IBM Tivoli Endpoint Manager (TEM) and IBM Tivoli Monitoring Manager (ITM)

Size: px
Start display at page:

Download "IBM Tivoli Endpoint Manager (TEM) and IBM Tivoli Monitoring Manager (ITM)"

Transcription

1 IBM Tivoli Endpoint Manager (TEM) and IBM Tivoli Monitoring Manager (ITM) Document Name Author(s) Contributors Reviewers ICAP TEM for ITM Document Shaker Al-Muaber Andress Georgescu, Shaun Kelley, Lakshmi Turun Version Date Author(s) Revision Notes Shaker Al-Muaber Initial Draft Shaker Al-Muaber System Layout Shaker Al-Muaber Script Files Shaun Kelley TEM Fixlets

2 Table of Contents Executive Summary... 3 Introduction... 3 Overview... 3 Assumptions... 3 System Layout... 3 Fixlet Customization... 4 Fixlet Relevance... 4 Unix... 5 Relevance 1:... 5 Relevance 2 & 3:... 5 Relevance 4:... 5 Relevance 5:... 5 Relevance 6:... 5 Relevance 7:... 5 Linux... 6 Relevance 1:... 6 Relevance 2:... 6 Relevance 3:... 6 Relevance 4:... 6 Relevance 5:... 6 Windows... 7 Relevance 1:... 7 Relevance 2:... 7 Relevance 3:... 7 Relevance 4:... 7 Relevance 5:... 7 Fixlet Actions:... 8 Unix:... 8 Linux:... 8 Windows:... 9 ITM Script Files... 9 Here are the scripts we used for ITM deployment on all the platforms of Linux, Unix and Windows Linux-agent-install.sh... 9 Unix-agent-install.sh Windows-agent-install.bat... 22

3 Executive Summary One of Steve Mills SWG initiatives is monitoring all systems in the labs for the purpose of increased utilization and network optimization and thus reduced expenses. The parameters monitored include disk I/O, CPU, memory, physical disk, and network usage. To monitor our systems, we have turned to IBM Tivoli Monitoring (ITM) software. As the landlord for Austin labs we have to install ITM on all Tivoli systems, as well as Rational, ICS, and AIM systems located on site. During this process, we encountered the following challenges with the ITM deployment: 1. Installing ITM manually, which can only get through 40 systems daily with our limited resources. 2. The amount of time and effort needed to obtain login credential for ITM deployment. 3. Manually tracking systems that are exempted from ITM. 4. Systems get re-imaged frequently. 5. Limited resources for ITM deployment The Tivoli IT team uses TEM to not only apply security patches, but to also quickly deploy software in SWG labs. Using automated scripts created by the ITM deployment team, TDS was able create a Fixlets for the ITM deployment in each lab. With the xlets in place, the TEM team loaded the ITM exemptions into a custom group in the TEM server and proved reliable during testing. Using the TEM solution, we were able to save many person hours by installing hundreds of ITM clients per day using TEM. Introduction Overview Installation of IBM Tivoli Monitoring has become a common requirement for all SWG. With the introduction of Tivoli Endpoint Manager, this is no longer limited to manually installing the agent on the systems. This document will explain all the steps needed to set up such an environment. Assumptions For the purpose of this document, we assume that the reader is familiar with TEM and ITM products. The user can perform a basic installation and conguration of these products, and is familiar with all common commands and utilities contained in these products. System Layout This document will show all the steps needed to customize ITM deployment Fixlets with our scripts and use it for ITM deployment. See the below diagram for the machine and product layout.

4 The above diagram shows the key component for TEM installation. We have the TEM Relay, which communicates with the TEM server and TEM clients. The TEM server will provide the Fixlet needed for the patch and ITM deployment. Fixlet Customization Using the scripts from the following sections we can create simple, scalable TEM xlets to do the heavy lifting for us. These sample Fixlets are created with the premise that the script les are stored on an open httpd server that the TEM server can access without autication. Fixlet Relevance The main challenge when setting up the xlets for the ITM install involved using TEM relevance to determine if the system was already running the ITM agent. This way we could at any time login to the TEM server and get a snapshot of how many systems need the ITM client. The other reason is that with the proper relevance in place, systems automatically disappear from the list of relevant systems after the install has been performed successfully.

5 Unix Relevance 1: (version of client >= " ") AND ((exists true whose (if true (exists (operating system) whose (it as string as lowercase contains "aix" as lowercase)) else false)) OR (exists true whose (if true (exists (operating system) whose (it as string as lowercase contains "sunos" as lowercase)) else false)) OR (exists true whose (if true (exists (operating system) whose (it as string as lowercase contains "HP" as lowercase)) else false))) This relevance clause contains standard code to check the version of the TEM client as well as checking for the proper operating system. In this case, this relevance is for the Unix deployment xlet. So it is looking for Solaris, AIX, or HP operating systems. Relevance 2 & 3: not exists match (regex "(AIX AIX VIOS) (5.1)") of name of operating system not exists match (regex "(AIX AIX VIOS) (4.3)") of name of operating system These relevance statements are excluding versions of AIX and VIOS that are not supported by ITM. Relevance 4: not exists le "/opt/ibm/citm/itm/bin/cinfo" This relevance clause is checking the default install path to see if the ITM agent has been installed. Change this to match if you install ITM in a different directory on Unix. Relevance 5: not exists process whose (name of it as lowercase contains "kuxagent") This relevance expression checks to make sure that the ITM Agent is not installed and running. Since it is possible the ITM Agent is installed in a non-default directory, this prevents those systems from showing as relevant. Relevance 6: not exists le "/opt/ibm/itm/bin/cinfo" This relevance statement is checking a secondary install directory to make sure the ITM agent is not already installed. Relevance 7: (exists true whose (if true (exists (if ( exists true whose (if true ( exists ip interfaces of network) else false) ) addresses whose (it as string!= " ") of ip interfaces whose (not loopback of it) of network as string else nothing) whose (it as string as lowercase contains "9.11." as lowercase)) else false))

