autosys Job Management - Unix User Guide

Unicenter AutoSys Job Management for UNIX

User Guide4.5

This documentation and related computer software program (hereinafter referred to as the Documentation) is for the end users informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. (CA) at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the users responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation as is without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage. The use of any product referenced in this documentation and this documentation is governed by the end users applicable license agreement. The manufacturer of this documentation is Computer Associates International, Inc. Provided with Restricted Rights as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions.

2003 Computer Associates International, Inc.All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Contents

Chapter 1: IntroductionJobs.........................................................................................

12 12 13 14

Defining Jobs ............................................................................. 12 Graphical User Interface System Components...............................................................

Job Information Language.............................................................. 12..........................................................................

Event Server .............................................................................. 13 High-Availability Option: Dual-Event Servers...........................................

Event Processor ........................................................................... 14 High-Availability Option: Shadow Event Processor ....................................... 15 Remote Agent............................................................................ ................................................................

15 16

Example Scenario on UNIX

Explanation ........................................................................... 17 Interface Components ..................................................................... 18 Machines....................................................................................

18

Instance ...................................................................................... 18 Events ....................................................................................... 19 Alarms..................................................................................... 110

Utilities ..................................................................................... 110 Basic Functionality ........................................................................... 111 Explanation............................................................................. 112

Extending Functionality ...................................................................... 113 Contacting Technical Support ................................................................. 114

Contents

iii

Chapter 2: SecurityOverview .....................................................................................21 Native Security...............................................................................22

Security on Events Sent by Users ............................................................22 Security on Events Sent by the Event Processor ...............................................24 System-Level Security.........................................................................27

Database Field Verification .................................................................27 Job Definition Encryption..................................................................27 ..............................................................28

Remote Agent Authentication

User Authentication....................................................................28 Event Processor Authentication.........................................................29 ................................................29

User and Database Administrator Passwords Job Ownership

Job-Level Security ........................................................................... 210..........................................................................

210

User Types .............................................................................. 211 Permission Types ........................................................................ 211 Granting Permissions................................................................

212

Job Permissions and Windows ............................................................ 213 Security Control ......................................................................... 213 Superuser Privileges ......................................................................... 214 Edit Superuser..........................................................................

214 216 217

Exec Superuser .......................................................................... 215 Restricting Access to Jobs eTrust Access Control....................................................................

Remote Agent Security ................................................................... 217.......................................................................

Policy Manager.......................................................................... 219 Security Access .......................................................................... 220 Disable Security.....................................................................

220

Controlling the Event Processor ........................................................... 221 Asset-Level Security ..................................................................... 221 eTrust Resource Classes .............................................................. 222 eTrust Access Modes ................................................................. 223 Security Enabled Applications ............................................................ 233 Security Call Logic ....................................................................... 235

iv

User Guide

Chapter 3: JobsJob Types and Structure ....................................................................... 32 Basic Job Information ...................................................................... 33 Command Jobs...........................................................................

33 34 35 36 36 38

Box Jobs .................................................................................. 34 Starting Conditions for Box Jobs File Watcher Jobs........................................................

.........................................................................

Basic Job Attributes ........................................................................... 36 Command Job Attributes.................................................................. ................................................................

File Watcher Job Attributes Job States and Status

Box Job Attributes ......................................................................... 37..........................................................................

Example State Diagram: Simple Jobs ....................................................... 310 Example State Diagram: Box Jobs .......................................................... 312 Starting Parameters .......................................................................... 314 Starting Parameters and Boxes............................................................ 314

Date/Time Dependencies ................................................................. 315 TZ Environment Variable ............................................................. 315 Custom Calendars .................................................................... 316 Job Dependencies Related to Job Status..................................................... 316 Cross-Instance Job Dependencies...................................................... 318

Event Processors ....

Search related