Unicenter Service Desk Implementation Guide

Transcription

Unicenter Service Desk Implementation Guide
Unicenter Service Desk

Implementation Guide
r11
This documentation and related computer software program (hereinafter referred to as the "Documentation") is for
the end user's informational purposes only and is subject to change or withdrawal by Computer Associates
International, Inc. ("CA") at any time.
This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part,
without the prior written consent of CA. This documentation is proprietary information of CA and protected by the
copyright laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for
their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy.
Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of
the license for the software are permitted to have access to such copies.
This right to print copies is limited to the period during which the license for the product remains in full force and
effect. Should the license terminate for any reason, it shall be the user's responsibility to return to CA the
reproduced copies or to certify to CA that same have been destroyed.
To the extent permitted by applicable law, CA provides this documentation "as is" without warranty of any kind,
including without limitation, any implied warranties of merchantability, fitness for a particular purpose or
noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or
indirect, from the use of this documentation, including without limitation, lost profits, business interruption,
goodwill, or lost data, even if CA is expressly advised of such loss or damage.
The use of any product referenced in this documentation and this documentation is governed by the end user's
applicable license agreement.
The manufacturer of this documentation is Computer Associates International, Inc.
Provided with "Restricted Rights" as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and
(2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions.
© 2005 Computer Associates International, Inc.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
CA Product References
This document references the following Computer Associates International,
Inc. (CA) products:
„
Advantage™
„
Allfusion®
„
BrightStor®
„
CleverPath™ Portal
„
eTrust® Embedded Identity and Access Management (eTrust eIAM)
„
Unicenter® Asset Management
„
Unicenter® Asset Portfolio Management (APM)
„
Unicenter® Management Portal
„
Unicenter® Network and Systems Management (NSM)
„
Unicenter® Remote Control
„
Unicenter® Service Desk
„
Unicenter® Knowledge Tools (KT)
„
Unicenter® Software Delivery
„
Unicenter® TNG for Windows
Contact Customer Support
For online technical assistance and a complete list of locations, primary service
hours, and telephone numbers, contact Customer Support at
http://ca.com/support.
Contents
CA Product References........................................................................................................... 3
Contact Customer Support ..................................................................................................... 3
Chapter 1: Introduction
11
What You Need to Know....................................................................................................... 12
Unicenter Service Desk Features ........................................................................................... 13
Chapter 2: Server Installation (Windows)
15
Phase 1: Review System Requirements .................................................................................. 15
Phase 2: Install Server ........................................................................................................ 15
Remote Components Installation...................................................................................... 16
New Installation ............................................................................................................ 17
Installation Upgrade....................................................................................................... 18
Modify Current Installation .............................................................................................. 18
Install Log .................................................................................................................... 19
Removing Unicenter Service Desk .................................................................................... 19
Phase 3: Before You Run Configuration .................................................................................. 20
Using eIAM for Authentication ......................................................................................... 20
eIAM Installation Considerations ...................................................................................... 21
Phase 4: Configure Service Desk ........................................................................................... 22
Phase 5: Configuring and Reporting Screen Painter .................................................................. 24
Phase 6: Integration and Configuration of the Web Interface ..................................................... 24
Phase 7: Start the Client Interfaces ....................................................................................... 24
Phase 8: Configure Security.................................................................................................. 25
Phase 9: Configure Email Options .......................................................................................... 25
Chapter 3: Server Installation (Linux)
27
Phase 1: Review System Requirements .................................................................................. 27
Phase 2: Install the Server ................................................................................................... 28
Remote Components Installation...................................................................................... 28
New Installation ............................................................................................................ 29
Installation Upgrade....................................................................................................... 30
Install Log .................................................................................................................... 30
Removing Unicenter Service Desk .................................................................................... 30
Phase 3: Before You Run Configuration .................................................................................. 31
Using eIAM for Authentication ......................................................................................... 31
eIAM Installation Considerations ...................................................................................... 32
Contents v
Phase 4: Configure Service Desk ........................................................................................... 33
Phase 5: Integration and Configuration of the Web Interface ..................................................... 35
Phase 6: Start the Client Interfaces (Linux) ............................................................................ 35
Phase 7: Configure Security.................................................................................................. 35
Phase 8: Configure Email Options .......................................................................................... 36
Phase 9: Manual Steps for Linux Install .................................................................................. 36
Check the shmmax Settings ............................................................................................ 36
Put NX_ROOT/bin in PATH Environment Variable ................................................................ 36
Start and Stop Ingres..................................................................................................... 37
Chapter 4: Secondary Server Setup
39
Web Interface..................................................................................................................... 39
Unicenter NSM Integration Converter ..................................................................................... 39
User Authentication ............................................................................................................. 40
Phase 1: Set Up the Secondary Server.............................................................................. 40
Phase 2: Test Login from a Client..................................................................................... 41
Phase 3: Establish Remote Authentication ......................................................................... 41
Phase 4: Test Remote Authentication ............................................................................... 42
Set Up an Object Manager.................................................................................................... 43
Chapter 5: Web Interface Installation
45
Windows Web Server Installation .......................................................................................... 45
Phase 1: Verify Prerequisites ........................................................................................... 45
Phase 2: Install the Web Interface ................................................................................... 46
Phase 3: Configure the Web Server .................................................................................. 46
Phase 4: Enable Web Engine on Secondary Server ............................................................. 47
Phase 5: Configure the Web Interface............................................................................... 48
Phase 5: Start Services .................................................................................................. 48
Phase 7: Access the Web Interface................................................................................... 48
Phase 8: Integrate with Portal ......................................................................................... 49
UNIX Web Server Installation................................................................................................ 49
Phase 1: Verify Prerequisites ........................................................................................... 49
Phase 2: Install the Web Interface (UNIX Web Server) ........................................................ 49
Phase 3: Configure the Web Server .................................................................................. 50
Phase 4: Enable Web Engine on Secondary Server ............................................................. 51
Phase 6: Configure the Web Interface............................................................................... 52
Phase 6: Start Daemons ................................................................................................. 52
Phase 8: Access the Web Interface................................................................................... 52
Phase 8: Integrate with Portal ......................................................................................... 52
vi Implementation Guide
Chapter 6: CA Workflow Integration
53
Workflow Components ......................................................................................................... 53
Workflow Design Environment............................................................................................... 54
Workflow Server ................................................................................................................. 54
How to Launch Workflow Components.................................................................................... 55
IDE Login Parameters..................................................................................................... 56
CA Workflow Access ............................................................................................................ 56
eIAM and CA Workflow ................................................................................................... 57
Resource Classes........................................................................................................... 57
Add Users to CA Workflow Groups.................................................................................... 58
Chapter 7: Unicenter NSM Integration
59
Phase 1: Before You Integrate .............................................................................................. 59
Phase 2: Integrate Unicenter Service Desk and Unicenter NSM .................................................. 60
Phase 3: Post Integration Process.......................................................................................... 62
Step 1: Create owned Assets........................................................................................... 62
Step 2: Monitor Event Console Messages .......................................................................... 64
Step 3: Filter Unwanted Events........................................................................................ 65
Step 4: Troubleshoot Error Messages................................................................................ 88
Service Desk Event Converter ............................................................................................... 95
Remove Event Converter from the Daemon manager .......................................................... 96
Remove Event Converter from Widows Service .................................................................. 96
Leverage NSM to Unicenter Service Desk Integration................................................................ 97
Example: NSM Message Records/Actions with Limited Content ............................................. 97
Sample cawto Commands that Generate/Update Requests .................................................101
Sample Files to Use with the Integration ..........................................................................102
Chapter 8: Change Impact Analyzer Implementation
107
Service Desk Change Impact Analyzer ..................................................................................107
How the Change Impact Analyzer Works ...............................................................................108
Install the Change Impact Analyzer Integration ......................................................................109
Configure the Daemon ..................................................................................................110
Change Impact Analyzer Integration Considerations ................................................................112
Test the Change Impact Analyzer Integration ...................................................................113
Change Impact Analyzer Integration Setup ............................................................................114
Change Impact Analyzer Classes.....................................................................................114
Define WorldView Repositories........................................................................................116
Map Change Impact Analyzer Classes to Asset Classes .......................................................118
Create Change Impact Analyzer Relationships ........................................................................119
Getting Started Examples ..............................................................................................120
Contents vii
Import Change Impact Analyzer Relationship to Service Desk .............................................121
Planning......................................................................................................................122
Create Assets...............................................................................................................123
Export Assets to WorldView............................................................................................124
Organize Relationships ..................................................................................................128
Examine Change Impact Analyzer Relationship in Service Desk ...........................................129
Automate Change Impact Analyzer Status Updates with Action Macros ......................................131
Use the Macros in Service Types .....................................................................................132
Use the Macros with Workflow Tasks ...............................................................................141
Logical Repositories in Unicenter NSM r11..............................................................................157
Configure Unicenter NSM 3.x..........................................................................................157
Configure Unicenter NSM r11 .........................................................................................158
Serialize Changes to Assets .................................................................................................160
Implementation Notes ........................................................................................................161
Status Changes ............................................................................................................161
Creating Assets from WorldView Managed Objects.............................................................163
Synchronizing WorldView Status to Service Desk Change Impact Analyzer Status ..................166
Maintaining Change Impact Analyzer Relationships ............................................................168
Recursion Depth ...........................................................................................................169
NSM Timeout Value.......................................................................................................170
Maintaining Change Impact Analyzer Relationships in Service Desk......................................171
Chapter 9: Client Installation (Windows)
173
Phase 1: Review System Requirements .................................................................................173
Phase 2: Install the Client ...................................................................................................173
Install on a Local Drive ..................................................................................................174
Install from a Network Drive ..........................................................................................175
Install Silently ..............................................................................................................177
Phase 3: Configure the Client...............................................................................................178
Phase 4: Configure Reports and Screen Painter ......................................................................179
Section 1: Configure Screen Painter or Seagate Crystal Reports with Ingres ..........................179
Section 2: Configure Microsoft Access Reports with Ingres..................................................185
Phase 5: Start the Client Interface........................................................................................191
Chapter 10: Client Installation (Linux)
193
Phase 1: Review System Requirements .................................................................................193
Phase 2: Install the Client ...................................................................................................193
Phase 3: Configure the Client...............................................................................................194
Phase 4: Start the Java Client Interfaces ...............................................................................194
viii Implementation Guide
Appendix A: Service Desk and Knowledge Tools Migration
195
Before Migration ................................................................................................................195
Clean-Up the Database..................................................................................................196
Run Service Desk Migration .................................................................................................198
Migration Interview.......................................................................................................199
Migration Process .........................................................................................................202
Knowledge Tools Migration ..................................................................................................204
Using Ingres as Knowledge Tools Database ......................................................................205
Knowledge Tools Migration from a Remote Machine ...........................................................206
Stand Alone Knowledge Tools Migration ...........................................................................207
Knowledge Tools Migration Concerns ...............................................................................208
Change Impact Analyzer Migration .......................................................................................209
Post Migration Steps...........................................................................................................210
Unicenter Service Desk Migration Concerns............................................................................213
Migrating from a Case Sensitive Database ........................................................................214
Copy Customized htmpl file from Service Desk 6.0..................................................................217
Incompatible htmpl Files................................................................................................220
Update Code ................................................................................................................221
Install/Remove Migration Views............................................................................................221
Messages During Migration ..................................................................................................222
Errors in Data Extraction Phase ......................................................................................222
Errors in Data Reset Phase.............................................................................................222
Errors in Data Loading...................................................................................................223
Appendix B: Portal Installation
227
Verify Service Desk Web Interface Accessibility ......................................................................227
Install and Start the Portal ..................................................................................................227
Start Portal on Windows ................................................................................................228
Start Portal on UNIX .....................................................................................................228
Include Portlets .................................................................................................................229
Configure Service Desk and Portal to use SSL ........................................................................230
Setup SSL using a self-signed certificate ..........................................................................231
Appendix C: Using Unicenter Software Delivery to Install and Configure Windows
Clients
233
Using the Service Desk Java Client Package ...........................................................................233
Phase 1: Review System Requirements (Windows Client) ...................................................233
Phase 2: Register the Service Desk Java Client Package .....................................................234
Phase 3: (Optionally) Remove Unnecessary Source Components .........................................237
Phase 4: Install the Java Client.......................................................................................238
Contents ix
Phase 5: Configure Reports and Screen Painter .................................................................240
Phase 6: Start the Client Interface ..................................................................................240
Appendix D: Mainframe Product Integration
241
Load Service Desk Side Data ...............................................................................................241
CA Products Currently Using CAISDI .....................................................................................241
CA Products Planning to Use CAISDI .....................................................................................242
Appendix E: Samples Directory
245
Contents of the Samples Directory........................................................................................245
asset ..........................................................................................................................245
call_mgt......................................................................................................................246
data ...........................................................................................................................247
FAXserve (Windows only) ..............................................................................................247
i18n ...........................................................................................................................248
macro_lock..................................................................................................................249
ntf_meth .....................................................................................................................250
pdmconf......................................................................................................................251
sdk.............................................................................................................................251
sql..............................................................................................................................251
views..........................................................................................................................252
Appendix F: Import Knowledge Tools Sample Data
253
Customize Filed Data ..........................................................................................................254
About the Sample Data .......................................................................................................255
Appendix G: Silent Installation License Agreement
257
Index
287
x Implementation Guide
Chapter 1: Introduction
Welcome to Unicenter Service Desk, an advanced service support tool that
helps organizations like yours address the challenges of managing today’s
complex service and support requirements. It provides a comprehensive and
scalable service management solution that can function as a stand-alone
product for your small business or departmental service desk, or integrated
into a much larger enterprise business solution. Its technology is designed to
reap maximum benefits for your investment and ensure that your service and
support solution can grow as your requirements do.
Unicenter Service Desk is designed to support both employees dependent on
the IT infrastructure and customers seeking support regarding purchased
products and/or services. It features numerous out-of-the-box integrations
with other CA infrastructure management products and is easily configured to
support the ITIL model, leverage CA's collection of years of service support
Best Practices, or implement your own processes.
This guide provides instructions for installing and configuring the base
components of Unicenter Service Desk which support the Unicenter Service
Desk application as well as the Unicenter Service Desk Knowledge Tools addon. It contains detailed directions for migrating your existing Unicenter
ServicePlus Service Desk 6.0 or Unicenter ServicePlus Knowledge Tools 6.0
system and data. Additionally, it outlines necessary considerations and steps
for integrating the Unicenter Service Desk system with companion CA
products.
This guide is intended primarily for system implementers, integrators, and
administrators. Some sections of this guide will be helpful to system users as
well.
Introduction 11
What You Need to Know
What You Need to Know
To use the information in this guide, you need a working knowledge of either a
Windows operating system and an UNIX operating system or both depending
upon your current production environment. In addition, you should be able to
perform basic administrative tasks on the operating system you are installing
the product on.
The guide covers installation and configuration of Unicenter Service Desk
primary server, secondary server and a client on all the supported platforms,
and the integration of Unicenter Service Desk with other CA products.
Note: Before putting Unicenter Service Desk into production, perform a
Typical installation on a test machine to get a feel for how the product installs
and configures. You should then use the product to become familiar with the
features to plan for your production implementation. Even users who are
familiar with past releases may find it beneficial to explore the new features,
before deciding to upgrade to version r11. Whether you are a new user or an
existing customer planning on upgrading to r11 we recommend that you
review the Implementation Guide entirely before proceeding with your
production installation and implementation.
12 Implementation Guide
Unicenter Service Desk Features
Unicenter Service Desk Features
Unicenter Service Desk has the following features, which could be selected
during installation:
Server
Installs a primary server. This feature includes all files needed to run the
server as well as files to run a client on the same machine as the server.
Selecting this option automatically selects any other required options and
disables those options from being individually cleared.
Secondary Server
Installs a secondary server. This feature includes all files needed to run a
secondary server. If the box you are installing on is intended to be a
secondary server only you should de-select the Server Feature.
Ingres Interface
Select this feature to install all files required to use an Ingres Database.
Web Interface
Installs a Web Interface. Select this feature to install all files needed to run
a Web Interface.
Unicenter NSM Integration
Select this feature to install all files required to integrate Unicenter Service
Desk with an existing Unicenter Network and Systems Management
(Unicenter NSM) installation.
Web Screen Painter
Installs Web Screen Painter. Select this feature if you wish to customize
forms used by the Web Interface or to modify the Unicenter Service Desk
schema.
Reporting
Select this feature to install Microsoft Access or Seagate Crystal reports
which will provide the capability to report on your Service Desk data. If
you install one of these reporting features, you must install the
corresponding runtime option unless you already have a full version of
Microsoft Access or Seagate Crystal Reports installed. Otherwise, you will
be unable to view the reports.
Introduction 13
Chapter 2: Server Installation (Windows)
This chapter explains how to install and configure a Unicenter Service Desk
server in a Windows operating system environment.
The new server can be set up using the Typical or Custom Installation. The
typical installation installs and configures the default features needed to run
the server automatically. The custom installation lets you select the features
(see page 13) you wish to install.
Important! If you wish to configure Unicenter Service Desk to use an ITIL
methodology, you must do a Custom Installation and select the Use ITIL
Methodology checkbox located on the Config Database dialog. For more
information on Unicenter Service Desk 's ITIL methodology, see the ITIL User
Guide.
Phase 1: Review System Requirements
Before you begin the installation process, review the Readme included on your
Unicenter Service Desk installation media for Installation Considerations and to
determine whether your environment meets the documented software and
hardware requirements.
Phase 2: Install Server
In this phase, you install a Unicenter Service Desk r11 server on a Windows
machine. Every Unicenter Service Desk installation requires one primary
server installation, that clients and other secondary servers can access.
Server Installation (Windows) 15
Phase 2: Install Server
Remote Components Installation
The Install Unicenter Service Desk Remote Components link, on the
installation media browser, assists you with the installation of the components
necessary to run the MDB remotely from your Unicenter Service Desk server.
If Ingres and eIAM are already installed by another application, the remote
component installer validates if Ingres and the MDB are at the proper release
level and upgrade both if necessary. Additionally it creates a Unicenter Service
Desk privileged user on the Database Server Machine. If no installation is
detected on the remote server, the wizard installs Ingres, eIAM and creates a
Unicenter Service Desk privileged user.
Note: The remote component installation should be executed even if Ingres
and the MDB were installed using another CA product. This guarantees all the
components required for a successful installation are setup and defined
correctly.
To install Unicenter Service Desk Remote Components, follow these steps:
1.
Log on as administrator to the machine where you will install Unicenter
Service Desk, and insert the installation media in the CD/DVD-ROM drive.
The installation process should begin automatically. If it does not,
double-click the CD/DVD-ROM drive letter in My Computer, then doubleclick setup.exe.
2.
Click on the Install Products link and then click on the Install Service Desk
Remote Components link.
The Unicenter Service Desk Remote Components welcome wizard appears.
3.
Click Next.
The Ingres options window appears.
4.
Accept the Defaults or change them as appropriate and Click Next.
Note: The II_INSTALLATION identifier on the remote database server
must match the II_INSTALLATION identifier on the Unicenter Service Desk
server. We recommend using the default identifier of EI.
The eIAM options window appears.
5.
Enter the Administrator Password and select the installation folder for
eIAM and Click Next.
Note: If eIAM is already installed on the remote system, the password
entered should match the previously defined password. The installation
default password is eiamadmin1.
The Privileged User options window appears.
16 Implementation Guide
Phase 2: Install Server
6.
Enter the Privileged User Name and Password and Click Next.
When configuring Unicenter Service Desk you must use the same
Privileged User Name as specified when running the Remote Components
installer.
The Summary window appears.
7.
Click Finish.
New Installation
To install Unicenter Service Desk for the first time, follow these steps:
1.
Log on as administrator to the machine where you will install Unicenter
Service Desk, and insert the installation media in the CD/DVD-ROM drive.
The installation process should begin automatically. If it does not,
double-click the CD/DVD-ROM drive letter in My Computer, then doubleclick setup.exe.
2.
Click on the Install Products link and then click on the Install Unicenter
Service Desk r11 link.
The Unicenter Service Desk Setup welcome screen appears.
3.
Click Next.
The License Agreement appears
4.
Read and accept the license agreement. After you click on the I Agree
button, the installation wizard prompts you to specify the Unicenter
Service Desk Installation Directory, the shared components directory and
whether you wish to perform a typical or a custom installation. To accept
the defaults, click Next. Otherwise, enter the information as requested,
and then click Next.
Note: We recommend that you perform a Typical installation initially to
get a feel for the product and make sure that Unicenter Service Desk
works in the environment that you currently have. You can modify your
installation later by selecting the Custom Installation.
5.
If you select Typical the default features are installed: Server, Secondary
Server, Client, Ingres Interface, Web Interface and Web Screen Painter.
You need to supply the required information when prompted by the
installation wizard:
a.
Select the Database Size.
b.
Enter the username and the password for Privileged User and the
Restricted Help Desk User.
c.
Review the current settings and click Next to initiate the installation
process. Go back if you need to change a previously defined setting. At
this point the installation wizard installs all the required files and
configures Unicenter Service Desk.
Server Installation (Windows) 17
Phase 2: Install Server
The installation process adds a Unicenter Service Desk menu to the
Windows Start, Programs menu. It contains shortcuts to access product
documentation and to invoke the components that you selected to install.
6.
Once you make sure that Unicenter Service Desk works on the machine,
you can modify your installation (see page 18) to add or remove Unicenter
Service Desk features (see page 13).
Installation Upgrade
If you are upgrading from Unicenter Service Desk 6.0, follow the procedure for
New Installations. The installation process automatically detects which
components are already installed.
Note: The customizations made to your current installation are automatically
backed up during an upgrade installation.
Once the upgrade installations is finished the wizard prompts you to run the
migration tool (see page 195).
Modify Current Installation
If you run the Unicenter Service Desk setup program when the current version
of the product is already installed on your machine, the installation process
detects the existence of the current version and lets you modify or remove
components as necessary.
Remove
If this option is selected the installer prompts you for required information
and verification and removes all the Unicenter Service Desk components
from the machine.
Modify
The Modify option lets you install new features (see page 13) and
selectively remove existing features. For example, you could use Modify to
add Access Reports and remove Crystal Reports.
When you select Modify and click Next, the Select Features page of the wizard
opens. Select the features that you want to add and clear components that
you want to remove.
Important! During modification, all currently installed components are
selected when the Select Features page first appears. Do not clear the check
box for any selected component unless you want to remove that component.
When the modification runs, only the components selected on this page are
installed.
18 Implementation Guide
Phase 2: Install Server
When the appropriate features are selected click Next and follow the
instruction on the wizard to complete the installation process. Allow the wizard
to run configuration after installation.
Install Log
The features that you selected to install are noted in a Unicenter Service Desk
installation log file. The location of this file is NX_ROOT\log\install.log.
Removing Unicenter Service Desk
Removing a current installation may not result in removal of all software
package(s) or file(s), especially when the software package(s) or individual
files are determined to be used in other products.
Server Installation (Windows) 19
Phase 3: Before You Run Configuration
Phase 3: Before You Run Configuration
Before you run Unicenter Service Desk Configuration, be sure to decide if you
want to use eIAM for Unicenter Service Desk Authentication purposes.
Using eIAM for Authentication
Unicenter Service Desk may optionally use Embedded eTrust Identity and
Access Management (eIAM) for validating a user’s login. This replaces the
default validation performed by the host operating system. You may want to
decide between these two validation processes before running the Unicenter
Service Desk Configuration.
The option to use eIAM for authentication is setup only with Unicenter Service
Desk Configuration utility. You may turn the eIAM authentication option on and
off as needed while running the configuration utility. On the EIAM
configuration page, select the checkbox to use eIAM for authentication.
Note: The boplgin daemon must be run on the primary server.
EIAM may be configured to use as its user base either an external LDAP
directory (such as Active Directory or eTrust Directory) or its own internal
database. Whichever source is used, you must make sure that the Privileged
User is known to eIAM. If eIAM is configured to use its internal database for
user records during Unicenter Service Desk configuration, the Privileged User
is added automatically. If eIAM uses an LDAP server, you must make sure the
Privileged User exists before completing Unicenter Service Desk configuration.
When the eIAM authentication feature is activated, login requests are checked
with the eIAM server. As normal, a login request is granted only if:
„
The user ID specified matches a Contact record in Unicenter Service Desk
„
The user ID matches a user profile in eIAM
„
The user ID/password combination is successfully validated by eIAM
20 Implementation Guide
Phase 3: Before You Run Configuration
eIAM Installation Considerations
eIAM is required for a successful Service Desk configuration. The eIAM server
may reside on the Service Desk server or the Database Server if different than
the Service Desk server. Because eIAM is meant to be a single repository of
your organization’s users and access policies, we strongly recommend a single
install of eIAM for your organization.
eIAM will be installed for you automatically if it is not detected when you run
the Service Desk remote component installer or the standard Service Desk
Install.
The eIAM web interface is accessed through the following URL:
https://servername:5250/spin/eiam/eiam.csp
Where servername is the name of the machine where eIAM is installed. The
eIAM web UI may also be launched from the Start menu on the server that is
hosting eIAM.
Server Installation (Windows) 21
Phase 4: Configure Service Desk
Phase 4: Configure Service Desk
Configuring Unicenter Service Desk consists of verifying and completing fields
on the Configuration window to define the information necessary to perform
the configuration, such as database and user information. Use the online help
when required.
If you chose the Typical install option, this process is performed automatically.
The Custom installation prompts you to specify whether to run configuration.
„
If you answer Yes to the configure prompt, the Configuration window
opens automatically.
„
If you answered No to the configure prompt and want to configure at a
later time select Configuration from the Unicenter Service Desk menu
(accessible from the Windows Start, Programs menu) to open the
Configuration window.
To configure Service Desk, follow these steps:
1.
Select the Configuration Type, as follows:
„
„
2.
For a primary server installation, select Primary Server.
For a secondary server installation, select Secondary Server (see
page 39).
Change the default values in the other fields on the Configuration as
necessary, and click Next.
The System Accounts option appears.
3.
Enter the Privileged User Name and the Restricted User name details and
click Next.
Note: If you change the operating system password for the privileged
user, you need to run the configuration again. This ensures that all of the
Unicenter Service Desk processes are updated of the change. Enter the
new password on this page and continue with the configuration. Do not reinitialize the database.
The Database Configuration option appears.
4.
Check the Load Default Data option and the appropriate Ingres option,
change the other default values as necessary, and click Next.
Note: Load Default Data must be checked for the initial configuration.
The Web Interface option appears.
22 Implementation Guide
Phase 4: Configure Service Desk
5.
Enter appropriate details in the Web Interface options and click Next.
Note: The Config Type drop down list allows you to select the web server
type. The choices are:
„
Tomcat Server only
„
Tomcat and IIS HTTP Server (default)
„
Tomcat Server (default) and IIS HTTP Server
The eIAM option appears.
6.
Set the eTrust Identity and Access Management password. Change the
other default values as necessary, and click Next. Check the Use eIAM for
authentication check box if you wish use eIAM as your authentication
method.
Note: eIAM always uses EiamAdmin as the eIAM Administrator Name and
eiamadmin1 as the default password.
The CA workflow option appears.
7.
Enter the Workflow User Name and Password. Click Next.
The AMS option appears.
8.
Enter the AMS User Name and Password. Click Next.
The Config. option appears.
9.
Check or uncheck the Start Service When Completed option as appropriate
and click Finish.
The initial configuration settings have been applied.
If the Install Ingres Server option was checked in step 4, the Unicenter Service
Desk Configuration installs Ingres and performs a number of other Database
related tasks that will take a while to complete. During the configuration
process the wizard may pop up alerts when a particular task is unsuccessful. If
an alert appears that indicates that a task has failed, look in the files in the
$NX_ROOT/log directory to try to determine the cause of the failure. After the
error condition has been resolved run the configuration again.
If there are no alerts displayed and you have selected the Start Service Desk
Services when Completed checkbox during configuration, the Unicenter
Service Desk services are started on your system. Otherwise, select Services
from the Control Panel, and start the Unicenter Service Desk Daemon Server
service.
Note: The configuration process does not set Unicenter Service Desk to start
automatically after an Operating System restart. If you wish to have Service
Desk to start automatically please set the Startup Type on the Service Desk
Service to automatic.
Server Installation (Windows) 23
Phase 5: Configuring and Reporting Screen Painter
Phase 5: Configuring and Reporting Screen Painter
If you installed the Reporting or Screen Painter options, a default
ODBC data source is configured when you restart the server.
Phase 6: Integration and Configuration of the Web Interface
In most instances the OOB settings for the Service Desk Web Server, whether
you choose to use Tomcat, IIS or both, will suffice. Please review the
information configuring the web interface (see page 45) to determine if
changes are required to meet your specific needs.
Note: IIS is not required if you choose to use TOMCAT as the default Web
Server.
Phase 7: Start the Client Interfaces
Unicenter Service Desk r11 has two client interfaces. Before you can use either
interface, you must ensure that the Unicenter Service Desk Daemon Server
service and the database server are started.
If you have configured a secondary server (for example, if you have the web
interface installed on a web server that resides on a different machine than
your primary Unicenter Service Desk server), the Unicenter Service Desk
Remote Daemon Proctor service must be running before you will be able to
use the Unicenter Service Desk Web Interface. To start the proctor on the
secondary server, select Services from the Control Panel and start the
Unicenter Service Desk Proctor Service.
When all the necessary servers are started, select Service Desk Web Client
from the Unicenter Service Desk menu (accessible from the Start, Programs,
Computer Associates). The URL to invoke the Web Client from machines other
than the Primary Server or any of the Secondary Servers is
http://servername:8080/CAisd/pdmweb.exe where servername is the name of
the machine that is hosting the Service Desk Web Server. If you are using IIS
as your Web Server then the url is http://servername/CAisd/pdmweb.exe.
24 Implementation Guide
Phase 8: Configure Security
Phase 8: Configure Security
The predefined security settings for Unicenter Service Desk allow maximum
accessibility to the product features. More over the default security settings
are left wide open to allow maximum usability. As the requirements are
different for different users, you must determine the users' requirements and
set the appropriate permissions for security. For more information on how to
set up and change security, see the chapter “Policy Implementation” in the
Administrator Guide.
Phase 9: Configure Email Options
The email interface provided with Unicenter Service Desk sends email
notifications and lets users create/update tickets via email. Review the Email
options from the Options Manager, Administration Tab in Unicenter Service
Desk Web Client. These include options to configure the incoming and
outgoing mail protocols and to determine how to handle incoming email. None
of them are installed by default. Determine the options that apply to your
implementation, install and set values for them accordingly. For a detailed
description of what each option controls and how to set values for options, see
the online help.
Note: The email protocols that are supported are SMTP for outbound email
and POP3 and IMAP4 inbound email.
Server Installation (Windows) 25
Chapter 3: Server Installation (Linux)
This chapter explains how to install and configure a Unicenter Service Desk
server in a Linux operating system environment.
The new server can be set up using the Typical or Custom Installation. The
typical installation installs and configures the default features needed to run
the server automatically. The custom installation lets you select the features
(see page 13) you wish to install.
Important! If you wish to configure Service Desk to use an ITIL methodology
you must do a Custom Installation and select the Use ITIL Methodology
checkbox located on the Config Database dialog. For more information on the
Service Desks ITIL methodology, see the ITIL User Guide.
Phase 1: Review System Requirements
Before you begin the installation process, review the Readme included on your
Unicenter Service Desk installation media for Installation Considerations and to
determine whether your environment meets the documented software and
hardware requirements.
In addition to the documented software and hardware requirements noted in
the readme for Linux, the /etc/hosts file must contain an entry with the IP
address, machine name, and the fully qualified machine name. An example
entry resembles the following:
„
127.0.0.1 localhost.localdomain localhost
„
141.202.211.11 usbegp11 usbegp11.ca.com
Unicenter Service Desk supports the en_US.iso88591 locale character set. The
Linux installation default locale character set is en_US.UTF8 which causes
Unicenter Service Desk to render foreign characters in-correctly. Before
installing Unicenter Service Desk on Linux, check if the locale is set to
en_US.iso88591. If en_US.iso88591 is not the default locale character set it
before installing Unicenter Service Desk.
Server Installation (Linux) 27
Phase 2: Install the Server
Phase 2: Install the Server
In this phase, you install a Unicenter Service Desk r11 server on a Linux
machine. Every Unicenter Service Desk installation requires one primary
server installation that clients and other secondary servers can access.
Remote Components Installation
The Unicenter Service Desk Remote Components link assists you with the
installation of the components necessary to run the MDB remotely from your
Unicenter Service Desk server. If Ingres and eIAM are already installed by
another application the remote component installer will validate if Ingres and
the MDB are at the proper release level and upgrade both if necessary.
Additionally it will create a Service Desk privileged user on the Database
Server Machine. If no installation is detected on the remote server, the wizard
installs Ingres, eIAM and creates a Service Desk privileged user.
Note: The remote component installation should be executed even if Ingres
and the MDB were installed via another CA product. This guarantees all the
components required for a successful installation are setup and defined
correctly.
To install the Remote Components, follow these steps:
1.
Create a user known as the Service Desk privileged user. The installation
default USERID for the Service Desk Privileged user is srvcdesk.
Note: This user is used to access the MDB during the configuration
process.
2.
Log on as the root user through an xTerm session and invoke the
./remote.sh script located on the root of the installation media. The
Unicenter Service Desk Remote Components welcome screen appears.
3.
Click Next.
The Ingres options window appears.
4.
Accept the defaults or change them as appropriate and Click Next. The
installation defaults the Ingres Instance ID as EI.
Note: The II_INSTALLATION identifier on the remote database server
must match the II_INSTALLATION identifier on the Service Desk client.
Also, you will need to specify the remote location for Ingres in the
Database Configuration options when you run configuration.
The eIAM options window appears.
5.
Enter the Administrator Password and select the installation folder for
eIAM and Click Next.
eIAM requires the following libraries to install properly:
28 Implementation Guide
Phase 2: Install the Server
„
libssl and libcrypto (part of OpenSSL)
„
liblber.so.2
„
libldap_r.so.2
The installation wizard checks for these files and notifies you if they are
not detected.
Note: If eIAM is already installed on the remote system the password
entered should match the previously defined password. The installation
default password is eiamadmin1.
The Privileged User options window appears.
6.
Enter the Privileged User Name and Click Next.
The Summary window appears.
7.
Click Finish.
New Installation
To install Unicenter Service Desk for the first time, follow these steps:
1.
Create a user known as the Service Desk privileged user. The installation
default USERID for the Service Desk Privileged user is srvcdesk.
Note: After the installation is completed the Service Desk privileged user
the Unicenter Service Desk files. This user is also used to access the MDB
during the configuration process.
2.
3.
Log on as the root user through an xTerm session and invoke the
./install.sh script located on the root of the installation media.
The Unicenter Service Desk welcome screen appears.
Click Next.
4.
Read and accept the license agreement. After you click on the I Agree
button, the installation wizard prompts you to specify the Installation
Directory and whether you wish to perform a typical or a custom
installation. To accept the defaults, click Next. Otherwise, enter the
information as requested, and then click Next.
Note: We recommend that you perform a Typical installation initially to
get a feel for the product and make sure that Unicenter Service Desk
works in the environment that you currently have. You can modify your
installation later by selecting the Custom Installation.
Server Installation (Linux) 29
Phase 2: Install the Server
5.
If you select Typical the default features are installed: Server, Secondary
Server, Client, Ingres Interface, Web Interface and Web Screen Painter.
You need to supply the required information when prompted by the
installation wizard:
a.
Enter the username and the password for Privileged User.
b.
Enter the Socket Port for Service Desk.
c.
Check OK to put links in /usr/bin if you wish to do so.
d.
Enter the location for the CA Shared Components directory.
e.
Select the target MDB Database size.
Review the current settings and hit Install to initiate the installation
process. Hit back if you need to change a previously defined setting.
this point the installation wizard will install all the required files and
configures Unicenter Service Desk.
At
Installation Upgrade
If you are upgrading from Unicenter Service Desk 6.0, follow the procedure for
New Installations. When prompted for the location of the Unicenter Service
Desk files specify the location of the Unicenter Service Desk 6.0 directory. The
6.0 installation default location is /opt/CA/UnicenterServicePlusServiceDesk. If
the directory you specify exists the installation script will automatically
perform an upgrade for you. The installation process automatically detects
which components are already installed as part of this process.
Note: The customizations made to your current installation are automatically
backed up during an upgrade installation.
Once the upgrade installation is finished the wizard prompts you to run the
migration tool (see page 195).
Install Log
The features that you selected to install are noted in a Unicenter Service Desk
installation log file. The location of this file is /opt/CA/Installer/log/caunicenter-servicedesk.log.
Removing Unicenter Service Desk
Removing a current installation may not result in removal of all software
package(s) or file(s), especially when the software package(s) or individual
files are determined to be used in other products.
30 Implementation Guide
Phase 3: Before You Run Configuration
Phase 3: Before You Run Configuration
Before you run Unicenter Service Desk Configuration, be sure to decide if you
want to use eIAM for Unicenter Service Desk Authentication purposes.
Using eIAM for Authentication
Unicenter Service Desk may optionally use Embedded eTrust Identity and
Access Management (eIAM) for validating a user’s login. This replaces the
default validation performed by the host operating system. You may want to
decide between these two validation processes before running the Unicenter
Service Desk Configuration.
The option to use eIAM for authentication is setup only with Unicenter Service
Desk Configuration utility. You may turn the eIAM authentication option on and
off as needed while running the configuration utility. On the EIAM
configuration page, select the checkbox to use eIAM for authentication.
Note: The boplgin daemon must be run on the primary server.
EIAM may be configured to use as its user base either an external LDAP
directory (such as Active Directory or eTrust Directory) or its own internal
database. Whichever source is used, you must make sure that the Privileged
User is known to eIAM. If eIAM is configured to use its internal database for
user records during Unicenter Service Desk configuration, the Privileged User
is added automatically. If eIAM uses an LDAP server, you must make sure the
Privileged User exists before completing Unicenter Service Desk configuration.
When the eIAM authentication feature is activated, login requests are checked
with the eIAM server. As normal, a login request is granted only if:
„
The user ID specified matches a Contact record in Unicenter Service Desk
„
The user ID matches a user profile in eIAM
„
The user ID/password combination is successfully validated by eIAM
Server Installation (Linux) 31
Phase 3: Before You Run Configuration
eIAM Installation Considerations
eIAM is required for a successful Service Desk configuration. The eIAM server
may reside on the Service Desk server or the Database Server if different than
the Service Desk server. Because eIAM is meant to be a single repository of
your organization’s users and access policies, we strongly recommend a single
install of eIAM for your organization.
eIAM will be installed for you automatically if it is not detected when you run
the Service Desk remote component installer or the standard Service Desk
Install.
The eIAM web interface is accessed through the following URL:
https://servername:5250/spin/eiam/eiam.csp
Where servername is the name of the machine where eIAM is installed. The
eIAM web UI may also be launched from the Start menu on the server that is
hosting eIAM.
32 Implementation Guide
Phase 4: Configure Service Desk
Phase 4: Configure Service Desk
Configuring the Unicenter Service Desk server consists of verifying and
completing fields on the Configuration dialog to define the information
necessary to perform the configuration, such as database and user
information. Use the online help when required.
If you chose the Typical install option, this process is performed automatically.
The Custom installation prompts you to run configuration:
„
If you answered yes to the configure prompt, the configuration window
opens automatically.
„
If you answered No and want to configure at a later time, execute
pdm_comnfigure from your command window.
To configure Service Desk, follow these steps:
1.
Select the Configuration Type, as follows:
„
„
2.
For a primary server installation, select Primary Server.
For a secondary server installation, select Secondary Server (see
page 39).
Change the default values in the other fields on the Configuration as
necessary, and click Next.
The System Accounts option appears.
3.
Enter the Privileged User Name and the Password and click Next.
The Database Configuration option appears.
4.
Check the Load Default Data option and Install Ingres Server options,
change the other default values as necessary, and click Next.
For more information on the data fields, click Help.
Note: Load Default Data must be checked for the initial configuration.
The Web Interface option appears.
5.
Enter appropriate details in the Web Interface options, using the online
help as necessary, and click Next.
Note: The Config Type drop down list allows you to select the web server
type. The choices are:
Tomcat Server Only
„
Tomcat Server and Apache Server (Default)
„
Tomcat Server (Default) and Apache Server
The eIAM option appears.
6.
Set the eTrust Identity and Access Management password and change the
other default values as necessary to install eIAM, and click Next.
Server Installation (Linux) 33
Phase 4: Configure Service Desk
Check the use eIAM for Authentication check box if you wish to use eIAM
as your authentication method.
eIAM requires the following libraries to install properly:
„
libssl and libcrypto (part of OpenSSL)
„
liblber.so.2
„
libldap_r.so.2
The installation wizard checks for these files and prompts if they are not
detected or unusable.
Note: eIAM always uses EiamAdmin as the eIAM Administrator Name and
eiamadmin1 as the default password.
The CA Workflow option appears.
7.
Enter the Workflow User Name and Password. Click Next.
The AMS option appears.
8.
Enter the AMS User Name and Password. Click Next.
The Config option appears.
9.
Check or uncheck the Start Daemons. When Completed, put Service Desk
links in /usr/bin and Start Event Converter Daemons options as
appropriate and click Finish.