6 This relevance statement is checking to see if the subnet the system is located on matches the site which the script is made for. Because each site uses a different ITM server for the agents to connect to, we need to make sure the systems which get the agent are in the same site as the server they are reporting in to. Linux Relevance 1: (version of client >= " ") AND ((exists true whose (if true (exists (operating system) whose (it as string as lowercase contains "red hat" as lowercase)) else false)) OR (exists true whose (if true (exists (operating system) whose (it as string as lowercase contains "suse" as lowercase)) else false))) This relevance clause contains standard code to check the version of the TEM client as well as checking for the proper operating system. In this case, this relevance is for the Linux deployment xlet. So it is looking for SuSE and Red Hat operating systems. Relevance 2: not exists le "/opt/ibm/citm/itm/bin/cinfo" This relevance clause is checking the default install path to see if the ITM agent has been installed. Change this to match if you install ITM in a different directory on Linux. Relevance 3: not exists process whose (name of it as lowercase contains "klzagent") This relevance expression checks to make sure that the ITM Agent is not installed and running. Since it is possible the ITM Agent is installed in a non-default directory, this prevents those systems from showing as relevant. Relevance 4: not exists le "/opt/ibm/itm/bin/cinfo" This relevance statement is checking a secondary install directory to make sure the ITM agent is not already installed. Relevance 5: (exists true whose (if true (exists (if ( exists true whose (if true ( exists ip interfaces of network) else false) ) addresses whose (it as string!= " ") of ip interfaces whose (not loopback of it) of network as string else nothing) whose (it as string as lowercase contains "9.11." as lowercase)) else false)) This relevance statement is checking to see if the subnet the system is located on matches the site which the script is made for. Because each site uses a different ITM server for the agents to

7 connect to, we need to make sure the systems which get the agent are in the same site as the server they are reporting in to. Windows Relevance 1: name of operating system as lowercase starts with "win" This relevance clause contains code to check for the proper operating system. In this case, this relevance is for the Windows deployment xlet. So it is looking for Windows operating systems. Relevance 2: not exists key "HKLM\SOFTWARE\Candle\KNT\Ver610\Primary\Conguration" of registry This relevance clause is checking the default registry key to see if the ITM agent has been installed. Relevance 3: not exists regapp "kntcma.exe" This relevance expression checks to make sure that the ITM Agent is not installed and running. Since it is possible the ITM Agent is installed in a non-default directory, this prevents those systems from showing as relevant. Relevance 4: not exists key "HKLM\SYSTEM\CurrentControlSet\services\KNTCMA_Primary" of registry This relevance statement is checking a secondary registry key to make sure the ITM agent is not already installed. Relevance 5: (exists true whose (if true (exists (if ( exists true whose (if true ( exists ip interfaces of network) else false) ) addresses whose (it as string!= " ") of ip interfaces whose (not loopback of it) of network as string else nothing) whose (it as string as lowercase contains "9.11." as lowercase)) else false)) This relevance statement is checking to see if the subnet the system is located on matches the site which the script is made for. Because each site uses a different ITM server for the agents to connect to, we need to make sure the systems which get the agent are in the same site as the server they are reporting in to.

8 Fixlet Actions: The second part in authoring the ITM installation xlets was creating the actions for each xlet. Again, these xlets rely on the ability of the TEM server to get the scripts from a anonymous ftp server or http server. Unix: Default Action: #!/bin/bash -vx # Enter your action script here cd /tmp ftp -in yourserver<<end_script quote USER anonymous quote PASS cd ITM bin get unix-agent-install_site.sh bye END_SCRIPT chmod u+x unix-agent-install_site.sh./unix-agent-install_site.sh rm unix-agent-install_site.sh This xlet uses shell scripting for the execution of the ITM installation script. Italicized are the parts that you would change to match your deployment. yourserver being the ftp server where you store the scripts and site being the variable for whichever site script you are using if you have a multi-site environment. Linux: Default Action: #!/bin/sh # Enter your action script here cd /tmp wget ftp://anonymous@yourserver/itm/linux-agent-install_site.sh chmod u+x linux-agent-install_site.sh./linux-agent-install_site.sh rm linux-agent-install_site.sh Like the Unix xlet, we use shell as the execution method. Italicized are the parts that you would change to match your deployment. yourserver being the ftp server where you store the scripts and site being the variable for whichever site script you are using if you have a multi-site environment.

9 Windows: Default Action: // downloads ITM Install les and executes install script prefetch windows-agent-install_site.bat sha1:sha1value size:#### wait Download\windows-agent-install_site.bat Unlike the Unix and Linux xlets, we use Bigx Action Script as the execution method. Italicized are the parts that you would change to match your deployment. yourserver being the httpd server where you store the scripts and site being the variable for whichever site script you are using if you have a multi-site environment. Unique to the Windows script are the sha1value and #### variables. The sha1value variable is where you would put the sha1 value for the.bat installer and the #### variable is where you would put the size of the.bat le in bytes. ITM Script Files Here are the scripts we used for ITM deployment on all the platforms of Linux, Unix and Windows. Linux-agent-install.sh Here is the script for Unix install agent: #!/bin/ksh #check if ksh is not installed if [! -x /bin/ksh ]; echo "Requires /bin/ksh. Not found exiting" exit 1 #generate logname and assign OUTPUT_LOG="$(hostname)_$(date +%Y%m%d).txt" #assign and create pipe (if it doesn't exist) for output duplication OUTPUT_PIPE=output.pipe if [! -e $OUTPUT_PIPE ]; mkfo $OUTPUT_PIPE #Remove old log if [ -e $OUTPUT_LOG ]; rm $OUTPUT_LOG #Reassign output to write to log and console