If the Install Ingres Server option was checked in step 4, the Unicenter Service
Desk Configuration installs Ingres and performs a number of other Database
related tasks that will take a while to complete. During the configuration
process the wizard may pop up alerts when a particular configuration task is
unsuccessful. If an alert appears that indicates that a task has failed look in
the files in the $NX_ROOT/log directory to try to determine the cause of the
failure. Once the error condition has been resolved, run the configuration
again using the following command:
NX_ROOT/local/pdm_configure script
If there are no alerts displayed and you have selected Start the Service Desk
Daemons when completed during configuration, the Unicenter Service Desk
daemons are started on your system.
Note: In order to start the Service Desk daemons, log on as the privileged
user, set $NX_ROOT and the Ingres database environment variables, and run
pdm_init. Execute pdm_status to display the status of the daemons.
If you have configured secondary servers, you must have all the proctors
running before starting the daemons. As the privileged user with $NX_ROOT
set, execute pdm_proctor_init on each secondary server to start the proctors.
Note: Run pdm_halt to shut down the daemons on a primary server or to stop
the proctor on a secondary server.
34 Implementation Guide
Phase 5: Integration and Configuration of the Web Interface
Phase 5: Integration and Configuration of the Web Interface
In most instances the OOB settings for the Service Desk Web Server, whether
you choose to use Tomcat, Apache or both, will suffice. Please review the
information configuring the web interface (see page 45) to determine if
changes are required to meet your specific needs.
Note: Apache is not required if you choose to use TOMCAT as the default Web
Server.
Phase 6: Start the Client Interfaces (Linux)
Unicenter Service Desk has two client interfaces. Before you can use either of
these interfaces, you must ensure that the Unicenter Service Desk Daemons
are running and that the database server is started.
If you have configured a secondary server (for example, if you have the web
interface installed on a web server that resides on a different machine than
your primary Unicenter Service Desk server), the Unicenter Service Desk
Remote Daemon Proctor service must be running before you will be able to
use the Service Desk Web Interface. To start the proctor on the secondary
server, execute pdm_proctor_init.
When all the necessary servers are started, start up a Web Client. The URL to
invoke the Web Client is http://servername:8080/CAisd/pdmweb.exe where
servername is the name of the machine that is hosting the Service Desk Web
Server. If you are using Apache as your Web Server then the URL is
http://servername/CAisd/pdmweb.exe.
Phase 7: Configure Security
The predefined security settings for Unicenter Service Desk allow maximum
accessibility to the product features, which is not suitable to most sites. For a
description of the out-of-the-box security settings and recommendations for
how to change them to suit your needs, see the chapter “Policy
Implementation” in the Administrator Guide.
Server Installation (Linux) 35
Phase 8: Configure Email Options
Phase 8: Configure Email Options
The email interface provided with Unicenter Service Desk sends email
notifications and lets users create/update tickets via email. Review the Email
options from the Options Manager, Administration Tab in Unicenter Service
Desk Web Client. These include options to configure the incoming and
outgoing mail protocols and to determine how to handle incoming email. None
of them are installed by default. Determine the options that apply to your
implementation, install and set values for them accordingly. For a detailed
description of what each option controls and how to set values for options, see
the online help.
Note: The email protocols that are supported are SMTP for outbound email
and POP3 and IMAP4 inbound email.
Phase 9: Manual Steps for Linux Install
This section describes few items that you can do to make administrating
Service Desk easier.
Check the shmmax Settings
The recommended minimum shared memory is 200000000 bytes (190 MB).
shmmax is set by default during Unicenter Service Desk installation. However,
if another application is also using shared memory you may need to increase
shmmax as appropriate.
Put NX_ROOT/bin in PATH Environment Variable
Most of the Service Desk commands work without further actions. However
some require an environment variable, NX_ROOT to be defined before the
command will work. Follow the instructions below to define NX_ROOT in your
environment.
Export NX_ROOT=[full path to the Service Desk set during installation]
Export PATH=$NX_ROOT/bin:$PATH
36 Implementation Guide
Phase 9: Manual Steps for Linux Install
Start and Stop Ingres
To start and stop services of Ingres Service from the command line use the
ingstart and ingstop commands. These commands can be executed from
‘ingres’ user only. II_SYSTEM, LD_LIBRARY_PATH and PATH variables should
be set for Ingres user before running these commands. Follow the instructions
below to set the required Ingres environment variables:
Export II_SYSTEM=[full path to the Open Source Ingres database set during installation]
Export PATH=$II_SYSTEM/ingres/bin:$II_SYSTEM/ingres/utility:$PATH
Export LD_LIBRARY_PATH= $II_SYSTEM/ingres/lib
Server Installation (Linux) 37
Chapter 4: Secondary Server Setup
You can install and configure a secondary Unicenter Service Desk server to
distribute product functionality across multiple servers. Setting up your system
in this way can have a number of advantages, including making your service
desk operation more efficient.
Unicenter Service Desk lets you set up secondary servers for the following
processes:
„
Web Interface
„
Unicenter® NSM Integration Converter
„
User authentication
„
Object manager
Web Interface
Depending on your web server environment, you may need to perform some
integration and configuration steps before you can use the web interface (see
page 45). If the machine on which you are installing is equipped as a web
server, the web interface is installed automatically as part of a primary server
installation.
Unicenter NSM Integration Converter
For information about setting up the Unicenter NSM Integration Converter to
run on a secondary server, see the chapter “Unicenter NSM Integration”.
Secondary Server Setup 39
User Authentication
User Authentication
When you install and configure a Unicenter Service Desk primary server,
authentication for users attempting to access information is based on the
operating system login IDs set up for the users on that server. This means
that if your primary Unicenter Service Desk server is on a UNIX machine, the
system administrator must set up and maintain UNIX user accounts for the
Unicenter Service Desk clients. Similarly, if your primary server is on a
Windows machine, the system administrator must set up and maintain
Windows user accounts for the Unicenter Service Desk clients. This is the
default behavior when you install and configure a Unicenter Service Desk
primary server; however, you can customize your system so that user
authentication occurs on a different machine, which may be running a different
operating system than your primary server.
For example, you can configure Unicenter Service Desk so that the primary
server runs on a UNIX machine and user authentication runs on a Windows
machine. This scenario is convenient because the system administrator can
use the Windows user administration features, which make setting and
maintaining user accounts less time consuming and cumbersome. The
information in this section shows how to set up remote authentication for this
scenario; however, you can easily apply the procedure to other scenarios (for
example, Windows primary server and UNIX user authentication).
Phase 1: Set Up the Secondary Server
If you have already installed and configured your Unicenter Service Desk
primary server on a UNIX machine and you want to set up remote
authentication using a Windows machine, you must first set up the Windows
machine as a Unicenter Service Desk secondary server, following these steps:
1.
Install and configure a Unicenter Service Desk secondary server on the
Windows machine where user authentication is to take place.
When setting up a secondary server for user authentication, you need to
install only the Secondary Server option (see page 17).
When installation and configuration are complete go to step 2.
2.
Select Settings, Control Panel, Administrative Tools, Services from the
Windows Start menu on the secondary server machine and start the
Unicenter Service Desk Remote Daemon Proctor service.
3.
Use the ping command to ensure that your secondary server machine can
reach the IP address or name of the UNIX machine running the Unicenter
Service Desk primary server.
40 Implementation Guide
User Authentication
Phase 2: Test Login from a Client
Before establishing remote authentication, follow these steps to ensure that
user validation is functioning properly on the primary server from a client (see
page 173):
1.
On a Unicenter Service Desk client, run the client configuration utility.
2.
In the Primary Server Node field, enter the name or IP address of the
Unicenter Service Desk primary server, and click OK.
3.
Start the Unicenter Service Desk Web Client, logging in as the privileged
user, and ensure that the scoreboard appears without error.
Phase 3: Establish Remote Authentication
After you complete the procedures in the previous phases, follow these steps
to move remote authentication to the secondary server machine:
1.
Run pdm_status on the Unicenter Service Desk primary server to ensure
that User Validation is running.
2.
Switch to the $NX_ROOT/samples/pdmconf directory on the primary
server, and enter the following command to start the pdm_edit utility:
pdm_perl pdm_edit.pl
3.
Answer the prompts according to your requirements, and when the main
menu displays, enter U to Select the Moving Login (U)ser Validation
option.
4.
Enter E to edit host, and, when prompted for a new host name, enter the
name of the Windows machine on which the Unicenter Service Desk
secondary server is installed (see page 40).
5.
When the menu reappears, ensure that the name displayed for the User
Validation Host is correct, and press Enter to return to the main menu.
6.
Enter X to save and exit.
This process creates a file named pdm_startup.rmt that stores your new
configuration values.
7.
Create a backup of the pdm_startup.tpl file that resides in
$NX_ROOT/pdmconf of the primary server installation, then replace it with
the newly created pdm_startup.rmt file.
8.
Run pdm_halt to shut down the Unicenter Service Desk primary server,
and ensure that it shuts down without error.
Secondary Server Setup 41
User Authentication
9.
Run the configuration utility (pdm_configure) on the primary server
without selecting the Load Default Data option. For information about how
to run the configuration utility, see the installation chapter for your
operating environment.
Your new configuration settings are in effect the next time you start the
Unicenter Service Desk primary server.
Important! Do not reinitialize your database when you reconfigure.
Monitor the standard log file, stdlog.0, to ensure that no errors occur
during the pdm_configure process.
10. Run pdm_init to start the Unicenter Service Desk primary server, and
ensure that it starts without error.
Monitor the standard log file, stdlog.0, to ensure that no errors occur
during the pdm_init process.
11. Run pdm_status on the Unicenter Service Desk primary server to ensure
that User Validation is running on the secondary server machine.
There may be a noticeable delay between running pdm_status and the
status changing to “Running.”
Phase 4: Test Remote Authentication
Follow these steps to test various login scenarios from a remote client to
ensure that remote authentication is functioning properly:
1.
On a Unicenter Service Desk client installation, run the client configuration
utility.
2.
In the Primary Server Node field, enter the name or IP address of the
Unicenter Service Desk primary server.
3.
Click OK.
4.
Start the Unicenter Service Desk Web Client, logging in as the privileged
user, and ensure that the scoreboard displays without error.
5.
Shut down the Web Client and start it again, this time logging in as an
invalid user to ensure that an error message displays indicating an invalid
user name or password.
6.
Clear the User and Password fields, and attempt to login again without
entering any values for these fields.
Once again, an error message appears indicating an invalid user name or
password.
42 Implementation Guide
Set Up an Object Manager
Set Up an Object Manager
To set up an object manager on a secondary server, log in as the privileged
user and follow these steps:
1.
Install and configure a Unicenter Service Desk secondary server on the
machine where the second object manager is to reside.
2.
On the Unicenter Service Desk primary server installation, switch to the
$NX_ROOT/samples/pdmconf directory, and enter the following command
to start the pdm_edit utility:
pdm_perl pdm_edit.pl
3.
Answer the prompts according to your requirements, and when you get to
the main menu, enter O to select the Edit (O)bject Servers option.
4.
Enter A to add, and when prompted for a host name, enter the name of
the machine on which the Unicenter Service Desk secondary server is
installed.
5.
Press Enter when prompted to select the default Group and Display values.
6.
When the Object Managers menu appears, it shows the object manager
you added.
Ensure that the information is correct, and note the value in the Comm.
Name column (for example, domsrvr:11).
7.
Press Enter to return to the main menu, and enter X to save and exit.
This process creates a file named pdm_startup.rmt that stores your new
configuration values.
8.
Create a backup of the pdm_startup.tpl that resides in
$NX_ROOT/pdmconf of the primary server installation, then replace it with
the newly created pdm_startup.rmt file.
9.
Run pdm_halt to shut down the Unicenter Service Desk primary server,
and ensure that it shuts down without error.
10. Run the configuration utility (pdm_configure) on the primary server
without making any changes. For information about how to run the
configuration utility, see the respective installation chapter for your
operating environment.
Your new configuration settings are into effect the next time you start the
Unicenter Service Desk primary server.
Important! Do not reinitialize your database when you reconfigure.
Monitor the standard log file, stdlog.0, to ensure that no errors occur
during the pdm_configure process.
Secondary Server Setup 43
Set Up an Object Manager
11. Run pdm_init to start the Unicenter Service Desk primary server, and
ensure that it starts without error.
Monitor the standard log file, stdlog.0, to ensure that no errors occur
during the pdm_init process.
12. Run pdm_status to ensure that the secondary server Object Manager and
Method Engine are running.
When you run the pdm_status command, it may take a few moments
before the status changes to Running.
Note: When you add an object manager (whether on the primary server or a
secondary server), use a text editor such as WordPad (Windows) or vi (UNIX)
to edit $NX_ROOT/NX.env and increase the value of the NX_MAX_DBAGENT
variable by 4. For example, if the current value of NX_MAX_DBAGENT is 6 and
you add one object manager, you would set the NX_MAX_DBAGENT value to
10.
44 Implementation Guide
Chapter 5: Web Interface Installation
You can use the web interface provided with Unicenter Service Desk to access
the product from the Internet. The web interface is also commonly referred to
as the browser interface. This chapter explains how to install, set up, and
configure the web interface. For more information about the web interface, see
the online help and the chapter “Configuring the Web Interface” in the
Administrator Guide.
This chapter contains information for Windows and UNIX platforms. For each,
it describes the following web interface configurations:
„
Installing and configuring the web interface on a web server that resides
on your Unicenter Service Desk primary server machine
„
Installing and configuring the web interface on a web server that resides
on a machine other than your Unicenter Service Desk primary server
machine
Note: The term web server identifies the machine where the software that
services the Hypertext Transfer Protocol (HTTP) is installed.
Windows Web Server Installation
Use the procedures in this section if you are installing the web interface on a
Windows web server. Your Unicenter Service Desk primary server may reside
on the same machine as your web server, or on another machine.
Phase 1: Verify Prerequisites
Before you begin the installation process, review the Readme included on your
installation media to determine if your environment meets the documented
software and hardware requirements, including supported browsers and web
servers.
Web Interface Installation 45
Windows Web Server Installation
Phase 2: Install the Web Interface
When the web server and the Unicenter Service Desk primary server are on
the same machine, no additional action is necessary.
However, if you are using a Windows web server and the Unicenter Service
Desk primary server is installed on a different machine, you will install and
configure two Unicenter Service Desk servers, a primary server and a
secondary server.
The secondary server is the Windows machine where your web server resides
and where you will install and configure the Unicenter Service Desk web
interface. During installation, select the Custom installation option and then
select the following options on the Select Features window:
„
Secondary Server
„
Web Interface
Important! If you have performed a Typical installation Tomcat is the default
Service Desk Web Server. If you wish to use IIS as your Service Desk Web
Server, run Configuration and select IIS as default Web Server from the Web
Interface Option.
Phase 3: Configure the Web Server
To configure Unicenter Service Desk on the web server machine, follow these
steps:
1.
Select Secondary Server for the Configuration Type, and specify the name
of the Unicenter Service Desk primary server in the Primary Server Node
field to configure this installation as a secondary server.
2.
Select Settings, Control Panel, Administrative Tools, Services from the
Windows Start menu, then start the Unicenter Service Desk Remote
Daemon Proctor service.
46 Implementation Guide
Windows Web Server Installation
Phase 4: Enable Web Engine on Secondary Server
Assuming that your Unicenter Service Desk primary server is already installed
and configured, you must enable a web engine on your secondary server using
the pdm_edit.pl utility as follows:
1.
On the Unicenter Service Desk primary server installation, switch to the
$NX_ROOT/samples/pdmconf (UNIX) or
installation-directory\samples\pdmconf (Windows) directory.
2.
Enter the following command to start the pdm_edit utility:
pdm_perl pdm_edit.pl
3.
Answer the prompts according to your requirements, and when you get to
the main menu, enter W to select the Edit Web Engines option.
4.
Enter A to add, then enter the IP address or DNS name of the secondary
server when prompted for a host name.
This value is case-sensitive, so be precise if you enter a DNS name. If you
are unsure, check the NX_LOCAL entry in the NX.env file on the secondary
server.
5.
When prompted for an object manager and a configuration file, you can
typically accept the default values. However, if you need to change them
you can do so.
6.
Press Enter to return to the main menu, then enter X to save and exit.
This process creates a file named pdm_startup.rmt that stores your new
configuration values.
7.
Create a backup of the pdm_startup.tpl that resides in the
$NX_ROOT/pdmconf (UNIX) or installation-directory\pdmconf (Windows)
directory of the Unicenter Service Desk primary server installation, then
replace it with the newly created pdm_startup.rmt file.
8.
Run the configuration utility on the Unicenter Service Desk primary server
without making any changes. For information about how to run the
configuration utility, see the installation chapter for your operating
environment in this guide.
Your new configuration settings are in effect the next time you start the
Unicenter Service Desk server.
Web Interface Installation 47
Windows Web Server Installation
Phase 5: Configure the Web Interface
The web.cfg configuration file is in installation-directory\bopcfg\www. This file
lets you configure the web interface and is similar in format to the
configuration file for many web servers. Each entry in the file consists of a
single line containing a property name, optionally followed by a value. Lines
beginning with a pound sign (#) are treated as comments and are ignored.
This phase is optional. You need to modify web.cfg if the default configuration
does not meet your requirements. You can edit web.cfg with any text editor
that does not add formatting or control character information (WordPad is
recommended). For descriptions of the web interface configuration properties,
see the chapter “Configuring the Web Interface” in the Administrator Guide.
Phase 5: Start Services
Before users can access the web interface, you must ensure that the Unicenter
Service Desk Services are running on all machines configured as Unicenter
Service Desk Services. This includes the primary server and the secondary
servers. For information about starting these services, see the installation
chapter for your operating environment. Your web server must also be up and
running.
Phase 7: Access the Web Interface
You can invoke the Web Interface from Start Menu.
Note: If your Internet Explorer browser's security is set to HIGH and you
launch the Unicenter Service Desk Web Client you will be presented with an
Internet Explorer Content Warning. Either add the Web site to your Trusted
Sites, or lower your Internet Explorer security settings.
To access the web interface from an internal Web Site, add a URL
…/pdmweb.exe link to your web pages. Use the following sample HTML code:
<A HREF=http://sernername:8080node/CAisd/pdmweb.exe> Click here for Unicenter SD </A>
If you use IIS or Apache as your web server do not use 8080 in the HTML
code.
48 Implementation Guide
UNIX Web Server Installation
Phase 8: Integrate with Portal
If you have a version of CleverPath Portal already installed, you can run the
Unicenter Service Desk web interface from a portal (see page 227) workspace.
For information about supported versions of the portal, see the Readme and
the Portal Server Administration Online Help.
UNIX Web Server Installation
Use the procedures in this section if you are installing the web interface on a
UNIX web server. Your Unicenter Service Desk primary server may reside on
the same machine as your web server, or on another machine.
Phase 1: Verify Prerequisites
Before you begin the installation process, review the Readme included on your
installation media to determine if your environment meets the documented
software and hardware requirements, including supported browsers and web
servers.
Phase 2: Install the Web Interface (UNIX Web Server)
Use the appropriate procedure that follows depending on whether the web
server and the Unicenter Service Desk primary server are on the same
machine or on different machines.
Servers on Same Machine
If your web server is installed on the same UNIX machine as your Unicenter
Service Desk primary server, you can install the web interface component
when you install the Unicenter Service Desk primary server from the server
installation media.
When installing Unicenter Service Desk for the first time, the Unicenter Service
Desk Web Interface component is installed automatically as part of the Typical
install.
After the installation completes, you must configure this machine as a primary
server (except on a Typical install, which does this for you). For more
information about installing and configuring Unicenter Service Desk, see the
installation chapter for your operating environment.
Web Interface Installation 49
UNIX Web Server Installation
Servers on Different Machines
If you are using a UNIX web server and the Unicenter Service Desk primary
server is installed on a different machine, you must install and configure two
Unicenter Service Desk servers, a primary server and a secondary server.
The secondary server is the UNIX machine where your web server resides and
where you will install and configure the Unicenter Service Desk web interface.
During installation, select the Custom installation option and select the
Secondary Server.
As the privileged user with $NX_ROOT set, start the Unicenter Service Desk
proctor on the secondary server by running pdm_proctor_init on the secondary
server.
Phase 3: Configure the Web Server
The web.cfg configuration file is in the $NX_ROOT/bopcfg/www directory. This
file lets you configure the web interface, and is similar in format to the
configuration file for many web servers. Each entry in the file consists of a
single line containing a property name, optionally followed by a value. Lines
beginning with a pound sign (#) are treated as comments and are ignored.
This phase is optional. You need only modify web.cfg if the default
configuration does not suit your needs. For example, you may need to update
the Cgi and Image properties depending on how your web server is
configured.
You can edit web.cfg with any text editor that does not add formatting or
control character information (vi is recommended). For descriptions of the web
interface configuration properties, see the chapter “Configuring the Web
Interface” in the Administrator Guide.
50 Implementation Guide
UNIX Web Server Installation
Phase 4: Enable Web Engine on Secondary Server
Assuming that your Unicenter Service Desk primary server is already installed
and configured, you must enable a web engine on your secondary server using
the pdm_edit.pl utility.
To enable a web engine on your secondary server, follow these steps:
1.
On the Unicenter Service Desk primary server installation, change to the
$NX_ROOT/samples/pdmconf (UNIX) or
installation-directory\samples\pdmconf (Windows) directory.
2.
Enter the following command to start the pdm_edit utility:
pdm_perl pdm_edit.pl
3.
Answer the prompts according to your requirements, and when you get to
the main menu, enter W to select the Edit Web Engines option.
4.
Select A to add, then enter the IP address or DNS name of the secondary
server when prompted for a host name.
This value is case-sensitive, so be precise if you enter a DNS name. If you
are unsure, check the NX_LOCAL entry in the NX.env file on the secondary
server.
5.
When prompted for an object manager and a configuration file, you can
typically accept the default values. However, if you need to change them
you can do so.
6.
Press Enter to return to the main menu, and then enter X to save and exit.
This process creates a file named pdm_startup.rmt that stores your new
configuration values.
7.
Create a backup of the pdm_startup.tpl that resides in the
$NX_ROOT/pdmconf (UNIX) or installation-directory\pdmconf (Windows)
directory of the Unicenter Service Desk primary server installation, then
replace it with the newly created pdm_startup.rmt file.
8.
Run the configuration utility on the Unicenter Service Desk primary server
without selecting the Load Default Data option. For information about how
to run the configuration utility, see the installation chapter for your
operating environment in this guide.
Your new configuration settings are in effect the next time you start the
Unicenter Service Desk server.
Web Interface Installation 51
UNIX Web Server Installation
Phase 6: Configure the Web Interface
The web.cfg configuration file is in the $NX_ROOT/bopcfg/www directory. This
file lets you configure the web interface and is similar in format to the
configuration file for many web servers. Each entry in the file consists of a
single line containing a property name, optionally followed by a value. Lines
beginning with a pound sign (#) are treated as comments and are ignored.
This phase is optional. You need to modify web.cfg if the default configuration
does not meet your requirements.
You can edit web.cfg with any text editor that does not add formatting or
control character information (vi is recommended). For descriptions of the web
interface configuration properties, see the chapter “Configuring the Web
Interface” in the Administrator Guide.
Phase 6: Start Daemons
Before users can access the web interface, you must ensure that the Unicenter
Service Desk Daemons are running on all machines configured as Unicenter
Service Desk Daemons. This includes the primary server and the secondary
servers. For information about starting these services, see the installation
chapter for your operating environment. Your web server must also be up and
running.
Phase 8: Access the Web Interface
To access the web interface from your web browser, add a URL
.../pdmweb.exe link to your web pages. For example, you might use the
following HTML code, where node identifies your machine:
<A HREF=http://sernername:8080node/CAisd/pdmweb.exe> Click here for Unicenter SD </A>
Phase 8: Integrate with Portal
If you have a version of CleverPath Portal already installed, you can run the
Unicenter Service Desk web interface from a portal (see page 227) workspace.
For information about supported versions of the portal, see the Readme and
the Portal Server Administration Online Help.
52 Implementation Guide
Chapter 6: CA Workflow Integration
A workflow denotes the tasks, procedural steps, organizations or individuals
involved, required input and output information, and the tools necessary for
managing and maintaining each step in a business process. The workflow
service provides a total solution to help you manage the business processes.
In general terms, workflow is best described as the automation of a business
process, in whole or part, during which documents, information, or tasks are
passed from one participant to another for action according to a set of
procedural rules.
Workflow is a generic, high performance, and scaleable workflow management
system, that allows for the definition, management, and execution of
workflows, and provides a generic workflow solution.
Workflow is integrated into Unicenter Service Desk via a Web service.
Workflow Components
Workflow uses the following components that are delivered with the Workflow
Embedding Kit:
„
Workflow Design Environment (see page 54)
„
Workflow server
„
Worklist (accessible via a web browser)
Workflow uses third-party software components. For further information on
this, see the Readme.
CA Workflow Integration 53
Workflow Design Environment
Workflow Design Environment
You use the Workflow Design Environment to create and manage workflows,
where workflows originate from a company’s business processes. The
Workflow Design Environment is your primary tool for creating and managing
process definitions and workflow instances, and for controlling workflow
participant interaction.
A company creates a business process to identify the resources, manual and
automated activities, and activity relationships to realize its business goals. A
workflow partially or fully automates the business process by defining the
business process activities in a process definition. These workflow activities
commonly include passing forms, tasks, or information from one resource to
another, where the resource may be human or software.
A process definition is a representation of your business process. A process
definition is comprised of nodes, events, roles, actors, work, and the criteria
for process start and process end.
While process definitions represent what you want to happen in your business
process, process instances represent what is actually happening. By running a
process definition, you create a process instance. You can create multiple
process instances of the same process definition, also called a process
definition instance.
Workflow Server
The Workflow server exposes runtime execution and management services for
workflow processes. The Workflow server consists of these components:
„
Actor Adapters allow for expansion of workflow activity functionality
„
The Process Engine executes process definition instances
„
The Process Manager provides management for process definitions as well
as process instances
All workflow clients, the Process Designer, the Worklist, and both the Java and
Web Services API use services provided by the Workflow server.
54 Implementation Guide
How to Launch Workflow Components
How to Launch Workflow Components
The Workflow Design Environment can be invoked via going to Start, All
Programs, CA, Unicenter, Service Desk, Workflow IDE or via the ide.exe or
ide.bat on Windows or via the ide.sh on Linux. The ide.exe, ide.bat, and ide.sh
files are located in $NX_ROOT\site\Workflow\Client.
Note: The IDE is not supported on UNIX platforms.
On Microsoft Windows, you can use either the ide.exe or ide.bat to invoke the
IDE. However, if the IDE classpath requires additions to accommodate
application requirements, you must modify the APPCPATH parameter in the
ide.bat and use the ide.bat to invoke the IDE.
On Linux, the ide.sh also has an APPCPATH parameter which can be modified
to add to the classpath.
You can invoke the Worklist via a web browser (for example,
http://<hostname>:<port number>/wl) or via API calls from an embedding
product.
For more information about the IDE and Worklist requirements and invocation,
refer to other chapters in this guide.
CA Workflow Integration 55
CA Workflow Access
IDE Login Parameters
The IDE logon screen is pre-populated with input fields to supply user name,
password, and url connection information. For streamlined access to the IDE,
you can completely bypass the IDE log on screen by using a combination of
the following command line parameters:
-u <username>
-p <password>
-url <PM URL>
-t <eIAM Safe Session token>
As an option, you can invoke the IDE by providing either a user name and
password (-u and -p) or by providing a token (-t). The –t token refers to an
exported SafeSession (also referred to as an artifact) which is a String. This
allows for parent products to simply re-use any existing SafeSessions they
may have, rather than prompting for a user name and password again.
The –url is a required parameter that must be supplied regardless of whether
you use the –u and –p userid/password method or the –t token method.
For example, [-u, -p, -url] or [-t, -url]
To use this facility to bypass the IDE logon screen, edit either the ide.bat file
(for Microsoft Windows) or ide.sh (for Linux) to add these parameters to the
list of parameters passed to the java command.
Note: This facility cannot be used with the ide.exe.
CA Workflow Access
Unicenter Service Desk r11 provides improved workflow management using a
common Workflow engine. The new workflow system provides a graphical
workflow definition environment, sophisticated branching mechanisms, and the
ability to interact with individuals who do not have direct access to the
Unicenter Service Desk application for gaining approvals. The previous
workflow system is still in place to enable backward compatibility.
This chapter describes the CA workflow authentication and how to add users to
the CA workflow groups.
56 Implementation Guide
CA Workflow Access
eIAM and CA Workflow
All logins to CA Workflow are authenticated by eIAM. A user must have an
eIAM user record in order to access the CA Workflow IDE or Worklist
application. The CA Workflow administrator, specified during Unicenter Service
Desk configuration, has full access to CA Workflow. By default, this user is
used by Unicenter Service Desk for the Workflow integration. This user
account is set by the cawf_username and cawf_password Options in Options
Manager. You must make sure the username and password set in these
options are correct and the user has full access to CA Workflow resources
within eIAM.
Resource Classes
CA Workflow also uses eIAM to restrict access to specific CA Workflow
functions. The access is controlled by two Resources Classes:
IDE
The IDE resource has a single action named login for login access to the
IDE. A user must have permission for this action to login to the CA
Workflow IDE application.
Process
The Process resource has the single action named start for the ability to
start a process instance. A user must have permission for this action to
start processes from within the Worklist web application. All users have
access to the CA Workflow Worklist application to view and perform
workitem tasks. This permission is only for starting new instances from the
Worklist.
Note: These resource classes are defined with the Unicenter Service Desk
application instance in eIAM; when logging into the eIAM Web user interface,
you need to specify the Unicenter Service Desk application instance in order to
see the resources, polices and groups discussed here.
CA Workflow Integration 57
CA Workflow Access
Add Users to CA Workflow Groups
Users who need to either login to the IDE or start process instances need an
authorization grant to the resources and the two actions. The Unicenter
Service Desk configuration adds two policies to eIAM that grant access to
these resources. For convenience, two user groups were also added that are
granted rights to the policies: Workflow Administrators and Workflow Process
Initiators. You can add the users to the Workflow Administrators group to give
them access to the IDE. Adding the users to the Workflow Process Initiators
group allows them to start processes from the Worklist application.
To add/remove users from the groups on the machine where eIAM is installed,
follow these steps:
1.
Select eIAM Web UI from Start, Programs, Computer Associates, eTrust,
eTrust Embedded IAM, Embedded IAM.
The login window appears.
2.
Select the Unicenter Service Desk application and enter the eIAM
administrator name and password.
The main eIAM window appears.
3.
Select Manage Identities.
4.
Select the Users search, enter search criteria and click search.
5.
Select a user in the result list.
6.
On the user details display, add/remove group membership in the
Application Group Membership section
If this section is not displayed, Click Add Application User Details.
7.
Click the Save.
This will add the users to the groups.
58 Implementation Guide
Chapter 7: Unicenter NSM Integration
During Unicenter Service Desk installation, you have the option of integrating
Unicenter NSM. If you select this option, your Unicenter installation will
communicate certain information to Unicenter Service Desk automatically. For
example, you can:
„
Create requests using the 2D/3D map, Unicenter Explorer and the
Unicenter NSM GUI
„
Monitor event console messages from Unicenter NSM to:
„
–
Send generic event data to Unicenter Service Desk
–
Automatically generate requests and incidents
–
Automatically post announcements to the Unicenter Service Desk
scoreboard
Add asset records to Unicenter Service Desk from Unicenter NSM
Note: If you do not already have Unicenter NSM installed, you must do so
before you can integrate it with Unicenter Service Desk.
This chapter explains how you can control Unicenter NSM integration so that
you get only the information you want. You should also review the Readme
located on your Unicenter Service Desk Common Services CD for the latest
information about installing Unicenter NSM.
Phase 1: Before You Integrate
Both Unicenter Service Desk and Unicenter NSM must be installed and all
patches applied before you can begin integration.
Important! Changing default settings when you integrate Unicenter Service
Desk with Unicenter NSM can result in unexpected results. For example, to
avoid instantaneous creation of thousands of Unicenter Service Desk Requests
during integration, the following parameters in the NX.env file located in
$NX_ROOT (UNIX) or installation-directory (Windows) default to NO:
@NX_TNG_OBJECT_UPDATED_SUBSCRIBE=NO
@NX_TNG_OBJECT_ADDED_SUBSCRIBE=NO
@NX_TNG_OBJECT_DELETED_SUBSCRIBE=NO
@NX_TNG_OBJECT_STATUS_UPDATED_SUBSCRIBE=NO
Unicenter NSM Integration 59
Phase 2: Integrate Unicenter Service Desk and Unicenter NSM
Phase 2: Integrate Unicenter Service Desk and Unicenter
NSM
When the Unicenter Service Desk server and Unicenter NSM are installed on
the same machine, you must install the Unicenter NSM Integration option. You
can install this option on either a UNIX or Windows server. You can select the
Unicenter NSM Integration option during the initial installation or later by
modifying an existing installation.
Windows
When the Unicenter Service Desk server and Unicenter NSM are installed
on different machines, you must install the Unicenter NSM Integration
option on the Unicenter Service Desk primary server. You must also install
and configure a Unicenter Service Desk client or secondary server on the
Unicenter NSM server or on a Unicenter NSM administrative client.
UNIX
When the Unicenter Service Desk server and Unicenter NSM are installed
on different machines, you must install the Unicenter NSM Integration
option on both the Unicenter Service Desk primary server and the
Unicenter NSM server. After installing the Unicenter NSM Integration
option on the Unicenter NSM server, you must run pdm_configure to
configure Unicenter Service Desk as a secondary server on that
installation.
You must also configure the converter using the pdm_edit utility as follows:
1.
On the Unicenter Service Desk primary server installation, switch to the
$NX_ROOT/samples/pdmconf directory.
2.
Enter the following command to start the pdm_edit utility:
pdm_perl pdm_edit.pl
3.
Answer the prompts according to your requirements, and when you get to
the main menu, enter N to select the Edit UNI Converters (UNIX_ONLY)
option.
4.
Select A to add, then enter the name or IP address of the Unicenter NSM
server machine (configured as the Unicenter Service Desk secondary
server) when prompted for a host name.
5.
The script prompts you for an IP address. Enter the IP address of the
Unicenter Service Desk primary server machine.
6.
Press Enter to return to the main menu, then select X to save and exit.
This process creates a file named pdm_startup.rmt that stores your new
configuration values.
60 Implementation Guide
Phase 2: Integrate Unicenter Service Desk and Unicenter NSM
7.
Create a backup of the pdm_startup.tpl that resides in the
$NX_ROOT/pdmconf directory of the Unicenter Service Desk primary
server installation, then replace it with the newly created pdm_startup.rmt
file.
8.
Run pdm_configure on the Unicenter Service Desk primary server without
making any changes. This puts your new configuration settings into effect
the next time you start the Unicenter Service Desk server.
Important! Do not reinitialize your database when you reconfigure.
9.
As the privileged user, run pdm_proctor_init on the Unicenter NSM server
to start the Unicenter Service Desk proctor.
10. As the privileged user, run pdm_init from the Unicenter Service Desk
server to start the Unicenter Service Desk daemons. Enter pdm_status to
display the status of the daemons.
Note: Keep the following in mind as you make selections during the
integration process:
„
Before the process of “receiving an NSM event and creating a Request in
Service Desk” can work, you must install and configure all components,
and ensure that they are active.
„
An event would only become lost if the event converter service has been
stopped. The event converter service queues NSM events when the
Unicenter Service Desk system is down (meaning it has been paused
instead of stopped from the Microsoft Windows Services Panel). When
Unicenter Service Desk is restarted, it processes the queued events.
„
The NSM event converter service queues events up to a maximum
specified by the NX_TNGCNV_QUEUE_SIZE environment variable.
„
When the Unicenter NSM repository is rebuilt after integration with
Unicenter Service Desk, Unicenter Service Desk menu entries are lost. To
restore them, you must re-run the integration on the Unicenter NSM
Windows machine. To do this, run integAHD.exe located in
installation-directory\bin.
„
If the NSM event converter starts during Unicenter NSM events
generation, events that occur before the event converter is fully initialized
are lost.
Unicenter NSM Integration 61
Phase 3: Post Integration Process
Phase 3: Post Integration Process
The typical post-integration process involves the following procedure after
both products are installed:
1.
Create Assets that are owned by Unicenter Service Desk which represent
WorldView managed objects.
2.
Monitor event console messages to define message records and message
actions as needed to create requests automatically.
3.
Make the necessary entries in the topology file, topology.cfg and define
filter and writer rules to filter unwanted events.
4.
Troubleshoot problems, if necessary.
Step 1: Create owned Assets
Many Unicenter products create Assets in the mdb; however they are not
automatically owned or available to Unicenter Service Desk. Usually a
Unicenter Service Desk organization wishes to only track Assets that are
owned by the organization and were acquired through a formal process. Some
devices that are detected on the network by other Unicenter products probably
should not automatically become available to Unicenter Service Desk. For
example the laptop computer of a visiting consultant probably is of no interest
to the Unicenter Service Desk organization.
To make a discovered Asset in the mdb available to Unicenter Service Desk,
use the Discovered Asset selection dialog that is available from the Asset
Search or Create New Asset forms in the Analyst Web Interface.
Note: The Discovered Asset selection dialogue is available on the Web Client.
If the WorldView integration for Change Impact Analyzer (see page 107) is
being used, discovered Assets can be made available to Unicenter Service
Desk either from the Unicenter NSM 2D/ Unicenter Explorer right-click menu
(Read Impact Analyzer) or the pdm_nsmimp command line utility.
2D/3D Map and Unicenter Explorer
The Unicenter NSM 2D/3D map and Unicenter Explorer lets you access and
create requests by right-clicking a managed object to display two menu
options: Create Request and Request List.
These menu options are added to Unicenter NSM when you integrate.
Sometimes the menu options are not available or you may encounter
problems (see page 88) using the 2D/3D map or Unicenter Explorer.
62 Implementation Guide
Phase 3: Post Integration Process
Discovered Asset Import
The pdm_discimp, Discovered Asset Import, utility is used for batch
registration of non-Unicenter Service Desk Discovered Assets. This utility can
be used to search the MDB for assets that were registered by other software
products and register them as Unicenter Service Desk assets, so they can be
used in Unicenter Service Desk. This is an interactive batch process.
The logic is similar to Discovered Assets dialog that can be launched from
Asset Search/List web form. This program will query the ca_logical_asset,
ca_asset, and ca_logical_asset_property tables, using various parameters, and
attempt to register new Unicenter Service Desk Assets from the discovered
values.
Notes: If the processing results in a blank Asset Label, the value found for the
Host Name or DNS Name will be used as the Asset Label. Assets must have at
least a Label and Asset Class to be registered for use in Unicenter Service
Desk.
Two queries are performed to select the appropriate records to process,
because of the structure of the MDB and Unicenter Service Desk architecture.
This could affect performance. The first query retrieves the rows from a join
between the ca_logical_asset and ca_asset tables that match label, serial
number, tag and hostname. Then for each resulting row, a query is performed
against ca_logical_asset_property to match dns_name and mac_address. The
asset from the first query is chosen for registration if the second query results
in rows being returned.
Unicenter NSM Integration 63
Phase 3: Post Integration Process
Step 2: Monitor Event Console Messages
The basic Unicenter Service Desk installation automatically monitors status
changes of monitored objects and the addition of new managed objects. You
can set up your environment to use AHD.DLL to monitor console messages on
Windows and send event messages to the Unicenter Service Desk server.
AHD.DLL is the recommended method for sending events to Unicenter Service
Desk. However, other methods are available when the event console is
running on a UNIX system.
Event Management in Unicenter NSM lets you identify events to which you
want to respond and specify one or more actions to initiate automatically.
After you define a message and an associated action, the action is performed
automatically whenever the event is encountered.
After integration with Unicenter Service Desk, when the event message
occurs, you can send generic event data to Unicenter Service Desk to:
„
Create new requests or update existing requests
„
Create and post announcements on the Unicenter Service Desk scoreboard
The following sections describe how to perform these tasks. However, you
should begin by using AHD.DLL to create a Unicenter NSM msg_action record
and then using the cawto command to pass that message record to the event
console.
Note: Use the default filter (see page 66) and writer rules provided with
Unicenter Service Desk until you are sure that your system is integrated. Do
not modify or remove the default rules until you have witnessed Unicenter
NSM events creating requests.
Send Generic Event Data (UNIX Only)
You can use the uniconv daemon in a message action in Unicenter NSM Event
Management to send generic event data to filter daemons in Unicenter Service
Desk. Generic event data can then be used to generate requests automatically
in the same manner as AHD.DLL is used on Windows. This is the preferred
method on UNIX.
Post Announcements Automatically
When you have Unicenter Service Desk integrated with Unicenter NSM, you
can create and post announcements on the Unicenter Service Desk scoreboard
from Unicenter NSM.
64 Implementation Guide
Phase 3: Post Integration Process
Step 3: Filter Unwanted Events
After you set up integration correctly and events are creating or updating
requests as defined, you can modify your filter rules to filter out unwanted
events. You may encounter problems (see page 88) using the integration.
The following list provides some tips for coding filter rules:
„
If you change your filter rule at any time, you must recycle Unicenter
Service Desk.
„
Use the default writer rules while testing your filter rules.
„
When coding the node_ID, user_ID, or event_ID parameters in the filter
rule, you must match the case of the incoming event. To ensure that you
have the case specified correctly, create an event in Unicenter NSM on the
parameter you are testing. This creates a request with the information you
need. Match the case on the request with the case in your filter rule. This
includes the case of incoming console messages.
„
When you are coding a filter rule for a specific event, the incoming text on
the event may have the following format: “Object_Status_Updated minor.”
Code your filter rule to look for the following text:
tng:::*:::*:::Object_Status_Updated.*minor.*:::(0,1)
„
Blanks in the event may actually be unprintable characters. You should
code the filter to include one or more characters with a period and asterisk
(.*), instead of the blank space (‘ ’). You should also include .* at the end
of the event for any unprintable characters that may be at the end of the
event text.
„
To ensure the filter works when you are coding more than one parameter
on it, such as combining the node_ID, user_ID, and event_ID, you should
code only one to begin with and make sure it works. Then add the next
parameter, make sure it works in conjunction with the other parameter,
and so on, until finished.
„
For ease in debugging, order your filter rules from the most specific at the
beginning of the file, to the most general at the end of the file.
Event writer rules follow the same set of debugging practices as filter rules. If
you are using the CR_CREATE action and you have included a template,
ensure that the template exists.
Unicenter NSM Integration 65
Phase 3: Post Integration Process
Filter Events Automatically
You can configure Unicenter Service Desk to automatically create requests for
error and event messages generated by network devices and other event
sources. Defining how events are filtered lets you automatically detect when
an event occurs and initiate the actions specified for handling that event. This
can improve overall operating efficiency and reduce the potential for error. You
can configure Unicenter Service Desk to:
„
Filter events based on host, content, type, and other information from
Unicenter NSM
„
Create requests automatically for error and event messages generated by
network devices
„
Execute commands automatically in response to an event
To automatically filter events, you must:
„
Define filter rules that identify the events that require special handling
„
Define event writer rules that identify the actions to perform automatically
when these events are encountered
Filter and event writer rules use a generic event data (see page 67) structure
to receive and send data. They are defined using a text editor and stored and
edited on the Unicenter Service Desk server only.
Any event is eligible for processing by filter and event writer rules. Some
examples of events you may want filter and event writer rules to process are:
„
Hardware failures
„
Failures of scheduled batch processes
„
Excessive CPU usage
„
High paging rates
„
Unusual file activity
„
Unusual security conditions
You can configure any number of filter daemons, event writer daemons, and
event sources on different machines (see page 86). The locations and
relationships of these elements are stored in the topology file on the Unicenter
Service Desk server.
Note: When integrated with Unicenter NSM, you can use the uniconv daemon
to automatically generate requests (this is the preferred method for UNIX).
uniconv is used in a message action in Unicenter NSM Event Management.
66 Implementation Guide
Phase 3: Post Integration Process
Generic Event Data
Information about events is communicated using a generic event data
structure. The generic event data structure consists of the following data
elements:
Source Type
Identifies the format for the rest of the event.
Node ID
Identifies the device name or ID.
User ID
Identifies the user name or ID (when applicable).
Major Source
Identifies the source application ID.
Minor Source
Identifies the agent of event or further delineation.
Date/Time
Identifies the event date and time.
Event ID
Identifies the source event string that triggered the event.
Event Data
Identifies the associated event data.
Severity
Identifies the measure of the event’s importance.
Handle
Identifies the daemon-supplied string resulting from rules.
Handle Source
Identifies the daemon identifier that assigned the handle.
Handle Status
Identifies the status as create, update, or terminate.
Status Count
Identifies the number of updates.
Unicenter NSM Integration 67
Phase 3: Post Integration Process
Set Up Filter Rules
Filters receive information from event sources that can then be passed to
event writers. Since network devices generate hundreds of event messages,
you can use filter rules to isolate those that can be used to create requests.
Filter rules let you:
„
Determine which network events or traps to report and how.
„
Control what happens when each type of event or trap is reported. Valid
actions include ignoring, reporting on, and marking.
When integrated with Unicenter NSM, filtering lets you manage events from all
systems managed by Unicenter NSM, which can include SNA and TCP/IP
networks.
By filtering events, you can retrieve specific information about a particular
node, user, or workstation, and then pass that information to event writers.
You can define event filter rules to screen for your particular needs, helping
you identify suspicious events and correct them before they cause problems.
Note: It is helpful to be familiar with UNIX regular expressions when writing
filter rules. You can also use UNIX regular expressions on Windows.
68 Implementation Guide
Phase 3: Post Integration Process
Define Filter Rules
Filter rules use UNIX regular expression matching to determine if an event has
a matching filter rule and blocks events that do not filter. A special filter
(ID=5) passes the incoming generic event unchanged to the writer. The filter
passes only filtered events and assigns a handle source of filter and handle
status of create, update, or terminate.
Unicenter Service Desk uses the major source, event ID, node ID, and user ID
fields from the generic event data structure to find a matching filter rule.
Important! Filter rules pass information from events to another daemon that
uses event writer rules (see page 73), which can automatically create
requests.
The default filter rule file, tngfilter_rule.dat, is located in $NX_ROOT/site/eh/IP
(UNIX) or installation-directory\site\eh\IP (Windows) on the Unicenter Service
Desk server. $NX_ROOT or installation-directory is the directory where you
installed Unicenter Service Desk and IP is the IP address of the machine on
which the filter resides. Typically, this is the Unicenter Service Desk server.
This file also contains many comment lines that show you how to set up
various filter rules. Comment lines begin with the pound sign (#).
Use a text editor to view, update, and save the filter rule file. However, do not
use an editor that leaves extra formatting characters in the file. We
recommend WordPad for Windows users and vi for UNIX users.
Syntax (Filter Rules)
The filter rule syntax is:
source_type:::node_ID:::user_ID:::event_ID:::filter
where:
Fields in the rule are separated by three colons (:::). You can use an asterisk
(*) as a wildcard character, which means the value of the parameter is ignored
when determining whether an incoming event matches the filter rule pattern.
Note: The first four parameters in the filter rule describe a pattern to compare
against incoming events. This pattern is used to determine if the filter
specified in the last parameter of the rule should process an incoming event.
Unicenter NSM Integration 69
Phase 3: Post Integration Process
Parameters (Filter Rules)
source_type
Specifies the type of source directing events to the filter. The major source
field of the incoming event is compared to the value in this parameter. The
type of converter that is sending events to the filter generally determines
the value of this parameter. Valid values are:
uni
Identifies the UNIX Unicenter NSM converter.
tng
Identifies the Windows Unicenter NSM converter.
If an incoming event matches several rules when source types and
event IDs are compared, then node IDs are compared.
node_ID
Specifies the node ID where the event originated. This parameter must
exactly match the node ID of the incoming event, or this filter rule is not
used. An asterisk (*) indicates that the node ID is ignored when
determining if an incoming event matches this filter rule pattern.
Rules that match the node ID of the incoming event take precedence over
rules that have asterisk (*) specified for node ID.
If an incoming event matches several rules when source types, event IDs,
and node IDs are compared, user IDs are compared.
user_ID
Identifies a user associated with the event. Use this parameter to execute
a particular action for events from a specific user. Note that many events
will not have specific users associated with them. This parameter cannot
contain a UNIX regular expression. You must supply an exact user ID or an
asterisk. An asterisk (*) is the default and indicates that the user is
ignored in selecting the rule.
Rules that match the user ID associated with the event take precedence
over rules that have asterisk (*) specified for user ID.
70 Implementation Guide
Phase 3: Post Integration Process
event_ID
Specifies the event identifier. You can use a UNIX regular expression. A
period and an asterisk (.*) matches any event name. For example, you
can specify [Aa].* to match any event that starts with uppercase or
lowercase “a.”
If the event_ ID parameter is simple text (not a regular expression), it
must exactly match the generic event’s event ID. Partial matching does
not count. If the event_ID is a regular expression, the length of the
regular expression match is used to determine how well the event filter
rule’s event_ID matches the generic event’s event ID.
If an incoming event matches several rules when source types and event
IDs are compared, node IDs are compared.
filter
Specifies which filter to use to process the incoming event and the
parameters that the filter uses. The format is:
(filter_id, filter_parameter1, filter_parameter2, …)
Valid values for filter_id are:
Value=0
Report all events
Value=2
Ignore events that occur infrequently
Value=3
Ignore outages shorter than the length specified in filter_parameter1
Value=4
Ignore bursts shorter than the length specified in filter_parameter1
Value=5
Pass all events to destination without modification
The number of filter parameters varies for each filter_id, as the
following table shows:
Unicenter NSM Integration 71
Phase 3: Post Integration Process
filter_I
D
filter_parameter1
filter_parameter2
filter_parameter3
0
0=no, 1=yes
None
None
Indicates whether
events should always
be reported as
separate problems.
2
3
4
5
Number of occurrences Interval
0=no, 1=yes
Specifies the number
of times an event must
occur during an
interval to be
important.
Specifies the elapsed
time, in seconds,
during which an
event must occur to
be important.
Indicates whether
events should
always be reported
as separate
problems.
Interval
0=no, 1=yes
None
Specifies the elapsed
time, in seconds,
during which an event
must occur to be
important.
Indicates whether
events should
always be reported
as separate
problems.
Interval
0=no, 1=yes
Specifies the elapsed
time, in seconds,
during which an event
must occur to be
important.
Indicates whether
events should
always be reported
as separate
problems.
None
None
None
None
Note: The first four parameters in the filter rule describe a pattern to compare
against incoming events. This pattern is used to determine if the filter
specified in the last parameter of the rule should process an incoming event.
72 Implementation Guide
Phase 3: Post Integration Process
Set Up Event Writers
Event writers specify what Unicenter Service Desk should do when it detects
an important event from the network. The event writer uses converted events
(events using the generic event data structure) from an event source and
events that have passed through a filter to create requests.
Using event writers, you can:
„
Identify the type of event received from an event source
„
Specify the action to perform when the event writer receives events of this
type. Valid actions include:
„
–
Creating new requests
–
Updating existing requests
–
Executing a command
Indicate whether logging occurs
Define Event Writer Rules
When Unicenter Service Desk is installed, a default configuration is supplied
that runs on the Unicenter Service Desk server. This default configuration sets
up a single event source, filter, and writer, and has a filter rule that passes all
events to the writer. The default writer rule creates requests for all events that
it receives.
The default writer rule file, tngwriter_rule.dat, is located in
$NX_ROOT/site/eh/IP (UNIX) or installation-directory\site\eh\IP (Windows) on
the Unicenter Service Desk server. $NX_ROOT or installation-directory is the
directory where you installed Unicenter Service Desk and IP is the IP address
of the Unicenter Service Desk server.
You can view the contents of this file to see the default writer rule definitions
and comments describing the format of the writer rules. The comments are at
the beginning of the file, and the writer rules are at the end. Comment lines
begin with the pound sign (#).
Use a text editor to view, update, and save the writer rule file. However, do
not use an editor that leaves extra formatting characters in the file. We
recommend WordPad for Windows users and vi for UNIX users.
Unicenter NSM Integration 73
Phase 3: Post Integration Process
Syntax (Event Writer Rules)
The event writer rule syntax is:
event_ID:::device:::user_ID:::majorSrc:::minorSrc:::action:::template:::
command:::logging:::event_token:::user_parms
where:
Fields in the rule are separated by three colons (:::). You can use an asterisk
(*) as a wildcard character, which means the value of the parameter is ignored
when determining matches for the event writer rule.
Parameters (Event Writer Rules)
event_ID
Specifies the event identifier to which the event writer rule applies. You
can use a UNIX regular expression. A period and an asterisk (.*) matches
any event name. For example, you can specify [Aa].* to match any event
that starts with uppercase or lowercase “a.”
If the event_ ID parameter is simple text (not a regular expression), it
must exactly match the generic event’s event ID. Partial matching does
not count. If the event_ID is a regular expression, the length of the
regular expression match is used to determine how well the event writer
rule’s event_ID matches the generic event’s event ID.
device
Specifies the name of the object, which is typically a device or host
associated with the event. A period and an asterisk (*) is the default and
indicates that the source object is ignored in selecting the rule.
If an incoming event matches several rules when source types and event
IDs are evaluated, devices are compared. Rules that match the device of
the incoming event take precedence over rules that have asterisk (*)
specified for device.
If you have defined rules for assigning device names, this parameter can
be useful. For example, if you name devices located in the United States
USxx, you can specify US.* in this parameter to execute a particular writer
action for events from devices in the United States.
74 Implementation Guide
Phase 3: Post Integration Process
user_ID
Identifies a user associated with the event. Use this parameter to execute
a particular action for events from a specific user. Note that many events
do not have specific users associated with them. This parameter cannot
contain a UNIX regular expression. You must supply an exact user ID or an
asterisk. An asterisk (*) is the default and indicates that the user is
ignored in selecting the rule.
If an incoming event matches several rules when source types, event IDs,
and devices are evaluated, user IDs are compared. Those rules that match
the user ID associated with the event take precedence over rules that
have asterisk (*) specified for user_ID.
majorSrc
Automatically displays the major type of source directing events to the
event writer. This parameter is required. Its value is determined by the
event source. For events from Unicenter NSM on Windows, the value must
be “tng.” For events from Unicenter NSM on UNIX, the value must be
“uni.”
minorSrc
Automatically displays the minor type of source directing events to the
event writer. For events from Unicenter NSM, this parameter contains the
event type. Use an asterisk (*) to accept all events.
action
Specifies the action that occurs when the event writer receives this type of
event using one of the following values:
CR_CREATE
Write a new request for each event.
CR_UPDATE
Update an existing request or requests (if they exist), or create a new
request if no requests are found. By default, records are located by
matching on the log_agent and affected_resource attributes. The user
can override the defaults by specifying a list of any request attributes.
CR_UPDATE_ONLY
Like CR_UPDATE, except a new request is never created when no
matching requests are found.
COMMAND
Execute the command specified in the command parameter.
Note: If Unicenter Service Desk cannot access a request or change order,
it attempts the update again after a fixed interval.
template
Unicenter NSM Integration 75
Phase 3: Post Integration Process
Specifies the name of a request template to use to create a request. This
parameter is not required and is ignored if the action is not CR_CREATE.
Note: The request template must be created before the rule is defined.
command
Specifies the command to execute if the action parameter value is
COMMAND. Substitution arguments, as the following table shows, can be
incorporated into the command. The arguments are replaced by their realtime values when the command is executed:
&node
The device name or node identifier
&user
The user name or ID
&date
The event date
&time
The event time
&event-id
The source event string that triggered the event
&data
The associated event data
&sev
A measure of importance for the event
&major-src
The source application ID
&minor-src
The agent name or further delineation of the event
&handle
The daemon-supplied string resulting from rules
&src-handle
The daemon identifier that assigned the handle
&status-handle
The status of the handle (valid values are create, update, or
terminate)
logging
Specifies whether logging occurs, using one of the following values:
76 Implementation Guide
Phase 3: Post Integration Process
NONE
No logging, other than normal error logging, occurs. NONE is the
default value.
PDM
Logging occurs in the Unicenter Service Desk log (stdlog.0) in its
internal generic event format. For more information, see Unicenter
Service Desk Log (stdlog.0) Syntax in this chapter.
SYS
Logging occurs in the UNIX syslog, which can be forwarded to the
Unicenter Console. The event is assigned a message ID (CAPD ....13)
to allow event processing from the Unicenter Console.
BOTH
Logging occurs in the Unicenter Service Desk log (stdlog.0) and the
UNIX syslog.
event_token
A 30-character user-defined tag that identifies a specific request
associated with an event_id (tng event message) or all messages like an
event_id (for example, a wildcarded event_id). event_token is a request
attribute and is stored in every request generated by the Unicenter NSM
interface. If no event_token is specified in the writer rule, the string
“tng_generated” is used. This lets the user update all requests that match
the event_token attribute. For example, two different messages for the
same asset can update unique requests.
Each CR_UPDATE writer rule specifies the unique message parts and a
unique event_token. The event_token is used to find and update the
matching request. By default, an activity log containing the message is
added to the matching request. In another example, the user can update
the status attribute (for example, set status=CL (closed)) in an existing
request by specifying the same event_token in the CR_UPDATE writer rule
that was used when the request was created using a CR_CREATE writer
rule.
For example, the first writer rule below causes the writer process
(tngwriter) to create a call request with an event_token equal to
‘SystemCritical whenever it receives a NSM event identified by the string
‘Event1’. The second writer rule causes the writer process to update the
status value to ‘CL’ for all call requests with an event_token equal to
‘SystemCritical’ whenever it receives a NSM event identified by the string
‘Event2’.
Event1:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE:::SystemCritical:::
Event2:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE:::SystemCritical:::%SEARCH=EVENT_TOKEN;%STATU
S=CL
Unicenter NSM Integration 77
Phase 3: Post Integration Process
user_parms
Contains the following types of information:
Request attribute values
Request attribute values are specified using the following syntax:
%ATTRIBUTE=value, where ATTRIBUTE is an attribute name identified
in text_api.cfg that maps to a Unicenter Service Desk Majic call
request attribute. This file is located in NX_ROOT/site (UNIX) or
installation-directory\site (Windows). For more information about
text_api.cfg and how Unicenter Service Desk uses the Text API to
create requests from Unicenter NSM, See the chapter “Creating
Objects using Text API” in the Administrator Guide.
Note: If you use multiple keyword/value pairs, separate each one
with a semicolon (“;”).
For example, the writer rule below causes the writer process
(tngwriter) to create a call request with assignee equal to ‘mccda04’
and customer equal to ‘nsm’ whenever it receives a NSM event
identified by the string ‘Event4’.
Event4:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE::::::%ASSIGNEE=mccda04;CUSTOMER=nsm
A list of request attributes to match when updating existing
request records
The syntax for the list of attributes to match is specified as follows:
%SEARCH=attribute1[, attribute2…], where SEARCH is a fixed
keyword and attribute1, attribute2, and so on are ATTRIBUTE names
specified in the text_api.cfg. See the chapter “Creating Objects using
Text API” in the Administrator Guide for more information about
text_api.cfg and how Unicenter Service Desk uses the Text API to
create requests from Unicenter NSM.
The default search list of attributes is "asset_name" (DEVICE or UUID)
and LOG_AGENT. The SEARCH keyword adds attributes (to match on)
to the default search list. The SEARCH_EXPLICIT keyword completely
overrides the default search list. Only the list of attributes following
the SEARCH_EXPLICIT keyword are used to search for a call request.
For example, the writer rule below causes the writer process
(tngwriter) to update the status value to ‘CL’ for all call requests with
assignee equal to ‘mccda04’ whenever it receives a NSM event
identified by the string ‘Event2’.
Event2:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE:::SystemCritical:::%SEARCH=ASSIGNEE;%STATUS=CL;
%ASSIGNEE=mccda04
78 Implementation Guide
Phase 3: Post Integration Process
Note: An attribute in the list of attribute values is used to search on if
the attribute is in the SEARCH or SEARCH_EXPLICIT list. If it is not in
the search list it is used to set or update the attribute's value in the
call request. It cannot be used for both in the same writer rule.
Special parameter names that are replaced with their
corresponding value from the Unicenter NSM event structure
You can use the following special parameter names anywhere in the
user_parms string:
&message
Message text associated with this Unicenter NSM message.
&parm
AHD.DLL Parm field on Unicenter NSM Message Action Screen.
&uuid
Unicenter NSM universally unique identifier.
&device
Device (for example, host name) that generated the Unicenter NSM
message.
&majorsrc
The major type of source directing events to the event writer. For
events from Unicenter NSM on Windows, the value is “tng.” For events
from Unicenter NSM on UNIX, the value is “uni.”
&minorsrc
The minor type of source directing events to the event writer.
&node
Device (for example, host name) that generated the Unicenter NSM
message.
&addr
The IP address of the host that generated the Unicenter NSM message.
&username
The user name on the host that generated the Unicenter NSM
message.
&date
An integer representing how long since 1970 the Unicenter NSM
message was generated.
&time
The Date and Time of the Unicenter NSM message (for example, Tue
Jul 4 10:23:37 2000).
Unicenter NSM Integration 79
Phase 3: Post Integration Process
&severity
The severity of the Unicenter NSM message.
&tag
Tag data associated with the Unicenter NSM message.
For example, the writer rule below causes the writer process (tngwriter) to
create a call request with customer equal to the username value
(&username) of the event message whenever the writer receives a NSM
event identified by the string ‘Event2’.
Event2:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE::::::%CUSTOMER=&username
Using event_token and user_parms, you can set initial values or update
values of all attributes of the request and specify which fields to match
when locating records to update. The only restriction is that the description
attribute is never updated in an existing call request record. If a record
update and the description field are specified, an activity log containing the
text of the description is added to the existing record.
NSM Message Action Record: ahd.dll AHD_Call <parms...>
You can also specify data (<parms...>) to the AHD_Call on the NSM
message action record that can be used to replace the &Parm
parameter specified in your user_parms parameter in your writer rule.
In order for the data specified on the AHD_Call to be processed in this
way the data (<parms...>) must be preceded with a '%' character
and the &Parm 'special parameter' must be included somewhere in the
user_parms field of the writer rule.
Below is a NSM message action and a writer rule that work together to
cause the writer process to create requests with assignee set to
‘mccda04’ whenever it receives a NSM event identified by the string
‘Event3’.
Ahd.dll AHD_Call %ASSIGNEE=mccda04
Event3:::.*:::*:::tng:::*:::CR_CREATE:::::::::NONE::::::&Parm
Service Desk customers migrating from AHD4.5 and earlier may
already be using the <parms...> field. For example, you may be using
this data to match on Writer rules. You can continue this practice
without change. If you want to use both 'old' and 'new' parameters
then you must concatenate a '%' character to your 'old' <parms..>
data and then follow with 'new' data. For example:
ahd.dll AHD_Call old data
ahd.dll AHD_Call %new user_parms
ahd.dll AHD_Call old data%new user_parms
80 Implementation Guide
Phase 3: Post Integration Process
Data before the first '%' character is concatenated to the TNG event
message which is placed into the Call Request description field. This is
how Service Desk has worked in the past. Data after the first '%'
character is used to replace the &Parm parameter wherever it is
specified in your user_parms parameter in your writer rule.
Unicenter NSM Integration 81
Phase 3: Post Integration Process
Unicenter Service Desk Log (stdlog.0) Syntax
The syntax for entries in the stdlog.0 file is:
genDate genTime genNode genProc PID level codefile linenum msgID
:::msgDomain\msgNode::: ::: :::msgGenDomain\msgGenUser:::domainID
:::msgDate msgTime:::eventID arg tag::: :::IPaddr:filter:filterNum
:::majorSrc::: :::msgSrc:::msgType:::msgSrcNum::: :::platform
where:
Fields in the rule are separated by three colons (:::).
genDate
Specifies the month and day (from the system clock) on which the log
incident was generated.
genTime
Specifies the time (from the system clock) at which the log incident was
generated.
genNode
Specifies the node name that generated the log incident. The value is
typically the first eight characters of the generating node’s DNS name.
This value is always the same, because stdlog.0 only contains entries from
processes running on the same node.
genProc
Specifies the name of the process (for example, ehwriter) that generated
the log incident. The process name is operating environment-dependent,
but should correspond to the name that appears in the Task Manager
processes list (Windows) or in output from a ps command (UNIX).
PID
Specifies the numeric process identifier from the Task Manager processes
list (Windows) or in output from a ps command (UNIX). The PID is critical
when multiple processes are running with the same process name. For
example, multiple database agents typically run concurrently with the
same process name.
level
Specifies the programmer’s estimation of the significance of the message.
Possible values include FATAL, EXIT, RESTART, SIGNIFICANT, SEVERE,
ERROR, MINIMUM, WARNING, INFORMATION, MILESTONE, TRACE, and
VERBOSE.
codefile
Specifies the name of the code source file from which the message was
generated.
82 Implementation Guide
Phase 3: Post Integration Process
lineum
Specifies the number of the line in the code source file at which the
message was generated.
msgID
Specifies the ID assigned to a TNG event.
msgDomain
Specifies the name of the domain from which the message originated.
msgNode
Specifies the name of the node from which the message originated.
msgGenDomain
Specifies the domain from which the user identified by the msgGenUser
value generated the TNG message.
msgGenUser
Specifies the user ID of the user that generated the TNG message.
domainID
Specifies the ID of the domain from which the TNG message was
generated.
msgDate
Specifies the month and day (from the system clock) on which the TNG
message was generated.
msgTime
Specifies the time (from the system clock) at which the TNG message was
generated.
eventID
Specifies the source event string or sed-style regular expression that
triggered the event.
arg
Specifies a variable entered in the text string of a message action. For
example, if the text field on a message action is entered as “ahd.dll
AHD_Call help me,” the argument in stdlog.0 appears as “args=help me.”
tag
Specifies tag data associated with the TNG message.
IPaddr
Specifies the IP address of the host that generated the TNG message.
filter
Specifies the process name for the filter rule file.
Unicenter NSM Integration 83
Phase 3: Post Integration Process
filterNum
Specifies the number of the filter rule file.
majorSrc
Specifies the major source (or converter type). This is a string that
identifies the source application ID. That is, whether events come from
Unicenter TNG for Windows (in which case the value is tng), from
Unicenter for UNIX (in which case the vale is uni), or from an internal
daemon (in which case the value is -).
msgScr
Specifies the message source. Possible values are CNV (converter), FLT
(filter), NOS (no source), and WRT (writer).
msgType
Specifies the message type. Possible values are CRT (create), DSC
(discovery), TRM (terminate), and UPD (update).
msgSrcNum
Specifies the message source number.
platform
Specifies the operating environment from which the message originated.
Possible values are AIX, AS400, DECOSF1, DGUX, DYNIX, HPUX, IRIX,
MISERVER, MPRAS, MVS, NETWARE, SINIX, SOLARIS, SVR4MP, TANDEM,
UNIXWARE, WNT (Windows), or any value defined by the UNIX agents.
Load Writer Rules
When you modify or define writer rules, you can load them without recycling
the Unicenter Service Desk server or any of the support processes, such as the
Unicenter NSM converter or the filter and writer daemons. To do this, use the
wrtrule utility. You can also use this utility to write existing writer rules to a
file.
Syntax (Loading Event Writer Rules)
The syntax for loading event writer rules is:
wrtrule [-v] -c addr [-r rule_file] [-d dump_file]
84 Implementation Guide
Phase 3: Post Integration Process
Parameters (Loading Event Writer Rules)
-v
Specifies verbose mode, so feedback displays as the utility executes.
-c addr
The name of the event writer as shown by slstat.
-r rule_file
The name of the text file containing the events to load.
-d dump_file
The name of the file where you want the current event writer rules written.
The following types of information are written to the file:
„
Pending event messages
„
Network resource information in the process of being retrieved
„
Event writer rules
Note: Although both -r rule_file and -d dump_file are optional, you must
specify one or the other. You can specify both, in which case new rules load
first.
Description
If the event writer is handling one or more Unicenter NSM event messages
when it receives a request to load new writer rules, the load is delayed until
the writer completes the current messages. For example, the writer may be
processing an event because it is waiting for network resource (asset)
information. In this case, the load message is delayed until this information
has been retrieved and the request for a Unicenter Service Desk call request
has been generated.
A request to write the current event rules to a file, however, is performed with
no delay.
Unicenter NSM Integration 85
Phase 3: Post Integration Process
Maintain Filtered Events
The relationships between filter and event writer daemons and event sources
on different machines are maintained in the topology file, topology.cfg, in the
$NX_ROOT/site/eh directory (UNIX) or installation-directory\site\eh directory
(Windows) on the Unicenter Service Desk server. The topology file lets you
determine and maintain the entire event handling system from one location.
Instead of going to multiple clients, you can edit files in a single location and
determine the topology of the entire event handling system.
Use a text editor to view, update, and save the topology.cfg file. However, do
not use an editor that leaves extra formatting characters in the file. We
recommend WordPad for Windows users and vi for UNIX users.
The $NX_ROOT/site/eh directory (UNIX) or installation-directory\site\eh
directory (Windows) on the Unicenter Service Desk server also includes filter
and event writer rules. A sample topology file is as follows:
# maple:uniconv uniconvert maple:tngfilter uni
maple:tngcnv
tngcnv
maple:tngfilter tng
maple:tngfilter filter_nxd maple:tngwriter maple:tngwriter ehwriter -
-
The format of the topology file is:
name cmd [dest-name] [converter-type]
where:
name
Specifies the host and the unique name of the event-handling daemon in
the format hostname:daemon-name (for example, ws2:uconv). The
daemon-name appears in slstat.
cmd
Specifies the name of the executable in the $NX_ROOT/bin directory
(UNIX) or installation-directory\bin (Windows), such as tngcnv, uniconvert,
filter_nxd, or ehwriter.
dest-name
Specifies the daemon that receives the generic events from this daemon
(for example, ws2:filter1 and ws3:wrtr). Event writer daemons do not
have destination daemons. All daemons should also have a record in the
topology file.
converter-type
Specifies whether events come from Unicenter NSM for Windows (tng),
Unicenter NSM for UNIX (uni), or from an internal daemon (-).
86 Implementation Guide
Phase 3: Post Integration Process
Example
To automatically create requests when a critical status appears on the
Unicenter NSM WorldView map, the Unicenter Service Desk administrator
(Ken) must create an event filter rule to identify the events to which he wants
to respond. He must also create an event writer rule to specify the action to
perform when events of this type are received.
Ken decides that he will use one simple filter rule at first. Then, as he becomes
more familiar with the system, he will use a more complex set of rules. He
decides to capture each critical event from U.S. servers. His system uses the
convention that names all servers located in the contiguous United States as
usaxxx, so this is very simple.
Ken first edits the tngfilter_rule.dat filter rule file in the $NX_ROOT/site/eh/IP
directory on the Unicenter Service Desk server, where IP is the IP address of
the Unicenter Service Desk server. He uses the UNIX vi editor, although he
could use any text editor that does not add extraneous control characters (we
recommend that Windows users use WordPad to edit files).
In the tngfilter_rule.dat file, the pound sign (#) is the comment character. Any
characters after the pound sign are ignored when the rules are read. Most of
the lines in Ken’s tngfilter_rule.dat file are commented out, but he notices the
following lines:
# Report All Events (separately)
uni:::*:::*:::.*:::(0,1)
tng:::*:::*:::.*:::(0,1)
These lines constitute an open filter; that is, a filter that will pass all events to
the event writer.
Ken changes these lines to:
# Report All Events (separately)
# uni:::*:::*:::.*:::(0,1)
tng:::*:::*:::Object_Status_Updated.*Critical.*:::(0,1)
Ken comments out the uni line because he is currently interested only in
Windows Unicenter NSM events. He enters Object_Status_Updated.*Critical.*
in the event_ID field in the tng line because he wants the filter to pass only
Object_Status_Updated.*Critical.* events. Unicenter NSM generates
Object_Status_Updated.*Critical.* events when the state of an object
becomes critical.
After saving the filter rule file, Ken edits the tngwriter_rule.dat writer rule file
found in $NX_ROOT/site/eh/IP on the Unicenter Service Desk server, where IP
is the IP address of the Unicenter Service Desk server.
Unicenter NSM Integration 87
Phase 3: Post Integration Process
As with the filter rules, most of the lines in the file are comments. The last two
lines in the file show the default writer rule definitions. Ken wants to pay
attention to events from Windows Unicenter NSM only, so he comments out
the first of these two lines.
Ken formats the second line following these steps:
1.
He has already set his filter to pass only critical events, so he leaves the
event ID open with .*.
2.
He wants to accept events from U.S. servers only, so he enters usa.* in
the device field.
3.
He wants to accept events from any user, so the user field remains
asterisk (*).
4.
He wants to write a new request for each critical event, so he leaves
CR_CREATE in the action field.
5.
He has already entered a suitable request template in the system, so he
enters its name, CriticalTemplate, in the template field.
6.
He does not want any other logging done, so the logging field remains
NONE.
Here are the results of Ken’s edit:
# .*:::.*:::*:::uni:::*:::CR_CREATE:::::::::NONE
.*:::usa.*:::*:::tng:::*:::CR_CREATE:::CriticalTemplate::::::NONE
Ken saves the writer rule file, and then recycles the Unicenter Service Desk
server. He is ready to receive events and write requests automatically.
Step 4: Troubleshoot Error Messages
This step contains information to use when troubleshooting error messages
that may occur when integrating, configuring, and using Unicenter NSM with
Unicenter Service Desk. Areas discussed in this step include:
„
2D/3D Map and Unicenter Explorer Error Messages (Windows Only)
„
Reviewing the Server Configuration
„
Checking the Slump Connection
„
Logging
2D/3D Map Error Messages (Windows Only)
Under certain circumstances, the integration portion of the 2D/3D map and
Unicenter Explorer can produce Unicenter NSM errors, which are explained in
this section.
88 Implementation Guide
Phase 3: Post Integration Process
TNGWV object create failure= x
Reason:
This error typically occurs when the integration script is executed multiple
times without first running deintegration (x represents a number).
Action:
To deintegrate, then integrate, Unicenter Service Desk with the Unicenter
NSM 2D/3D map and Unicenter Explorer, follow these steps:
1.
At the command line, enter:
installation-directory\bin\deintahd.exe
2.
Open the Unicenter NSM Object Browser.
3.
Locate and click Method to display a list of methods.
4.
If any AHD Methods are listed in the name column, select Delete from the
Object menu to remove them.
5.
Click Popup_Menu to display a list of menus.
6.
If any AHDManagedObject exists under the name column, select Delete
from the Object menu to remove it.
7.
With Popup_Menu still open, scroll down until ManagedObjects displays
under the name column.
8.
Search for any ManagedObject that has a method name containing AHD.
If any exist, select Delete from the Object menu to remove them.
9.
Click Jasmine_Menu_Action to display a list of Unicenter Explorer methods.
10. If any USPSD menu actions are listed in the name column, select Delete
from the Object menu to remove them.
11. Click Jasmine_Menu_Object to display a list of Unicenter Explorer menus.
12. If any USPSD menu objects are listed in the name column, select Delete
from the Object menu to remove them.
Exit Object Browser.
13. At the command line, enter:
installation-directory\bin\integAHD.exe
Your integration into the 2D/3D maps and Unicenter Explorer should now be
successful. Right-click a managed object from the 2D/3D map or Unicenter
Explorer, and try all of the Unicenter Service Desk menu options displayed.
Unicenter NSM Integration 89
Phase 3: Post Integration Process
Couldn't connect to the server - Please check the network and that server daemons are running.
(Socket error 10061)
Reason:
This is a general connectivity error and occurs if you try to get into
Unicenter Service Desk from the client.
Action:
1.
Ensure that the Unicenter Service Desk daemons or services are running.
2.
If so, check the client configuration for correct settings.
CAE0232E-Repository error code 22
Reason:
This message indicates that the path to the executable in the method is
incorrect.
Action:
Add installation-directory\bin to your path or modify the exe_name field in the
Method list to include the full path to the executable.
90 Implementation Guide
Phase 3: Post Integration Process
Review Server Configuration
When the Unicenter Service Desk server is on a UNIX or Windows machine and
Unicenter NSM is on a different Windows machine, the Unicenter Service Desk
server must be up and running. Start the NSM Event Converter service on the
Unicenter NSM machine. To ensure the converter is up and running, check the
processes using Task Manager. If tngcnv does not appear as a running process
after the event converter service was started, check the tngcnv.n or stdlog.n
files (located in installation-directory\log). These files provide you with
information about why the event converter is not running.
When the Unicenter Service Desk server and Unicenter NSM server are on the
same Windows machine, the Unicenter Service Desk Service must be up and
running. To ensure the converter is up and running, check the processes using
Task Manager. If tngcnv does not appear as a running process after the
Unicenter Service Desk service was started, check the following:
1.
Using WordPad, edit the pdm_startup file located
installation-directory\pdmconf. In this file, you will see text similar to the
following:
[ procset MAIN_PROCSET]
pdm_info
sw_ver_ctl
bpnotify_nxd
PDMBASE
PDMBOP
FILTERING
If a semicolon (;) is used to comment out FILTERING, remove the
semicolon.
2.
Moving backwards toward the top of the file, you should see the following
text:
[ procset FILTERING ]
tngfilter
tngwriter
ehc
; UNICNV_REPLACE
; tngcnv:NT_ONLY
If a semicolon (;) is used to comment out any of the above options,
remove the semicolon.
3.
If you made any changes to this file, save them, then recycle Unicenter
Service Desk server.
If the event converter still does not show up as a running process, check the
most recent tngcnv.n file (located in installation-directory\log). This file
provides you with information about why the event converter is not running.
Unicenter NSM Integration 91
Phase 3: Post Integration Process
Filter Error Messages
If your event converter (tngcnv) does not start or your converter is running
but no requests are being created, your log files may contain an error
indicating why it could not start or report events. You may see one or more of
the following error messages:
Can’t resolve host name to an IP address
Reason:
This message indicates that you are missing host entries on your Unicenter
Service Desk machine, your Unicenter NSM machine, or both.
This error might also indicate that DNS is not working or is not returning
the correct IP address.
Action:
Check the %SystemRoot%/system32/drivers/etc/hosts file. Your host file
must contain an entry for the Unicenter Service Desk machine and the
Unicenter NSM machine. After adding the host name, restart the converter
(or the Unicenter Service Desk service). An example entry resembles the
following:
127.0.0.1
localhost
# Local host loop back
141.202.211.11 usbegp11
# This is the NSM client box
141.202.211.12 usbegp12 ahdhost # This is the Service Desk host
# (showing multiple entries)
Cannot find repository file
Reason:
This message indicates that the @NX_REPOSITORY parameter is not set in
NX.env (located in installation-directory) on the client.
Action:
Edit NX.env, add your repository name, making sure that you match the
name exactly, save the file, and then restart the event converter.
The dependency doesn’t exist or has been marked for deletion
Reason:
This message occurs when there is a dependency (probably MSSQL) on
the converter that should be removed.
Action:
Execute regedt32 and open the HKEY_LOCAL_MACHINE -> System -> Current
Control Set -> Services -> AHD_Event_Converter tree. Remove the MSSQL
dependency (or other as applicable) and restart your Windows server.
92 Implementation Guide
Phase 3: Post Integration Process
Destination unknown, Queuing events or No topology.cfg file entry for node; queuing event
Reason:
This message indicates that the topology.cfg file on the Unicenter Service
Desk server must be corrected.
Action:
Correct the topology.cfg file (see page 86) as necessary, then recycle
Unicenter Service Desk and the Unicenter NSM converter. An example
topology.cfg file for Unicenter Service Desk on a Windows machine named
AHD1 and a Unicenter NSM machine named TNG1 follows:
TNG1:tngcnv
tngcnv
AHD1:tngfilter tng
AHD1:tngfilter filter_nxd AHD1:tngwriter AHD1:tngwriter ehwriter -
-
Check the Slump Connection
If the Unicenter NSM converter is running and you still do not see any events
being created, you should verify the slump connection to Unicenter Service
Desk. To do this, enter the slstat command from the command line on the
Unicenter Service Desk machine.
Look for a slump connection to tngcnv. If you do not find one, the converter is
not communicating with Unicenter Service Desk. Recycle the Unicenter NSM
converter, then verify the connection again. If the connection still cannot be
found, check the tngcnv.n files (located in installation-directory\log) for errors
regarding tngcnv and slump logon.
Unicenter NSM Integration 93
Phase 3: Post Integration Process
Turn On Logging
If the slump logon was successful and you still do not see new events, turn on
logging and check the files for an indication that an event has come through
Unicenter NSM. You can create an event simply by changing the status on a
managed object on the 2D/3D map.
To turn on logging, modify the file NX.env file located in $NX_ROOT (UNIX) or
installation-directory (Windows) to include the following line:
@NX_LOG_LEVEL_BSTRAP=VERBOSE
You can then monitor the tngcnv.n files (located in installation-directory\log)
to determine if events are being passed to Unicenter Service Desk. You should
see something similar to the following:
09/17 16:35:58:01 tngcnv
477 MILESTONE
convrtr.c
399
Sending 1:::dogwood:::9994011e-2f7e-11d1-a435-00c04fd478c9:::09/17/1997
:::16:35:41:::Object_Status_Updated minor:::BV:141.202.211.0:Segment.1
IP:141.202.211.14 MAC: CNT: LOC: DSC::::3:::tngcnv:1:::tng:::WindowsNT:
::CNV:::CRT:::1:::
In this example, the message indicates that the status on a managed object
has been updated to Minor.
If you find that events are being passed to Unicenter Service Desk and they
appear in the log, double check to make sure that you are using the default
filter and writer rules. If not, restore the original default filter and writer files,
recycle the server, and create a new event.
If you find that events are not being passed to Unicenter Service Desk, make
sure that two Unicenter NSM processes responsible for passing event
information (canotify.exe and caoprdmn.exe) are executing. If they are not
running, start them as described in the Unicenter NSM documentation. If they
are running, contact Unicenter NSM Support.
94 Implementation Guide
Service Desk Event Converter
Service Desk Event Converter
This section applies to NSM Integration on a Windows platform only.
The Unicenter Service Desk Event Converter is installed in two different ways
when SD configuration is run on a windows server:
„
As a Windows Service
„
As a part of Unicenter Service Desk Daemon Server from where you can
start and stop the converter
The Event Converter can be run on a Primary, Secondary or Client-only
machine. While you may use either method to start the Converter on the
Primary and Secondary servers, it can only be started as a Windows Service
on a Client. Running the Event Converter in two different ways may cause
concerns and you may choose to eliminate one of the methods.
Note: If the Unicenter Service Desk is stopped intentionally or inadvertently
do not stop the Converter, because the Converter has the ability to queue
messages received from NSM. In this case start and stop the Converter
through Unicenter Service Desk Services.
Unicenter NSM Integration 95
Service Desk Event Converter
Remove Event Converter from the Daemon manager
The Daemon Manager not only starts and stops the Converter but also restarts the Converter if it stops inadvertently. You can use pdm_status to see
whether the Converter is running or not and to determine if it is running on
the local or on a remote (Secondary) server.