10 exec 3>&1 4>&2 tee $OUTPUT_LOG < $OUTPUT_PIPE >&3 & tpid=$! exec > $OUTPUT_PIPE 2>&1 #Checking if ITM OS Agent is running as process. If the process is running exit from script - itm os agent will not be installed. if [ $(ps -ef grep klzagent grep -v grep awk 'NR==1{print ($8)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "klzagent" ] echo ITM OS Agent is already running. ITM OS Agent for linux will not be installed. #Determine if this agent is already present and its current state if present (cinfo -o doesnt work, -o isnt a valid option) #stop install if linux agent is present if [ '-d /opt/ibm/itm/bin' ]; echo "ITM Unix agent binaries seem to exist, checking to see if product is running" if [ "$(/opt/ibm/itm/bin/cinfo -r grep "lz")" == "" ] echo "The process is not running" echo "Checking if the the itm os agent is installed" if [ "$(/opt/ibm/itm/bin/cinfo -i grep "lz" awk '{print $1}')" == "lz" ] echo "The ITM OS Agent is installed but the process is not running, you may want to start it" echo "ITM OS Agent is not installed, checking if snmp process is running" elif [ "$(/opt/ibm/itm/bin/cinfo -r grep "lz" awk -F. '{print $4}' - )" == "running" ] echo "The process does seem to be running already, check your TEPS and see if you can see the device, if not you may have it pointed to the wrong TEMS/TEPS" #Determine if SNMP process is already present and its current state #stop install if SNMP is running and congured using right community name if [ '-e /etc/snmp/snmpd.conf' ]; if [ "$(netstat -natv grep ':199' awk '{print $6}')" == "LISTEN" ]

11 "linmills2" ] installed." echo "The SNMP process does seem to be running already" echo "checking if snmpd.conf has correct community name set" if [ "$(cat /etc/snmp/snmpd.conf grep 'linmills2' awk 'NR==1{print ($2)}')" == echo "SNMP cong le is set with right community name." echo "ITM OS Agent will not be #temporary set SELINUX to permissive mode if [ $(sestatus grep "Current mode" awk '{print $3}') == "enforcing" ] echo 0 > /selinux/enforce echo "SELINUX has been set to permissive mode temporarily" mkdir -p /opt/ibm/citm/itm #create mountpoints and mount MSA install directory and agent response le directory mkdir -p /agentinstallpoint mkdir -p /agentresponsele mount itmagntls.tivlab.austin.ibm.com:/msa/.projects/p10/ibmpublic /agentinstallpoint mount itmagntls.tivlab.austin.ibm.com:/response_les /agentresponsele #Install the agent using the response les /agentinstallpoint/inst.images/aix/itm/6.2.2/agent/install.sh -q -h /opt/ibm/citm/itm -p \ /agentresponsele/linux_agent_install.rsp #run cong using cong response le /opt/ibm/citm/itm/bin/candlecong -A -p \ /agentresponsele/unix_agent_cong_austin.rsp lz /opt/ibm/citm/itm/bin/itmcmd agent start lz #Secure ITM Executables /opt/ibm/citm/itm/bin/securemain lock #Return output to normal opperation and remove pipe exec 1>&3 3>&- 2>&4 4>&- wait $tpid rm $OUTPUT_PIPE #unmount and remove mountpoint umount /agentinstallpoint umount /agentresponsele rmdir /agentinstallpoint rmdir /agentresponsele

12 #set back SELINUX to enforcing mode if [ $(sestatus grep "Current mode" awk '{print $3}') == "permissive" ] echo 1 > /selinux/enforce echo "SELINUX has been set to enforcing mode" #create log directory and move log mkdir -p /tmp/itm mv $OUTPUT_LOG /tmp/itm echo "your logle is "$OUTPUT_LOG echo "you can locate it in /tmp/itm" Unix-agent-install.sh Here is the script for Unix install agent: #!/bin/ksh #set -x #generate logname and assign OUTPUT_LOG="$(hostname)_$(date +%Y%m%d).txt" os=$(uname -s) ITMHOMEDEFAULT=/opt/IBM/ITM ITMHOME=/opt/IBM/citm/ITM OUTPUT_PIPE=output.pipe tpid=$! #Determine if this is an AIX, HP-UX, or Solaris machine as the commands are not at all similar (Julian Foster 3/25/10) case $os in ' ') echo "No os version retrieved please ensure PATH is set correctly, uname returned no value" ;; AIX) #assign and create pipe (if it doesn't exist) for output duplication if [! -e $OUTPUT_PIPE ]; mkfo $OUTPUT_PIPE #Remove old log if [ -e $OUTPUT_LOG ]; rm $OUTPUT_LOG #Reassign output to write to log and console exec 3>&1 4>&2

13 tee $OUTPUT_LOG < $OUTPUT_PIPE >&3 & exec > $OUTPUT_PIPE 2>&1 #Checking if ITM OS Agent is running as process. If the process is running exit from script - itm os agent will not be installed. if [ $(ps -ef grep kuxagent grep -v grep awk 'NR==1{print ($9)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "kuxagent" ] echo ITM OS Agent is already running. ITM OS Agent for unix will not be installed. if [ $(ps -ef grep kuxagent grep -v grep awk 'NR==1{print ($8)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "kuxagent" ] echo ITM OS Agent is already running. ITM OS Agent for unix will not be installed. #Determine if this agent is already present and its current state if present (cinfo -o doesnt work, -o isnt a valid option) if [ '-d $ITMHOMEDEFAULT/bin' ]; echo "ITM Unix agent binaries seem to exist, checking to see if the process is running" if [ "$($ITMHOMEDEFAULT/bin/cinfo -r grep "ux")" == "" ] echo "The process is not running" echo "Checking if the itm os agent is installed" if [ "$($ITMHOMEDEFAULT/bin/cinfo -i grep "ux" awk '{print $1}')" == "ux" ] echo "The ITM OS Agent is installed but the process is not running, you may want to start it" echo "ITM OS Agent is not installed, checking if snmp process is running" elif [ "$($ITMHOMEDEFAULT/bin/cinfo -r grep "ux" awk -F. '{print $4}' - )" == "running" ] echo "The process does seem to be running already, check your TEPS and see if you can see the device, if not you may have it pointed to the wrong TEMS/TEPS"

14 #Determine if SNMP process is already present and its current state for AIX5.2,AIX5.3,AIX6.1 #stop install if SNMP is running and congured using right community name if [ '-e /etc/snmpdv3.conf' ]; if [ "$(lssrc -s snmpd grep snmpd awk '{print $4}')" == "active" ] echo "The SNMP process does seem to be running already" #echo "checking if snmpd.conf has correct community name set" if [ "$(cat /etc/snmpdv3.conf grep "COMMUNITY" awk 'NR==3{print ($3)}')" == "aixmills3" ] echo "SNMP cong le is set with right community name." echo "ITM OS Agent will not be installed." #Determine if the ITM directory exists if [! -e $ITMHOME ] mkdir -p $ITMHOME #Determine if there is enough space on the disk if [ "$(df -m $ITMHOME awk 'NR==2{print ($3)}')" -lt "300" ] echo "not enough space in the target lesystem" exit 1 #create mountpoint and mount MSA install directory mkdir -p /agentinstallpoint mkdir -p /agentresponsele == 0 ] #checking NFS client reserved port for Linux NFS servers if [ "$(nfso -a grep nfs_use_reserved_ports awk '{print $3}')" nfso -p -o nfs_use_reserved_ports=1 mount itmagntls.tivlab.austin.ibm.com:/msa/.projects/p10/ibmpublic /agentinstallpoint mount itmagntls.tivlab.austin.ibm.com:/response_les /agentresponsele

15 $ITMHOME -p \ #Install the agent using the response les /agentinstallpoint/inst.images/aix/itm/6.2.2/agent/install.sh -q -h /agentresponsele/unix_agent_install.rsp #run cong using cong response le $ITMHOME/bin/CandleCong -A -p \ /agentresponsele/unix_agent_cong_austin.rsp ux $ITMHOME/bin/itmcmd agent start ux #Secure ITM executables /opt/ibm/citm/itm/bin/securemain lock #Return output to normal opperation and remove pipe exec 1>&3 3>&- 2>&4 4>&- wait $tpid rm $OUTPUT_PIPE #unmount and remove mountpoint umount /agentinstallpoint umount /agentresponsele rmdir /agentinstallpoint rmdir /agentresponsele #create log directory and move log mkdir -p /tmp/itm mv $OUTPUT_LOG /tmp/itm SunOS) echo "your logle is "$OUTPUT_LOG echo "you can locate it in /tmp/itm" #End of AIX install ;; #assign and create pipe (if it doesn't exist) for output duplication OUTPUT_PIPE=output.pipe if [! -e $OUTPUT_PIPE ]; mkfo $OUTPUT_PIPE #Remove old log if [ -e $OUTPUT_LOG ]; rm $OUTPUT_LOG #Reassign output to write to log and console exec 3>&1 4>&2 tee $OUTPUT_LOG < $OUTPUT_PIPE >&3 & exec > $OUTPUT_PIPE 2>&1

16 #Checking if ITM OS Agent is running as process. If the process is running exit from script - itm os agent will not be installed. if [ $(ps -ef grep kuxagent grep -v grep awk 'NR==1{print ($9)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "kuxagent" ] echo ITM OS Agent is already running. ITM OS Agent for unix will not be installed. if [ $(ps -ef grep kuxagent grep -v grep awk 'NR==1{print ($8)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "kuxagent" ] echo ITM OS Agent is already running. ITM OS Agent for unix will not be installed. #Determine if this agent is already present and its current state if present (cinfo -o doesnt work, -o isnt a valid option) if [ '-d $ITMHOMEDEFAULT/bin' ]; echo "ITM Unix agent binaries seem to exist, checking to see if the process is running" if [ "$($ITMHOMEDEFAULT/bin/cinfo -r grep "ux")" == "" ] echo "The process is not running" echo "Checking if the itm os agent is installed" if [ "$($ITMHOMEDEFAULT/bin/cinfo -i grep "ux" awk '{print $1}')" == "ux" ] echo "The ITM OS Agent is installed but the process is not running, you may want to start it" echo "ITM OS Agent is not installed, checking if snmp process is running" elif [ "$($ITMHOMEDEFAULT/bin/cinfo -r grep "ux" awk -F. '{print $4}' - )" == "running" ] echo "The process does seem to be running already, check your TEPS and see if you can see the device, if not you may have it pointed to the wrong TEMS/TEPS" #Determine if SNMP process is already present and its current state on Solaris 8 and Solaris 9

17 #stop install if SNMP is running and congured using right community name if [ '-e /etc/snmp/conf/snmpd.conf' ]; if [ "$(netstat -an grep '*.199' awk '{print $7}')" == "LISTEN" ] echo "The SNMP process does seem to be running already" #echo "checking if snmpd.conf has correct community name set" if [ "$(cat /etc/snmp/conf/snmpd.conf grep read-community awk 'NR==2{print ($2)}')" == "solmills4" ] echo "SNMP cong le is set with right community name." echo "ITM OS Agent will not be installed." #Determine if SNMP process is already present and its current state on Solaris 10 #stop install if SNMP is running and congured using right community name if [ '-e /etc/sma/snmp/snmpd.conf' ]; if [ "$(svcs -a grep sma awk '{print $1}')" == "online" ] echo "The SNMP process does seem to be running already on Solaris 10" #echo "checking if snmpd.conf has correct community name set" if [ "$(cat /etc/sma/snmp/snmpd.conf grep read-community awk 'NR==2{print ($2)}')" == "solmills4" ] echo "SNMP cong le is set with right community name." echo "ITM OS Agent will not be installed." #Determine if the ITM directory exists if [! -e $ITMHOME ] mkdir -p $ITMHOME