If you wish to use the Windows Service Manager to start and stop the Event
Converter, remove the Event Converter from the Daemon Manager’s startup
configuration.
To change the startup configuration on a Primary server, change the following
line in the pdm_startup file.
tngcnv
so that it reads:
; tngcnv
However, this change would revert when you re-run Unicenter Service Desk
Configuration. If you want the change to persist make the same change in
pdm_startup.tpl file.
To change the startup configuration on a remote (Secondary) server use the
pdm_edit facility. For more information on running pdm_edit, see the chapter
"Configuring the Web Interface" in the Administrator Guide.
Remove Event Converter from Widows Service
If you wish to use the Daemon Manager to start and stop the Event Converter,
use the following command to remove the Event Converter from the Windows
Service:
tngcnv –u
To re-install the Event Converter as a Windows Service use the following
command:
tngcnv -i
96 Implementation Guide
Leverage NSM to Unicenter Service Desk Integration
Leverage NSM to Unicenter Service Desk Integration
The section provides an example of how to leverage the integration between
Unicenter NSM and Unicenter Service Desk. The example offers a sample
approach for configuring this out-of-box functionality and is not intended to
suggest that it is the only way to accomplish this task.
Example: NSM Message Records/Actions with Limited Content
Two Message Records, CFNEW and CFUPDATE, written with a single message
action each, are the cornerstone in this example for integrating NSM to
Unicenter Service Desk (sample files are also included). For a clean, compact,
robust and easy-to-maintain integration, you can leverage the strength of the
following:
„
tngwriter_rule.dat
„
CR_UPDATE and CR_UPDATE_ONLY functions
„
text_api keyword list
Note: The example shows how to create Message Records and Message
Actions with very little content. The content has been moved into the cawto
commands that are illustrated in the examples that follow. You could
alternately place the desired parameters and content directly into the “text”
field of the message action, or even use a combination of the two approaches.
Sample of the Event Management Message Record
The following dialog shows a sample Event Management Message Record that
will react to an event containing “CFNEW” at the start of the event alert:
Unicenter NSM Integration 97
Leverage NSM to Unicenter Service Desk Integration
Sample of the Message Action List
This sample shows the Message Action list that is associated with the
“CFNEW*” Message Record. By double-clicking on this item, you can see the
detailed information stored as part of the Message Action.
98 Implementation Guide
Leverage NSM to Unicenter Service Desk Integration
Note: The next example shows the detailed view where you can see the
“action” field set to “EXTERNAL” and the “text” field with the standard
integration text value of “AHD.dll AHD_Call”.
Unicenter NSM Integration 99
Leverage NSM to Unicenter Service Desk Integration
Sample of a second Message Record (configured to scan for events
beginning with CFUPDATE)
This sample reflects part of the detail that results from a second Message
Record, configured to scan for events that began with “CFUPDATE”. This
Message Record also has an identical Message Action created for it (as
illustrated by the previous “CFNEW*” Message Record):
100 Implementation Guide
Leverage NSM to Unicenter Service Desk Integration
Sample cawto Commands that Generate/Update Requests
To use the Message Records previously created, send a message through
Unicenter NSM Event Management by using the “cawto” utility/command
provided with Unicenter NSM. The “cawto” utility/command allows you to
create or update a Request using the command formats shown in the two
examples that follow.
Note: By using this approach, you can capture and reformat (for translation
into an expected format for inclusion into Unicenter Service Desk) any alerts of
interest coming into the Event Management console.
Issue the “opreload” command on the NSM Event management Console to
refresh the NSM Event Message Records and Actions that are stored in
memory after creating the previous NSM Message and Action rules.
Sample 1: “cawto” formats for Generating and Updating a New
Request
Use the following cawto format for generating a New Request:
CAWTO -n <NSM-server-name>
CFNEW;%STRING1=KEYWORD1;%CUSTOMER=ServiceDesk;%SUMMARY=Photos
required;%CATEGORY=Applications;%DESCRIPTION=Description: Photos required Justification: required
by regulations for entry
Use the following cawto format for updating a Request:
CAWTO -n <NSM-server-name>
CFUPDATE;%STRING1=KEYWORD1;%STATUS=Closed;%SUMMARY=Cancelled by ServiceDesk
Sample 2: Alternative “Cawto” formats for Generating and Updating a
New Request
Use the following alternative cawto format for generating a New Request:
CAWTO -n <NSM-server-name> CFNEW2;%EVENT_TOKEN=KEYWORD2;%SUMMARY=Server
Installation Approved;%STATUS=Work in Progress;%CATEGORY=Hardware;%DESCRIPTION=Install
new server and level V drops to existing server location within the data center. Also, install wiring on patch
panel in router cabinet
Use the following alternative cawto format for updating a Request:
CAWTO –n <NSM-server-name>
CFUPDATE2;%EVENT_TOKEN=KEYWORD2;%STATUS=Closed;%SUMMARY=Closed by Server
Team
Unicenter NSM Integration 101
Leverage NSM to Unicenter Service Desk Integration
Sample Files to Use with the Integration
This section describes the sample files available for your use when integrating
NSM to Unicenter Service Desk.
topology.cfg file
# <remote_node>:uniconv uniconvert <IP_ADDR_tngfilter>:tngfilter uni
<IP_ADDR_tngcnv>:tngcnv tngcnv <IP_ADDR_tngfilter>:tngfilter tng
<IP_ADDR_tngfilter>:tngfilter filter_nxd <IP_ADDR_tngwriter>:tngwriter <IP_ADDR_tngwriter>:tngwriter ehwriter - -
where:
<IP_ADDR_tngcnv>
The IP Address of the server that is running the Unicenter NSM Event
Converter process.
<IP_ADDR_tngfilter>
The IP Address of the server that is running Unicenter Service Desk.
<IP_ADDR_tngwriter>
The IP Address of the server that is running Unicenter Service Desk.
tngfilter_rule.dat
This file is not shown because the default has not been modified.
102 Implementation Guide
Leverage NSM to Unicenter Service Desk Integration
tngwriter_rule.dat
The tngwriter_rule.dat displays as follows:
# evt id:::dev:::user:::majorSrc:::minorSrc:::action:::template:::cmd:::log:::event_token:::user_parms
where:
# event id
The string or sed-style regular expression.
device
The string, sed-style regular expression, or '*' or empty.
user
The string, '*', or empty.
majorSrc
The string "uni" from uniconverter, or "tng" from tng converter.
minorSrc
The string or '*'.
action
The action options. The following options are available:
CR_CREATE
Write a new request for each event
CR_UPDATE
Updates an existing request or requests (if any exists) or creates a
new request if no requests are found. By default, requests are located
by matching on the log_agent and affected_resource (asset) fields.
The user can override the defaults by specifying a list of any call
request attributes.
CR_UPDATE_ONLY
This is like CR_UPDATE except that a new request is never created
when no matching requests are found.
COMMAND
Executes <cmd>, identified in the cmd description in this table.
Unicenter NSM Integration 103
Leverage NSM to Unicenter Service Desk Integration
template
Specifies the name of a request template to use to create a request. This
parameter is not required and is ignored if the action is not CR_CREATE.
Note: The request template must be created before the rule is defined..
cmd
The command passed to the shell—ignored on all but COMMAND action.
logging
The logging options, as shown by the following:
NONE
No logging (other than error logging).
SYS
Log incidents to the Unix syslog (Unicenter message console).
PDM
Log incidents to application log ($NX_ROOT/log).
BOTH
Log incidents to application log and syslog.
event_token
(Optional). This is a 30-character user defined tag that is used to identify a
specific request associated with an event_id (tng event message) or all
messages like an event_id (for example, a wildcarded event_id).
event_token is a request attribute that is stored in every request
generated by the TNG interface. If no event_token is specified in the writer
rule, the string "tng_generated" is used. This allows the user to update all
requests that match the event_token attribute. For example, two different
messages for the same asset can now update unique requests. Each
CR_UPDATE writer rule specifies the unique message parts and a unique
event_token. The event_token is used to find and update the matching
request. By default, an activity log containing the message is added to the
matching request.
In another example, the user can update the status attribute (such as, set
status=CL (closed)) in an existing request by specifying the same
event_token in the CR_UPDATE writer rule that was used when the
request was created using a CR_CREATE writer rule.
104 Implementation Guide
Leverage NSM to Unicenter Service Desk Integration
user_parms
(Optional) This contains the following three types of information:
„
Request attribute values
„
List of request attributes to match on when updating existing
request records
„
Special parameter names that are replaced with their
corresponding value from the TNG event structure
The request values and the list of attributes are specified using a
%<KEYWORD>=<value> syntax. If you use multiple keywords/value
pairs, you must separate each by a semicolon (";").
Request attribute values are specified using the syntax
%<ATTRIBUTE>=<value>, where ATTRIBUTE is an attribute name
identified in the text_api.cfg (located in NX_ROOT/site directory), which
maps to an AHD majic request attribute.
The syntax for the list of attributes to match is specified as
%SEARCH=<attribute1>[,<attribute2>.], where SEARCH is a fixed
keyword and attribute1 (and so on), are ATTRIBUTE names specified in the
text_api.cfg.
The following special parameter names can be used anywhere in the
user_parms string:
&Message
The message text associated with this Unicenter NSM message.
&Parm
The AHD.DLL Parm field on the Unicenter NSM Message Action dialog.
&Uuid
The TNG universally unique identifier.
&Device
The device (for example, hostname) that generated the Unicenter NSM
message.
&Majorsrc
The major type of source directing events to the event writer. For
events from Unicenter NSM on Windows, the value is “tng”. For
events from Unicenter NSM on UNIX, the value is “uni”.
&Minorsrc
The minor type of source directing events to the event writer.
&Node
The device (for example, hostname) that generated the Unicenter NSM
message.
Unicenter NSM Integration 105
Leverage NSM to Unicenter Service Desk Integration
&Addr
The IP address of the host that generated the Unicenter NSM message.
&Username
The user name on the host where the Unicenter NSM message was
generated.
&Date
The integer number representing the time since 1970 when the
Unicenter NSM message was generated.
&Time
The date and time of the Unicenter NSM message. For example, Tue
Jul 4 10:23:37 2000.
&Severity
The severity of the Unicenter NSM message.
&Tag
The tag data associated with the Unicenter NSM message.
Note: The Defining Event Writer Rules topic (see page 73) describes how to
use the event_token and user_parms.
As an example, using the examples outlined in Sample 2: Alternative “Cawto”
formats for Generating and Updating a New Request the default Event Writer
Rules file should be changed from:
*:::.*:::*:::uni:::*:::CR_CREATE:::::::::NONE
To the following:
CFNEW.*:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE::::::&Parm;%SEARCH_EXPLICIT=STRING1
CFNEW2.*:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE::::::&Parm;%SEARCH=Event_Token
CFUPDATE.*:::.*:::*:::tng:::*:::CR_UPDATE_ONLY:::::::::NONE::::::&Parm;%SEARCH_EXPLICIT=STRING1
CFUPDATE2.*:::.*:::*:::tng:::*:::CR_UPDATE:::::::::NONE::::::&Parm;%SEARCH=EVENT_TOKEN;%STATUS=C
L
Note: The %SEARCH_EXPLICIT parameter is used to ensure that when an
update is performed, the search looks for a matching Request by comparing
the contents of the STRING1 field before proceeding with the update.
For more information about text_api.cfg and how Unicenter Service Desk uses
the Text API to create requests from Unicenter NSM, see the chapter “Creating
Objects using Text API” in the Administrator Guide.
106 Implementation Guide
Chapter 8: Change Impact Analyzer
Implementation
This chapter explains how to integrate, create and maintain the Change
Impact Analyzer.
Service Desk Change Impact Analyzer
Your business is comprised of many interrelated elements—people, roles,
processes, and the resources that support the successful operation of these
elements—which together deliver products and services to your consumers.
Often the knowledge of how these elements interrelate and affect your
business exists only in the heads of a few key members of your organization.
A method is needed to effectively display the relationships between these
elements based on current data. By monitoring the status of elements such as
configuration changes and faults, the health of your business can be
ascertained. Often failure of a component in one part of a business exhibits
itself in an unpredictable manner in another part of the business. Having the
relationships of the elements that comprise your business mapped in an
intuitive graphical form lets you easily determine the root cause of failures.
Using the map, what-if scenarios can be analyzed to see what impact an
anticipated change will have on your business, or more importantly, what may
happen if the change is unsuccessful.
Using the Change Impact Analyzer feature, you can do the following:
„
Define the elements of your business
„
Map the relationships between these elements
„
Track the status of each element
„
View and manage relationship information in a hierarchical graphical map
Change Impact Analyzer Implementation 107
How the Change Impact Analyzer Works
How the Change Impact Analyzer Works
Change Impact Analyzer works as an integrated feature of Unicenter Service
Desk to manage your assets, which are the key elements of your business.
Change Impact Analyzer uses Unicenter Service Desk asset information in
conjunction with the Unicenter NSM WorldView product, which provides the
visual tool to view and manage these business elements and their
relationships in a graphical environment. Communication between the
Unicenter Service Desk daemon server and WorldView is accomplished utilizing
a Windows service routine. This communication allows the transfer and
synchronization of asset data between Unicenter Service Desk and WorldView,
which is critical to keeping WorldView refreshed with the most up-to-date
asset information from the Unicenter Service Desk database. Asset information
includes asset status and relationship data. It is this data, when viewed
graphically in WorldView, which lets you see the real-time statuses and
relationships of assets and identify problems to formulate solutions. You can
also introduce changes to the current WorldView map in order to see the
impact that changes will have on your organization.
Through menu items in the interface, Unicenter Service Desk provides the
facilities to export asset information to WorldView, synchronize status
information between the two systems, and view and maintain relationship
information. In addition, Change Impact Analyzer provides command line
utilities that can be run on-demand. Most of these utilities are run
automatically during initial setup or can be run directly from the Service Desk
interface. They are provided as stand-alone components for flexibility in
managing the Change Impact Analyzer integration.
108 Implementation Guide
Install the Change Impact Analyzer Integration
Install the Change Impact Analyzer Integration
The Change Impact Analyzer feature is integrated into the Unicenter Service
Desk r11. Unlike the earlier releases, you do not need to install a separate
patch to use the functionality.
The Impact Analysis feature, available from a Change Order, can be used with
or without integration with Unicenter NSM WorldView (see page 168).
Unicenter Service Desk Change Impact Analyzer integration with WorldView
provides these additional benefits:
„
Facilitates building relationships among assets using the graphical tools of
Unicenter NSM WorldView.
„
Provides a graphical view of real-time asset status information using
WorldView.
„
Facilitates root-cause analysis using the graphical WorldView map.
The Change Impact Analyzer and the Unicenter NSM WorldView integration
point is currently supported only on the Windows platform. However, it is not
necessary that the Unicenter Service Desk must reside on the Windows
platform.
If your Unicenter Service Desk resides on a platform other than Windows or a
Windows system that does not host WorldView, you should complete the
following steps before proceeding.
„
Set up a Windows system to host the integration.
„
Install, configure and test a WorldView Administrative client on this new
system. For information on completing this process, see Unicenter NSM
documentation.
„
Install, configure and test a Unicenter Service Desk Secondary Server with
the NSM Integration option on the new Windows Server.
As always, you should test this reconfiguration in an environment that is
isolated from your production environment.
Important! Both Unicenter NSM WorldView and Unicenter Service Desk must
be configured and operational before integrating Unicenter Service Desk
Change Impact Analyzer and WorldView.
Change Impact Analyzer Implementation 109
Install the Change Impact Analyzer Integration
Configure the Daemon
The Unicenter Service Desk Change Impact Analyzer daemon is responsible for
communicating the real-time status information to managed objects in the
WorldView repository.
To configure the daemon, follow these steps:
1.
Use the Unicenter Service Desk pdm_edit utility to configure the Change
Impact Analyzer Daemon, pdm_uspnsm_nxd, to run on the new Windows
Server.
Note: Win client is not a supported configuration. pdm_uspnsm_nxd
daemon will require primary or secondary windows server. For further
information on how to run the pdm_edit utility, see the appendix
"Reference Commands" in the Administrator Guide. Please follow all
instructions, including re-running the USD Configuration utility after
successfully executing the pdm_edit utility. During the execution of the
pdm_edit utility choose the following option: “9. Edit ( C )hange Impact
Analyzer”. Also, make sure to take the default of “primary” when
specifying the “Change Impact Analyzer Host”.
2.
Restart the Unicenter Service Desk server.
3.
Use the pdm_status command to verify that the daemon is running
The Change Impact Analyzer uses several new Managed Object Classes and
associated icons. To verify that these new classes exist, use the Unicenter
Class Browser. To use the Unicenter Class Browser go to Start, All Programs,
Computer Associates, Unicenter, NSM, WorldView, Class Browser. Then
expand the TNGROOT folder, followed by the ManagedObject folder, and finally
the UBM folder. You should then see the following:
110 Implementation Guide
Install the Change Impact Analyzer Integration
If you do not see the UBM folder or any of the classes underneath it, then you
must use the WorldView Import/Export utility (trix.exe) to load
$NX_ROOT\data\svc_ana\ubm0.tng into each WorldView repository that is
participating in the configuration. Be sure to recycle the WorldView Manager
services as well as the Service Desk pdm_uspnsm_nxd daemon after making
changes to the WorldView Managed Object Class.
Change Impact Analyzer Implementation 111
Change Impact Analyzer Integration Considerations
Change Impact Analyzer Integration Considerations
When configuring your system environment to support Change Impact
Analyzer you need to be aware of the following considerations.
„
The utilities of Change Impact Analyzer that interface with WorldView use
the Worldview API. Currently, the Worldview API is limited to the Windows
platform. Since some Change Impact Analyzer utilities require the
Worldview API, they too are limited to the Windows platform. The
following Change Impact Analyzer utilities use the Worldview API or are
only supplied as Windows utility executables:
„
pdm_nsmbmcls.exe
„
pdm_nsmclass.exe
„
pdm_nsmimp.exe
„
pdm_nsmsync.exe
„
pdm_uspnsm_nxd.exe
„
Change Impact Analyzer requires Unicenter Service Desk r11 or Unicenter
ServicePlus Service Desk 6.0 with the Change Impact Analyzer patch.
Change Impact Analyzer will not work with Unicenter Service Desk
versions before 6.0.
„
Change Impact Analyzer works with NSM 3.x WorldView and NSM r11
WorldView. Change Impact Analyzer provides for integration with more
than one WorldView repository. While it is technically possible to integrate
with different versions of WorldView, the results may be inconsistent. The
inconsistency is due to the differences in the class names among the
various versions of NSM WorldView. Change Impact Analyzer relies on
both managed object name and managed object class to uniquely identify
WorldView objects. If objects with the same names exist in multiple
WorldView repositories, but with different managed object classes,
confusion will occur.
„
WorldView is inherently case-sensitive. Make sure of the case for
„
112 Implementation Guide
arguments used in running the various Change Impact Analyzer
integration utilities.
„
hostnames in WorldView.
„
Change Impact Analyzer Repository records.
Change Impact Analyzer Integration Considerations
„
If you are using NSM 3.x WorldView Administrative clients that are
connecting to the WorldView Repository that is integrated with Change
Impact Analyzer, the icons for the seven new Managed Object classes will
need to be manually copied from $NX_ROOT\data\svc_ana\icons and
$NX_ROOT\data\svc_ana\images to the appropriate WorldView directories
on the WorldView administrative client machines. Normally these icons are
installed during CIA Integration and will be installed on the machine on
which the integration is run. With NSM/CCS r11 this won't be a problem
because the icons are now being delivered as part NSM/CCS r11. Be sure
to restart the WorldView services after performing Change Impact
Analyzer integration.
Test the Change Impact Analyzer Integration
To test the Change Impact Analyzer Integration, follow these steps:
1.
Select Change Impact Analyzer from Administration Tab, Service Desk,
Application Data, Assets.
There should be a number of nodes listed under Change Impact Analyzer.
If “Maintain Relationships” is the only available option then continue with
the rest of this procedure.
2.
Install NSM r11 WorldView on a separate machine.
Note: If you install NSM r11 Worldview on the same machine, when you
install Unicenter Service Desk on top of WorldView, you may encounter
problems with the database. You will need Windows 2003 for NSM r11
Worldview.
3.
Leave the primary server running.
4.
Custom install a Unicenter Service Desk Secondary Server on the machine
on which NSM is installed.
„
5.
Choose Unicenter NSM Integration option on the Select Features
window.
During Secondary Server Configuration, do the following:
a.
Configure to use the primary server.
b.
Select Integrate with Change Impact Analyzer option
Note: The domsrvr should be running on primary.
6.
Run pdm_edit.pl in the PRIMARY server, adding the Change Impact
Analyzer. Use the SECONDARY server’s hostname when asked.
7.
Copy the generated pdm_startup.rmt file to $NX_ROOT/pdmconf, rename
it to pdm_startup.tpl, and re-run Configuration on the Primary Server.
To verify the presence of the nodes, login to the Web Interface and select
Change Impact Analyzer from Administration Tab, Service Desk, Application
Data, Assets. There should be more than one node listed.
Change Impact Analyzer Implementation 113
Change Impact Analyzer Integration Setup
Change Impact Analyzer Integration Setup
After you have completed the required installations and configurations, the
next step in implementing Change Impact Analyzer is to populate the
reference tables with the data needed for integration.
Change Impact Analyzer Classes
The first table that is populated, by the installation of the Change Impact
Analyzer, is the Change Impact Analyzer Class table. This table is used to map
Unicenter Service Desk Asset Classes to Unicenter NSM Managed Object
Classes. To verify the presence of these classes, login to the Web Interface
and select Classes from Administration Tab, Service Desk, Application Data,
Assets, Change Impact Analyzer. If you see classes in the Change Impact
Analyzer Classes List go on to the Map Change Impact Analyzer Classes to
Asset Classes (see page 118) section.
If you see nothing in the Change Impact Analyzer Class List then run the
pmd_nsmbmcls utility from the DOS command prompt. It will then read all
the Managed Object Classes from the WorldView repository and populate the
Business_Management_Class table in Unicenter Service Desk.
114 Implementation Guide
Change Impact Analyzer Integration Setup
If multiple WorldView repositories are being used, and you have created
custom Unicenter NSM Managed Object Classes, the pdm_nsmbmcls utility
should be run for each of the repositories that you plan on using.
Run pdm_nsmbmcls –h to display information on the available command line
options.
After the Change Impact Analyzer Classes are populated, several additional
options will be available in the Unicenter Web Client Administration tab for
maintaining the Change Impact Analyzer integration.
Change Impact Analyzer Implementation 115
Change Impact Analyzer Integration Setup
Define WorldView Repositories
Change Impact Analyzer integration requires that at least one Unicenter NSM
WorldView repository be defined. This record defines the WorldView Repository
by hostname and the credentials that the Change Impact Analyzer daemon will
use to sign on the repository.
To maintain the repository definitions, follow these steps:
1.
Click the Repository Configuration option from the Administration, Service
Desk, Application Data, Assets, Change Impact Analyzer.
The Change Impact Analyzer Repository List appears.
If no repository is defined, click Create New to create a new repository.
Note: When defining the new repository, you must first save the definition
by clicking on the Save button before providing login information on the
NSM Credentials tab. Once the repository has been defined go to step 4 of
this process.
2.
Click the repository link under the Symbol column.
The Update Change Impact Analyzer Repository window appears.
3.
Edit the repository record by filling in the Symbol and Repository fields.
4.
Click NSM Credentials
The NSM Credentials window appears at the bottom.
116 Implementation Guide
Change Impact Analyzer Integration Setup
5.
Click Save.
The NSM WorldView Repository definition is saved.
6.
Click Change Repository Login to save the login User-Id and Password for
the Repository.
7.
Click Test Repository Login to ensure that the credentials are correct.
The Change Impact Analyzer daemon, pdm_uspnsm_nxd, attempts to connect
to the Repository. A successful test updates the daemon’s in-memory cache of
repositories and will begin using the new credentials when it needs to
communicate with the repository. If you skip this step, the repository is not
available until Unicenter Service Desk server is recycled.
Note: The User-Id provided must have “dbowner” rights to the WorldView
database for Change Impact Analyzer functionality to work properly. Often
WorldView requires that the hostname be uppercase.
Change Impact Analyzer Implementation 117
Change Impact Analyzer Integration Setup
Map Change Impact Analyzer Classes to Asset Classes
The Change Impact Analyzer Classes are mapped to Asset Classes manually
using the Change Impact Analyzer Class field or automatically by running the
pdm_nsmclass utility.
Map Manually
To manually map each Asset Class to a Change Impact Analyzer Class,
follow these steps:
1.
Click Asset Classes option from Administration tab, Service Desk,
Application Data, Assets.
The Class List window appears.
2.
Click the available Class link.
The Update Class window appears.
3.
118 Implementation Guide
Click the Change Impact Analyzer Class to map the asset.
Create Change Impact Analyzer Relationships
Run pdm_nsmclass to Map Automatically
The pdm_nsmclass utility, run from command prompt, uses a file to map
each Asset Class to a Change Impact Analyzer Class. Before running
pdm_nsmclass review the sample $NX_ROOT\site\nsmclsmap.dat file, and
be aware for the following:
„
„
„
Each line in the sample file maps an Asset Class to a Change Impact
Analyzer Class.
If pdm_nsmclass finds an Asset Class that has no corresponding entry
in the nsmclsmap.dat file, it will map the Asset Class to the
“Component” Change Impact Analyzer Class by default. If required,
the default Change Impact Analyzer Class can be changed with a
command line option.
pdm_nsmclass will only update Asset Classes that have no Change
Impact Analyzer Class selected. A command line option lets you reset
the Change Impact Analyzer Class of all Asset Classes.
Run pdm_nsmclass –h to display information on the available command
line options.
If you are running Unicenter Service Desk with a case-sensitive DBMS,
such as Oracle, pay extra attention to the case of your entries in
nsmclsmap.dat file. The mapping is case-sensitive.
Create Change Impact Analyzer Relationships
To be successful at implementing Change Impact Analyzer, start with careful
planning. Organize the elements of your business, considering that the data
you get from any system in your organization should always be checked for
accuracy.
Do not try to map your whole organization at once. Organize your business
into manageable sections. Your business is more than IT hardware. The
following new Unicenter NSM Managed Object Classes are available to help you
represent non-IT related elements:
„
Document
„
Practice
„
Process
„
Service
„
Component
„
Role
„
Person
Change Impact Analyzer Implementation 119
Create Change Impact Analyzer Relationships
Getting Started Examples
You can evaluate the Change Impact Analyzer feature from sample WorldView
data located in the $NX_ROOT\samples\assets subdirectory on the Unicenter
Service Desk server. It can be loaded using the WorldView Import/Export
utility (trix.exe). The compressed sample data file, myco_demo.caz, can be
extracted using the cazipxp utility available from CA’s SupportConnect web
site (http://supportconnect.ca.com (http://supportconnect.ca.com/)).
To install the sample WorldView data, follow these steps:
1.
Copy myco_demo.caz to a temporary directory on your NSM WorldView
server.
2.
After changing directories to the temporary directory in a DOS prompt
window, extract the sample data file using the command:
Cazipxp –u myco_demo.caz
This will uncompress the file myco_demo.tng
3.
Load the myco_demo.tng file using the Unicenter NSM WorldView
Import/Export Repository utility (trix.exe).
For more information on the WorldView Import/Export utility, see
WorldView documentation.
For the following example, you are the Unicenter Service Desk administrator at
the fictitious Myco Company, which recently implemented Change Impact
Analyzer. Today, you must add the password reset process to Change Impact
Analyzer. The following sections outline the steps necessary to accomplish this
task.
120 Implementation Guide
Create Change Impact Analyzer Relationships
Import Change Impact Analyzer Relationship to Service Desk
After the logical relationships between assets are built in WorldView, the
structures can be imported to Unicenter Service Desk as Change Impact
Analyzer Relationships.
To import the relationships, follow these steps:
1.
Right-click on the top-level object of a Relationship in WorldView that you
want to import to Unicenter Service Desk.
2.
Select the highest object in your business structure and right mouse click.
Change Impact Analyzer Implementation 121
Create Change Impact Analyzer Relationships
3.
Select Read Change Impact Analyzer.
The pdm_nsmimp utility is launched to import the Change Impact Analyzer
Relationships to Unicenter Service Desk.
Note: The name of the WorldView Managed Object chosen for import will
be used as the name of the Change Impact Analyzer Relationship in
Unicenter Service Desk.
Planning
Your analysis has determined that the password reset process has two
dependant elements, the Password Reset Procedure Document and the
Password Reset Administrator Role. The Password Reset Process itself was
dependant on the Help Desk Practice, because this is the department that
handles the password reset procedures.
„
Help Desk Practice
–
122 Implementation Guide
Password Reset Process
„
Password Reset Procedure Document
„
Password Reset Administrator Role
Create Change Impact Analyzer Relationships
Create Assets
Using the Asset windows in the Unicenter Service Desk interface, create the
appropriate assets to represent the elements of the business.
Change Impact Analyzer Implementation 123
Create Change Impact Analyzer Relationships
Export Assets to WorldView
To export Assets to WorldView, follow these steps:
1.
Click Export Assets to NSM from Administration Tab, Service Desk,
Application Data, Assets, Change Impact Analyzer in the Unicenter Service
Desk Web client.
The Export Configuration Items to NSM window appears.
2.
Click Add Assets.
The Assets to Export Search window appears.
124 Implementation Guide
Create Change Impact Analyzer Relationships
Refine the search criteria to find each of the four assets that were just
created. Multiple searches will need to be done to find all the four assets.
3.
Select the Assets from the Available Assets list and add them to the Assets
to Export list and click OK.
The Export Configuration Items to NSM window appears.
4.
Select the Target Repository. This is the repository to which the assets will
be exported.
5.
Select the Target Object folder. This controls the WorldView container in
which the assets will be placed. If not specified, the objects will be created
in the ManagedObjectRoot folder.
Important! Normally any child assets, of the assets that were selected for
export, that are found will be exported. The hierarchical relationships will
be recreated in WorldView. The Exclude Child Assets options will export
only the selected assets and exclude any child assets from the export.
6.
Click the Export Assets button to start the export process.
When the export completes, you are notified.
Once exported, the assets are placed in the ManagedObjectRoot folder in
WorldView.
Change Impact Analyzer Implementation 125
Create Change Impact Analyzer Relationships
126 Implementation Guide
Create Change Impact Analyzer Relationships
When assets are exported to Unicenter NSM WorldView, the repository is
automatically assigned.
Note: Certain WorldView Managed Object classes require additional, nonstandard Instance Level Properties that can't be anticipated. When the Change
Impact Analyzer daemon tries to create Managed Objects using these classes,
the creation will fail. The Change Impact Analyzer Daemon attempts to set
these Instance Level Properties from corresponding information contained in
the Service Desk Asset: Name, Label, IP Address, MAC Address, Description,
Contact and Location. Try to avoid using Managed Object Classes such as:
IP_Interface, IP_Network, IP_Subnet, LANBus, and Segment which require
additional Instance Level Properties.
Change Impact Analyzer Implementation 127
Create Change Impact Analyzer Relationships
Organize Relationships
Now that the assets are in WorldView, you can use the 2D map, in Design
Mode, to define the relationships between your business elements by first
moving the Help Desk Practice into the Myco Industries Inc folder. This is
followed by moving the Password Reset Procedure Document, Password Reset
Process, and Password Rest Administrator folders into the Help Desk Practice
folder.
Then import this new logical relationship into Unicenter Service Desk by
performing the following steps:
1.
Right mouse click on the Help Desk Practice folder.
2.
Select Read Change Impact Analyzer.
The pdm_nsmimp utility is launched to import the Change Impact Analyzer
Relationships to Unicenter Service Desk.
128 Implementation Guide
Create Change Impact Analyzer Relationships
Examine Change Impact Analyzer Relationship in Service Desk
To examine the results of the import in Unicenter Service Desk, follow these
steps:
1.
Click Maintain Relationships from Administration Tab, Service Desk,
Application Data, Assets, Change Impact Analyzer in Unicenter Service
Desk Web Client.
The Change Impact Analyzer Relationship List appears.
Change Impact Analyzer Implementation 129
Create Change Impact Analyzer Relationships
2.
Check whether the Source Repository is set to the Repository from which it
was imported, when the Assets are imported from WorldView.
Note: The status in WorldView is considered unreliable. The Change
Impact Analyzer data is owned by Unicenter Service Desk. WorldView is
used only to display Unicenter Service Desk information.
This example walked you through the following three simple steps of adding
the Password Reset process to Change Impact Analyzer for the Myco
Company:
„
You defined the business elements by creating the supporting assets in
Unicenter Service Desk and exporting them to WorldView.
„
Using the WorldView 2D map, you organized the business elements by
defining relationships between them with WorldView’s drag-and-drop
capabilities.
„
You imported the relationships back to Unicenter Service Desk for use by
Change Impact Analyzer.
130 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
Automate Change Impact Analyzer Status Updates with
Action Macros
The new Action Macros permit the Change Impact Analyzer Status of Assets to
be changed automatically.
These macros can be invoked from Service Types for Requests, Change
Orders, and Issues. They can also be invoked from Service Types for Incidents
and Problems when Unicenter Service Desk is installed in an ITIL format. For
Workflow Tasks, the macros can be executed from Behaviors.
Change Orders and Issues allow multiple assets to be attached. The macros
will update the Change Impact Analyzer Status of all attached assets.
The following examples walk you through the processes of using the macros in
Service Types and Behaviors.
Change Impact Analyzer Implementation 131
Automate Change Impact Analyzer Status Updates with Action Macros
Use the Macros in Service Types
To begin using the Macros in a Service Type you need to perform the following
tasks:
„
Create a new event
„
Create a new service type and use the event in the service type.
„
Test the event.
132 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
Create a New Event
To create a New Event, follow these steps:
1.
Select Events under Events and Macros option from the Administration
tab.
The Event List window appears.
2.
Click Create New.
The Create New Event Window appears.
Change Impact Analyzer Implementation 133
Automate Change Impact Analyzer Status Updates with Action Macros
3.
Enter the Name, Object Type Description and Delay Time, Allow Time
Resetting and On Done Event Flag and click Save.
Note: Event needs to be saved before attaching condition macros. Once
the Event is saved click on Edit to select the condition from the list.
4.
Click Action Information
The Action Information window appears.
5.
Click Update Actions on True.
The Macro Search form appears.
6.
Click Search for the Set Asset Critical Requests macro.
The Actions on True Update window appears. The list on the left shows the
results of the Macro Search. The list on the right shows the Macros
assigned to the Event.
134 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
Select the action Set Asset Critical Request from Possible Actions list and
click the arrow button to add the actions to the macro list, and click OK.
The Event Update window appears.
7.
Click Save.
This creates an Event.
This Event can now be used in Service Types if desired. However, you can test
the Event without creating a Service Type.
Change Impact Analyzer Implementation 135
Automate Change Impact Analyzer Status Updates with Action Macros
Test the Event
Before testing the Event create a new Request and Assign an asset, which has
already been exported to WorldView, to the Request. Save the Request.
To test the new Event and see the macros in action, follow these steps:
1.
Click the Attach Service Type Event button on the Service Type tab in the
Request Detail window.
The Attach Service Type Event to Request window appears.
2.
Use the dialog to select the new Event and click OK.
The display time field appears.
3.
Set the Delay Time to 00:00:00 and click OK.
The Event will be attached to the Request.
136 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
4.
Right-click on the Service Type Tab of the Request and choose Refresh to
update the Attached Service Type Events.
5.
Examine the Asset to check if Change Impact Analyzer Status is set to
Critical.
Change Impact Analyzer Implementation 137
Automate Change Impact Analyzer Status Updates with Action Macros
6.
If you examine the asset’s log, there will be an entry showing that the
status was changed.
7.
Examine the WorldView map with either 2D Map or Unicenter Explorer.
The color of the corresponding Managed Object has changed to red and
the status propagated upwards to the top of the objects.
138 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
8.
Manually change the Change Impact Analyzer Status of the asset back to
Normal and click Save to save the changes.
Change Impact Analyzer Implementation 139
Automate Change Impact Analyzer Status Updates with Action Macros
9.
140 Implementation Guide
The status will be automatically updated in WorldView in real-time.
Automate Change Impact Analyzer Status Updates with Action Macros
Use the Macros with Workflow Tasks
The Change Impact Analyzer Macros can be used with Workflow tasks from a
Change Order or Issue. Instead of using the macros as actions in an Event,
they are assigned as Behaviors to a status of a Workflow Task at the Template
level.
In the following example, two Workflow Tasks are created for an Issue. When
the first task is completed, it sets all the attached Assets to Warning status.
This can be used to alert other analysts that changes are in progress to the
assets. When the second task is completed, the assets are returned to normal
status.
To use the Macros with Workflow Tasks, start by creating two new Workflow
Task Types. This example will be with Issues. The same procedure can be
applied to Change Orders.
To create a WorkFlow Task, follow these steps:
1.
Click Workflow Task Types from the Administration Tab, Service Desk,
Issues in the Web Client.
2.
Click the Create New to create a new Task Type.
3.
Create the following two Task Types, paying particular attention to the
Status Codes that are assigned to the Task.
Change Impact Analyzer Implementation 141
Automate Change Impact Analyzer Status Updates with Action Macros
4.
142 Implementation Guide
Create a new Issue Category from Administration Tab, Service Desk,
Issues, Categories to use the new Task Types. Click Create New to create
the following category.
Automate Change Impact Analyzer Status Updates with Action Macros
5.
Add the first Workflow Task to the Issue Category. Click the Edit button on
the Issue Category form and then go to the Workflow tab.
Note: Workflow Tasks and Macros are not available when the CA Workflow
engine is used to service the category.
Change Impact Analyzer Implementation 143
Automate Change Impact Analyzer Status Updates with Action Macros
6.
Click the Add Workflow button.
The Create New Workflow Task Template window appears.
7.
Create the following Workflow Template, and then click Accept.
The Workflow Template is added to the Issue Category and the window
closes returning you to the Issue Category window .
144 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
8.
Click the Add Workflow button to add the second Workflow Task Template
as mentioned in step six and seven.
Change Impact Analyzer Implementation 145
Automate Change Impact Analyzer Status Updates with Action Macros
9.
Click Save.
The Create New Workflow Template window will close and you are
returned to the Issue Category window.
10. Click Save.
The Issue Category will look like the following:
146 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
Add Behaviors to Workflow Templates
To add Behaviors to the Workflow Templates, follow these steps:
1.
Click the 100 hyperlink in the Sequence column of the Issue Category
Detail for the asset warning task.
This asset warning Workflow Template Detail window appears.
Change Impact Analyzer Implementation 147
Automate Change Impact Analyzer Status Updates with Action Macros
2.
Click the Complete status hyperlink.
The Behavior template Detail window appears.
Note: This example fires the Change Impact Analyzer Set Assets Warning
Issue Wf macro when the Workflow Task changes status to Complete.
148 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
3.
Click Update Actions on True.
The Macro Search window appears.
4.
Click Search.
The list on the left shows you the Macros that are available to be added.
The list on the Right shows you the Macros that are assigned to the
Behavior.
5.
Select the Set Assets Warning Issue Workflow Macro and click the Arrow
button to add it to the list on the right.
6.
Click OK to save the changes.
The Behavior Template Detail window appears and the changes are
complete.
7.
Close the window.
The asset warning Workflow Template Detail window appears.
8.
Close this window.
The Issue Category Detail window appears.
Change Impact Analyzer Implementation 149
Automate Change Impact Analyzer Status Updates with Action Macros
150 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
9.
Click the 200 hyperlink for the asset normal task and select Complete from
the Status column of the Issue Category Detail. Follow the steps one
through eight to add the Behavior to the second task, only this time add
the Set Asset Normal Issue Wf macro to the Behavior Template on the
Action to True Update window.
Try the new Issue Category by creating a new Issue with the new Category.
The Macros will change the Change Impact Analyzer Status of each of the
attached Assets.
Change Impact Analyzer Implementation 151
Automate Change Impact Analyzer Status Updates with Action Macros
Add Asset to Issue
To attach Assets to the Issue, follow these steps:
1.
Click the Asset tab on the Issue Detail window.
2.
Click Update Assets.
The Asset Search window appears.
3.
Click Search to find the Assets that you wish to attach. Fill in some criteria
to limit the search if necessary.
The Affected Asset Update window appears. Use this window to attach the
Assets to the Issue.
4.
Click OK to save the changes.
The Attach Assets dialog will close and the Issue Detail window appears.
5.
Click Save to save the Issue.
The Assets that were selected are listed on the Asset tab.
152 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
Test Automatic Update
To test the automatic update of the Change Impact Analyzer status, follow
these steps:
1.
Click the Workflow Tasks tab.
This will show the tasks in a Wait status.
Change Impact Analyzer Implementation 153
Automate Change Impact Analyzer Status Updates with Action Macros
2.
Click the “100” hyperlink to update the first Workflow task.
The Issue Workflow Detail window appears.
3.
Click Edit.
The Update Issue Workflow window appears.
4.
Change the Status to Complete.
This will fire off the Change Impact Analyzer Macro.
5.
Click Save to save the Workflow Task. Then, examine the WorldView map.
The icons have changed to yellow.
154 Implementation Guide
Automate Change Impact Analyzer Status Updates with Action Macros
6.
View the log for one of the assets.
There is an entry showing that the Status was changed by a macro.
7.