18 "307200" ] #Determine if there is enough disk space if [ "$(df -b $ITMHOME awk 'NR==2{print ($2)}')" -lt echo "not enough space in the target lesystem" exit 1 #create mountpoint and mount MSA install directory mkdir -p /agentinstallpoint mkdir -p /agentresponsele #Solaris doesnt support NFS vers 3 by default and thats the NFS being used by MSA (which is an Linux machine) mount -o vers=3 itmagntls.tivlab.austin.ibm.com:/msa/.projects/p10/ibmpublic /agentinstallpoint mount -o vers=3 itmagntls.tivlab.austin.ibm.com:/response_les /agentresponsele $ITMHOME -p \ #Install the agent using the response les /agentinstallpoint/inst.images/aix/itm/6.2.2/agent/install.sh -q -h /agentresponsele/unix_agent_install.rsp #run cong using cong response le $ITMHOME/bin/CandleCong -A -p \ /agentresponsele/unix_agent_cong_austin.rsp ux $ITMHOME/bin/itmcmd agent start ux #Secure ITM executables /opt/ibm/citm/itm/bin/securemain lock #Return output to normal opperation and remove pipe exec 1>&3 3>&- 2>&4 4>&- wait $tpid rm $OUTPUT_PIPE #unmount and remove mountpoint umount /agentinstallpoint umount /agentresponsele rmdir /agentinstallpoint rmdir /agentresponsele #create log directory and move log mkdir -p /tmp/itm mv $OUTPUT_LOG /tmp/itm echo "your logle is "$OUTPUT_LOG echo "you can locate it in /tmp/itm" #End of Solaris install ;;

19 HP-UX) #assign and create pipe (if it doesn't exist) for output duplication OUTPUT_PIPE=output.pipe if [! -d $OUTPUT_PIPE ]; mkfo $OUTPUT_PIPE #Remove old log if [ -d $OUTPUT_LOG ]; rm $OUTPUT_LOG #Reassign output to write to log and console exec 3>&1 4>&2 tee $OUTPUT_LOG < $OUTPUT_PIPE >&3 & exec > $OUTPUT_PIPE 2>&1 #Checking if ITM OS Agent is running as process. If the process is running exit from script - itm os agent will not be installed. if [ $(ps -ef grep kuxagent grep -v grep awk 'NR==1{print ($9)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "kuxagent" ] echo ITM OS Agent is already running. ITM OS Agent for unix will not be installed. if [ $(ps -ef grep kuxagent grep -v grep awk 'NR==1{print ($8)}' awk '{ print substr( $0, length($0) - 7, length($0) ) }') == "kuxagent" ] echo ITM OS Agent is already running. ITM OS Agent for unix will not be installed. #Determine if this agent is already present and its current state if present (cinfo -o doesnt work, -o isnt a valid option) if [ '-d $ITMHOMEDEFAULT/bin' ]; echo "ITM Unix agent binaries seem to exist, checking to see if the process is running" if [ "$($ITMHOMEDEFAULT/bin/cinfo -r grep "ux")" == "" ] echo "The process is not running" echo "Checking if the itm os agent is installed" if [ "$($ITMHOMEDEFAULT/bin/cinfo -i grep "ux" awk '{print $1}')" == "ux" ]

20 echo "The ITM OS Agent is installed but the process is not running, you may want to start it" echo "ITM OS Agent is not installed, checking if snmp process is running" elif [ "$($ITMHOMEDEFAULT/bin/cinfo -r grep "ux" awk -F. '{print $4}' - )" == "running" ] echo "The process does seem to be running already, check your TEPS and see if you can see the device, if not you may have it pointed to the wrong TEMS/TEPS" #Determine if SNMP process is already present and its current state on HP-UX #stop install if SNMP is running and congured using right community name if [ '-e /etc/snmpagent.d/snmpd.conf' ]; if [ "$(netstat -an grep tcp grep 161 awk '{print $6}')" = "LISTEN" ] echo "The SNMP process does seem to be running already on HP-UX" #echo "checking if snmpd.conf has correct community name set" if [ "$(cat /etc/snmpagent.d/snmpd.conf grep get-community-name: grep hpuxmills5 awk '{print $2}')" = "hpuxmills5" ] echo "SNMP cong le is set with right community name." echo "ITM OS Agent will not be installed." #Determine if the ITM directory exists if [! -d $ITMHOME ] mkdir -p $ITMHOME "307200" ] #Determine if there is enough space on disk if [ "$(df -k $ITMHOME awk 'NR==2{print ($1)}')" -lt

21 echo "not enough space in the target lesystem" exit 1 #create mountpoint and mount MSA install directory mkdir -p /agentinstallpoint mkdir -p /agentresponsele mount itmagntls.tivlab.austin.ibm.com:/msa/.projects/p10/ibmpublic /agentinstallpoint mount itmagntls.tivlab.austin.ibm.com:/response_les /agentresponsele $ITMHOME -p \ #Install the agent using the response les /agentinstallpoint/inst.images/aix/itm/6.2.2/agent/install.sh -q -h /agentresponsele/unix_agent_install.rsp #run cong using cong response le $ITMHOME/bin/CandleCong -A -p \ /agentresponsele/unix_agent_cong_austin.rsp ux $ITMHOME/bin/itmcmd agent start ux #Secure ITM Files /opt/ibm/citm/itm/bin/securemain lock #Return output to normal opperation and remove pipe exec 1>&3 3>&- 2>&4 4>&- wait $tpid rm $OUTPUT_PIPE #unmount and remove mountpoint umount /agentinstallpoint umount /agentresponsele rmdir /agentinstallpoint rmdir /agentresponsele #create log directory and move log mkdir -p /tmp/itm mv $OUTPUT_LOG /tmp/itm echo "your logle is "$OUTPUT_LOG echo "you can locate it in /tmp/itm" #End of HP-UX install ;; *) echo "This is not a Unix machine, please retry with the appropriate install script for your OS" ;; esac

22 Windows-agent-install.bat Here is the script for Unix install off echo ########## Checking if this system is already monitored through ITM OS Agent ########## reg query hkey_local_machine\system\currentcontrolset\services\kntcma_primary /v DisplayName > nul IF %ERRORLEVEL% NEQ 0 goto check_snmp echo ITM OS Agent has been found. echo ITM OS Agent will not be installed. Exit /b :check_snmp echo. echo ########## Checking if this system is already monitored through ITM Agentless ########## reg query hkey_local_machine\system\currentcontrolset\services\snmp\parameters\validcommunities /v winmills1 > nul IF %ERRORLEVEL% NEQ 0 goto start_installation for /f "usebackq delims=" %%i in (`"reg query hkey_local_machine\system\currentcontrolset\services\snmp\parameters\validcommunities /v winmills1"`) do set comunity_name=%%i set comunity_name=%comunity_name:~0,13% set comunity_name=%comunity_name: =% if %comunity_name% == winmills1 ( echo. echo SNMP Service is already congured and system is monitored through ITM agentless. echo itm os agent will not be installed. Exit /b ) :start_installation echo Creating temp directiory REM clean up failed install if there and make install directory if exist C:\temp\ITM rmdir /s /q C:\temp\ITM mkdir C:\temp\ITM\itm cd C:\temp\ITM echo getting package REM ftp code here echo open >ftp.txt echo anonymous>>ftp.txt echo itm install>>ftp.txt echo cd ITM>>ftp.txt