Go back to the Issue and change the Status of the second Workflow Task
to Complete.
Change Impact Analyzer Implementation 155
Automate Change Impact Analyzer Status Updates with Action Macros
8.
Click Save to save the Workflow Task.
9.
Now examine the WorldView map.
The icons have changed back to normal.
10. Examine the asset log again.
There is an entry showing the status was changed back to normal by a
Workflow Task.
156 Implementation Guide
Logical Repositories in Unicenter NSM r11
Logical Repositories in Unicenter NSM r11
This section explains how to configure the Change Impact Analyzer with
Unicenter NSM 3.x and Unicenter NSM r11.
Configure Unicenter NSM 3.x
When Change Impact Analyzer is configured to integrate with NSM 3.x running
on SQL, the Repository field is used to indicate the hostname, which is casesensitive, of the server where the WorldView repository resides. You can use
the ping command to verify that the hostname is resolvable.
The User-Id and Password fields contain the credentials used to authenticate
to SQL Server.
The Repository field is located on Change Impact Analyzer Repository Detail
form.
Change Impact Analyzer Implementation 157
Logical Repositories in Unicenter NSM r11
Configure Unicenter NSM r11
When Change Impact Analyzer is configured to integrate with NSM r11 running
on Ingres, the Repository field contains the name of the NSM Logical
Repository, rather than a hostname.
The Logical Repository contains information for WorldView to use when
connecting to the MDB, located either locally or remotely. The credentials used
to connect to the MDB are also stored in the Logical Repository.
The values entered into the User-Id and Password fields on the Change Impact
Analyzer Repository Detail form must match those stored in the associated
Logical Repository.
The following example shows you how to create a NSM Logical Repository.
158 Implementation Guide
Logical Repositories in Unicenter NSM r11
Create an Unicenter NSM Logical Repository
The Unicenter NSM r11 logical repositories are created using the Define Logical
Repository utility on NSM Worldview.
To create or make changes to the Unicenter NSM r11 Logical Repositories,
follow these steps.
1.
Select Define Logical Repository from Start, Programs, Computer
Associates, Unicenter, NSM, Worldview.
The Unicenter Repository Creation: Greetings dialog appears.
2.
Click Next.
The Unicenter Repository Creation: Selection dialog appears.
3.
Enter the name for the Logical Repository in the Repository Selection field.
4.
Click Next.
The Unicenter Repository Creation: Access Type dialog appears.
5.
Select the Database type from the DBMS Access Type field.
6.
Click Next
The Unicenter Repository Creation: Server Name dialog appears.
7.
Enter the server and login credentials. The Server Installation Code
identifies the Ingres installation (EI).
8.
Click Next.
The Unicenter Repository Creation: Completion dialog appears.
9.
Click Define Repository.
10. Click Finish to confirm Unicenter Repository changes.
Change Impact Analyzer Implementation 159
Serialize Changes to Assets
Serialize Changes to Assets
The new asset_only_one_chg option in Unicenter Service Desk enables you to
restrict an asset from being attached to more than one active Change Order.
This option is managed from Option Manager in the Administration Interface.
After installing this option, the attachment of an asset to a Change Order will
fail if the asset is already attached to another active Change Order. An error
dialog will appear warning you that the asset is already attached to an active
Change Order.
When attaching multiple assets, only the assets already attached to other
Change Orders will fail. Other assets are not affected.
160 Implementation Guide
Implementation Notes
Implementation Notes
Status Changes
The Change Impact Analyzer Status of an asset that has been imported from
WorldView will automatically be reflected in the WorldView maps.
Change Impact Analyzer Implementation 161
Implementation Notes
When the Change Impact Analyzer Status is changed manually or
automatically using the Action Macros, the corresponding WorldView Managed
Objects are updated. Normal WorldView propagation rules apply and the
status is reflected in the top object of the hierarchy.
162 Implementation Guide
Implementation Notes
Creating Assets from WorldView Managed Objects
Assets can be created directly from WorldView Managed Objects without the
need to first create them in Unicenter Service Desk. Create a Managed Object
in the NSM WorldView 2D map while in Design Mode. Then import to Unicenter
Service Desk by right mouse clicking on the newly created Managed Object
and selecting Read Impact Analyzer.
Change Impact Analyzer Implementation 163
Implementation Notes
When the pdm_nsmimp utility is run to import a WorldView Managed Object
that does not exist as an asset in Unicenter Service Desk, the utility will create
the asset, as well as its corresponding Asset Class (if it too does not yet exist).
The Source Repository will be set to the repository from which the asset was
imported. The Repository will also be assigned.
164 Implementation Guide
Implementation Notes
If the Managed Object was a container, everything inside the container will be
imported. The Change Impact Analyzer Relationships are created
automatically.
Note: When importing Managed Objects from WorldView, by default the
pdm_nsmimp utility limits the number of inclusions (nesting level) that will be
examined to 1,000. This can be changed with a command line option on the
pdm_nsmimp utility.
Change Impact Analyzer Implementation 165
Implementation Notes
Synchronizing WorldView Status to Service Desk Change Impact Analyzer Status
Sometimes WorldView may become unavailable. When this occurs, Change
Impact Analyzer cannot automatically update the Change Impact Analyzer
Status of a Managed Object in the WorldView repository.
The pdm_nsmsync utility can be run to update the status of all Managed
Objects in the WorldView Repositories with the proper Change Impact Analyzer
Status of assets in Unicenter Service Desk.
This utility processes all assets that are found in existing Change Impact
Analyzer Relationships. Assets that are not members of Change Impact
Analyzer Relationships are not processed. The WorldView Status in each
repository that is assigned to the asset is updated with the asset’s Change
Impact Analyzer Status.
Only the status of existing WorldView Managed Objects will be affected.
Nothing will be imported, exported, moved or removed.
Note: If the number of assets participating in Change Impact Analyzer
Relationships is large, the performance of a heavily-loaded busy Unicenter
Service Desk system or the Unicenter NSM WorldView Repository could be
impacted during synchronization.
The synchronization function can also be invoked from the Administration
Interface. You would use the Synchronize Status button:
166 Implementation Guide
Implementation Notes
You will be notified when the synchronization is complete. This could take a
few minutes if there are many Change Impact Analyzer Relationships to
process.
Change Impact Analyzer Implementation 167
Implementation Notes
Maintaining Change Impact Analyzer Relationships
Change Impact Analyzer Relationships can be created and maintained
manually from the Service Desk interface, although this is not recommended.
To view and maintain relationships, use the Maintain Relationships menu item
on the Service Desk interface’s Administration Tab, Service Desk, Application
Data, Assets, Change Impact Analyzer menu.
168 Implementation Guide
Implementation Notes
The top-level element of a Change Impact Analyzer Relationship is denoted by
an entry that has no Parent Asset.
It is not possible to manually delete a single element of a Change Impact
Analyzer Relationship. Since the Relationships form a linked-list, permitting
the deletion of elements could cause the structure to break, resulting in data
corruption.
When WorldView Managed Objects are imported, pdm_nsmimp will delete
existing Change Impact Analyzer Relationships with the same name if they
already exist.
Recursion Depth
To prevent a possible endless recursion loop when exporting assets to
Unicenter NSM WorldView, the child level depth is tracked. This endless loop
situation can occur when asset A is a child of asset B, and asset B is a child of
asset A. Unicenter Service Desk allows this cyclical relationship, however
WorldView does not. By default, the export is canceled if the depth exceeds
99 levels. To change this level, create the NX_UBM_RECURSION_LIMIT
variable in the NX.env file on the Unicenter Service Desk server and set it to
an integer value.
Change Impact Analyzer Implementation 169
Implementation Notes
NSM Timeout Value
Because the Unicenter NSM Business Management integration between
Unicenter Service Desk and Unicenter NSM could potentially span the world, a
timeout is used when Unicenter Service Desk communicates with Unicenter
NSM. By default, Unicenter Service Desk waits 10 seconds for a response from
the pdm_uspnsm_nxd daemon before generating an error. Sometimes, if the
Unicenter Service Desk and Unicenter NSM systems are far apart or the
Unicenter NSM system is busy, this timeout value could be insufficient. To
change this value, create the NX_UBM_NSM_TIMEOUT variable in the NX.env
file on the Unicenter Service Desk server and set it to an integer value
between 1 and 1000. Then, recycle the Unicenter Service Desk server.
170 Implementation Guide
Implementation Notes
Maintaining Change Impact Analyzer Relationships in Service Desk
The following steps summarize the process for maintaining Change Impact
Analyzer Relationships in Unicenter Service Desk:
1.
Create all the necessary assets in Unicenter Service Desk that you want to
use in WorldView. If no Change Impact Analyzer repository is assigned,
the default used during export will be assigned.
2.
Ensure that an asset exists in Unicenter Service Desk with the name that
you want to use for the top-level managed object in WorldView. This
object will be created in the WorldView Managed Objects folder. All other
members of the relationship will be created below this asset. Everything
that is to be represented in WorldView must exist as an asset in
Unicenter Service Desk.
3.
Create the first Change Impact Analyzer relationship record. The top-level
object created in WorldView will be labeled with the name of the child
asset in this relationship record. This can be referred to as the top level
asset. The symbol of the relationship record should match the name of this
top level asset. There should be no parent asset in this Change Impact
Analyzer relationship record. The absence of a parent asset in a Change
Impact Analyzer record signifies the beginning of the relationship structure
to Change Impact Analyzer.
4.
Create Change Impact Analyzer relationship records to represent
relationships between the assets that are subordinate to the asset from
the top-level asset. When these assets are exported to WorldView, they
will be placed inside the object created from the top-level asset. Be sure to
make the symbol of each Change Impact Analyzer Relationship Record the
same as in the previous step. This is how Change Impact Analyzer knows
which records form a relationship. The parent asset of all these records will
be the top-level asset. The child assets of all these records will be the
assets that should be placed below the top-level asset.
5.
Create the next level of the hierarchy. Create Change Impact Analyzer
relationship records to represent the assets that are subordinate to the
assets created in the previous step. Be sure to make the symbol of each
Change Impact Analyzer Relationship Record the same as in the previous
step. The parent asset in these records represents the managed objects
that will contain the assets. Repeat this procedure for all remaining levels
of the hierarchy that you want to represent.
6.
You will need to create Change Impact Analyzer Relationship records for all
assets. Only the assets defined as child assets will be exported when
exporting Change Impact Analyzer Relationships. This operation will not
search asset parent/child relationships. The parent Asset of a relationship
is used to place the child asset in the appropriate place in WorldView.
7.
Finally export the relationship to NSM.
Change Impact Analyzer Implementation 171
Chapter 9: Client Installation (Windows)
This chapter explains how to install and configure the Unicenter Service Desk
client on a Windows system.
Earlier versions of the Unicenter Service Desk interface will not connect to a
Unicenter Service Desk r11 server.
Note: If your enterprise has purchased and installed Unicenter Software
Delivery (see page 233), you can install and configure the Unicenter Service
Desk client remotely.
Phase 1: Review System Requirements
Before you begin the installation process, review the Readme included on your
installation DVD to determine whether your environment meets the
documented software and hardware requirements. You should also review the
Installation Considerations section of the Readme.
Phase 2: Install the Client
In this phase, you install a Unicenter Service Desk client on a Windows client
machine. You can install the client in one of the following ways:
„
On a local drive from the Unicenter Service Desk client installation media.
„
From a network drive
„
Using the Silent Install feature
„
Using Unicenter Software Delivery (as explained in the appendix “Using
Unicenter Software Delivery to Install and Configure Windows Clients”)
Client Installation (Windows) 173
Phase 2: Install the Client
Install on a Local Drive
Note: This procedure is for installing from the Unicenter Service Desk client
installation media. You can also install the client form a network drive (see
page 175) and install silently (see page 177), without user interaction.
To install a Unicenter Service Desk client on a local drive, follow these steps:
1.
Log on to the Windows workstation where you will install the Unicenter
Service Desk client, and insert the Unicenter Service Desk Windows client
installation media in the CD/DVD-ROM drive.
The installation process should begin automatically. If it does not,
double-click the CD/DVD-ROM drive letter in My Computer, then doubleclick setup.exe and follow the on-screen prompts.
2.
After you accept the license agreement, the installation wizard initially
prompts you to select the location for the server and the shared
components and then to select a typical or a custom installation. Click
either option for a brief description.
Typical
Installs the features needed to run the client. The installation process
is automatic and self-explanatory.
Custom
Lets you select the features (see page 13) you want to install.
Select the type of installation and click Next.
The Select Features page appears.
3.
Select the components to install. If you have a question about a particular
component, highlight it to display a brief description. The following options
require additional setup and configuration, as indicated:
Reporting
Select this option to use Microsoft Access or Seagate Crystal reporting
features to report on your Unicenter Service Desk database. If you
install one of these reporting programs, you must install the
corresponding runtime option unless you already have a full version of
Microsoft Access or Seagate Crystal Reports installed. Otherwise, you
will be unable to run the reports. For more information if you select
either of these options, see Phase 4: Configure Reports and Screen
Painter in this chapter.
Screen Painter
Select this option to use Screen Painter (see page 179) to customize
the forms used by the Web Client.
174 Implementation Guide
Phase 2: Install the Client
Web Screen Painter
Select this option to use Web Screen Painter (see page 179) to
customize your Web Interface.
4.
After selecting the appropriate components for your installation in Step 3,
click Next.
5.
When prompted to Select the Program Folder select the location where you
want to add the program icons and click Next.
The installation process begins.
6.
When prompted about whether to configure Unicenter Service Desk, select
Yes to configure now or No to configure later.
Important! Whether you configure Unicenter Service Desk now or later is
up to you. Any time you run the setup program, you must configure
Unicenter Service Desk before you can use it. For more information, see
Phase 3: Configure the Client in this chapter.
The installation process adds a Unicenter Service Desk menu to the Windows
Start, Programs menu. It contains commands to access product
documentation and the components you chose to install.
Install from a Network Drive
Installing the Unicenter Service Desk client from a network drive is a two-step
process:
„
Load the software disk images on a network drive
„
Install the software from the network drive
Note: Before loading the software to the network drive determine whether you
sufficient disk space on the network drive after comparing the image on the
installation media. You may want to use a comparison utility.
Step 1: Load the Software Disk Images on a Network Drive
To load disk images for a network installation:
1.
Create a directory named usdinst on a shared network drive as follows:
F:\SHARE>md usdinst
2.
Copy the Unicenter Service Desk Windows client installation media to the
network subdirectory as follows (where x is your CD/DVD-ROM drive):
F:\SHARE\usdinst>copy x:\*.*
The software is now available for users to install from the network.
Client Installation (Windows) 175
Phase 2: Install the Client
Step 2: Installing the Software from a Network Drive
To install the Unicenter Service Desk client from network disk images, follow
these steps:
1.
Select Run from the Windows Start menu.
The Run dialog appears.
2.
Enter the following in the Run dialog, and click OK:
F:\SHARE\usdinst\setup.exe
3.
176 Implementation Guide
Follow the procedure in Install on a Local Drive, starting with Step 2.
Alternatively, follow the procedure in Install Silently to perform a silent
install.
Phase 2: Install the Client
Install Silently
You can install the Unicenter Service Desk client “silently,” without requiring
any user input. The silent install is useful for implementing software delivery
or otherwise installing Unicenter Service Desk as part of a batch process.
To perform a silent install, you can use setup.exe with the –r option set to
install a client, as follows:
setup_dir\winclnt.32\disk1\setup -r
Using the –r option creates a file named setup.iss in your WINNT directory and
records in it all the choices you make during the installation process.
Note: A setup.iss file containing default settings resides at
setup_dir\winclnt.32\disk1\.
You can use the setup.iss file as input to install any client by issuing the
following command:
setup_dir\setup /s /f1"iss_file" /f2"log_file"
where:
setup_dir
Specifies the directory where setup.exe resides. This may be a location on
your CD/DVD-ROM drive or on a network drive, if you have copied the
installation files to a shared drive on your network.
iss_file
Specifies the full path, including the name of the setup.iss file to use
during installation.
log_file
Specifies the full path, including the name of a log file where the
installation process can log information.
You can run this command from a batch file, by using the Run command on
the Windows Start menu, or from the Command Prompt.
Important! After performing a silent install, you must configure Unicenter
Service Desk before you can use it. For more information, see Phase 3:
Configure the Client.
Client Installation (Windows) 177
Phase 3: Configure the Client
Phase 3: Configure the Client
Note: If your enterprise has purchased and installed Unicenter Software
Delivery, you can configure the Unicenter Service Desk client remotely. For
more information, see the appendix “Using Unicenter Software Delivery to
Install and Configure Windows Clients”.
Configuring the Unicenter Service Desk client consists of verifying and
completing fields on the Configuration window to define the information
necessary to perform the configuration. Selection of a Typical or Custom
installation prompts you to specify whether to run configuration:
„
If you answer Yes to the configure prompt, the Configuration window
appears automatically when installation finishes.
„
If you answered No to the configure prompt and want to configure now,
select Configuration from the Unicenter Service Desk menu (accessible
from the Windows Start, Programs menu) to open the Configuration
dialog.
To configure the client, follow these steps:
1.
Enter data in the appropriate fields on Configuration dialog, and click OK.
Click help to view information about the fields on the Configuration dialog.
2.
If you performed the configuration as part of the installation process, click
Finish to complete the installation process.
The Unicenter Service Desk client is now configured on your workstation.
178 Implementation Guide
Phase 4: Configure Reports and Screen Painter
Phase 4: Configure Reports and Screen Painter
If you installed the Reports or Screen Painter options, you must follow the
steps in the appropriate section of this phase, depending on the type of
database your Unicenter Service Desk server uses and the types of reports
you installed. You need only complete the procedures in the sections that
apply to your installation.
After you complete the appropriate sections, you can run any of the Seagate
Crystal or Microsoft Access reports that you installed. For more information,
see the chapter “Generating Reports” in the Administrator Guide. You can also
use the Screen Painter. For more information, see the chapter “Using Screen
Painter” in the Modification Guide.
Section 1: Configure Screen Painter or Seagate Crystal Reports with Ingres
If you use an Ingres database and have selected the Screen Painter or the
Seagate Crystal Reports option, you must configure an Ingres virtual node,
while an ODBC data source to access the Unicenter Service Desk database is
created automatically.
Client Installation (Windows) 179
Phase 4: Configure Reports and Screen Painter
Step 1: Configure the Database Client Using the Ingres Network Utility
To use the Ingres Network Utility to configure the database client, follow these
steps:
1.
Select Programs, Computer Associates, Ingres (EI), Ingres Service
Manager from the Windows Start menu.
The Ingres Service Manager window appears.
2.
If Ingres is not already running, click Start.
The stoplight changes from red to green, indicating that Ingres is up and
running.
3.
Click Exit to close this window.
4.
Select Programs, Computer Associates, Ingres, Ingres Network Utility from
the Windows Start menu.
The Ingres Network Utility window appears.
5.
Select Add from the Node menu.
The Add Virtual Node Definition dialog appears.
6.
Enter data in the following fields. Contact your system administrator for
specific information.
Virtual Node
Specifies the name you will use when you configure the ODBC data
source in Step 5 under Step 2: Configure the ODBC Data Source. Enter
Help_Desk in this field.
User Name
Specifies the user ID that you use to log into the Ingres database.
Password
Specifies the password associated with the user ID you entered in the
User Name field.
Confirm Password
Confirms the password that you entered in the Password field.
Node
Specifies the name or IP address of the database server. You must be
able to ping this server from your PC.
Important! By default, this field's value is the same as the virtual
node name. You must change it to match the name or IP address of
the database server machine. The database server must be up and
running on this machine or the node test in Step 8 will fail.
180 Implementation Guide
Phase 4: Configure Reports and Screen Painter
Protocol
Specifies a communications protocol that you select from the dropdown list. In most cases, you can use the default selection, wintcp. If
you have a question about which protocol to use, contact your system
administrator.
Listen Address
Specifies the listen address for the database server. If you installed
the Embedded Ingres option, enter EI.
If you are using an existing Ingres installation, you can typically enter
the default Ingres listen address (II); however, the listen address
may have been changed. To determine the listen address, enter the
following command at the command prompt to display the correct
value, or contact your system administrator:
ingprenv II_INSTALLATION
After entering these values, the Add Virtual Node Definition dialog
resembles the following illustration:
7.
Click OK to save the configuration settings, close the Add Virtual Node
Definition dialog, and return to the Ingres Network Utility window.
8.
Select the Help_Desk virtual node, then select Test Node from the Node
menu.
A message indicates whether the node test was successful.
9.
If the node test fails, click OK to close the error message, then select Alter
from the Node menu to modify the virtual node definition (contact your
system administrator if you need help understanding the correct values to
enter). Repeat Steps 6-8 until the test is successful.
10. When the node test is successful, select Exit from the File menu to close
the Ingres Network Utility window.
Client Installation (Windows) 181
Phase 4: Configure Reports and Screen Painter
Step 2: Configure the ODBC Data Source (Screen Painter or Seagate Crystal Reports)
To configure the ODBC data source, follow these steps:
1.
Select Settings, Control Panel, Administrative Tools, Data Sources (ODBC)
from the Windows Start menu.
The ODBC Data Source Administrator appears:
2.
Click one of the following tabs:
„
„
The User DSN tab if only the user currently logged in will use the
connection.
The System DNS tab if all users of the PC will use the connection.
3.
Click Add to create a new data source.
4.
Select the Ingres driver, and click Finish.
The Ingres ODBC Administrator window appears.
5.
Enter data in the following fields. Contact your system administrator for
specific information.
Data Source
Specifies the data source. Enter ServiceIT as the name for this data
source.
Description
Describes the data source, for example, Unicenter Service Desk.
Vnode
Specifies the name of the virtual node that you created in Step 6
under Step 1: Configure the Database Client Using the Ingres Network
Utility. Select Help_Desk from the drop-down list.
Type
Specifies the database type. Use the default value (INGRES).
Database
Specifies the name of the Unicenter Service Desk database. This is the
same name you entered in the Database Name field on the Unicenter
Service Desk Server Configuration window. You can typically enter the
default database name (mdb).
Prompt User ID and Password
Prompts the user for a user ID and password instead of using the ones
specified for the vnode. Clear this option if you always want to connect
using the user ID and password defined for the vnode.
Group
Specifies the Table group. Enter Service_desk_ro_group as the
name of this group.
182 Implementation Guide
Phase 4: Configure Reports and Screen Painter
After entering these values, the Ingres ODBC Administrator window
resembles the following illustration:
6.
Click Apply, and click Test.
Correct any errors before continuing.
7.
When the test is successful, click OK repeatedly to close the remaining
open windows.
Client Installation (Windows) 183
Phase 4: Configure Reports and Screen Painter
Step 3: Configure the ODBC Connection String
To complete ODBC configuration, you must specify the values with which
Seagate Crystal Reports will connect to the ODBC data source (called the
ODBC connection string).
To specify the values and complete the configuration, follow these steps:
1.
Select Reporting, Service Desk Reporting (Crystal Reports) from the
Service Desk menu.
The Service Desk Reporting (Crystal) window appears.
2.
Click Configure.
The Database Link Configuration dialog appears:
3.
Enter data in the following fields. Contact your system administrator for
specific information.
Data Source Name
Specifies the value entered in the Data Source field in Step 5 under
Step 2: Configure the ODBC Data Source. Enter ServiceIT if you used
the suggested value.
Database Name
Specifies the value entered in the Database field in Step 5 under Step
2: Configure the ODBC Data Source. Enter mdb if you used the
suggested value.
User ID
Specifies the value entered in the User Name field in Step 6 under
Step 1: Configure the Database Client Using the Ingres Network
Utility.
Password
Specified the value entered in the Password field in Step 6 under Step
1: Configure the Database Client Using the Ingres Network Utility.
4.
Click Close and Save.
You can select a report and click View Report to view as many reports as
you want, and click Cancel when you finish.
184 Implementation Guide
Phase 4: Configure Reports and Screen Painter
Section 2: Configure Microsoft Access Reports with Ingres
If you are using an Ingres database and have selected Microsoft Access
Reports, you must configure an Ingres virtual node, while the ODBC data
source to access the Unicenter Service Desk database is created automatically.
Step 1: Configure the Database Client (Ingres)
To configure the database client, follow these steps:
1.
Select Programs, Computer Associates, Ingres (EI), Ingres Service
Manager from the Windows Start menu.
The Ingres Service Manager window appears:
2.
If Ingres is not already running, click Start.
The stoplight changes from red to green, indicating that Ingres is up and
running.
3.
Click Exit to close this window.
4.
Select Programs, Computer Associates, Unicenter, Service Desk,
Reporting, Service Desk Reporting (MS Access) from the Windows Start
menu.
The Report Selection window appears.
5.
Click Configure.
The Database Link Configuration dialog appears:
Client Installation (Windows) 185
Phase 4: Configure Reports and Screen Painter
6.
Enter data in the following fields. Contact your system administrator for
specific information.
Data Source
Defines the ServiceIT data source that you created in Section 1:
Configure Screen Painter or Seagate Crystal Reports with Ingres from
the drop-down list, if you have already configured Seagate Crystal
Reports to run with Ingres. Otherwise, leave this field blank for now—
you will configure a data source and select it in Step 2: Configure the
ODBC Data Source.
Database
Defines the name of the Unicenter Service Desk database. Enter the
same name you entered in the Database Name field on the Unicenter
Service Desk Server Configuration window. You can typically enter the
default database name (mdb).
Table Owner
Defines the user ID of the owner of the tables in the Unicenter Service
Desk database. Unless otherwise instructed by your system
administrator, enter mdbadmin in this field.
User ID
Defines the user ID used to log into the Ingres database.
Password
Defines the password associated with the user ID you entered in the
User ID field.
Server Name
Defines the name or IP address of the database server. You must be
able to ping this server from your PC.
Important! The database server must be up and running on this
machine, otherwise, when you test the data source later in the
procedure, it will fail.
Listen Address
Specifies the listen address for the database server. If you installed
the Embedded Ingres option, enter EI.
If you are using an existing Ingres installation, you can enter the
default Ingres listen address (II); however, the listen address may
have been changed. To determine the listen address, enter the
following command at the command prompt to display the correct
value, or contact your system administrator:
ingprenv II_INSTALLATION
7.
186 Implementation Guide
Do one of the following:
Phase 4: Configure Reports and Screen Painter
„
„
If you have already configured Seagate Crystal Reports to run with
Ingres and selected your data source in the previous step, continue
with Step 3: Test the Data Source and Link the Tables.
If you have not configured Seagate Crystal Reports to run with Ingres
and selected that data source in the previous step, continue with Step
2: Configure the ODBC Data Source.
Client Installation (Windows) 187
Phase 4: Configure Reports and Screen Painter
Step 2: Configure the ODBC Data Source (Microsoft Access Reports)
Follow these steps only if you have not already configured an Ingres data
source for use with Seagate Crystal Reports:
To configure the ODBC data source, follow these steps:
1.
On the Database Link Configuration window, click Configure Ingres Net to
create an Ingres virtual node named Help_Desk, and press Enter
whenever you are prompted during this process.
When the process finishes, the Database Link Configuration window
displays. Use the vnode name you created when you configure the ODBC
driver in Step 6 of this procedure.
2.
Click Data Source Configure.
The ODBC Data Source Administrator dialog appears:
3.
Click one of the following tabs:
„
„
The User DSN tab if only the user currently logged in will use the
connection.
The System DNS tab if all users of the PC will use the ODBC
connection.
4.
Click Add to create a new data source.
5.
Select the Ingres driver, and click Finish.
The Ingres ODBC Administrator window appears.
6.
Enter data in the following fields. Contact your system administrator for
specific information.
Data Source
Specifies the data source. Enter ServiceIT as the name for this data
source.
Description
Describes the data source, for example, Unicenter Service Desk.
Vnode
Specifies the name of the virtual node that you created in Step 6
under Step 1: Configure the Database Client. Select Help_Desk from
the drop-down list.
Type
Specifies the type of the database. Use the default value (INGRES).
188 Implementation Guide
Phase 4: Configure Reports and Screen Painter
Database
Specifies the name of the Unicenter Service Desk database. This is the
same value you entered in the Database Name field on the Unicenter
Service Desk Server Configuration window. You can typically enter the
default database name (mdb). However, the database name may
have been changed. Contact your system administrator for the correct
name.
Prompt User ID and Password
Prompts the user for a user ID and password instead of using the ones
specified for the vnode. Clear this option if you always want to connect
using the user ID and password defined for the vnode.
After entering these values, the Ingres ODBC Administrator window
resembles the following illustration:
7.
Click Apply, and click Test.
Correct any errors before continuing.
8.
When the test is successful, click OK repeatedly until the Database Link
Configuration window displays.
9.
Select Help_Desk from the Data Source drop-down list.
All other fields should contain the values you previously entered.
10. Continue with Step 3: Test the Data Source and Link the Tables.
Client Installation (Windows) 189
Phase 4: Configure Reports and Screen Painter
Step 3: Test the Data Source and Link the Tables
To access the data in the remote database, you must first test the data
source, then create a link to each of the tables and views you want to use. A
link lets you access live data instead of replicated data.
To test the data source and link the tables, follow these steps:
1.
From the Database Link Configuration window, click Test Data Source to
test the connectivity of the data source you choose.
A message indicates whether the ODBC connection test was successful.
2.
If the ODBC connection test fails, click OK to close the error message, then
review the ODBC data source configuration settings for possible errors
(contact your system administrator for the correct values).
3.
Repeat Steps 1 and 2 until the ODBC connection test is successful, and
click OK to return to the Database Link Configuration window.
The Test Status should now read “Tested Successfully.”
4.
If you have already installed the database views as described in the
chapter “Report Generation” in the Administrator Guide, you can link the
views when you link the tables by selecting the Link Views check box.
Note: Audit logging must be turned on to use the Link Views option. For
more information, see the online help and the chapter “Control System
Behavior” in the Administrator Guide.
5.
To link the tables (and views if you have chosen to do so), click Link
Tables on the Database Link Configuration window.
This links the tables needed for reporting. When prompted that the tables
have been successfully linked, click OK. The Link Status should now read
“All Tables Successfully Linked .”
Note: Links to tables persist until you delete or link the table to a different
data source. You cannot link to the tables until the database network
clients and ODBC drivers are correctly configured, as outlined in the
previous steps.
6.
190 Implementation Guide
Click Close to exit the Database Link Configuration window.
Phase 5: Start the Client Interface
Phase 5: Start the Client Interface
Unicenter Service Desk r11 has two client interfaces. Before you can use either
interface, you must ensure that the Unicenter Service Desk Daemon Server
services and the database server are started.
Important! In Unicenter Service Desk r11 the Web Client is the only interface
that has all the administrative functions. The Web Client eliminates the need
to install the Java desktop application. Moreover, interface of earlier versions
of Unicenter Service Desk will not connect to the r11 servers.
If you have configured a secondary server (for example, if you have the web
interface installed on a web server that resides on a different machine than
your primary Unicenter Service Desk server), the Unicenter Service Desk
Remote Daemon Proctor service must be running before you start the primary
server service. To start the proctor on the secondary server, follow these
steps:
1.
Select Settings, Control Panel from the Windows Start menu.
The Control Panel window appears.
2.
Double-click Administrative Tools.
The Administrative Tools window appears.
3.
Double-click Services.
The Services window appears.
4.
Right-click Unicenter Service Desk Remote Daemon Proctor and click Start
from the shortcut menu.
The Unicenter Service Desk Remote Daemon Proctor service starts.
When all the necessary servers are started, select Web Client from the
Unicenter Service Desk menu (accessible from the Start, Programs menu).
Client Installation (Windows) 191
Chapter 10: Client Installation (Linux)
This chapter explains how to install and configure the Unicenter Service Desk
client on a Linux system.
Note: You cannot upgrade from a Service Desk 6.0 client to a Service Desk
r11 client. You must uninstall the Service Desk 6.0 client before attempting to
install the Unicenter Service Desk r11 client. Also earlier versions of the
Service Desk Java Client will not connect to r11 Unicenter Service Desk
Server.
Phase 1: Review System Requirements
Before you begin the installation process, review the Readme included on
your installation media to determine whether your environment meets the
documented software and hardware requirements.
Note: The client installation adds links to the /usr/bin directory for Unicenter
Service Desk scripts.
Phase 2: Install the Client
In this phase, you install a Unicenter Service Desk client on a workstation
running Linux.
1.
Log on as the root user using an xTerm session and invoke the ./install.sh
script located on the root of the installation media.
2.
The Unicenter Service Desk welcome screen appears. Click next.
3.
After you accept the license agreement, the installation wizard prompts
you to select the Installation directory and for the Default User ID. To
accept the defaults, click Next. Otherwise, enter the information as
requested, and then Click Next.
The Summary dialog appears.
Client Installation (Linux) 193
Phase 3: Configure the Client
Phase 3: Configure the Client
Configuring the Unicenter Service Desk client consists of verifying and
completing fields on the Configuration dialog to define the information
necessary to complete the configuration.
To configure the client, follow these steps:
1.
2.
Complete the General Settings options in the right panel by either
selecting or entering the details for the following as appropriate:
„
Configuration Type
„
Primary Server Node
„
Object Manager Name
„
Configure/etc/Service
„
Local Host Name
„
Slump Socket Port
Once you are satisfied with the settings, click Next.
The System Accounts options appear.
3.
Enter the Default User ID and click Finish.
The client configuration process starts.
Note: To run configuration at a later point execute the pdm_configure script.
Phase 4: Start the Java Client Interfaces
To start the Unicenter Service Desk interface execute pdm_client from the
command line.
194 Implementation Guide
Appendix A: Service Desk and
Knowledge Tools Migration
This appendix contains information you may need to migrate data from
Unicenter ServicePlus Service Desk 6.0 to Unicenter Service Desk r11.
Before Migration
You can only migrate to Unicenter Service Desk R11 from Unicenter
ServicePlus Service Desk 6.0. If you wish to upgrade to R11 from an earlier
version, you will need to first upgrade to Unicenter ServicePlus Service Desk
6.0 and then to Unicenter Service Desk r11.
If you need to upgrade from an earlier version of Service Desk to Service Desk
6.0 and then migrate to Service Desk r11 on a Windows 2000 Server, the
WSCRIPT.EXE needs to be upgraded to the latest version, before running
migration.
Note: Migration to Unicenter Service Desk r11 is currently supported only for
MS SQL and Ingres databases. Review the Unicenter Service Desk Migration
Concerns section before running migration.
Install r11 on the 6.0 System
This would be a simple migration process. Unicenter Service Desk r11
installation will detect Unicenter ServicePlus Service Desk 6.0 and will
launch an upgrade installation wizard.
Install r11 on system that does not have 6.0
If the system that you want to install Unicenter Service Desk r11 is
different from the system where Unicenter ServicePlus Service Desk 6.0
then you need to do the following:
1.
Install Unicenter ServicePlus Service Desk 6.0 on new system.
2.
If there are any schema modifications to the earlier Unicenter
ServicePlus Service Desk 6.0 system, implement the same changes on
Unicenter Service Desk 6.0 which is installed on the new system.
3.
Run configuration and point to either the production Unicenter
ServicePlus Service Desk 6.0 Database or a copy of one located
elsewhere.
4.
Install Service Desk and follow the procedure in this chapter.
Service Desk and Knowledge Tools Migration 195
Before Migration
Clean-Up the Database
Note: Before performing any table maintenance, always backup the data
before you start. Use the utilities provided with your DBMS or use the
pdm_extract or pdm_backup commands. The samples shown here are purely
examples. You need to determine if they are appropriate for your
environment.
The migration process takes data from your current database and inserts it
into the new MDB database. It will run faster with less data. Take the time
now to do a few simple tasks to remove old, obsolete data from your
database. Consider decreasing the amount of data in the following tables
which tend to get larger over time:
Requests, Change Orders and Issues
The pdm_crarcpurge utility identifies inactive ticket data older than a
certain age and archives and purges the data from the Unicenter
ServicePlus Service Desk database. For more information, see the online
help.
Notification Log History
The pdm_purge utility completely removes records older than the specified
time from the notification log file. These log file records are not archived
and cannot be recovered. For more information, see the online help.
Audit Log
If you have enabled any of the audit logging options in Options Manager,
consider removing old entries. First use the pdm_extract utility to select
the records that you want to remove and save them in a file. For example,
to select all Audit_Log records that are older than August 1, 2005 use the
following commands:
pdm_extract –f “select * from Audit_Log where change_date < DATE ‘2005-08-01’ ” > audlog_old.dat
Then use the pdm_load utility with the –r option to remove them:
pdm_load –r –f audlog_old.dat
Service Type Events
If you are using the Save History feature of your Service Type Events,
completed event records are left in the database. Consider deleting them.
Completed events will have status_flag=1. Canceled events will have
status_flag=0. For example, to remove all events that are in complete
status use the following commands:
pdm_extract -f "select * from Attached_Events where status_flag=1" > atev_old.dat
Then use the pdm_load utility with the –r option to remove them:
pdm_load –r –f atev_old.dat
196 Implementation Guide
Before Migration
Knowledge
You need not remove old Document FAQ Rating/Voting data or Audit data.
Parameters in the Knowledge Tools Migration dialog allow you to specify
the number of days' worth of data that should be retained.
Surveys
„
„
Survey response data is stored in the following tables:
–
Survey
–
Survey_Question
–
Survey_Answer
You can use the pdm_extract / pdm_load command combination, as
shown in the Audit_Log example above, to extract and remove records
from these tables. There is a small chance that some orphan records
could be left in the database if the processing of the received survey
spanned midnight. This should have no impact.
For example, to remove all the Survey records that are older than
September 2, 2005, use the following commands in this order:
pdm_extract -f "select * from Survey where last_mod_dt < DATE '2005-09-02' " > survey_old.dat
pdm_load -r -f survey_old.dat
pdm_extract -f "select * from Survey_Question where last_mod_dt < DATE '2005-09-02' " >
survey_question_old.dat
pdm_load -r -f survey_question_old.dat
pdm_extract -f "select * from Survey_Answer where last_mod_dt < DATE '2005-09-02' " >
survey_answer_old.dat
pdm_load -r -f survey_answer_old.dat
Service Desk and Knowledge Tools Migration 197
Run Service Desk Migration
Run Service Desk Migration
This section describes the migration process for SQl or Ingres database from
Unicenter Service Desk 6.0 to Unicenter Service Desk r11. Unless stated
otherwise, you must run all procedures on the primary server and on any
secondary servers.
Follow the Unicenter Service Desk installation procedure for your operating
environment as explained in this guide. The process detects that this is an
upgrade installation, backs up all files to the $NX_ROOT/migrate/tor11/prer11
directory, and installs new files.
When installation finishes, migration wizard is launched automatically.
Additionally, you can bring up the migration wizard by running the following
command:
Windows
NX_ROOT\bin\migrate_to_r11.vbs
Linux
NX_ROOT\bin\migrate_to_r11.sh
198 Implementation Guide
Run Service Desk Migration
Migration Interview
Before migration a number of queries are performed regarding the database
connectivity information for both the source and target databases. The Ingres
connectivity is accessed through created Ingres vnodes based on the
information supplied during the interviewing.
To complete the migration interview, follow these steps:
1.
Click Next on the Unicenter Service Desk Migration Wizard Welcome
window.
The Source Connectivity window appears.
Service Desk and Knowledge Tools Migration 199
Run Service Desk Migration
2.
Enter the source database details and click next.
The Target Connectivity window appears.
200 Implementation Guide
Run Service Desk Migration
Note: Use the OS logged in user name and password as the Target
Database (Ingres) user name and password.
3.
Enter the target database details and click next.
The Tomcat Port window appears.
4.
Enter the port number and click next.
Note: Tomcat Port is used for attachment document repository servlet
port information. Specify the same Tomcat Port number when asked
during the configuration that you specified during the migration process. If
they are different then you edit the port number for the Document
Repository after configuration in order for it to be accessible for use.
The Check Prerequisites window appears, which validates Database
Connectivity and API registration based on the information provided in the
previous steps.
At this stage a check in also done on the disk space and the memory. The
wizard prompts a Recommended Disk Space Window.
5.
Click Browse to select a new location or click OK.
The Knowledge Tool Migration inquire is launched.
Note: The Knowledge Tools migration is brought up automatically by the
migration wizard, if it is on the r11 system. Otherwise the files output from
the Knowledge Tools Migration (see page 204) should be moved to the r11
system.
Service Desk and Knowledge Tools Migration 201
Run Service Desk Migration
6.
Click on Finish.
This completes the final configuration for the r11 settings and the actual
migration process starts.
Migration Process
Initially the migration wizard runs a validation to check the data sources to
determine its smooth progression. Once the validation is completed the
migration is done in four phases and the status window is updated as the
migration progresses. A migration.log file is created in $NX_ROOT/logs
directory.
Note: During migration you may see errors in the stdlog regarding recurring
animator missed firings. These errors are due to the fact that the system is
down during migration and are normal errors.
The user interface allows the user to start, stop and restart the migration.
However, when you stop the migration there are some places when the
process does not stop immediately, and runs until after a set of steps are
completed. The migration allows restart ability by recording each successful
step and phase within the migration.properties file.
Once the migration is done the wizard launches the Unicenter Service Desk
Configuration window. For more information about server configuration, see
Configure the Server for the appropriate platform.
If you need to re-run the Unicenter Service Desk migration you will not be
interviewed unless you rename the following files before running the migration
wizard:
„
$NX_ROOT\site\migration.properties
„
$NX_ROOT\Mig60ToR11\migration_phase1.properties
„
$NX_ROOT\Mig60ToR11\migration_phase3.properties
Note: If you need to re-run migration you will need a clean install of the
database.
202 Implementation Guide
Run Service Desk Migration
Phase 1: Extracting Data
In this phase the migration tool performs the following actions:
„
Extracts all the rows from Source database into xml files. The extraction
includes all the modifications: the additional columns in existing tables and
the new tables that have been created and defined to Unicenter Service
Desk.
„
Validates a new schema and make modifications to the r11 MDB.
„
Adds new columns and tables, if necessary.
Phase 2: Converting Data
In this phase the migration tool performs the following actions:
„
Reads and re-arranges information from the XML files, generated in
Phase1, based on R11 database structures.
„
Resets all necessary foreign keys as primary keys that have changed in
the r11 MDB.
„
Replaces ID's used in 6.0 database, when necessary, with UUID's used in
the R11 database.
Once these changes are made the tool generates the XML data files.
Phase 3: Inserting Data
In this phase the XML data file generated in Phase 2 is parsed, and the data is
loaded all of the data into the r11 MDB.
Phase 4: Loading Scripts
In this phase the required scripts are loaded and updated to the r11 system.
Service Desk and Knowledge Tools Migration 203
Knowledge Tools Migration
Knowledge Tools Migration
Knowledge Tools migration components are designed to be deployable to a
Knowledge Tools 6.0 system and run remotely from the Unicenter Service
Desk migration, or run locally to the Unicenter Service Desk migration.
Knowledge Tools migration information is also gathered during the interview
stage. If the Knowledge Tools migration is local it is brought up automatically
by the migration wizard.
204 Implementation Guide
Knowledge Tools Migration
Using Ingres as Knowledge Tools Database
If the Knowledge Tools database is Ingres then perform the following steps
before starting the Knowledge Tools migration utility:
1.
Create the following directory structure:
=> %NX_ROOT%\migrate\tor11\prer11
2.
Create a text file named "NX.env".
3.
Edit the NX.env text file and add the following line:
=> "@II_SYSTEM='Your base ingres 2.6 location goes here'
(example: "@II_SYSTEM=C:/IngresII")
4.
Run the migration.
Service Desk and Knowledge Tools Migration 205
Knowledge Tools Migration
Knowledge Tools Migration from a Remote Machine
To migrate Knowledge Tools 6.0, in the remote situation, follow these steps:
1.
Run the migration wizard on the Unicenter Service Desk r11 server.
2.
Complete the Knowledge Tools interview, which will instruct you where to
place the Knowledge Tools migration files.
3.
Copy the KTMig60ToR11 directory from the Unicenter Service Desk r11
installation media to the Knowledge Tools 6.0 server.
4.
Register the CRMR11ENU.dll located in KTMig60ToR11 directory using the
regsvr32 command. For ex: If the folder in step 1 is located under the C:\
drive, type the following command:
regsvr32 C:\KTMig60ToR11\CRMR11ENU.dll
5.
Double click on the R11Migration .exe located in the KTMig60ToR11
directory.
6.
Enter the Server, Database, Login ID and Password details under Data
Source.
Note: The login ID and Password of the database owner must be given for
successful Migration.
7.
Enter the details in the following, as appropriate:
„
„
8.
Migrate document FAQ rating/voting data for the last xxxxx days
refers to the bu_trans table.
Migrate audit data for the last xxxxx days refer to the ci_asked_ques,
ci_audit_trails and ci_audit_trail_data tables.
Select the following:
„
„
"Remove the KT 6.0 shortcuts" and "Redirect the KT 6.0 urls to the
new installation at" and enter the url for the new Service Desk
installation to which the KT 6.0 urls should be redirected after
migration.
"Migrate the user's passwords to the default PIN field for users with"
options as appropriate to migrate KT 6.0 user passwords to r11.
Note: This option is available only for KT stand alone migration.
9.
Click Start
The migration process begins.
10. Upon completion, copy the KTMigrationFiles folder to the destination
indicated during the Knowledge Tools interview.
11. Complete the Unicenter Service Desk/Knowledge Tools r11 migration.
Once the Knowledge tools and the Unicenter Service Desk migrations are
completed run the following Knowledge Tools reindexing command:
NX_ROOT/bin/pdm_k_reindex.exe
206 Implementation Guide
Knowledge Tools Migration
Stand Alone Knowledge Tools Migration
For Migration of non-integrated Knowledge Tools to Unicenter Service Desk
R11, follow these steps:
1.
Install and configure Service Desk r11 on the system. Restart the
machine.
2.
Confirm Unicenter Service Desk Server services are stopped, and Windows
Services manager is not up (required for Windows 2000).
3.
Manually invoke the migration utility from
$NX_ROOT\bin\migrate_to_r11.vbs.
4.
Follow the instructions in the Migration Wizard to complete the KT only
migration process.
Note: In some situations, the migration process may fail with a "Schema
Validation" error.
If the migration process fails, follow these steps:
1.
From the command line, run "pdm_configure -m". Wait 3 minutes for it to
complete (there will be no indication of completion).
2.
Manually invoke the migration utility from
$NX_ROOT\bin\migrate_to_r11.vbs.
3.
Follow the instructions in the Migration Wizard to restart the migration
process where it left off.
Service Desk and Knowledge Tools Migration 207
Knowledge Tools Migration
Knowledge Tools Migration Concerns
This section lists the Knowledge Tools migration concerns that you should be
aware of during migration:
1.
The errors that may occur during the extraction phase of Knowledge Tools
6.0 data into XML files are logged in MigrationKT.log. The log file is located
in the $NX_ROOT\Mig60ToR11\phase2_kt directory when Knowledge Tools
is on the same system as Unicenter Service Desk. The log file is located in
the Mig60ToR11\KTMigrationFiles directory, if Knowledge Tools (or the
Keyword Search) data is on a different system.
2.
If you cancel migration extraction while it is running, the process will run
to a checkpoint, record the log and then halt. This will allow for rollback if
the process is terminated catastrophically.
3.
The Knowledge Tools “CRM_CONTACTS" table is migrated in a Knowledge
Tools stand-alone migration, when Knowledge Tools is not integrated with
Unicenter Service Desk.
4.
After the Knowledge Tools migration is done, to enable the embedded
images inside documents you need to copy the KT 6.0 images library
directory, usually the UploadedImages directory, to
$NX_ROOT/bopcfg/www/wwwroot.
5.
The Knowledge Tools 6.0 administrator settings for Allow Users to Submit
Knowledge will not migrate to R11. Instead, the administrator can define
Allow Document Creation setting for each access type in the access type
form. The default value will be to allow for all access types.
6.
The Knowledge Tools 6.0 custom field names are not migrated to r11.
7.
The following two new tags have been added to the document template in
r11:
„
Related Tickets
„
Properties
If the default order of the tags has not been changed via the HTML editor
in 6.0 the migration will place the new tags between the Related
Categories and Comments tags. If the order of the tags has changed in
6.0, the new tags will be added at the end of the template after migration.
208 Implementation Guide
Change Impact Analyzer Migration
Change Impact Analyzer Migration
The configuration changes made with the pdm_edit utility are not migrated to
Unicenter Service Desk r11. Run pdm_edit to redo your configuration changes,
if you are not using the default configuration.
The following are the Change Impact Analyzer post-migration tasks:
1.
The configuration changes made to the Change Impact Analyzer daemon
are not migrated. Run pdm_edit to define the Change Impact Analyzer
daemon.
2.
If you have upgraded to NSM WorldView r11:
„
„
3.
Click the Change Repository Login button and reset the User-Id and
Password. Click Test Repository Login to verify the credentials and
update the real-time daemon cache.
If you are using NSM 3.x:
„
„
4.
Review the defined Logical Repositories. You may define a new
WorldView Logical Repository for the Change Impact Analyzer
integration to use. The Repository field and the NSM Credentials of the
Change Impact Analyzer Repository records must match the
WorldView Logical Repository definitions. These values are casesensitive.
Review the Repository fields of the Change Impact Analyzer Repository
records and verify that they match the hostname of the server hosting
NSM 3.x. These values are case-sensitive.
Click the Change Repository Login button and reset the User-Id and
Password. Then click Test Repository Login to verify the credentials
and update the real-time daemon cache.
Review the Asset Class – Change Impact Analyzer Class mappings. This is
especially important if you have upgraded NSM because class definitions
may have changed. Each Asset Class contains a field that allows you to
select a corresponding Change Impact Analyzer Class. You can set these
manually or use the pdm_nsmbmcls and pdm_nsmclass utilities. If you
use these utilities, review the nsmclsmap.dat file first.
Service Desk and Knowledge Tools Migration 209
Post Migration Steps
Post Migration Steps
Once the migration is completed, you may need to perform some or all of
these tasks:
Note: The Unicenter Service Desk Services should be running when you
perform these tasks.
1.
You need to register assets that were migrated from the Unicenter
ServicePlus Service Desk 6.0 system. Run the Unicenter Service Desk
configuration, pdm_configure. To register the assets run the
pdm_reg_assets -fv command.
This registration can be run with users accessing the system without
problems. Depending upon the number of assets migrated; the
registration process may take considerable amount of time. You can cancel
the process at any point and start it again, and it will restart registration
from where it last left off. If records are skipped during the first run
because the asset was being edited by another user, you can re-run the
registration process.
2.
If you are using Web Director in Unicenter ServicePlus Service Desk 6.0
you need to run pdm_edit to reset your Web Director parameters after
running migration for registration to pick up the skipped assets.
3.
If Shared File repositories existed on the database (for attachments), the
Administrator needs to update them based on the following guidelines
prior to accessing them for upload or download:
„
„
If the share resides on a server that runs Unicenter Service Desk r11,
then specify the local path to the physical directory in the Upload Path.
If the share resides on a server that does not run Unicenter Service
Desk r11, then it needs a dedicated (letter) drive mapping on a server
that runs Unicenter Service Desk r11. This permanent mapped path
should be specified as the Upload Path on the repository record. The
user will no longer need to map to the shared drive, only the server
will require access.
Note: Mapped drive repositories are not supported on WIN2003.
„
Unicenter Service Desk r11 does not support UNC file names. You
must manually update the repository record after the migration.
Note: Repositories defined on servers other than the Primary will have to
be validated after migration is completed. These servers should have a
secondary server set up on them. Repositories defined on the Primary
server will be set correctly.
210 Implementation Guide
Post Migration Steps
4.
Once migration is complete, you need to login as a contact that is using
the out-of-box Administrator access type. You need to manually edit all
Access type records that were created in Unicenter ServicePlus Service
Desk 6.0. The Service Desk Analyst, Service Desk Administrator,
Knowledge Manager and Knowledge System Administrator entries on the
Web Interface tab need to be set as appropriate for using the Access type
records.
5.
In order to improve Ingres Database Performance for Knowledge Tools,
run the following command
bop_cmd -f reorg.frg "reorg()"
This will reorganize the tables and recreate all indexes. This will take a
while. Once the execution is complete issue the following command
ktoptdb
This will optimize the database on Knowledge Tool tables.
It is recommended to run optimize DB after migration and also after
importing large number of documents, especially on following tables:
„
optimizedb -zk -umdbadmin mdb -rskeletons
„
optimizedb -zk -umdbadmin mdb -rindex_doc_links
„
optimizedb -zk -umdbadmin mdb -rebr_fulltext
„
optimizedb -zk -umdbadmin mdb -rebr_fulltext_adm
6.
If you are migrating from a release earlier than Unicenter ServicePlus
Service Desk 6.0 note that the format of the val_fieldupdate_site() trigger
has changed. Review the examples in
$NX_ROOT\samples\call_mgt\chg_site.mod, cr_site.mod and
iss_site.mod. This trigger can be used to automatically log changes to
user-defined fields in the ticket's Activity Log. If you have an adaptation
that uses this trigger, review your coding and adjust as necessary to
ensure proper operation and prevent error messages in the logs.
7.
Once the Knowledge tools and the Unicenter Service Desk migration is
completed run the following Knowledge Tools reindexing command:
NX_ROOT/bin/pdm_k_reindex.exe
8.
Unicenter ServicePlus Service Desk 6.0 forms that include where clauses
may not work properly after a migration. When using where clause in the
htmpl file, it requires to have the character, “U”, in front of the UUID type
id, for example:
<PDM_LIST PREFIX=list WHERE="ANALYST_ID=U'$cst.id'" FACTORY="USP_PREFERENCES">
This, modified, PDM_LIST statement shows a list of the user preference
records owned by the login user.
9.
Any code written in the Service Desk 6.0 sitemods.js that is called from an
htmpl page must be merged into the Service Desk r11 sitemods.js before
the code will work.
Service Desk and Knowledge Tools Migration 211
Post Migration Steps
10. After migration, you will be not be able to access the Web Interface as any
user associated with an Access Type not delivered in your Service Desk
6.0 server. To enable web access for these Access Types, log into the Web
Interface as a user with Administrator access, select the Administration
tab, and enable the appropriate check boxes on the Web Interface and
Knowledge Tools tabs.
11. The HTML formatted Activity Notification Message Templates that can be
used with email notifications are new in Unicenter Service Desk r11. These
HTML Message Templates are installed during Unicenter Service Desk r11
installation but are not installed during migration from Unicenter Service
Desk 6.0. If the recipient's email reader supports HTML, it will show the
HTML message rather than the plain text message. If you have customized
your Message Templates, your customizations will not be included in the
new HTML templates.
These HTML Message Templates are supplied in files, and can be loaded if
you would like to use them. The files are located in the
$NX_ROOT\samples\data directory:
Files
Message Templates
html_ntf_chg.dat
Sample HTML Message Templates for Change Orders
html_ntf_cr.dat
Sample HTML Message Templates for Request
html_ntf_iss.dat
Sample HTML Message Templates for Issues
html_ntf_itil.dat
Sample HTML Message Templates for Requests, Problems
and Incidents for ITIL installations
Before loading these templates, it is recommended that you backup the
following tables containing your existing Message Templates:
„
pdm_extract –f Act_Type > aty_backup.dat
„
pdm_extract –f Spell_Macro > macro_backup.dat
The new files can then be loaded. For example pdm_load –f
html_ntf_chg.dat.
12. After migrating to Service Desk r11, if you had a custom.ver version
control file in Service Desk 6.0, you must remove the file and create a new
custom.ver file for Service Desk r11.
212 Implementation Guide
Unicenter Service Desk Migration Concerns
Unicenter Service Desk Migration Concerns
This section lists the Unicenter Service Desk migration concerns that you
should be aware of during migration:
1.
Foreign Keys (SRELs) that reference tables, whose primary key is now a
UUID, are changed from integer type to UUID type (or BYTE 16).
2.
The MDB provides a consistent database schema for a wide variety of IT
management data. During the development of the MDB, data elements
from the previous version of Unicenter Service Desk and Unicenter Service
Desk Knowledge Tools were incorporated into this schema. The size of the
data elements may increase and consequently the increase in the overall
database size. However, if you have increased the size of the standard
data elements beyond the column width defined for the MDB, there may
be some data truncation in these elements during the migration process.
Messages are issued to identify any truncation during migration.
3.
Referential integrity issues detected by the migration program when
attempting to reset foreign keys will result in errors in the migration.log
file and the associated foreign key is set to a pre-defined valid reference.
4.
Unicenter Service Desk r11 includes a redesigned File Attachment
component. After a migration any previously existing repositories and file
attachments will still be accessible except in the following case. Shared file
repositories will only be accessible if the repository daemon is running on a
machine that can access the shared file. This means that the server name
on the repository record (detail form) must be a Windows machine that
has access to the share. A Unicenter Service Desk repository daemon must
also be running on the machine.
Note:
After a migration the process of downloading attachments differ depending
upon when they were attached. Existing attachments (uploaded prior to a
migration) will be downloaded, that must be unzipped before you can view
them. Any attachments uploaded via Unicenter Service Desk r11 client
interface, will be unzipped before being downloaded and are viewable
immediately.
5.
For more information regarding the Unicenter ServicePlus Service Desk
6.0 database tables that have moved to newly named tables, and the
column names that have been changed in Unicenter Service Desk r11, see
Appendix "Changes to Database Schema" in the Release Impact Guide.
This information is necessary for users that have written custom reports
accessing these tables.
Service Desk and Knowledge Tools Migration 213
Unicenter Service Desk Migration Concerns
6.
Migration to Unicenter Service Desk r11 will retain the customizations on
the forms from Unicenter ServicePlus Service Desk 6.0. However, you will
not see the new Unicenter Service Desk r11 functionality on the migrated
customized forms.
If you need the Unicenter Service Desk r11 functionality and like to
preserve your customizations, you will have to redo the customizations on
a base Unicenter Service Desk r11 form which has the new functions.
If you wish to upgrade to Unicenter Service Desk R11 from an earlier
version than Unicenter ServicePlus Service Desk 6.0, you will need to first
upgrade to Unicenter ServicePlus Service Desk 6.0 and then to Unicenter
Service Desk r11. In this case too migration retains the customizations in
Unicenter ServicePlus Service Desk 6.0 and you need to redo the
customizations on a base 6.0 form, if you need the new functionalities and
retain the customizations.
7.
Hyphens in Knowledge Document may not migrate properly.
Migrating from a Case Sensitive Database
If you are migrating from a case sensitive database, query your database prior
to r11 migration to identify if you have duplicate values in any of the unique
index key columns arising due to the case differences.
Although the Unicenter Service Desk r11 database schema differs from the
Unicenter ServicePlus Service Desk 6.0 database schema, you should be able
to locate potential duplicates by identifying the indexes in your 6.0 database
which contain unique key columns, and then running queries against those
which you suspect may contain duplicate key values. The duplicates should be
removed prior to migration to avoid indexing errors.
Note: If duplicates are found before migration, you should modify the
Unicenter ServicePlus Service Desk 6.0 database to remove these duplicates
before starting migration. If duplicates are found during migration, you should
modify the r11 database to remove the duplicates and then create the index
which failed, using the syntax provided in the migration error message.
214 Implementation Guide
Unicenter Service Desk Migration Concerns
Viewing Index List in 6.0
Depending on the type of database, use one of the following syntaxes to view
a list of Unicenter ServicePlus Service Desk 6.0 indexes which contain unique
key columns:
For Ingres Server:
SELECT t.table_name, i.index_name,
c.column_name, c.key_sequence
from iiindexes i, iiindex_columns c, iitables t
WHERE i.index_name = c.index_name and i.index_name = t.table_name
AND i.unique_rule = 'U'
and i.system_use = 'U'
order by t.table_name, i.index_name, c.key_sequence
For Sql Server:
SELECT o.name AS TableName, i.name AS IndexName, c.name AS ColumnName, k.keyno AS 'Position'
FROM sysindexkeys k LEFT OUTER JOIN
sysobjects o ON k.id = o.id LEFT OUTER JOIN
sysindexes i ON k.id = i.id AND k.indid = i.indid LEFT OUTER JOIN
syscolumns c ON k.id = c.id AND k.colid = c.colid LEFT OUTER JOIN
sysfilegroups fg ON i.groupid = fg.groupid
WHERE (i.indid > 0) AND (o.type = 'U') AND (i.indid <> 0) AND (i.indid <> 255) AND (o.name NOT IN
('dtproperties')) AND (i.status = 2)
ORDER BY o.name, i.indid, i.name, [Position]
Once you have identified indexes which have duplicates, use the syntax
described in the following example to list any duplicates found for a specified
index and column name(s).
Example for the code column in the chgcat table:
SELECT *
FROM chgcat
WHERE (UPPER(code) IN
(SELECT upper(code)
FROM chgcat
GROUP BY upper(code)
HAVING (COUNT(UPPER(code)) > 1)))
Service Desk and Knowledge Tools Migration 215
Unicenter Service Desk Migration Concerns
Removing Duplicate Key Values after Migration
If you have already run the migration, and received errors indicating that an
index could not be created due to duplicate key values, use the syntax as
described in the following example to locate duplicate keys in your Unicenter
Service Desk r11 database.
select *
from chgcat
where upper(char(code)) in
(select upper(char(code))
FROM chgcat
GROUP BY upper(char(code))
HAVING (COUNT(UPPER(char(code))) > 1))
216 Implementation Guide
Copy Customized htmpl file from Service Desk 6.0
Copy Customized htmpl file from Service Desk 6.0
Some of the Unicenter ServicePlus Service Desk 6.0 files are no longer used in
the Unicenter Service Desk R11. However, they are required for displaying
htmpl files customized in Unicenter ServicePlus Service Desk 6.0. These files,
after migration, need to be manually copied to specific Unicenter Service Desk
R11 directories, so they can be loaded and used by the web interface.
The following steps list the directories from where the files are to be copied
and moved to:
1.
2.
Copy the following list of files from Unicenter ServicePlus Service Desk 6.0
NX_ROOT/migrate/tor11/prer11/bopcfg/www/htmpl/web/analyst to
Unicenter Service Desk r11
NX_ROOT/bopcfg/www/htmpl/web/analyst/legacy
„
ci_search.htmpl
„
detail_cr_prp_edit.htmpl
„
detail_crkn.htmpl
„
detail_iss_prp_edit.htmpl
„
detail_mfr_ro.htmpl
„
detail_vp.htmpl
„
do_svy.htmpl
„
list_mfr.htmpl
„
list_vp.htmpl
„
nr_prop_tab.htmpl
„
svy_thanks.htmpl
„
tour_content.htmpl
„
tour_frames.htmpl
„
view_svy.htmpl
„
xx_alg_tab.htmpl
„
xx_resln_tab.htmpl
Copy the following list of files from Unicenter ServicePlus Service Desk 6.0
NX_ROOT/migrate/tor11/prer11/bopcfg/www/htmpl/default to Unicenter
Service Desk r11 NX_ROOT/bopcfg/www/htmpl/default/legacy
„
help_frameset.htmpl
„
cst_ci_search.htmpl
„
loginerr.htmpl
Service Desk and Knowledge Tools Migration 217
Copy Customized htmpl file from Service Desk 6.0
3.
Copy the following file from Unicenter ServicePlus Service Desk 6.0
NX_ROOT/migrate/tor11/prer11/bopcfg/www/macro to Unicenter Service
Desk r11 NX_ROOT/site/mods/www/macro
„
4.
kt_search_str.mac
Copy the following file from Unicenter ServicePlus Service Desk 6.0
NX_ROOT/migrate/tor11/prer11/bopcfg/www/wwwroot/html to Unicenter
Service Desk r11 NX_ROOT/site/mods/www/wwwroot/html
„
cst_menubar.html
Note: The customization in the html file needs to be merged to R11. Keep
the customized html file under html directory can cause problem.
5.
Copy the following file from Unicenter ServicePlus Service Desk 6.0
NX_ROOT/migrate/tor11/prer11/bopcfg/www/wwwroot/css to Unicenter
Service Desk r11 NX_ROOT/site/mods/www/wwwroot/css
„
6.
218 Implementation Guide
tour.css
Copy the following list of files from Unicenter ServicePlus Service Desk 6.0
NX_ROOT/migrate/tor11/prer11/bopcfg/www/wwwroot/img to Unicenter
Service Desk r11 NX_ROOT/site/mods/www/wwwroot/img
„
bg_lines_dark.gif
„
bg_lines_medium.gif
„
bg_lines_light.gif
„
ca_sheet.gif
„
button_middle.gif
„
button_middle_down.gif
„
button_middle_active.gif
„
button_left_down.gif
„
button_left.gif
„
button_right.gif
„
button_right_active.gif
„
button_right_down.gif
„
button_left_active.gif
„
pb_blank.gif
„
pb_vert.gif
„
corner.gif
„
button_middle_ns.gif
„
pb_folder.gif
„
books04.gif
Copy Customized htmpl file from Service Desk 6.0
„
ca_logo_black.gif
„
nsm_banner.gif
„
sdo_banner.gif
„
about_top.jpg
„
amo_banner.gif
„
kt_banner.gif
„
tour_lines.gif
„
tour_feature.gif
„
tour_page.gif
„
tour_bottombanner.jpg
„
tour_topbanner.jpg
Service Desk and Knowledge Tools Migration 219
Copy Customized htmpl file from Service Desk 6.0
Incompatible htmpl Files
Some of the Unicenter ServicePlus Service Desk 6.0 htmpl files are not
compatible with the Service Desk R11 htmpl files. These files need to be
removed from the following the Unicenter ServicePlus Service Desk 6.0
customization directories:
„
NX_ROOT/site/mods/www/htmpl/default
„
NX_ROOT/site/mods/www/htmpl/web/analyst
„
NX_ROOT/site/mods/www/htmpl/web/employee
„
NX_ROOT/site/mods/www/htmpl/web/customer
The following is the list of incompatible files, which need to be removed:
„
ahdtop.htmpl
„
std_head.htmpl
„
std_body.htmpl
„
std_footer.htmpl
„
login.htmpl
„
menu_frames.htmpl
„
top_splash.htmpl
„
reports.htmpl
„
styles.htmpl
„
xx_attmnt_tab.htmpl
„
upload_file.htmpl
„
detail_attmnt_edit.htmpl
„
upload_success.htmpl
„
load_properties.htmpl
„
imgbtndata.htmpl
„
load_wait.htmpl
„
scoreboard.htmpl
„
detail_nr.htmpl
„
list_nr.htmpl
Note: These files may or may not appear in the directories mentioned above.
220 Implementation Guide
Install/Remove Migration Views
Update Code
The Unicenter Service Desk 6.0 attachment code does not work in the
Unicenter Service Desk R11 installation since code for the attachment feature
in R11. In order to make the new attachment work in the Unicenter Service
Desk 6.0 customized htmpl files, for example, detail_cr.htmpl,
detail_chg.htmpl, and detail_iss.htmp, the following htmpl code needs to be
replaced with the new Unicenter Service Desk R11 htmpl code.
Unicenter Service Desk 6.0 code:
<PDM_TAB FILE="xx_attmnt_tab.htmpl" NAME="Attachments" NEW_ROW=Yes>
Unicenter Service Desk R11 code:
<INPUT TYPE=hidden NAME="NEW_ATTMNTS" ID="NEW_ATTMNTS">
<PDM_TAB ID=attmnt
SRC="OP=SHOW_DETAIL+HTMPL=xx_attmnt_tab.htmpl+FACTORY=cr+PERSID=$args.persistent_id"
NAME="Attachments" height=300></pdm_tab>
Install/Remove Migration Views
To allow users continue working with customized reports, you have the option
of installing a set of views that mimic the tables that were replaced by ca_xxx
(or common tables) in the mdb. These views allow you using ODBC to
continue to work without modification. These views are not required for
reports delivered with Unicenter Service Desk. The view definitions are stored
in NX_ROOT/samples/views/ingres/IngresCreateMigViews.sql.
To install the views, issue the following command:
sql -umdbadmin mdb < IngresCreateMigViews.sql
To remove the views, once customized reports have been converted to, access
the new CA-MDB tables and issue the following command:
sql -umdbadmin mdb < IngresDropMigViews.sql
Service Desk and Knowledge Tools Migration 221
Messages During Migration
Messages During Migration
This section lists specific information that you should be aware of during
migration.
Errors in Data Extraction Phase
Phase1 ### XML write error while extracting from table table_name
Additional debugging messages should follow this error message. Provide
this information to technical support.
Errors in Data Reset Phase
04/08 06:28:54.875 ERROR ctct 128 Cannot locate USA in ca_country
table
This error occurs when migrating a contact record. The record in 6.0 had a
value in the country column USA which the migration attempted to match
with what is defined in the ca_country table and failed.
222 Implementation Guide
Messages During Migration
Errors in Data Loading
DropIndex ### ca.gcf.util.SqlEx: ALTER TABLE DROP CONSTRAINT:
constraint 'constraint_name' does not exist
This error occurs when migration attempts to drop an index which does
not exist. During the execution of the migration failed to add the index.
Ignore this error.
LoadTable ### org.xml.sax.SAXParseException: Content is not
allowed in trailing section
This error indicates that an xml file created by migration is invalid, and it
stops the further processing for the table. The SAXParseException details
"Content is not allowed in trailing section" may vary from this example.
This is a serious error. Contact technical support.
LoadTable 404 ca.gcf.util.SqlEx: Duplicate key on INSERT detected
This error occurs when there is a unique Primary key which is being
violated by attempting to insert a row with a duplicate key. The preceding
messages will identify the row that migration was attempting to insert.
LoadTable ### ca.gcf.util.SqlEx: Cannot INSERT into table
'"table_name1"' because the values do not match those in table
'"table_name2"' (violation of REFERENTIAL constraint
'"constraint_name"')
This error indicates that the step which drops the indexes was
unsuccessful. Unicenter Service Desk r11 contains referential constraints
which were not imposed in Unicenter ServicePlus Service Desk 6.0. This
means that in order to insert a row in the database, rows must already
exist in the referenced table. This error should not occur because
migration drops all referential indexes prior to loading the data. Review
the migration log for additional error messages and contact technical
support.
LoadTable ### ca.gcf.util.SqlEx: line 1, You cannot assign a value of
type 'long nvarchar' to a column of type 'nvarchar'. Explicitly convert
the value to the required type
This error indicates that a migration step was skipped. Contact technical
support.
LoadTable ### java.io.UTFDataFormatException: Invalid byte 1 of 1byte UTF-8 sequence
This error indicates that your data contains characters which are not
supported by XML. Migration currently supports invalid XML/UTF-8
characters within the range X'0000' thru X'001F', as well X'007F, which
may be contained within your data as ASCII control characters. Contact
technical support if you receive this message.
Service Desk and Knowledge Tools Migration 223
Messages During Migration
LoadTable ### ca.gcf.util.SqlEx: Table 'table_name' does not exist or
is not owned by you
LoadTable ### Can not find column column_name in table
table_name
LoadTable ### Processing has stopped for this table because the
target database does not contain the column noted in the above
message
These errors may occur if migration has difficulty processing user-defined
tables or columns. Please contact technical support if you encounter these
error messages.
LoadTable ### ca.gcf.util.SqlEx: No value specified for mandatory
column 'column_name'
This error occurs when migration attempts to insert a row which does not
have a value for a column that is mandatory in Unicenter Service Desk
r11. Data in the previous informational message will assist in locating the
row which is causing this error.
AddIndex ### ca.gcf.util.SqlEx: INDEX: table could not be indexed
because rows contain duplicate keys
This error occurs when the rows loaded by migration contain duplicate
values for the key, while a secondary index has a unique key constraint.
There are two reasons for this error.
„
„
If Unicenter ServicePlus Service Desk 6.0 database already contained
duplicate keys.
If Unicenter ServicePlus Service Desk 6.0 database contained
references to invalid keys which no longer exist. These invalid
references are identified and logged in Phase 2.
Phase 2 creates a “Migration Generated Entry” in the referenced table so
that the reference is no longer invalid. To avoid excessive generation of
these “migration” rows, in many cases, but not all, only one such row is
created for a particular table, even though more than one value may have
been invalid. This situation can lead to the duplicate key error message.
For example, you may receive this error for the hier_x0 index if there were
multiple invalid parent or child references pointing to a single “Migration
Generated Entry” row. Refer to the informational message directly above
this error for details about the index and its keys. Use this information and
the Invalid SREL (foreign key) messages from Phase 2 to query the
Unicenter Service Desk r11 database to identify duplicate key values. It is
important to correct these duplicates so that the index can be added. For
Beta2, use sql to add the index, using the syntax provided in the log
message, after the error is corrected.
224 Implementation Guide
Messages During Migration
AddIndex ### ca.gcf.util.SqlEx: Could not add a REFERENTIAL
CONSTRAINT. Some rows in table 'table_name1' do not have
matching keys in table 'table_name2'
This error occurs when tables fail to load completely when migration
attempts to add the referential constraints. Unicenter Service Desk r11
includes referential constraints which did not exist in Unicenter ServicePlus
Service Desk 6.0. In addition, there are some columns in the Unicenter
Service Desk r11 database whose values will default to "0" if no value is
supplied. For example, the resource_class column in the
ca_owned_resource table. If one or more of Unicenter ServicePlus Service
Desk 6.0 Network_Resource rows did not include a value for
resource_class, and you do not have a General_Resource_Class row for id
= 0, you will receive this error. Use the information provided in the
preceding message to identify the index column(s) in error. It is necessary
to correct these references so that the index can be added. For Beta2, use
sql to add the index, using the syntax provided in the log message, after
the error is corrected.
AddIndex ### java.sql.SQLException: [Microsoft][SQLServer 2000
Driver for JDBC][SQLServer]There is already an index on table
'table_name' named 'index_name'
This error, as identified in the log messages which precedes this message,
indicates that migration is attempting to recover from a prior execution of
migration, which failed in the middle of the step while adding the indexes.
You may receive this duplicate error because some of the indexes had
already been added. Ignore this error.
Service Desk and Knowledge Tools Migration 225
Appendix B: Portal Installation
This appendix discusses how to access Unicenter Service Desk components
through Unicenter Management Portal and CleverPath Portal. Use the
procedures in this appendix if you have Unicenter Management Portal or
CleverPath Portal installed on your system and want to access Unicenter
Service Desk through it. If you wish to setup SSL follow the instruction in
section "Configure Service Desk and Portal to use SSL.
Note: The Unicenter Management Portal and CleverPath Portal are not shipped
with Unicenter Service Desk, and must be purchased and licensed separately.
This appendix contains only the most basic information to access Unicenter
Service Desk through Portal Administration. For detailed information, see the
CleverPath and Unicenter Management Portal Server Administration Online
Help.
Verify Service Desk Web Interface Accessibility
After Unicenter Service Desk is installed on a system, make sure that you can
access the web interface through tomcat server. For Portal Integration to
work, the Unicenter Service Desk Web Interface must be accessible through
tomcat.
Note: For Unicenter Service Desk LINUX server installation the
LD_LIBRARY_PATH must be set to $NX_ROOT/sdk/lib.
Install and Start the Portal
Install the Portal on a system different from the Unicenter Service Desk
system or on the same one on which Unicenter Service Desk is installed.
Note: When you start the portal server, an active program runs in a separate
command prompt window. You can minimize this window but do not close it. If
you do, the portal server shuts down.
Portal Installation 227
Install and Start the Portal
Start Portal on Windows
„
To start the CleverPath portal on Windows 2000/2003 systems, choose
Programs, CA, CleverPath, Portal, Portal Startup from the Windows Start
menu.
„
To start Unicenter Management Portal on Windows 2000/2003 systems,
choose Programs, Unicenter NSM, Portal , Portal Startup from the Windows
Start menu.
Start Portal on UNIX
To start the portal on UNIX systems, run ./portal.sh from the shell command
line in the directory in which you installed the portal server.
To connect to the portal server, open a web browser, and enter the following
URL in the location or address field:
http://<servername>:<port#>/servlet/portal
where:
<servername>
Specifies the server name (or IP address) of the portal server.
<port#>
Specifies the port number that the portal server monitors. You specified
the port number during portal server installation. The default port is 8080.
228 Implementation Guide
Include Portlets
Include Portlets
To include Unicenter Service Desk portlets in the portal:
1.
Log onto the Unicenter Service Desk and click Search from the Options
Manager on the Administration tab.
The Options List window appears.
2.
Click on Portal_Safe_List.
The Portal_Safe_list Detail window appears.
3.
Enter the machinename:portnumber where the portal was installed in
the Options Value Field. For more information on what this option does,
see the online help.
4.
Click Install.
5.
Restart Unicenter Service Desk daemon.
6.
Login to the portal as an administrator.
7.
Create a user which is valid Unicenter Service Desk User. For more
information on how to create a user, see the portal documentation.
Note: The password used while creating this user in the portal could be
different from the password used by this same user to log into Unicenter
Service Desk as Unicenter Service Desk authenticates the users for this
integration using a combination of the following, username, a valid portal
session and the portal install value if it exits in the PORTAL_SAFE_LIST
option.
8.
Select Knowledge from the main Portal menu bar.
The Knowledge page appears.
9.
Select Library from the left pane Knowledge bar.
The Library tree appears in the left pane.
10. Select (or create then select, if necessary) a folder in the Library tree,
then choose Publish File from the right pane Knowledge bar.
The Publish File form opens.
11. Type the following Unicenter Service Desk portlet URL in the Content text
box on the General Information tab:
http://hostname:portnumer/CAisd/PortalServlet?USERNAME=$USER.username$&PORTALSESSION=$S
ESSION$&PORTALINSTALL=portalhostname:portalportnumber
Note: Substitute hostname:portnumber in the URL with the name and
port of the web server on which Unicenter Service Desk resides.
Substitute portalhostname:portalportnumber in the URL with the name
and port of the web server on which Portal resides.
12. Type Unicenter Service Desk in the Title text box.
Portal Installation 229
Configure Service Desk and Portal to use SSL
13. Click Advanced.
The Advanced properties page of the Publish File form displays.
14. Type portal/variable-url in the Content (mime) Type field and click
Publish.
The published contents appear in the selected Library folder.
15. Configure the Workplace to show this portlet.
16. Log out and login as the newly created user. You should be automatically
logged onto Unicenter Service Desk in the portlet you just created without
logging on again.
Note: While running Service Desk in the portlet, the preference, Avoid
Popups, is not available in the Preference page and a popup window is always
used regardless of the setting of the preference.
Configure Service Desk and Portal to use SSL
Note: For production purpose it is always advisable to obtain a certificate from
a trusted certificate authority.
Before you begin configuration check if the integration works without SSL
setup. Follow the steps in Include Portlets section.
230 Implementation Guide
Configure Service Desk and Portal to use SSL
Setup SSL using a self-signed certificate
To set up the Unicenter Service Desk Portal Integration using a self-signed
certificate, follow these steps:
1.
At the command line, enter:
%JAVA_HOME%\bin\keytool -genkey -alias tomcat -keyalg RSA
Answer the prompts appropriately and enter 'changeit' as the password for
both password prompts (you'd have other configuration steps if you use a
different password).
This sets up the certificate.
2.
Edit the server.xml file located in:
$NX_ROOT/bopcfg/www/CATALINA_BASE/conf
3.
Uncomment the following section and save:
<!-<Connector className="org.apache.coyote.tomcat4.CoyoteConnector"
port="8443" minProcessors="5" maxProcessors="75" enableLookups="true" acceptCount="100"
debug="0" scheme="https" secure="true"useURIValidationHack="false" disableUploadTimeout="true">
<Factory className="org.apache.coyote.tomcat4.CoyoteServerSocketFactory"
clientAuth="false" protocol="TLS" /></Connector>
-->
4.
Add keystoreFile attribute to server.xml. (When you run the command in
step 1, a .keystore file gets created in the user's home directory. Add the
reference to the keystoreFile attribute and Save the file. Your server.xml
should look as follows.
<Connector className="org.apache.coyote.tomcat4.CoyoteConnector"
port="8443" minProcessors="5" maxProcessors="75" enableLookups="true" acceptCount="100"
debug="0" scheme="https" secure="true" useURIValidationHack="false" disableUploadTimeout="true">
<Factory className="org.apache.coyote.tomcat4.CoyoteServerSocketFactory"
clientAuth="false" protocol="TLS" keystoreFile="location/.keystore" />
</Connector>
5.
Restart Unicenter Service Desk.
6.
Test to check whether SSL works point your browser to https://machinename:8443. This should display a Security Alert dialogue. Click Yes.
Note: SSL uses port 8443
7.
Replace the Service Desk portlet to use HTTPS and port 8443.
https://hostname:8443/CAisd/PortalServlet?
USERNAME=$USER.username$&PORTALSESSION=$SESSION$&PORTALINSTALL=portalhostname:
portalportnumber
Portal Installation 231
Appendix C: Using Unicenter Software
Delivery to Install and Configure
Windows Clients
If your enterprise has purchased and installed Unicenter Software Delivery,
you can deploy the Unicenter Service Desk client remotely. The Service Desk
Java Client package allows for an unattended installation and client
configuration.
Using the Service Desk Java Client Package
This section explains how to use Unicenter Software Delivery to perform the
following:
„
Register the Unicenter Service Desk Java Client package in the Unicenter
Software Delivery Software Library.
„
Remove unnecessary source components from the package (optional).
Phase 1: Review System Requirements (Windows Client)
Before you begin the installation process, review the Readme included on your
Unicenter Service Desk installation media for Installation Considerations and to
determine whether your environment meets the documented software and
hardware requirements.
Using Unicenter Software Delivery to Install and Configure Windows Clients 233
Using the Service Desk Java Client Package
Phase 2: Register the Service Desk Java Client Package
In this phase, you register the Unicenter Service Desk Java Client package
with the Unicenter Software Delivery software library. To do so, follow these
steps:
1.
Select Programs, Computer Associates, Unicenter, Software Delivery, SD
Explorer from the Windows Start menu.
The Software Delivery explorer window appears.
234 Implementation Guide
Using the Service Desk Java Client Package
2.
Click as necessary in the tree view to navigate to the Software Library,
All Software branch.
3.
Right-click All Software and select New, Software from the shortcut
menus.
The New Software dialog appears.
4.
Enter the name and version of the software item with alphanumeric
characters. (The vendor and comment fields are optional).
Name
Unicenter Service Desk Admin. Client Win32 [en-US] r11
Version
r11
Vendor
Computer Associates International, Inc.
Comment
Unicenter Service Desk Admin. Client Win32 [en-US] r11
5.
Click OK.
Expand the tree view of the software package to enable display of the
source image, procedures, and a registry of the installation records.
6.
Right-click Source and select New volume, From Files from the shortcut
menu.
The Create new volume dialog appears.
7.
Enter the name with alphanumeric characters.
Name
Administrative Client Win32
8.
Click OK.
9.