23 echo binary>>ftp.txt echo get silent_agentw32_austin.txt>>ftp.txt echo get silent_agentw64_austin.txt>>ftp.txt echo get windowspackage.exe>>ftp.txt echo bye>>ftp.txt ftp -s:ftp.txt cacls "C:\temp\ITM\windowspackage.exe" /e /p users:f echo unpacking windowspackage.exe -s REM install move silent_agentw32_austin.txt WINDOWS move silent_agentw64_austin.txt WINDOWS cd WINDOWS cacls "C:\temp\ITM\WINDOWS" /e /t /p users:f :END echo PLEASE WAIT: The Agent will now install. This may take a few minutes and open some windows. IF PROCESSOR_ARCHITECTURE == x86 AND PROCESSOR_ARCHITEW6432 NOT DEFINED (goto b32) else goto (b64) :b32 start /wait./setup /z"/sfc:\temp\itm\windows\silent_agentw32_austin.txt" /s goto END :b64 start /wait./setup /z"/sfc:\temp\itm\windows\silent_agentw64_austin.txt" /s goto END :END echo Removing install source cd C:\temp rmdir /s /q C:\temp\ITM echo Install log can be found at \IBM\citm\ITM\InstallITM echo For a successful install the log will be called "IBM Tivoli Monitoring DATE" echo For a failure it will be "Abort IBM Tiovli Monitoring DATE" echo Running check. If the install worked you should see output like "Hostname NT NT AUTHORITY\SYSTEM 4:43:42 PM Running Primary" C:\IBM\citm\ITM\InstallITM\KinCInfo.exe -r

The Unix Shell & Shell Scripts

The Unix Shell & Shell Scripts The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises

More information

Insight Control Server Provisioning Capturing and Installing SUSE Enterprise Linux 12 System Images

Insight Control Server Provisioning Capturing and Installing SUSE Enterprise Linux 12 System Images Technical white paper Insight Control Server Provisioning Capturing and Installing SUSE Enterprise Linux 12 System Images Table of contents Summary 2 Preparing for image capture 2 Sanitizing server image

More information

Installation of ITM Agents and ITCAM MQ Agents 7.3 in Linux. IBM Techdoc:

Installation of ITM Agents and ITCAM MQ Agents 7.3 in Linux. IBM Techdoc: +++ Objective Page 1 of 26 Installation of ITM Agents 6.0.3.2 and ITCAM MQ Agents 7.3 in Linux IBM Techdoc: 7048601 http://www.ibm.com/support/docview.wss?uid=swg27048601 Date last updated: 08-Sep-2016

More information

Road map for a Typical installation of IBM Tivoli Monitoring, Version 5.1.0

Road map for a Typical installation of IBM Tivoli Monitoring, Version 5.1.0 Road map for a Typical installation of IBM Tivoli Monitoring, Version 5.1.0 Objective To use an installation wizard to deploy IBM Tivoli Monitoring and the Tivoli Management Framework in a typical Tivoli

More information

IBM IBM Tivoli Endpoint Manager V8.1 Implementation.

IBM IBM Tivoli Endpoint Manager V8.1 Implementation. IBM 000-560 IBM Tivoli Endpoint Manager V8.1 Implementation http://killexams.com/exam-detail/000-560 A. It should always be empty in a healthy environment. B. It is used to store downloaded files from

More information

Highly Secure ITM Agent Configuration

Highly Secure ITM Agent Configuration 1 Highly Secure ITM Agent Configuration Version 1.2 Version Date Comment 1 07/05/11 Initial Public Release 1.1 11/28/11 ITM 6.2.3 HTTPS-only TEPS and disable non-ssl HTTP ports. Simplified instructions.

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA Sanghoon Han(sanghoon.han@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Announcement (1) Please come

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

Linux Shell Scripting. Linux System Administration COMP2018 Summer 2017

Linux Shell Scripting. Linux System Administration COMP2018 Summer 2017 Linux Shell Scripting Linux System Administration COMP2018 Summer 2017 What is Scripting? Commands can be given to a computer by entering them into a command interpreter program, commonly called a shell

More information

Best practices on deployment of IBM Rational. servers

Best practices on deployment of IBM Rational. servers Best practices on deployment of IBM Rational License key server(rlks) on Linux and Unix servers Pankaj Sharma and Sombir Yadav October 21, 2015 Page 1 of 25 INTRODUCTION CONFIGURATION OF LICENSE FILE ON

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Chapter 2. UNIX Installation. Node Locked vs Floating Network Licensing. Installation Procedure. Floating Network Keycodes. Node Locked Keycodes.