Place the Unicenter Service Desk installation media into your CD/DVDROM drive and from the Windows Explorer, Select All (except the reginfo
directory) and Copy.
10. Drag and drop these directories/files into the Source folder.
11. Right-click Procedures and select New, Procedure from the shortcut
menus.
The Register procedure dialog appears.
Using Unicenter Software Delivery to Install and Configure Windows Clients 235
Using the Service Desk Java Client Package
12. Enter the name for the procedures folder and comment with alphanumeric
characters.
Name
Install
Comment
Installs the Service Desk Administrative Client (Windows) using
\winclnt.32\Disk1\setup.exe /s. The /s option specifies an unattended
installation using the default response file: setup.iss.
13. Select the Embedded File tab.
14. Enter the details to invoke the procedure, such as:
File
setup.exe
Subpath
winclnt.32\disk1
Volume
Administrative Client Win32
Type
Executable file
Parameters
/s
15. Click OK.
16. Right-click on Unicenter Service Desk Java Client Win32 [en-US] r11 in the
Software Library tree, and select Seal from the shortcut menu.
The Unicenter Service Desk package is sealed, making it available for
delivery through Unicenter Software Delivery. A registered package named
"Unicenter Service Desk Java Client Win32 [en-US] r11" displays in the All
Software branch under Software Library.
236 Implementation Guide
Using the Service Desk Java Client Package
Phase 3: (Optionally) Remove Unnecessary Source Components
If you intend to use the unattended install settings from the setup.iss file,
remove unnecessary source components from the package to reduce its size
from approximately 370MB to as little as 90MB, thereby saving significant
bandwidth. To do so, follow these steps:
1.
Click as necessary in the Software Delivery Explorer tree view to
navigate to the Software Library/All Software branch.
2.
Right-click Unicenter Service Desk Java Client Win32 [en-US] r11 and click
Unseal from the shortcut menu.
3.
Click as necessary to navigate to the Source branch under Unicenter
Service Desk Java Client Win32 [en-US] r11.
You may delete a directory and its contents that represents a feature that
is not required or an existing installation that already exists at the target
location. For instance, the following when deleted would represent a
significant reduction in the package size and delivery time.
„
The winclnt.32\disk1\AccessRT directory and its contents
„
The winclnt.32\Ingres directory and its contents
4.
Right-click the item branch you want to delete, then click Delete from the
shortcut menu.
5.
When you finish deleting items, right-click the Unicenter Service Desk Java
Client Win32 [en-US] r11 branch and select Seal from the shortcut menu.
Using Unicenter Software Delivery to Install and Configure Windows Clients 237
Using the Service Desk Java Client Package
Phase 4: Install the Java Client
In this phase, you use Unicenter Software Delivery to perform an unattended
remote installation of the Unicenter Service Desk Java Client. To do so, follow
these steps:
1.
In the Software Delivery Explorer Tree View, click as necessary to
navigate to the Software Library/All Software branch.
2.
Right-click Unicenter Service Desk Java Client Win32 [en-US] r11 and click
Copy from the shortcut menu.
238 Implementation Guide
Using the Service Desk Java Client Package
3.
Click as necessary to navigate to the appropriate destination under the
All Computers and Users branch, then right-click the selected destination
computer or user and click Paste, Software/Procedures to Schedule Jobs
with Default Settings from the shortcut menu.
4.
The job runs.
To view the job status and targets, navigate to the Job Containers branch
in the Tree View. For more information, see the Unicenter Software
Delivery Administrator Guide.
Using Unicenter Software Delivery to Install and Configure Windows Clients 239
Using the Service Desk Java Client Package
Phase 5: Configure Reports and Screen Painter
If you installed the Reports or Screen Painter options, follow the appropriate
procedures from Phase 4: Configure Reports and Screen Painter in the chapter
“Client Installation (Windows)”, depending on the type of database your
Unicenter Service Desk server uses and the types of reports you installed. You
need only complete the procedures in the sections that apply to your
installation.
After you complete the appropriate sections, you can run any of the Seagate
Crystal or Microsoft Access reports that you installed. For more information,
see the chapter “Report Generation” in the Administrator Guide. You can also
use the Screen Painter. For more information, see the chapter “The Screen
Painter” in the Modification Guide.
Phase 6: Start the Client Interface
To start the Unicenter Service Desk interface, click the interface from the
Unicenter Service Desk menu.
Note: When you start the interface, Unicenter Service Desk version control
compares items under control on the server with those items on the client. If
discrepancies occur, those items are downloaded to your client, depending on
how the administrator has set up version control. Upon initial startup, version
control downloads files and options from the server to most clients. Version
control issues several informational messages. Click OK in response to these
messages. For more information, see the chapter “Version Control
Management” in the Administrator Guide.
If your Unicenter Service Desk server has the web interface installed, you can
also access the web interface from your web browser. The URL for a Windows
or UNIX installation typically resembles http://host_name/CAisd/pdmweb.exe.
The URL may differ slightly from one installation to another (if you are
uncertain check with the administrator). You need not install a Unicenter
Service Desk client to use the web interface.
240 Implementation Guide
Appendix D: Mainframe Product
Integration
This appendix explains about the Unicenter Service Desk side data (.dat file)
associated with each mainframe product integration.
Load Service Desk Side Data
The Unicenter Service Desk side data (.dat file) associated with each
mainframe product integration in a list which associates a .dat to mainframe
product name.
Note: If the Service Desk server is configured to use ITIL methodology, then
ITIL updates need to be applied to the integration data. User pdm_userload -a
itil_integXXX.dat to apply the updates only after loading the respective
integXXX.dat.
Use pdm_userload -f integXXX.dat to load Unicenter Service Desk side data to
enable a particular integration. The files are delivered to
$NX_ROOT\data\integrations\.
For further instructions on enabling the calling side (mainframe product side)
of the integration, see "CA Common Services for z/OS - Unicenter Service
Desk Integration Guide r11" which will ship with each mainframe product.
CA Products Currently Using CAISDI
The following table lists the products currently using CAISDI and the
associated .dat files:
CA Product Currently Using CAISDI
DAT file
Advantage EDBC
integEDBC.dat
BrightStor CA-1
integCA1.dat
BrightStor CA-Allocate
integAllocate.dat
BrightStor CA-Disk
integDisk.dat
BrightStor CA-Dynam/TLMS
integTLMS.dat
BrightStor CA-Vantage
integVantage.dat
Mainframe Product Integration 241
CA Products Planning to Use CAISDI
BrightStor CA-Vtape
integVtape.dat
Unicenter CA-7
integCA7.dat
Unicenter CA-JARS
■
integJARS.dat
■
integJARSMVS.dat
Unicenter CA-MIM
integMIM.dat
Unicenter CA-OPS/MVS
integOPMVS.dat
Unicenter CA-SYSVIEW
integSysview.dat
Unicenter NetMaster Network Management for TCP/IP integNetMaster.dat
Unicenter NetMaster Network Management for SNA
integNetMaster.dat
Unicenter NetMaster Network Automation
integNetMaster.dat
Unicenter NetMaster Network Performance
integNetMaster.dat
Unicenter NetMaster Network Operations for TCP/IP
integNetMaster.dat
Unicenter NetMaster File Transfer Management
integNetMaster.dat
Unicenter NeuMICS
integNeuMICS.dat
CA Products Planning to Use CAISDI
The following table lists the CA products that would use CAISDI and the
associated .dat files:
CA Product Planning to Use CAISDI
DAT file
Allfusion CA-2e
integ2e.dat
Unicenter AutoSys Job Management
integAutoSys.dat
Unicenter CA-Bundl
integBundl.dat
Unicenter CA-11 Restart and Tracking
integCA11.dat
Unicenter CA-Connect
integConnect.dat
CA-DASDChec
integDASD.dat
Allfusion CA-Datamacs
integDatamacs.dat
Allfusion Date Simulator
integDate.dat
Unicenter CA-Deliver Output Management
integDeliver.dat
Unicenter CA-Dispatch Output Management
integDispatch.dat
BrightStor CA-FAVER VSAM Data Protection
integFaver.dat
242 Implementation Guide
CA Products Planning to Use CAISDI
Allfusion CA-FileAge
integFileAge.dat
Allfusion CA-FileMaster Plus
integFileMaster.dat
CA-Filesave/RCS
integFileSave.dat
Allfusion Gen (?)
integGen.dat
Unicenter GSS (Common component)
integGSS.dat
Allfusion CA-InterTest
integInterTest.dat
Unicenter CA-JCLCheck Utility
integJCLCheck.dat
Unicenter CA-Jobtrac Job Management
integJobtrac.dat
Allfusion Joe
integJoe.dat
Unicenter CA-LPD Report Convergence
integLPD.dat
Allfusion CA-Optimizer
integOptimizer.dat
Allfusion CA-Optimizer/II
integOptimizerII.dat
Allfusion Plex
integPlex.dat
Unicenter CA-Scheduler Job Management
integScheduler.dat
Unicenter CA-Spool Print Management
integSpool.dat
Allfusion CA-SymDump
integSymDump.dat
Allfusion CA-Verify
integVerify.dat
Unicenter CA-View Output Archival and Viewing
integView.dat
Mainframe Product Integration 243
Appendix E: Samples Directory
This appendix contains information on several files in the $NX_ROOT/samples
directory that can be modified for use with various external interfaces. These
are grouped into various sub-directories. None of the files in the samples
directory are executable as originally shipped.
Note: Windows C++ complier such as Microsoft Visual C++ (which is a part of
Microsoft Visual Studio .NET 2003) is a pre-requisite to use
$NX_ROOT/samples/i18n/makei18ndll.bat which allows a Unicenter Service
Desk administrator to customize the message catalog (pdm.dll) on Windows.
Contents of the Samples Directory
The sample directory contains the following subdirectories and files:
asset
myco_demo.caz
This file contains a sample Business Process View that can be used to test
Change Impact Analyzer.
Samples Directory 245
Contents of the Samples Directory
call_mgt
Contains samples for customization in request management.
gencr.frg
This file can be used in conjunction with bop_cmd to create requests from
a command line. All notifications and activity log entries will occur,
however no Request Form will display on the server when created. Be sure
to read the gencr_readme.txt file to learn the syntax, and how to modify it
if necessary. The file should be placed in $NX_ROOT/site/mods/interp, if
the directory does not exist, you should create it.
iss_site.mod
This file can be used to enable activity logging of site-adapted fields in
issues. This file should be placed in $NX_ROOT/site/mods/majic after it
has been changed for the site-adapted fields.
cr_site.mod
This file can be used to enable activity logging of site-adapted fields in
requests. This file should be placed in $NX_ROOT/site/mods/majic after it
has been changed for the site-adapted fields.
chg_site.mod
This file can be used to enable activity logging of site-adapted fields in
change orders. This file should be placed in $NX_ROOT/site/mods/majic
after it has been changed for the site-adapted fields.
gencr_readme.txt
This file contains instructions on how to use the gencr.frg file.
chg_site.spl
This file may be modified to change the mapping of attributes when
creating a change order from a request. This file should be placed in
$NX_ROOT/site/mods/majic after the appropriate changes have been
made.
audlog_site.mod
This file can be used to enable audit logging of site-adapted fields. This file
should be placed in $NX_ROOT/site/mods/majic after it has been changed
for the site-adapted fields.
Notify_add.spl (UNIX only)
This file can be used to add the request’s log agent, assignee and group to
the request notification list. This file should be placed in
$NX_ROOT/site/mods/majic.
246 Implementation Guide
Contents of the Samples Directory
Notify_replace.spl (UNIX only)
This file can be used to add the request’s log agent, assignee and group to
the request notification list when they are changed. This file should be
placed in $NX_ROOT/site/mods/majic.
data
Sample data for loading into the database. As noted, modifications may have
to be made before using with your system.
html_ntf_chg.dat
This file contains sample html notifications for change orders. A
pdm_userload can be run using this file to load the sample notifications.
This would only need to be done on a system that has been migrated from
6.0.
html_ntf_cr.dat
This file contains sample html notifications for requests. A pdm_userload
can be run using this file to load the sample notifications. This would only
need to be done on a system that has been migrated from 6.0.
html_ntf_iss.dat
This file contains sample html notifications for issues. A pdm_userload can
be run using this file to load the sample notifications. This would only need
to be done on a system that has been migrated from 6.0.
html_ntf_itil.dat
This file contains sample html notifications for systems configured for
using the ITIL methodology. A pdm_userload can be run using this file to
load the sample notifications. This would only need to be done on a
system that has been migrated from 6.0.
FAXserve (Windows only)
fs-template2.rtf
This file contains a sample template for use with FAXserve.
fs-template.rtf
This file contains a sample template for use with FAXserve.
Samples Directory 247
Contents of the Samples Directory
i18n
Contains resources and scripts necessary to build the product’s global resource
and message catalogs.
Note: Other Java components utilize Java resource bundles for their UI strings
and messages. Reports, forms, and base-data also contain elements appearing
on the user-interfaces and are defined in formats. For more information on
this, see the Modification Guide.
This catalog is a repository for user interface (UI) strings and messages
utilized by most compiled components and the UI elements of the Service
Desk Service Desk interface (excluding form definitions). The i18n directory
further contains a backup copy of the initial out-of-box catalog: pdm.dll
(Windows) and pdm.cat (Linux/UNIX). The runtime copy used by the system
can be found in %NX_ROOT%\bin\pdm.dll (Windows) and
$NX_ROOT/fig/cfg/pdm.cat (Linux/UNIX).
pdm.mc (Windows only)
This file is an executable that is used to create a pdm.dll file.
pdm.dll (Windows only)
This file contains messages used by Unicenter Service Desk and Unicenter
Knowledge Tools.
pdm.def (Windows only)
This file is used in creating the pdm.dll file.
makei18ndll.bat (Windows only)
This batch file is run to create the pdm.dll file.
Makei18ncat (UNIX only)
This script file is run to create the pdm.cat file.
Pdm.cat (UNIX only)
This file contains messages used by Unicenter Service Desk and Unicenter
Knowledge Tools.
Pdm.txt (UNIX only)
This file contains messages in text format used by Unicenter Service Desk
and Unicenter Knowledge Tools.
248 Implementation Guide
Contents of the Samples Directory
Message catalog on Windows
To modify, build and deliver the message catalog on Windows you require a
tool for generating Windows resource-only DLLs such as Microsoft Visual
Studio.NET 2003.
To make the modification, follow these steps:
1.
Backup the %NX_ROOT%\samples\i18n directory
2.
Edit the pdm.mc file with an editor capable of saving in Unicode format
such as Notepad
3.
From a command prompt cd to the %NX_ROOT%\samples\i18n directory.
4.
If using MS-Visual Studio, confirm that the proper Microsoft Visual Studio
C++ command line variables have been configured (e.g. for Microsoft
Visual Studio .NET 2003 run
<VSINSTALLDIR>\Common7\Tools\vsvars32.bat).
5.
Run makei18ndll.bat to generate pdm.dll
6.
Stop the product’s services, copy the generated pdm.dll to runtime
location (above), restart services
Message catalog on Linux/Unix
To modify, build and deliver the message catalog on Linux/UNIX you require a
Linux/UNIX environment matching the production environment with the gencat
utility installed.
To make the modification, follow these steps:
1.
Backup the $NX_ROOT/samples/i18n directory.
2.
Edit the pdm.txt file with an editor
3.
From a command shell navigate to the $NX_ROOT/samples/i18n directory
4.
Invoke the script makei18ncat
5.
Stop the product’s services, copy the generated pdm.cat to runtime
location (above), restart services
macro_lock
This file contains a spel fragment that can be run using a bop_cmd to turn off
locks that are being held by macros.
Samples Directory 249
Contents of the Samples Directory
ntf_meth
Sample notification methods. As noted, modifications may have to be made
before using them with your system. Setup instructions are included in this
section. These scripts are all written to run with a Bourne shell interpreter.
Note: Under UNIX these scripts will run as written. However, on Windows NT,
either a third party Bourne shell interpreter must be installed on the server or
the scripts rewritten as complied c files, or .bat files. Another possibility is to
install a Perl interpreter and translate the scripts to Perl.
hp.pdm_pager0 (UNIX Only)
hp.pdm_pager1(UNIX Only)
hp.sendpage0(UNIX Only)
hp.sendpage1(UNIX Only)
pager.p(UNIX Only)
sun.pdm_pagera(UNIX Only)
sun.pdm_pagerb(UNIX Only)
sun.sendpagea(UNIX Only)
sun.sendpageb(UNIX Only)
These files contain sample notification methods for pagers. These are only
examples and will not necessarily work with different pagers.
pager_notify.pl
This file contains a sample perl script that could be modified and used as a
notification method for pagers. Note that it is only a sample and may not
necessarily work with different pagers.
250 Implementation Guide
Contents of the Samples Directory
pdmconf
web.xml.tpl
pdm_startup.tpl
pdm_edit_usage_notes.htm
alias_install.bat
web.cfg.tpl
pdm_startup.i.tpl
pdm_edit.pl
README_files
All of these files are used by pdm_edit.pl to create startup files for a
primary server and secondary servers that are configured to run a variety
of daemons.
sdk
This directory contains a sample file for making Unicenter Service Desk web
service calls.
sql
ingres_lockdown_sd_only.sql
This file contains a set of REVOKE statements which will remove the
SELECT privilege on CA Common tables from PUBLIC access. You may
want to run this script in order to manage who has access to these tables.
ingres_lockdown_common.sql
This file contains a set of REVOKE statements which will remove the
SELECT privilege on Unicenter Service Desk tables from PUBLIC access.
You may want to run this script in order to manage who has access to
these tables.
Samples Directory 251
Contents of the Samples Directory
views
ingres
IngresCreateMigViews
This file contains views for an Ingres database that could be used to
allow most reports written for earlier releases to continue to work until
the reports can be rewritten to support the current table structures.
Loading these view should only be required to support customized
reports written for previous release.
IngresDropMigViews
This file contains commands to drop the migration views from an
Ingres database.
252 Implementation Guide
Appendix F: Import Knowledge Tools
Sample Data
Sample Knowledge data from Knowledge Broker, PCHowTo and Right Answers
is provided for your use. If you decide you want to use the sample Knowledge
data you must import the data into the Knowledge Tools database. Follow the
instructions outlined below to do so.
For a Windows installation:
1.
Go to $NX_ROOT\samples\data and unzip SampleData.zip into the same
directory.
If you wish to customize field data, follow the steps in customize field data
(see page 254) section before moving on to the next step.
2.
There are four batch files located at $NX_ROOT\bin. These can be run by
double-clicking on the batch file, or from a command window.
a.
ImportSampleData.bat – loads all the sample data files
(ImportKnowledgeBroker.bat, ImportPCHowTo.bat,
ImportRightAnswers.bat)
b.
ImportKnowledgeBroker.bat – sample data provided by Knowledge
Broker
c.
ImportPCHowTo.bat – sample data provided by PCHowTo
d.
ImportRightAnswers.bat – sample data provided by Right Answers
For a UNIX installation:
1.
Run the command tar -xvf SampleData.tar from $NX_ROOT\samples\data.
If you wish to customize field data, follow the steps in customize field data
(see page 254) section before moving on to the next step.
2.
There are four shell files located at $NX_ROOT\bin. These can be run from
a command window.
a.
ImportSampleData.sh - loads all the sample data files
(ImportKnowledgeBroker.sh, ImportPCHowTo.sh,
ImportRightAnswers.sh)
b.
ImportKnowledgeBroker.sh – sample data provided by Knowledge
Broker
c.
ImportPCHowTo.sh – sample data provided by PCHowTo
d.
ImportRightAnswers.sh – sample data provided by Right Answers
Import Knowledge Tools Sample Data 253
Customize Filed Data
Customize Filed Data
To customize Field Data on both Windows and UNIX installations, follow these
steps:
1.
Open the headings.txt file, located at $NX_ROOT\site\cfg, with WordPad.
The file contains 3 paragraphs that look as follows:
NAME=SampleTemplate_1
DELIMITER={Tab}
FIELDS=CREATION_DATE, TITLE, SUMMARY, PROBLEM, RESOLUTION,
PATH
DEFAULTS=STATUS:Draft, AUTHOR:ServiceDesk, OWNER:ServiceDesk,
INITIATOR:[email protected]
PATH_DELIMETER=~
NEW_LINE_IN_REC=\n
2.
On the first line, the Name= refers to these sample data:
SampleTemplate_1 – default settings
SampleTemplate_2 – settings for PCHowTo sample
SampleTemplate_3 – data settings for RightAnswers sample data
Note: The sample data from Knowledge Broker is in kbi format and cannot
be customized in this manner.
3.
254 Implementation Guide
On the line beginning with DEFAULTS, default values for status, author,
owner and initiator may be set. Note that the value entered here applies to
all the sample data, it cannot be set on a document by document basis.
Additional fields may be added to the DEFAULTS line in the same format, if
desired.
About the Sample Data
About the Sample Data
Computer Associates is not responsible for the accuracy of the data provided
by the various vendors. It is provided “as is” for your use.
KnowledgeBroker
This free KnowledgeBase from KnowledgeBroker contains more than 400
sample solutions to common problems with Microsoft Outlook 2003 and
Outlook XP. Used by Help Desk Analysts and End Users, KBI
KnowledgeBases save time and cut costs by streamlining the support
process. Each Outlook solution is short, concise and easy to follow.
Needed graphics are built-in. No clicks on links or outside URLs. Enter a
question or key word in your CA Search, select an answer and follow the
step-by-step solution. It's that simple.
PCHowTo
To illustrate the power and utility of a multimedia knowledge base,
PCHowTo has assembled a small content library of knowledge items for
Internet Explorer. Integrated into the CA Unicenter Service Desk product
in a very simple, straight-forward manner, detailed descriptions on how to
set the browser toolbars, manage favorite links, and other useful functions
fully enable the user to obtain maximum performance from the product.
These knowledge items are task specific, designed to provide the user with
precise information at the time of need. The text is presented with a
“Show Me” link that will display the multimedia feature, allowing users to
read or experience the knowledge items.
RightAnswers
This sample title includes a variety of “How To” solutions &" Error
Message” solutions from Microsoft Excel 2003, all designed to fuel selfservice for end-users and improve 1st call resolution rates for support
analysts. In addition, you’ll find a sample of our multimedia solutions
(search for “Show-IT”) that show you what to do with sound and video and
our automated tasks (search for “Automate-IT”) that actually implement
the solution for you!
Import Knowledge Tools Sample Data 255
Appendix G: Silent Installation License
Agreement
COMPUTER ASSOCIATES INTERNATIONAL, INC. ("CA")
END USER LICENSE AGREEMENT (THE "AGREEMENT") FOR THE CA SOFTWARE
PRODUCT THAT IS BEING INSTALLED AS WELL AS THE ASSOCIATED
DOCUMENTATION AND ANY SDK, AS DEFINED BELOW, INCLUDED WITHIN
THE PRODUCT ("THE PRODUCT").
CAREFULLY READ THE FOLLOWING TERMS AND CONDITIONS REGARDING
YOUR USE OF THE PRODUCT BEFORE INSTALLING AND USING THE PRODUCT.
Throughout this Agreement, you will be referred to as "You" or "Licensee."
BY SELECTING THE "I agree" BUTTON BELOW, YOU ARE (I) REPRESENTING
THAT YOU ARE NOT A MINOR, AND HAVE FULL LEGAL CAPACITY AND HAVE
THE AUTHORITY TO BIND YOURSELF AND YOUR EMPLOYER, AS APPLICABLE,
TO THE TERMS OF THIS AGREEMENT; AND (II) CONSENTING ON BEHALF OF
YOURSELF AND/OR AS AN AUTHORIZED REPRESENTATIVE OF YOUR
EMPLOYER, AS APPLICABLE, TO BE BOUND BY THIS AGREEMENT.
BY SELECTING THE "I disagree" BUTTON BELOW, THE INSTALLATION
PROCESS WILL CEASE.
1. CA (or where the Product is being supplied outside of North America the CA
subsidiary identified after Section 15 below for the country in which the
Product is being supplied, and in such instance CA shall mean the CA
subsidiary identified) provides Licensee with one copy of the Product, for use
by a single user, or the quantity designated as the authorized use limitation
("Authorized Use Limitation") on any Order Form (defined below) referencing
the terms of this Agreement or CD sleeve included within the Product box. CA
licenses the Product to Licensee on a non-exclusive basis, pursuant to the
terms of this Agreement as well as the terms of (a) any CA Order Form or
Registration Form which has been signed by Licensee and CA; or (b) a License
Program Certificate which is provided by CA to Licensee, as applicable (each
hereafter referred to as the "Order Form").
Silent Installation License Agreement 257
About the Sample Data
2. If the Product is an alpha or beta version of the program, hereinafter
referred to as the "beta program" or "beta version" and not generally available
to date, CA does not guarantee that the generally available release will be
identical to the beta program or that the generally available release will not
require reinstallation. Licensee agrees that if it registers for support or if
otherwise required by CA, Licensee shall provide CA with specific information
concerning Licensee’s experiences with the operation of the Product. Licensee
agrees and acknowledges that the beta version of the Product (a) is to be used
only for testing purposes and not to perform any production activities unless
CA shall have otherwise approved in writing and (b) has not been tested or
debugged and is experimental and that the documentation may be in draft
form and will, in many cases, be incomplete. Licensee agrees that CA makes
no representations regarding the completeness, accuracy or Licensee’s use or
operation of the beta version of the Product. BETA PRODUCTS ARE PROVIDED
ON AN "AS IS" BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY
WARRANTIES OR REPRESENTATIONS OF TITLE OR NON-INFRINGEMENT. If
Licensee is also a Tester of the beta version of the Product (as "Tester" is
defined by the Beta Testing Agreement that was agreed to by Licensee during
the registration process before obtaining the beta version of the Product),
Licensee agrees that the terms of this Agreement are in addition to, and do
not supersede, the terms of the Beta Testing Agreement.
3. If the Product is being licensed on a trial or evaluation basis, Licensee
agrees to use the Product solely for evaluation purposes, in accordance with
the usage restrictions set forth in Section 1, for a thirty-day evaluation period
unless a different period is otherwise noted (the "Trial Period"). At the end of
the Trial Period, Licensee’s right to use the Product automatically expires and
Licensee agrees to de-install the Product and return to CA all copies or partial
copies of the Product or certify to CA that all copies or partial copies of the
Product have been deleted from Licensee’s computer libraries and/or storage
devices and destroyed. If Licensee desires to continue its use of the Product
beyond the Trial Period, Licensee may contact CA to acquire a license to the
Product for the applicable fee. Licensee’s use of the Product during the Trial
Period is on an "AS IS" basis without any warranty, and CA disclaims all
warranties including, without limitation, the implied warranties of
merchantability and fitness for a particular purpose, as well as any express
warranties provided elsewhere in this Agreement.
258 Implementation Guide
About the Sample Data
4. If the Product includes a Software Development Kit ("SDK"), the terms and
conditions of this paragraph apply solely for the use of the SDK. The SDK may
include software, APIs and associated documentation. The SDK is provided
solely for Licensee's internal use to develop software that enables the
integration of third party software or hardware with the Product, or to develop
software that functions with the Product, such as an agent. Licensee’s use of
the SDK is restricted solely to enhance Licensee’s internal use of the Product.
No distribution rights of any kind are granted to Licensee regarding the
Product. In addition to the limitations on use set forth in Section 8, below,
Licensee may not reproduce, disclose, market, or distribute the SDK or the
documentation or any applications containing any executable versions of the
SDK to third parties, on the internet, or use such executables in excess of the
applicable Authorized Use Limitation. If there is a conflict between the terms
of this section and the terms of any other section in this Agreement, the terms
of this section will prevail solely with respect to the use of the SDK.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, AND
NOTWITHSTANDING ANYTHING CONTAINED HEREIN TO THE CONTRARY, THE
SDK IS PROVIDED AND LICENSED "AS IS" WITHOUT WARRANTY OF ANY
KIND.
5. Payment of the fees specified on the Order Form or as agreed between
Licensee and an authorized reseller of CA, shall entitle Licensee to use the
Product for the term specified on the Order Form (the "Term"), which use may
include the right to receive maintenance services therefor for the period set
forth on the Order Form. After the Term, continued usage and/or
maintenance of the Product as provided herein shall be subject to the payment
by Licensee of the fees described on the Order Form. Notwithstanding the
foregoing, if the Product was licensed under this Agreement without an Order
Form, Licensee shall be entitled to use the Product for an indefinite period, but
the license does not include the right to receive maintenance services.
Notwithstanding the foregoing, with respect to any Product that relies on
continuous content updates, such as signature files and security updates,
Licensee shall be entitled to such content updates for a period of one (1) year
from the effective date of the license.
6. If maintenance is provided by CA, it shall be renewed annually (except as
otherwise provided in the Order Form) and Licensee agrees to pay the annual
renewal maintenance fee, unless either party gives the other at least 20 days
written notice of non-renewal. All fees are net of applicable taxes. Licensee
agrees to pay any tariffs, duties or taxes imposed or levied by any government
or governmental agency including, without limitation, federal, state and local,
sales, use, value added and personal property taxes, (other than franchise and
income taxes for which CA is responsible) upon a presentation of invoices by
CA. Any claimed exemption from such tariffs, duties or taxes must be
supported by proper documentary evidence delivered to CA. Any invoice
which is unpaid by Licensee when due shall be subject to an interest charge
equal to the lower of 1.5% per month or the highest applicable legal rate.
Silent Installation License Agreement 259
About the Sample Data
7. Licensee may use the Product as provided herein solely to process its own
data and the data of its majority-owned subsidiaries and use is restricted to
the location, computer equipment, and Authorized Use Limitation specified on
the Order Form or CD sleeve, as applicable. If Licensee desires to use the
Product beyond such restrictions, it shall notify CA, and Licensee will be
invoiced for and shall pay the applicable fees for such expanded use.
260 Implementation Guide
About the Sample Data
8. The Product, including any source or object code that may be provided to
Licensee hereunder, as well as documentation, appearance, structure and
organization, is the proprietary property of CA and/or its licensors, if any, and
may be protected by copyright, patent, trademark, trade secret and/or other
laws. Title to the Product, or any copy, modification, translation, partial copy,
compilation, derivative work or merged portion of any applicable SDK, shall at
all times remain with CA and/or its licensors. Usage rights respecting the
Product may not be exchanged for any other CA product. The Product is
licensed as a single product. Its component parts may not be separated for
use. Licensee and its employees will keep the Product and the terms of this
license strictly confidential. Licensee may not (i) disclose, de-compile, reverse
assemble disassemble nor otherwise reverse engineer the Product except to
the extent the foregoing restriction is expressly prohibited under applicable
law; (ii) create any derivative works based on the Product; (iii) use the
Product in to provide facilities management or connection with a service
bureau or like activity whereby Licensee, without purchasing a license from CA
for such purpose, operates or uses the Product for the benefit of a third party
who has not purchased a copy of the Product; or (iv) permit the use of the
Product by any third party without the prior written consent of CA. Licensee
shall not release the results of any benchmark testing of the Product to any
third party without the prior written consent of CA. Licensee will not transfer,
assign, rent, lease, use, copy or modify the product, in whole or in part, or
permit others to do any of the foregoing with regard to the Product without
CA’s prior written consent, except to the extent the foregoing restriction is
expressly prohibited under applicable law. Licensee will not remove any
proprietary markings of CA or its licensors. Licensee may copy the Product as
reasonably required for back-up and disaster recovery purposes, provided that
production use of the Product is restricted to the Authorized Use Limitation
specified on the Order Form or CD sleeve, and provided that use of the
Product for disaster recovery testing shall be limited to one week in any three
month period. The Product may be used only within the boundaries of the
country where the Product was purchased (except as otherwise provided on
the Order Form) unless CA consents otherwise in writing. If this license
terminates for any reason, Licensee shall certify to CA in writing that all copies
and partial copies of the Product have been deleted from all computers and
storage devices and are returned to CA or destroyed and are no longer in use.
All fees payable hereunder shall be payable in advance. Licensee will install
each new release of the Product delivered to Licensee. Licensee shall comply
with all relevant import and export regulations, including those adopted by the
Office of Export Administration of the US Department of Commerce. The
Product and any accompanying documentation have been developed entirely
at private expense. They are delivered and licensed as "commercial item"
"computer software" as defined in FAR 2.101. If a Product is being acquired
by or on behalf of the U.S. Government or by a U.S. Government prime
contractor or subcontractor (at any tier), then the Government's rights to the
Product and accompanying documentation will be only as set forth in this
Agreement; and in accordance with FAR 52.227-14 Rights in Data-General,
"Restricted Rights," any equivalent agency regulation or contract clause, or
such applicable successor provisions. CA is the manufacturer of the Product.
Silent Installation License Agreement 261
About the Sample Data
This Agreement shall be governed by and interpreted in accordance with the
laws of the State of New York, without regard to its choice of law provisions.
9. CA warrants that it can enter into this Agreement and that it will indemnify,
hold Licensee harmless, and defend or, at its option, settle any claim that CA
is not so authorized or that Licensee’s use of the Product as authorized hereby
infringes any patent, copyright or other intellectual property right of any third
party. CA also warrants that the Product will operate in accordance with its
published specifications, provided that CA’s only responsibility will be to use
reasonable efforts, consistent with industry standards, to cure any defect. The
foregoing warranty respecting the operation of the Product will be in effect
only during any period for which Licensee shall have paid the applicable license
fee and annual maintenance fee, or, with respect to Products licensed without
an Order Form, during a period of ninety (90) days from Licensee’s acquisition
of license for the Product. If, within a reasonable time after receiving
Licensee’s written notice of breach of either of the above warranties, CA is
unable to cause the Product to operate (a) without infringing a third party’s
intellectual property rights, or (b) in accordance with CA’s written
specifications, then either party may terminate this Agreement on written
notice to the other party and CA or the authorized reseller will refund the
relevant license fees paid for such non-compliant Product only when Licensee
returns the Product to CA or its authorized reseller from whom it obtained the
Product, with the purchase receipt within the warranty period noted above.
10. EXCEPT AS SET FORTH ABOVE, TO THE FULL EXTENT PERMITTED BY
APPLICABLE LAW: (A) NO OTHER WARRANTIES, WHETHER EXPRESS OR
IMPLIED, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE MADE BY
CA; AND (B) IN NO EVENT WILL CA BE LIABLE TO LICENSEE OR ANY OTHER
PARTY FOR ANY CLAIM FOR LOSS, INCLUDING TIME, MONEY, GOODWILL,
AND CONSEQUENTIAL DAMAGES, WHICH MAY ARISE FROM THE USE,
OPERATION OR MODIFICATION OF THE PRODUCT. IN THE EVENT THAT THE
ABOVE LIABILITY LIMITATION IS FOUND TO BE INVALID UNDER APPLICABLE
LAW, THEN CA’S LIABILITY FOR SUCH CLAIM SHALL BE LIMITED TO THE
AMOUNT OF THE LICENSE FEE ACTUALLY PAID FOR THE PRODUCT BY
LICENSEE. NO THIRD PARTY, INCLUDING AGENTS, DISTRIBUTORS, OR
AUTHORIZED CA RESELLERS IS AUTHORIZED TO MODIFY ANY OF THE ABOVE
WARRANTIES OR MAKE ANY ADDITIONAL WARRANTIES ON BEHALF OF CA. CA
DOES NOT WARRANT THAT THE PRODUCT WILL MEET LICENSEE’S
REQUIREMENTS OR THAT USE OF THE PRODUCT WILL BE UNINTERRUPTED
OR ERROR FREE.
262 Implementation Guide
About the Sample Data
11. Licensee may assign this Agreement only if Licensee complies with CA’s
then prevailing policies respecting assignment of licenses, which includes a
requirement that the scope of use of the Product not be expanded beyond the
business of Licensee and the business of Licensee’s majority-owned
subsidiaries. CA may assign this Agreement to any third party that succeeds
to CA’s interests in the Product and assumes the obligations of CA hereunder;
and CA may assign its right to payment hereunder or grant a security interest
in this Agreement or such payment right to any third party.
12. If Licensee breaches any term of this Agreement or if Licensee becomes
insolvent or if bankruptcy or receivership proceedings are initiated by or
against Licensee, CA shall have the right to withhold its own performance
hereunder and/or to terminate this Agreement immediately and, in addition to
all other rights of CA, all amounts due or to become due hereunder will
immediately be due and payable to CA.
13. If Licensee fails to pay the applicable maintenance fee, then Licensee may
reinstate maintenance thereafter by paying to CA a fee equal to 150% of CA’s
then prevailing maintenance fee for each year for which the maintenance fee
has not been paid.
14. If a court holds that any provision of this Agreement to be illegal, invalid
or unenforceable, the remaining provisions shall remain in full force and effect.
No waiver of any breach of this Agreement shall be a waiver of any other
breach, and no waiver shall be effective unless made in writing and signed by
an authorized representative of the waiving party. Any questions concerning
this Agreement should be referred to Computer Associates International, Inc.,
One Computer Associates Plaza, Islandia, NY 11749, Attention: Worldwide Law
Department.
15. In the event Licensee acquires a license for the Product outside of the
United States, the following Sections will apply to the use of the Product:
Notwithstanding the terms of the last sentence of Section 8, the laws of the
country in which Licensee acquires a license for the Product shall govern this
Agreement, except as otherwise provided below.
In Albania, Armenia, Belarus, Bosnia/Herzegovina, Bulgaria, Croatia, Georgia,
Hungary, Kazakhstan, Kirghizia, Former Yugoslav Republic of Macedonia
(FYROM), Moldova, Romania, Russia, Slovak Republic, Slovenia, Ukraine and
Federal Republic of Yugoslavia, the laws of Austria govern this Agreement.
Argentina
The CA subsidiary that is the licensor is Computer Associates de Argentina S.A.
The last sentence of Section 8 is deleted and replaced with:
Silent Installation License Agreement 263
About the Sample Data
This Agreement shall be governed by and interpreted in accordance with the
laws of Argentina. Any dispute hereunder shall be determined by the
Tribunales de la Cuidad de Buenos Aires.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates de Argentina S.A, Avenida Alicia Moreau de Justo, 400, 2 piso,
1107, Buenos Aires - At.: Finance Department.
Australia
The CA subsidiary that is the licensor is Computer Associates Pty. Ltd.
The following is added to each of the end of Sections 2, 3 and 10:
Although CA specifies that there are no warranties, Licensee may have certain
rights under the Trade Practices Act 1974 and other state and territory
legislation which may not be excluded but may be limited. To the full extent
permitted by law CA excludes all terms not expressly set out in the express
terms of this Agreement, and limits any terms imposed by the Trade Practices
Act 1974 and other state and territory legislation to the full extent permitted
by the applicable legislation.
The last sentence of Section 8 is deleted and replaced with:
The laws of the State or Territory in which the transaction is performed govern
this Agreement.
The following is added to Section 10:
Where CA is in breach of a condition or warranty implied by the Trade
Practices Act 1974 or other state and territory legislation, CA's liability is
limited, in the case of goods, to the repair or replacement of the goods, or
payment for the repair or replacement of the goods, and in the case of
services, the supplying of the services again or payment for the re-supply of
the services, as CA may elect. Where that condition or warranty relates to a
right to sell, quiet possession or clear title, in respect of goods or if the goods
supplied by CA are of a kind ordinarily acquired for personal, domestic or
household use or consumption, then none of the limitations in this Section
apply.
Austria
The last sentence of Section 8 is deleted and replaced with:
The laws of Austria govern this Agreement. The following is added to Section
8: In addition, CA is entitled to bring action against Licensee in a court located
in Licensee’s place of incorporation, establishment or permanent residence.
264 Implementation Guide
About the Sample Data
The following is added to Section 10:
Any liability for the slight negligence of CA is excluded.
The following is added to the Agreement:
In the event the Licensee qualifies as a consumer according to Austrian
Consumer Protection Act ("Konsumentenschutzgesetz" -"KSchG") Sections 2,
3, 9 and 10 of this Agreement are not applicable to the extent they reduce
CA’s liability and the consumer’s warranty.
Belgium
The CA subsidiary that is the licensor is Computer Associates S.A./N.V.
The last sentence of Section 8 is deleted and replaced with:
The courts of CA’s registered office shall have exclusive jurisdiction regarding
any dispute that may arise between the parties dealing with the formation,
execution, interpretation, or termination of this Agreement, including but not
limited to measures of conservation, emergency proceedings, warranty
proceedings, petition or in case of more than one defendant.
The last sentence of Section 14 are deleted and replaced with:
Any question concerning this Agreement should be referred to Computer
Associates S.A./N.V., Da Vincilaan 11, Box F2, Building Figueras, B-1935
Zaventem, Attention: Worldwide Law Department.
Brazil
The CA subsidiary that is the licensor is Computer Associates Programas de
Programas de Computador Ltda.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Brazil. Any dispute hereunder shall be determined by a court of the
São Paulo City Hall.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates Programas de Programas de Computador Ltda, Avenida das Nações
Unidas, 12901 - 6 andar - Torre Norte - São Paulo - SP, 04578-000, At.:
Worldwide Law Department.
Silent Installation License Agreement 265
About the Sample Data
Canada
The CA subsidiary that is the licensor is Computer Associates Canada
Company.
The last sentence of Section 8 is deleted and replaced with:
The laws in the Province of Ontario shall govern this Agreement.
Chile
The CA subsidiary that is the licensor is Computer Associates de Chile S.A.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Chile. Any dispute hereunder shall be determined by the Tribunales
Ordinarios de la Cuidad de Santiago.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates de Chile S.A, Avenida Providencia 1760, piso 15 - Edificio Palladio,
oficina 1501 - 6640709 Providencia - Santiago - At.: Finance Department.
China
The CA subsidiary that is the licensor is Computer Associates (China) Co., Ltd.
The second sentence of Section 6 is deleted and replaced with:
All fees are inclusive of VAT.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of the People’s Republic of China, without regard to its choice of law
provisions. Any dispute hereunder shall be determined by a competent court
located in Beijing.
Columbia
The CA subsidiary that is the licensor is Computer Associates de Colombia S.A.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Colombia. Any dispute hereunder shall be determined by the
Tribunales Ordinarios de la Cuidad de Bogotá.
266 Implementation Guide
About the Sample Data
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates de Colombia S.A, Avenida 82, numero 12-18, Oficina 305 - Santa
Fé de Bogotá, D.C., Colombia - At.: Finance Department.
Czech Republic
The first sentence of Section 1 is deleted and replaced with:
CA grants the Licensee a non-exclusive license to use the Product, for use by a
single user, or the quantity designated as the authorized use limitation
("Authorized Use Limitation") on any Order Form (defined below) referencing
the terms of this Agreement or CD sleeve included within the Product box.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of the Czech Republic, without regard to its choice of law provisions. Any
dispute hereunder shall be determined by a court of competent jurisdiction
within the Czech Republic.
Section 10 is deleted and replaced with:
Except as set forth above, to the full extent permitted by applicable law, no
other warranties, whether express or implied, including, without limitation, the
implied warranties of merchantability and fitness for a particular purpose, are
made by CA.
Denmark
The CA subsidiary that is the licensor is Computer Associates Scandinavia A/S.
The third paragraph of the Preamble is deleted and replaced with:
BY INSTALLING, COPYING OR USING THE PRODUCT OR BY SELECTING THE "I
agree" BUTTON BELOW, YOU ARE (I) REPRESENTING THAT YOU ARE NOT A
MINOR AND HAVE FULL LEGAL CAPACITY AND HAVE THE AUTHORITY TO BIND
YOURSELF AND YOUR EMPLOYER, AS APPLICABLE, TO THE TERMS OF THIS
AGREEMENT; AND (II) CONSENTING ON BEHALF OF YOURSELF AND/OR AS
AN AUTHORIZED REPRESENTATIVE.
The following is added to the last paragraph of the Preamble:
Silent Installation License Agreement 267
About the Sample Data
In the event that you click on "I disagree" the installation shall cease. You
should delete all copies of the Product from your computer systems and
return, by registered first class post, the Product, complete with box and any
documentation, to CA or the authorized reseller from whom you purchased the
Product with your proof of purchase within thirty (30) days of the date of
purchase. You will promptly be issued a full refund of any license fees paid for
the Product and, if applicable, maintenance fees paid. If requested at the time
of return and provided that receipts of costs incurred are provided, CA or the
authorized reseller shall also refund to you any postage costs you incurred in
returning the Product.
The second to last sentence of Section 2 is deleted and replaced with:
BETA PRODUCTS ARE PROVIDED ON AN "AS IS" BASIS, WITHOUT
WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR
IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES, CONDITIONS
OR REPRESENTATIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY
AND FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The last sentence of Section 3 is deleted and replaced with:
LICENSEE’S USE OF THE PRODUCT DURING THE TRIAL PERIOD IS ON AN "AS
IS" BASIS WITHOUT ANY WARRANTY, AND CA DISCLAIMS ALL WARRANTIES
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR
CONDITIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY AND
FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The seventh sentence of Section 8 is deleted and replaced with:
Licensee may not (i) disclose, de-compile, disassemble nor otherwise reverse
engineer the Product save to the extent expressly permitted by law; (ii) create
any derivative works based on the Product; (iii) use the Product in connection
with a service bureau or like activity whereby Licensee, without purchasing a
license from CA for such purpose, operates or uses the Product for the benefit
of a third party who has not purchased a copy of the Product; or (iv) permit
the use of the Product by any third party without the prior written consent of
CA, save for contract staff of the Licensee who are acting on the Licensee’s
business, not engaged in facilities management and who the Licensee agrees
as a condition of this Agreement to ensure such contract staff shall comply
with all the terms of this Agreement, including without limitation,
confidentiality provisions.
268 Implementation Guide
About the Sample Data
Section 10. (A) is deleted and replaced with:
NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A
PARTICULAR PURPOSE, ARE MADE BY CA; AND
The following is added at the end of Section 10:
The foregoing exclusions and limitations upon liability shall not apply to any
liability for damages arising from (a) tangible property damage to the extent
that such is due to the negligence of an employee or authorized agent of CA,
in which event CA’s maximum liability shall be limited to $1,000,000 for each
event or series of events, or (b) death or personal injury caused by the
negligence of an employee or authorized agent of CA.
France
The CA subsidiary that is the licensor is Computer Associates S.A.
The last sentence of Section 8 is deleted and replaced with:
The Commercial Court of Paris shall have exclusive jurisdiction regarding any
dispute that may arise between the parties dealing with the formation,
execution, interpretation, or termination of this Agreement, including but not
limited to measures of conservation, emergency proceedings, warranty
proceedings, petition or in case of more than one defendant.
The last sentence of Section 14 is deleted and replaced with:
Any question concerning this Agreement should be referred to Computer
Associates S.A., Immeuble Ex-Libris, 25, Quai du Président Paul Doumer,
92408 Courbevoie Cedex, Attention: Worldwide Law Department.
Germany
The CA subsidiary that is the licensor is C.A. Computer Associates GmbH.
Section 6 of the Agreement is deleted.
The twelfth sentence of Section 8 is deleted. The sixteenth sentence of Section
8 is deleted and replaced with:
Licensee shall comply with all relevant import and export regulations, including
those adopted by the Office of Export Administration of the US Department of
Commerce, any competent EU government and German export regulations.
Licensee understands and acknowledges that US, EU and German restrictions
vary regularly and, depending on Product, Licensee must refer to then current
US, EU or German regulations.
Silent Installation License Agreement 269
About the Sample Data
The following is added to Section 9:
CA shall not be liable for any infringement based upon use of other than an
unaltered release of the Product unless altered with CA's prior written consent.
Section 10 is deleted and replaced with:
In case of (i) willful misconduct, no limitation of liability applies;(ii) personal
injury or damage to property, CA’s liability to Licensee is limited to the
maximum amount that CA will recover under its insurance policies; (iii) gross
negligence that results in other damage than personal injury or damage to
property, CA’s liability to Licensee shall be limited to an amount equal to the
license fee for the Product; (iv) negligence that results in damages other than
personal injury or damage to property, CA’s liability to Licensee shall be
limited to an amount equal to fifty percent (50%) of the license fee for the
Product. Notwithstanding the foregoing, the aggregated liability according to
(iii) and (iv) above shall never exceed an amount equal to the purchase price
of the Product. Except in case of willful misconduct or gross negligence,
neither party shall be liable to the other for indirect, incidental, special or
consequential damage, including but not limited to harm to services supplied
by Licensee, or loss of business, loss of profit, or loss of data, arising out of or
in connection with the implementation or the use of the Product. No actions,
regardless of form, arising out of this Agreement may be brought by either
party more than three (3) years after the cause of action has arisen, or, in the
cause of non-payment, more than three (3) years from the date of the
relevant invoice. Neither party shall be liable for delay in performing or failure
to perform any of its obligations under this Agreement if the delay or failure
results from events or circumstances outside its reasonable control. Such
delay or failure shall not constitute a breach of this Agreement and time for
performance shall be extended by time equivalent to the length of the delay
caused by force majeure.
Greece
The CA subsidiary that is the licensor is COMPUTER ASSOCIATES HELLAS LTD.
The last sentence of Section 8 is deleted and replaced with:
Any dispute hereunder shall finally be determined by Athens Courts.
Hong Kong
The CA subsidiary that is the licensor is Computer Associates International Ltd.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Hong Kong. The courts of Hong Kong will have sole and exclusive
jurisdiction with respect to any disputes arising out of this Agreement.
270 Implementation Guide
About the Sample Data
The following is added at the end of Section 10:THE AFOREMENTIONED
LIABILITY LIMITATION AND THE AFOREMENTIONED MAXIMUM LIABILITY
AMOUNT WILL NOT AFFECT OR PREJUDICE THE STATUTORY RIGHTS OF THE
LICENSEE UNDER THE SALE OF GOODS ORDINANCE, THE SUPPLY OF
SERVICES (IMPLIED TERMS) ORDINANCE OR THE CONTROL OF EXEMPTION
SECTIONS ORDINANCE, NOR WILL THEY LIMIT OR EXCLUDE ANY LIABILITY
FOR DEATH OR PERSONAL INJURY SOLELY CAUSED BY CA'S NEGLIGENCE.
India
The CA subsidiary that is the licensor is C.A. Computer Associates India Pvt.
Ltd.
The last sentence of Section 8 is deleted and replaced with:
This Agreement and the terms hereof shall be governed and construed in
accordance with the laws of India and the courts of Mumbai shall have sole
and exclusive jurisdiction with respect to any disputes arising out of this
Agreement.
Indonesia
The last sentence of Section 8 is deleted and replaced with:
This Agreement and the terms hereof shall be governed and construed in
accordance with the laws of Indonesia. The courts of Indonesia, located in
Jakarta, will have the sole and exclusive jurisdiction with respect to any
disputes arising out of this Agreement.
Section 9 is amended by adding the following:
Licensee represents that Licensee (i) has full corporate power and authority;
and (ii) is legally capable to execute, deliver and perform this Agreement. CA
and Licensee agree to waive any provisions, procedures and operation of any
applicable law to the extent that a court order is required for termination of
this Agreement.
Israel
The CA subsidiary that is the licensor is CA COMPUTER ASSOCIATES ISRAEL
LTD.
The last sentence of Section 8 is deleted and replaced with:
Any dispute hereunder shall finally be determined by Tel Aviv Courts.
Silent Installation License Agreement 271
About the Sample Data
Italy
The CA subsidiary that is the licensor is COMPUTER ASSOCIATES S.p.A.
According to article 1341 and 1342 of the Italian Civil Code, the Licensee
expressly accepts the terms and conditions included in Sections 6 (specifically
the interest rate set forth in the last sentence), 8 and 9.
The last sentence of Section 8 is deleted and replaced with:
Any dispute hereunder shall finally be determined by Milan Courts.
Japan
The CA subsidiary that is the licensor is Computer Associates Japan, Ltd.
The third sentence of Section 6 is deleted and replaced with:
Licensee agrees to pay any tariffs, duties or taxes imposed or levied by any
government or governmental agency other than the taxes for which CA is
responsible upon a presentation of invoices by CA.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of the country of Japan, without regard to its choice of law provisions.
Any dispute hereunder shall finally be determined by Tokyo District Court
located in Tokyo Japan.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates Japan, Ltd., 2-1-1, Nishishinjyuku, Shinjyuku-ku, Tokyo, 163-0439,
Japan, Attention: Worldwide Law Department.
Korea
The CA subsidiary that is the licensor is Computer Associates Korea Limited.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Republic of Korea, without regard to its choice of law provisions.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates Korea Limited, City Air Tower (18th Fl.), 159-9, Samsung-Dong,
Kangnam-Ku, Seoul 135-973 Korea, Attention: Worldwide Law Department.
272 Implementation Guide
About the Sample Data
Malaysia
The CA subsidiary that is the licensor is Computer Associates (M) Sdn. Bhd.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Malaysia. The courts of Malaysia will have sole and exclusive
jurisdiction with respect to any disputes arising out of this Agreement.
The following is added to Section 10:
Although CA specifies that there are no other warranties, Licensee may have
certain rights under the Consumer Protection Act 1999 and the warranties are
only limited to the extent permitted by the applicable legislation.
Mexico
The CA subsidiary that is the licensor is Computer Associates de México S.A.
de C.V.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of México. Any dispute hereunder shall be determined by the Tribunales
de la Cuidad de México.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates de México S.A. de C.V, Avenida Jaime Balmes, 8 - Piso 4 - Oficina
403 - Col. Los Morales - Polanco , 11510 - Mexico - DF - At.: Finance
Department.
Netherlands
The CA subsidiary that is the licensor is Computer Associates B.V.
The third paragraph of the Preamble is deleted and replaced with:
BY INSTALLING, COPYING OR USING THE PRODUCT OR BY SELECTING THE "I
agree" BUTTON BELOW, YOU ARE (I) REPRESENTING THAT YOU ARE NOT A
MINOR AND HAVE FULL LEGAL CAPACITY AND HAVE THE AUTHORITY TO BIND
YOURSELF AND YOUR EMPLOYER, AS APPLICABLE, TO THE TERMS OF THIS
AGREEMENT; AND (II) CONSENTING ON BEHALF OF YOURSELF AND/OR AS
AN AUTHORIZED REPRESENTATIVE.
The following is added to the last paragraph of the Preamble:
Silent Installation License Agreement 273
About the Sample Data
In the event that you click on "I disagree" the installation shall cease. You
should delete all copies of the Product from your computer systems and
return, by registered first class post, the Product, complete with box and any
documentation, to CA or the authorized reseller from whom you purchased the
Product with your proof of purchase within thirty (30) days of the date of
purchase. You will promptly be issued a full refund of any license fees paid for
the Product and, if applicable, maintenance fees paid. If requested at the time
of return and provided that receipts of costs incurred are provided, CA or the
authorized reseller shall also refund to you any postage costs you incurred in
returning the Product.
The second to last sentence of Section 2 is deleted and replaced with:
BETA PRODUCTS ARE PROVIDED ON AN "AS IS" BASIS, WITHOUT
WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR
IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES, CONDITIONS
OR REPRESENTATIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY
AND FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The last sentence of Section 3 is deleted and replaced with:
LICENSEE’S USE OF THE PRODUCT DURING THE TRIAL PERIOD IS ON AN "AS
IS" BASIS WITHOUT ANY WARRANTY, AND CA DISCLAIMS ALL WARRANTIES
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR
CONDITIONS OF MERCHANTABILITY OR SATISFACTOERY QUALITY AND
FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The seventh sentence of Section 8 is deleted and replaced with:
Licensee may not (i) disclose, de-compile, disassemble nor otherwise reverse
engineer the Product save to the extent expressly permitted by law; (ii) create
any derivative works based on the Product; (iii) use the Product in connection
with a service bureau or like activity whereby Licensee, without purchasing a
license for such purpose from CA, operates or uses the Product for the benefit
of a third party who has not purchased a copy of the Product; or (iv) permit
the use of the Product by any third party without the prior written consent of
CA, save for contract staff of the Licensee who are acting on the Licensee’s
business, not engaged in facilities management and who the Licensee agrees
as a condition of this Agreement to ensure that such contract staff shall
comply with all the terms of this Agreement, including without limitation,
confidentiality provisions.
274 Implementation Guide
About the Sample Data
Section 10.(A) is deleted and replaced with:
NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A
PARTICULAR PURPOSE, ARE MADE BY CA.
The following is added at the end of Section 10:
The foregoing exclusions and limitations upon liability shall not apply to any
liability for damages arising from (a) tangible property damage to the extent
that such is due to the negligence of an employee or authorized agent of CA,
in which event CA’s maximum liability shall be limited to $1,000,000 for each
event or series of events, or (b) death or personal injury caused by the
negligence of an employee or authorized agent of CA, or (c) willful misconduct
or gross negligence of CA.
New Zealand
The CA subsidiary that is the licensor is Computer Associates (N.Z.) Ltd.
Notwithstanding the final sentence of Section 6, the applicable interest charge
on invoices unpaid by Licensee is 1.5% per month.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of New Zealand. The courts of New Zealand will have sole and exclusive
jurisdiction with respect to any disputes arising out of this Agreement.
The following is added to Section 10:
Although CA specifies that there are no warranties, Licensee may have certain
rights under the Consumer Guarantees Act 1993 or other legislation which
cannot be excluded or limited. The Consumer Guarantees Act 1993 will not
apply in respect of any goods or services which CA supplies, if Licensee
acquires the goods and services for the purposes of a business as defined in
that Act. Where the Product is not acquired for the purposes of a business as
defined in the Consumer Guarantees Act 1993, the limitations in this Section
are subject to the limitations in that Act.
The following is added to Section 12:
CA’s rights under this Section shall also apply if any resolution is passed or
proceedings are commenced for the liquidation or winding up of Licensee.
Silent Installation License Agreement 275
About the Sample Data
Norway
The CA subsidiary that is the licensor is Computer Associates Norway AS.
The third paragraph of the Preamble is deleted and replaced with:
BY INSTALLING, COPYING OR USING THE PRODUCT OR BY SELECTING THE "I
agree" BUTTON BELOW, YOU ARE (I) REPRESENTING THAT YOU ARE NOT A
MINOR AND HAVE FULL LEGAL CAPACITY AND HAVE THE AUTHORITY TO BIND
YOURSELF AND YOUR EMPLOYER, AS APPLICABLE, TO THE TERMS OF THIS
AGREEMENT; AND (II) CONSENTING ON BEHALF OF YOURSELF AND/OR AS
AN AUTHORIZED REPRESENTATIVE.
The following is added to the last paragraph of the Preamble:
In the event that you click on "I disagree" the installation shall cease. You
should delete all copies of the Product from your computer systems and
return, by registered first class post, the Product, complete with box and any
documentation, to CA or the authorized reseller from whom you purchased the
Product with your proof of purchase within thirty (30) days of the date of
purchase. You will promptly be issued a full refund of any license fees paid for
the Product and, if applicable, maintenance fees paid. If requested at the time
of return and provided that receipts of costs incurred are provided, CA or the
authorized reseller shall also refund to you any postage costs you incurred in
returning the Product.
The second to last sentence of Section 2 is deleted and replaced with:
BETA PRODUCTS ARE PROVIDED ON AN "AS IS" BASIS, WITHOUT
WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR
IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES, CONDITIONS
OR REPRESENTATIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY
AND FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The last sentence of Section 3 is deleted and replaced with:
LICENSEE’S USE OF THE PRODUCT DURING THE TRIAL PERIOD IS ON AN "AS
IS" BASIS WITHOUT ANY WARRANTY, AND CA DISCLAIMS ALL WARRANTIES
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR
CONDITIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY AND
FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
276 Implementation Guide
About the Sample Data
The seventh sentence of Section 8 is deleted and replaced with:
Licensee may not (i) disclose, de-compile, disassemble nor otherwise reverse
engineer the Product save to the extent expressly permitted by law; (ii) create
any derivative works based on the Product; (iii) use the Product in connection
with a service bureau or like activity whereby Licensee, without purchasing a
license from CA for such purpose, operates or uses the Product for the benefit
of a third party who has not purchased a copy of the Product; or (iv) permit
the use of the Product by any third party without the prior written consent of
CA, save for contract staff of the Licensee who are acting on the Licensee’s
business, not engaged in facilities management and who the Licensee agrees
as a condition of this Agreement to ensure that such contract staff shall
comply with all the terms of this Agreement, including without limitation,
confidentiality provisions.
Section 10.(A) is deleted and replaced with:
NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A
PARTICULAR PURPOSE, ARE MADE BY CA.
The following is added at the end of Section 10:
The foregoing exclusions and limitations upon liability shall not apply to any
liability for damages arising from (a) tangible property damage to the extent
that such is due to the negligence of an employee or authorized agent of CA,
in which event CA’s maximum liability shall be limited to $1,000,000 for each
event or series of events, or (b) death or personal injury caused by the
negligence of an employee or authorized agent of CA, or (c) willful misconduct
or gross negligence of CA.
Peru
The CA subsidiary that is the licensor is Computer Associates de Peru S.A.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Peru. Any dispute hereunder shall be determined by the Tribunales
Ordinarios de La Cuidad de Lima.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates de Peru S.A, Avenida Paseo de La Republica, 3211, Piso 11, San
Isidro, Lima 27, Peru - At.: Finance Department.
Silent Installation License Agreement 277
About the Sample Data
Philippines
The CA subsidiary that is the licensor is Philippine Computer Associates
International Inc.
The first seven sentences of Section 8 are deleted and replaced with:
Title to the Product and all modifications thereto shall remain with CA. The
Product is a trade secret and the proprietary property of CA or its licensors.
Usage rights respecting the Product may not be exchanged for any other CA
product. Licensee and its employees will keep the Product and the terms of
this Agreement strictly confidential. To the maximum extent permitted by
applicable law, Licensee will not disclose, de-compile, disassemble nor
otherwise reverse engineer the Product.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of the Philippines. The courts of Makati City will have sole and exclusive
jurisdiction with respect to any disputes arising out of this Agreement.
Section 12 is deleted and replaced with:
If Licensee breaches any term of this Agreement or if Licensee becomes
insolvent or if bankruptcy or receivership proceedings are initiated by or
against Licensee, CA shall have the right to withhold its own performance
hereunder and/or to terminate this Agreement immediately upon notice and,
in addition to all other rights of CA, all amounts due or to become due
hereunder will immediately be due and payable to CA.
Poland
If payments are to be made in PLN, the last sentence of Section 6 is replaced
as follows:
Any invoice which is unpaid by Licensee when due shall be subject to an
interest charge equal to the lower of 1.5% per month or the statutory delay
interest rate then applicable in Poland.
The last sentence of Section 8 is deleted and replaced with:
The laws of Poland govern this Agreement.
278 Implementation Guide
About the Sample Data
Section 12 is deleted and replaced with:
If Licensee breaches any term of this Agreement or if Licensee becomes
insolvent or if bankruptcy or receivership proceedings are initiated by or
against Licensee, CA shall have the right to withhold its own performance
hereunder and/or, to the extent permitted by the applicable law, to terminate
this Agreement immediately and, in addition to all other rights of CA, all
amounts due or to become due hereunder will immediately be due and
payable to CA.
Portugal
The last sentence of Section 8 is deleted and replaced with:
Any dispute hereunder shall finally be determined by Lisbon Courts.
Singapore
The CA subsidiary that is the licensor is Computer Associates Pte. Ltd.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Singapore. The courts of Singapore will have sole and exclusive
jurisdiction with respect to any disputes arising out of this Agreement.
The following is added to the end if Section 9:
To the full extent permitted by applicable law, CA disclaims all implied
conditions or warranties of satisfactory quality or fitness for purpose.
The following is added at the end of Section 10:
The limitation of liability set forth in this Section above will not apply to any
breach of CA’s obligations implied by Section 12 of the Sales of Goods Act
(Cap 393). In addition, if you are a consumer, the limitation of liability will not
apply to any breach of CA’s obligations implied by Sections 13, 14 or 15 of the
Sale of Goods Act (Cap 393).
Silent Installation License Agreement 279
About the Sample Data
Sweden
The CA subsidiary that is the licensor is Computer Associates Sweden AB.
The third paragraph of the Preamble is deleted and replaced with:
BY INSTALLING, COPYING OR USING THE PRODUCT OR BY SELECTING THE "I
agree" BUTTON BELOW, YOU ARE (I) REPRESENTING THAT YOU ARE NOT A
MINOR AND HAVE FULL LEGAL CAPACITY AND HAVE THE AUTHORITY TO BIND
YOURSELF AND YOUR EMPLOYER, AS APPLICABLE, TO THE TERMS OF THIS
AGREEMENT; AND (II) CONSENTING ON BEHALF OF YOURSELF AND/OR AS
AN AUTHORIZED REPRESENTATIVE.
The following is added to the last paragraph of the Preamble:
In the event that you click on "I disagree" the installation shall cease. You
should delete all copies of the Product from your computer systems and
return, by registered first class post, the Product, complete with box and any
documentation, to CA or the authorized reseller from whom you purchased the
Product with your proof of purchase within thirty (30) days of the date of
purchase. You will promptly be issued a full refund of any license fees paid for
the Product and, if applicable, maintenance fees paid. If requested at the time
of return and provided that receipts of costs incurred are provided, CA or the
authorized reseller shall also refund to you any postage costs you incurred in
returning the Product.
The second to last sentence of Section 2 is deleted and replaced with:
BETA PRODUCTS ARE PROVIDED ON AN "AS IS" BASIS, WITHOUT
WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR
IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES, CONDITIONS
OR REPRESENTATIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY
AND FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The last sentence of Section 3 is deleted and replaced with:
LICENSEE’S USE OF THE PRODUCT DURING THE TRIAL PERIOD IS ON AN "AS
IS" BASIS WITHOUT ANY WARRANTY, AND CA DISCLAIMS ALL WARRANTIES
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR
CONDITIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY AND
FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
280 Implementation Guide
About the Sample Data
The seventh sentence of Section 8 is deleted and replaced with:
Licensee may not (i) disclose, de-compile, disassemble nor otherwise reverse
engineer the Product save to the extent expressly permitted by law; (ii) create
any derivative works based on the Product; (iii) use the Product in connection
with a service bureau or like activity whereby Licensee, without purchasing a
license from CA for that purpose, operates or uses the Product for the benefit
of a third party who has not purchased a copy of the Product; or (iv) permit
the use of the Product by any third party without the prior written consent of
CA, save for contract staff of the Licensee who are acting on the Licensee’s
business, not engaged in facilities management and who the Licensee agrees
as condition of this Agreement to ensure that such staff shall comply with all
the terms of this Agreement, including without limitation, confidentiality
provisions.
Section 10.(A) is deleted and replaced with:
NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A
PARTICULAR PURPOSE, ARE MADE BY CA.
The following is added at the end of Section 10:
The foregoing exclusions and limitations upon liability shall not apply to any
liability for damages arising from (a) tangible property damage to the extent
that such is due to the negligence of an employee or authorized agent of CA,
in which event CA’s maximum liability shall be limited to $1,000,000 for each
event or series of events, or (b) death or personal injury caused by the
negligence of an employee or authorized agent of CA, or (c) willful misconduct
or gross negligence of CA.
Switzerland
The following is added at the end of Section 1:
THE PLACE OF PERFORMANCE OF ANY DUTIES OF CA UNDER THIS
AGREEMENT IS ISLANDIA, NEW YORK.
The last sentence of Section 8 is deleted and replaced with:
ANY DISPUTE HEREUNDER SHALL BE DETERMINED BY A COURT OF
COMPETENT JURISDICTION WITHIN THE STATE OF NEW YORK, U. S. A.
Taiwan
The CA subsidiary that is the licensor is Computer Associates Taiwan Ltd.
Silent Installation License Agreement 281
About the Sample Data
The second sentence of Section 6 is deleted and replaced with:
All fees are inclusive of VAT.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of the Republic of China, without regard to its choice of law provisions.
Any dispute hereunder shall be determined by Taipei District Court.
Thailand
The CA subsidiary that is the licensor is Computer Associates Pte. Ltd.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Thailand. The courts of Thailand will have sole and exclusive
jurisdiction with respect to any disputes arising out of this Agreement.
Turkey
The following is added at the end of Section 8:
Licensee undertakes to keep all information of trade secret nature strictly
private and confidential, and to use all necessary measures and its best efforts
in order to assure and maintain the confidentiality thereof and to prevent and
protect it, or any part thereof, from disclosure to any third person.
Furthermore, Licensee hereby expressly undertakes: (i) not to use a CA trade
secret directly or indirectly in any respect or for whatever reason on its own
behalf or on behalf of any third party or allow it to be used for any other
purpose except as expressly permitted by CA; or (ii) not to disclose, decompile, disassemble nor otherwise reverse engineer the Product and to avoid
such a disclosure in whatever form, and (iii) not to copy or permit the others
to copy without CA’s prior written consent
Licensee acknowledges that in the event of a breach of any one of the
obligations imposed upon it under this Section, CA might suffer significant
damage, notwithstanding the return of all copies of the Product, arising out of
the fact that it has breached the aforesaid obligations. Consequently, Licensee
undertakes to indemnify CA in full against any such damage.
Licensee acknowledges that CA has the right to prevent any threat to
confidentiality or restrain ongoing infringement or breach of confidentiality by
Licensee through legal proceedings and in case an order is obtained against
Licensee for breach, Licensee shall reimburse CA’s juridical costs and expenses
including the attorney fees.
282 Implementation Guide
About the Sample Data
The following is added at the end of Section 9:
In the event that CA is rendered unable, wholly or in part, to perform or
implement any of its warranties herein set forth, by force majeure which
includes governmental controls or orders of the government of Turkey, acts of
God, wars, commotion or riot, epidemics, strikes, lockouts and any other
events or forces beyond its reasonable control, it shall be relieved from such
warranties and shall not be held liable for the non-fulfillment and/or
suspended implementation thereof, as long as and to the extent that the effect
of such events or forces remains unabated.
The following is added at the end of the second sentence of Section 10:
EXCEPT THAT MAY ARISE FROM CA’S WILFUL FAULT OR NEGLIGENCE.
United Kingdom
The CA subsidiary that is the licensor is Computer Associates Plc.
The third paragraph of the Preamble is deleted and replaced with:
BY INSTALLING, COPYING OR USING THE PRODUCT OR BY SELECTING THE "I
agree" BUTTON BELOW, YOU ARE (I) REPRESENTING THAT YOU ARE NOT A
MINOR AND HAVE FULL LEGAL CAPACITY AND HAVE THE AUTHORITY TO BIND
YOURSELF AND YOUR EMPLOYER, AS APPLICABLE, TO THE TERMS OF THIS
AGREEMENT; AND (II) CONSENTING ON BEHALF OF YOURSELF AND/OR AS
AN AUTHORIZED REPRESENTATIVE.
The following is added to the last paragraph of the Preamble:
In the event that you click on "I disagree" the installation shall cease. You
should delete all copies of the Product from your computer systems and
return, by registered first class post, the Product, complete with box and any
documentation, to CA or the authorized reseller from whom you purchased the
Product with your proof of purchase within thirty (30) days of the date of
purchase. You will promptly be issued a full refund of any license fees paid for
the Product and, if applicable, maintenance fees paid. If requested at the time
of return and provided that receipts of costs incurred are provided, CA or the
authorized reseller shall also refund to you any postage costs you incurred in
returning the Product.
The second to last sentence of Section 2 is deleted and replaced with:
BETA PRODUCTS ARE PROVIDED ON AN "AS IS" BASIS, WITHOUT
WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR
IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES, CONDITIONS
OR REPRESENTATIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY
AND FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
Silent Installation License Agreement 283
About the Sample Data
The last sentence of Section 3 is deleted and replaced with:
LICENSEE’S USE OF THE PRODUCT DURING THE TRIAL PERIOD IS ON AN "AS
IS" BASIS WITHOUT ANY WARRANTY, AND CA DISCLAIMS ALL WARRANTIES
INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR
CONDITIONS OF MERCHANTABILITY OR SATISFACTORY QUALITY AND
FITNESS FOR A PARTICULAR PURPOSE, AS WELL AS ANY EXPRESS
WARRANTIES PROVIDED ELSEWHERE IN THIS AGREEMENT.
The seventh sentence of Section 8 is deleted and replaced with:
Licensee may not (i) disclose, de-compile, disassemble nor otherwise reverse
engineer the Product save to the extent expressly permitted by law; (ii) create
any derivative works based on the Product; (iii) use the Product in connection
with a service bureau or like activity whereby Licensee, without purchasing a
license from CA for that purpose, operates or uses the Product for the benefit
of a third party who has not purchased a copy of the Product; or (iv) permit
the use of the Product by any third party without the prior written consent of
CA, save for contract staff of the Licensee who are acting on the Licensee’s
business, not engaged in facilities management and who the Licensee agrees
as a condition of this Agreement to ensure that such contract staff shall
comply with all the terms of this Agreement, including without limitation,
confidentiality provisions.
The last sentence of Section 8 is deleted and replaced with:
All disputes relating to this Agreement will be governed by the laws of England
and Wales and will be submitted to the exclusive jurisdiction of the English
courts.
Section 10.(A) is deleted and replaced with:
NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, INCLUDING,
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OR CONDITIONS OF
MERCHANTABILITY, SATISFACTORY QUALITY AND FITNESS FOR A
PARTICULAR PURPOSE, ARE MADE BY CA.
The following is added at the end of Section 10:
The foregoing exclusions and limitations upon liability shall not apply to any
liability for damages arising from (a) tangible property damage to the extent
that such is due to the negligence of an employee or authorized agent of CA,
in which event CA’s maximum liability shall be limited to $1,000,000 for each
event or series of events, or (b) death or personal injury caused by the
negligence of an employee or authorized agent of CA, or (c) willful misconduct
or gross negligence of CA.
284 Implementation Guide
About the Sample Data
Venezuela
The CA subsidiary that is the licensor is Computer Associates de Venezuela,
CA.
The last sentence of Section 8 is deleted and replaced with:
This Agreement shall be governed by and interpreted in accordance with the
laws of Venezuela. Any dispute hereunder shall be determined by the
Tribunales Ordinarios de la Cuidad de Caracas.
The last sentence of Section 14 is deleted and replaced with:
Any questions concerning this Agreement should be referred to Computer
Associates de Venezuela, CA, Avenida Principal de La Castellana - Centro
Letonia, Torre ING Bank, Piso 10, Oficina 105 - 1060 - Caracas - Venezuela At.: Finance Department.
16. If the Product contains third party software, and the licensor requires the
incorporation of specific license terms and conditions for such software into
this Agreement, those specific terms and conditions, which are hereby
incorporated by this reference, are located below this Agreement.
LICENSEE ACKNOWLEDGES THAT THIS LICENSE HAS BEEN READ AND
UNDERSTOOD AND BY SELECTING THE ["I agree"] BUTTON, LICENSEE
ACCEPTS ITS TERMS AND CONDITIONS. LICENSEE ALSO AGREES THAT THIS
LICENSE (INCLUDING ANY ORDER FORM REFERENCING THIS AGREEMENT
AND ANY TERMS RELATING TO THIRD PARTY SOFTWARE WHICH ARE SET
FORTH BELOW THIS AGREEMENT) CONSTITUTES THE COMPLETE AGREEMENT
BETWEEN THE PARTIES REGARDING THIS SUBJECT MATTER AND THAT IT
SUPERSEDES ANY INFORMATION LICENSEE HAS RECEIVED RELATING TO THE
SUBJECT MATTER OF THIS AGREEMENT, EXCEPT THAT THIS AGREEMENT
(EXCLUDING THE THIRD PARTY TERMS BELOW) WILL BE SUPERSEDED BY
ANY WRITTEN AGREEMENT, EXECUTED BY BOTH LICENSEE AND CA,
GRANTING LICENSEE A LICENSE TO USE THE PRODUCT. THIS AGREEMENT
MAY ONLY BE AMENDED BY A WRITTEN AGREEMENT SIGNED BY AUTHORIZED
REPRESENTATIVES OF BOTH PARTIES.
SELECT THE ["I agree"] BUTTON TO ACCEPT THE TERMS AND CONDITIONS
OF THIS AGREEMENT AS SET FORTH ABOVE AND PROCEED WITH THE
INSTALLATION PROCESS.
SELECT THE ["I disagree"] BUTTON TO HALT THE INSTALLATION PROCESS.
Silent Installation License Agreement 285
Index
logging • 82
rules
A
administrative client, starting • 24
Advantage Ingres
Microsoft Access Reports option • 185
Seagate Crystal Reports option • 179
AHD.DLL • 64
AIX secondary server
Unicenter NSM integration • 59
web interface • 49
AIX server
new installations • 29
system requirements, reviewing • 27
upgrade installations • 30
web interface
accessing • 52
configuring • 52
defining • 73
loading • 84
setting up • 73
syntax • 74
tngwriter_rule.dat • 73
H
HP-UX secondary server
Unicenter NSM integration • 59
web interface • 49
HP-UX server
new installations • 29
secondary server setup • 39, 40, 41, 42, 43
upgrade installations • 30
web interface
installing • 49
accessing • 52
C
configuring • 52
cawto command • 64
client
client interface, starting • 191, 194, 240
configuring • 178, 194
installing • 173, 193
local installation (Windows) • 174
network installation (Windows) • 175
reports, configuring • 179, 240
Screen Painter, configuring • 179, 240
silent installation (Windows) • 177
system requirements, reviewing • 173, 193,
233
configuration script • 60, 194
CR_CREATE action • 65
installing • 49
D
Daemon Proctor, starting • 24
daemons
starting • 22
I
IPlanet web server, configuring • 52
L
Linux client
client interface, starting • 194
configuring • 194
installing • 193
system requirements, reviewing • 193
Linux secondary server
Unicenter NSM integration • 59
web interface • 49
Linux server
installing • 28
new installations • 29
upgrade installations • 30
web interface
E
email options, Windows, configuring • 25
event writers, Unicenter NSM
Index 287
accessing • 52
configuring • 52
installing • 49
M
Microsoft Access Reports option
Advantage Ingres • 185
migrate_to_60.cmd • 198
msg_action record • 64
upgrade installations • 30
web interface
accessing • 52
configuring • 52
installing • 49
server, HP-UX
new installations • 29
upgrade installations • 30
web interface
N
accessing • 52
NX.env, object manager setup • 43
NX_MAX_DBAGENT variable, object manager
setup • 43
configuring • 52
O
Options Manager
email options • 25
P
pdm_client.exe • 194
pdm_configure.exe • 60, 194
pdm_edit.pl • 46, 50, 60
pdm_init.exe • 60
pdm_proctor_init • 50, 60
pdm_startup.rmt • 43, 46, 50, 60
pdm_startup.tpl • 46, 50, 60
pdm_status.exe • 41, 43, 60, 86
R
Reports option, Windows client, configuring •
179, 240
S
Screen Painter option
Advantage Ingres • 179
Windows
client, configuring • 179, 240
Seagate Crystal Reports option
Advantage Ingres • 179
secondary server
Unicenter NSM integration • 59
web interface • 45, 49
server configuring • 22
server, AIX
new installations • 29
system requirements, reviewing • 27
288 Implementation Guide
installing • 49
server, Linux
installing • 28
new installations • 29
simple migration • 198
upgrade installations • 30
web interface
accessing • 52
configuring • 52
installing • 49
server, Sun Solaris
new installations • 29
upgrade installations • 30
web interface
accessing • 52
configuring • 52
installing • 49
server, UNIX
IPlanet web server, configuring • 52
new installations • 29
upgrade installations • 30
web interface
accessing • 52
configuring • 52
installing • 49
server, Windows
administrative client, starting • 24
configuring • 22
email options, configuring • 25
installing • 15
modifying • 18
new installations • 17
system requirements, reviewing • 15
upgrade installations • 18
web interface
accessing • 48
CleverPath Portal, integrating with • 49
configuring • 24, 48
installing • 46
integrating • 24
prerequisites • 45
services, starting • 52
Service Desk Administrative Client package
administrative client
installing • 238
registering • 234
source components, removing • 237
setup.iss • 177
stdlog file • 82
Sun Solaris secondary server
Unicenter NSM integration • 59
web interface • 49
Sun Solaris server
new installations • 29
upgrade installations • 30
web interface
accessing • 52
configuring • 52
installing • 49
T
tngfilter_rule.dat • 69
tngimpt command, Unicenter NSM • 62
tngwriter_rule.dat • 73
topology.cfg • 86
U
Unicenter NSM
2D/3D map, troubleshooting • 88
2D/3D map, using • 62
AHD.DLL • 64
cawto command • 64
database, populating • 62
events
console messages, monitoring • 64
filtering • 65, 66
integration, troubleshooting • 88
writer rules • 73
writers • 73
filter rules • 65
defining • 69
setting up • 68
syntax • 69
filtered events, maintaining • 86
filtering, error messages • 92
generic event data • 67
installation • 59
logging • 82, 94
msg_action record • 64
server configuration, reviewing • 91
slump connection, checking • 93
tngfilter_rule.dat • 69
tngimpt command • 62
topology.cfg • 86
Unicenter ServicePlus SD
integration • 60
post-integration • 62
pre-integration • 59
uniconv daemon • 64, 66
Unicenter Software Delivery
administrative client
installing • 238
Service Desk Administrative Client package
registering • 234
source components, removing • 237
uniconv daemon • 64, 66
UNIX client
client interface, starting • 194
configuring • 194
installing • 193
system requirements, reviewing • 193
UNIX secondary server
Unicenter NSM integration • 59
web interface • 49
UNIX server
IPlanet web server, configuring • 52
new installations • 29
Index 289
upgrade installations • 30
web interface
accessing • 52
configuring • 52
installing • 49
W
web interface
Windows • 24
web interface, AIX
accessing • 52
configuring • 52
installing • 49
web interface, HP-UX
accessing • 52
configuring • 52
installing • 49
web interface, Linux
accessing • 52
configuring • 52
installing • 49
web interface, Sun Solaris
accessing • 52
configuring • 52
installing • 49
web interface, UNIX
accessing • 52
configuring • 52
installing • 49
web interface, Windows
accessing • 48
CleverPath Portal, integrating with • 49
configuring • 48
installing • 46
prerequisites • 45
services, starting • 52
web.cfg • 48, 52
Windows client
administrative client
installing • 238
client interface, starting • 191, 240
configuring • 178
installing • 173
local installation • 174
network installation • 175
reports, configuring • 179, 240
Screen Painter, configuring • 179, 240
290 Implementation Guide
Service Desk Administrative Client package
registering • 234
source components, removing • 237
silent installation • 177
system requirements, reviewing • 173, 233
Windows secondary server
Unicenter NSM integration • 59
web interface • 45
Windows server
administrative client, starting • 24
configuring • 22
email options, configuring • 25
installing • 15
modifying • 18
new installations • 17
system requirements, reviewing • 15
upgrade installations • 18
web interface
accessing • 48
CleverPath Portal, integrating with • 49
configuring • 24, 48
installing • 46
integrating • 24
prerequisites • 45
services, starting • 52
writer rules, Unicenter NSM • 84