Chapter 2. UNIX Installation. Node Locked vs Floating Network Licensing. Installation Procedure. Floating Network Keycodes. Node Locked Keycodes. Chapter 2 UNIX Installation Installation of Artwork Conversion Software s translators and postprocessors on UNIX platforms has been adjusted to make it as similar as possible across the various machines

More information

Introduction to Unix. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Introduction to Unix. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University Introduction to Unix Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is an OS? OS is a resource manager Sharing Protection Fairness Performance

More information

IBM Exam C IBM Tivoli Monitoring V6.3 Implementation Version: 6.0 [ Total Questions: 120 ]

IBM Exam C IBM Tivoli Monitoring V6.3 Implementation Version: 6.0 [ Total Questions: 120 ] s@lm@n IBM Exam C9560-507 IBM Tivoli Monitoring V6.3 Implementation Version: 6.0 [ Total Questions: 120 ] Question No : 1 A customer must perform trend analysis for future growth. Which product should

More information

Vi & Shell Scripting

Vi & Shell Scripting Vi & Shell Scripting Comp-206 : Introduction to Week 3 Joseph Vybihal Computer Science McGill University Announcements Sina Meraji's office hours Trottier 3rd floor open area Tuesday 1:30 2:30 PM Thursday

More information

Useful Unix Commands Cheat Sheet

Useful Unix Commands Cheat Sheet Useful Unix Commands Cheat Sheet The Chinese University of Hong Kong SIGSC Training (Fall 2016) FILE AND DIRECTORY pwd Return path to current directory. ls List directories and files here. ls dir List

More information

Micro Focus VisiBroker Installation Guide

Micro Focus VisiBroker Installation Guide Micro Focus VisiBroker 8.5.5 Installation Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2009-2018 All rights reserved. MICRO

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

VisiBroker 8.5. Installation Guide

VisiBroker 8.5. Installation Guide VisiBroker 8.5 Installation Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2009-2016. All rights reserved. VisiBroker contains

More information

Part 1: Basic Commands/U3li3es

Part 1: Basic Commands/U3li3es Final Exam Part 1: Basic Commands/U3li3es May 17 th 3:00~4:00pm S-3-143 Same types of questions as in mid-term 1 2 ls, cat, echo ls -l e.g., regular file or directory, permissions, file size ls -a cat

More information

CSCM98 Lab Class #5 Getting familiar with the command line

CSCM98 Lab Class #5 Getting familiar with the command line CSCM98 Lab Class #5 Getting familiar with the command line Lab Class Description. Unix has some powerful commands that can be combined inside shell scripts. Today we will have a look at various commands

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Kisik Jeong (kisik@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Dong-Yun Lee (dylee@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating

More information

Accessing LINUX file systems from CMS. Metropolitan VM Users Association January 24, 2005

Accessing LINUX file systems from CMS. Metropolitan VM Users Association January 24, 2005 Accessing LINUX file systems from CMS Metropolitan VM Users Association January 24, 2005 Agenda Linux and it's support of mission critical applications on z/vm has become an important part of many z/vm

More information

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University

Unix/Linux Basics. Cpt S 223, Fall 2007 Copyright: Washington State University Unix/Linux Basics 1 Some basics to remember Everything is case sensitive Eg., you can have two different files of the same name but different case in the same folder Console-driven (same as terminal )

More information

SIEMENS UserAdmin Workshop TELEPERM XP Version 4 Chapter 1

SIEMENS UserAdmin Workshop TELEPERM XP Version 4 Chapter 1 1 UNIX... 1-2 1.1 USER-ENVIRONMENT... 1-2 1.1.1 User-environment... 1-3 1.1.2 Basic commands... 1-3 1.1.3 SCO Unix specific commands... 1-4 1.1.4 HP Unix specific commands... 1-4 1.2 FILE SYSTEM... 1-5

More information

Unix System Architecture, File System, and Shell Commands

Unix System Architecture, File System, and Shell Commands Unix System Architecture, File System, and Shell Commands Prof. (Dr.) K.R. Chowdhary, Director COE Email: kr.chowdhary@iitj.ac.in webpage: http://www.krchowdhary.com JIET College of Engineering August

More information

Introduction to remote command line Linux. Research Computing Team University of Birmingham

Introduction to remote command line Linux. Research Computing Team University of Birmingham Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

COMP 4/6262: Programming UNIX

COMP 4/6262: Programming UNIX COMP 4/6262: Programming UNIX Lecture 12 shells, shell programming: passing arguments, if, debug March 13, 2006 Outline shells shell programming passing arguments (KW Ch.7) exit status if (KW Ch.8) test

More information

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---

More information

To configure the patching repository so that it can copy patches to alternate locations, use SFTP, SCP, FTP, NFS, or a premounted file system.

To configure the patching repository so that it can copy patches to alternate locations, use SFTP, SCP, FTP, NFS, or a premounted file system. Configuring Protocols to Stage and 1 Deploy Linux and UNIX Patches VCM supports patching of managed machines in distributed environments, either geographically or separated by firewalls. VCM uses a single

More information

Zenoss Resource Manager Upgrade Guide

Zenoss Resource Manager Upgrade Guide Zenoss Resource Manager Upgrade Guide Release 5.3.2 Zenoss, Inc. www.zenoss.com Zenoss Resource Manager Upgrade Guide Copyright 2017 Zenoss, Inc. All rights reserved. Zenoss, Own IT, and the Zenoss logo

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

Shell Programming Overview

Shell Programming Overview Overview Shell programming is a way of taking several command line instructions that you would use in a Unix command prompt and incorporating them into one program. There are many versions of Unix. Some

More information

My Own Help On Unix Environment

My Own Help On Unix Environment My Own Help On Unix Environment ***** *** * This is my own collection on some tips/hints to help my work on Unix Environment. As my Unix is my second skill, hence the information here is very basic and

More information

[S9I ] gtmsecshr vulnerability Security Advisory Page 1 of 6

[S9I ] gtmsecshr vulnerability Security Advisory Page 1 of 6 [S9I10-002703] gtmsecshr vulnerability Security Advisory Page 1 of 6 Background The GT.M Group at Fidelity National Information Services (FIS) recently received a report of a GT.M security vulnerability.

More information

UNIT I Linux Utilities

UNIT I Linux Utilities UNIT I Linux Utilities 1. a) How does Linux differ from Unix? Discuss the features of Linux. 5M b) Explain various text processing utilities, with a suitable example for each. 5M 2. a) Explain briefly

More information

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller

More information

commandname flags arguments

commandname flags arguments Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands

More information

BPPM Patrol Agent Installation Steps on Linux and Automation Integration

BPPM Patrol Agent Installation Steps on Linux and Automation Integration BPPM Patrol Agent Installation Steps on Linux and Automation Integration Author: Karlis Peterson, Software Consultant, BMC Software Version: 1.0 Date: May 12, 2013 DISCLAIMER NOTICE This is Field Developed

More information

On successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12.

On successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12. CIE- 25 Marks Government of Karnataka Department of Technical Education Bengaluru Course Title: Linux Lab Scheme (L:T:P) : 0:2:4 Total Contact Hours: 78 Type of Course: Tutorial, Practical s & Student

More information

USER GUIDE. Snow Inventory Agent for Unix. Version 5. Release date Document date SNOWSOFTWARE.COM

USER GUIDE. Snow Inventory Agent for Unix. Version 5. Release date Document date SNOWSOFTWARE.COM USER GUIDE Product Snow Inventory Agent for Unix Version 5 Release date 2016-09-27 Document date 2017-10-24 CONTENTS 1 Introduction... 3 1.1 Prerequisites... 3 2 Installation... 5 2.1 Prepared installation

More information

IBM z Systems Development and Test Environment Tools User's Guide IBM

IBM z Systems Development and Test Environment Tools User's Guide IBM IBM z Systems Development and Test Environment Tools User's Guide IBM ii IBM z Systems Development and Test Environment Tools User's Guide Contents Chapter 1. Overview......... 1 Introduction..............

More information

Best Practices: Agent Updates Performing Large Scale Updates & Troubleshooting

Best Practices: Agent Updates Performing Large Scale Updates & Troubleshooting Christopher Hambridge Software Engineer 24 August 2012 Best Practices: Agent Updates Performing Large Scale Updates & Troubleshooting 2009 IBM Corporation IBM Presentation Template Full Version Agenda

More information

Assignment clarifications

Assignment clarifications Assignment clarifications How many errors to print? at most 1 per token. Interpretation of white space in { } treat as a valid extension, involving white space characters. Assignment FAQs have been updated.

More information

Програмиранев UNIX среда

Програмиранев UNIX среда Програмиранев UNIX среда Използванена команден шел и създаванена скриптове: tcsh, bash, awk, python Shell programming As well as using the shell to run commands you can use its built-in programming language

More information

Shells & Shell Programming (Part B)

Shells & Shell Programming (Part B) Shells & Shell Programming (Part B) Software Tools EECS2031 Winter 2018 Manos Papagelis Thanks to Karen Reid and Alan J Rosenthal for material in these slides CONTROL STATEMENTS 2 Control Statements Conditional

More information

Processes. Shell Commands. a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms:

Processes. Shell Commands. a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms: Processes The Operating System, Shells, and Python Shell Commands a Command Line Interface accepts typed (textual) inputs and provides textual outputs. Synonyms: - Command prompt - Shell - CLI Shell commands

More information

CounterACT Macintosh/Linux Property Scanner Plugin

CounterACT Macintosh/Linux Property Scanner Plugin CounterACT Macintosh/Linux Property Scanner Plugin Version 7.0.1 and Above Table of Contents About the Macintosh/Linux Property Scanner Plugin... 4 Requirements... 4 Supported Operating Systems... 4 Accessing

More information

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used:

When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: Linux Tutorial How to read the examples When talking about how to launch commands and other things that is to be typed into the terminal, the following syntax is used: $ application file.txt

More information

INd_rasN SOME SHELL SCRIPTING PROGRAMS. 1. Write a shell script to check whether the name passed as first argument is the name of a file or directory.

INd_rasN SOME SHELL SCRIPTING PROGRAMS. 1. Write a shell script to check whether the name passed as first argument is the name of a file or directory. 1. Write a shell script to check whether the name passed as rst argument is the name of a le or directory. Ans: #!/bin/bash if [ -f $1 ] echo "$1 is a le" echo "$1 is not a le" 2. Write a shell script

More information

UNIX System Programming Lecture 3: BASH Programming

UNIX System Programming Lecture 3: BASH Programming UNIX System Programming Outline Filesystems Redirection Shell Programming Reference BLP: Chapter 2 BFAQ: Bash FAQ BMAN: Bash man page BPRI: Bash Programming Introduction BABS: Advanced Bash Scripting Guide

More information

Insight Control Server Provisioning Capturing and Installing Red Hat Enterprise Linux 7 System Images

Insight Control Server Provisioning Capturing and Installing Red Hat Enterprise Linux 7 System Images Technical white paper Insight Control Server Provisioning Capturing and Installing Red Hat Enterprise Linux 7 System Images Table of contents Summary 2 Preparing for image capture 2 Sanitizing server image

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

UNIX Essentials Featuring Solaris 10 Op System

UNIX Essentials Featuring Solaris 10 Op System A Active Window... 7:11 Application Development Tools... 7:7 Application Manager... 7:4 Architectures - Supported - UNIX... 1:13 Arithmetic Expansion... 9:10 B Background Processing... 3:14 Background

More information

IBM IBM Tivoli Monitoring Express V6.1 Specialist. Download Full Version :

IBM IBM Tivoli Monitoring Express V6.1 Specialist. Download Full Version : IBM 000-887 IBM Tivoli Monitoring Express V6.1 Specialist Download Full Version : https://killexams.com/pass4sure/exam-detail/000-887 QUESTION: 88 Which two options for log files for tracing the Warehouse

More information

MasterScope Application Navigator. Logical Agent Installation Guide

MasterScope Application Navigator. Logical Agent Installation Guide MasterScope Application Navigator Logical Agent Installation Guide October, 2014 Revision History Revision No. Date Shipped Description 1st edition 09.2010 Newly released for Ver3.1. 2nd edition 07.2011

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

networkserversuite AIX & AIX VIOS Agent Installation

networkserversuite AIX & AIX VIOS Agent Installation networkserversuite AIX & AIX VIOS Agent Installation Copyright Copyright 2009-2015 Halcyon - A division of HelpSystems. All rights reserved. Windows is a registered trademark of Microsoft Corporation in

More information

(a) About Unix. History

(a) About Unix. History Part 1: The Unix Operating System (a) About Unix History First roots in the Bell Laboratories, early 60s Kernel rewrite in C by Ritchie / Thompson in the early 70s Source code licenses for Universities

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

ForeScout CounterACT Linux Plugin

ForeScout CounterACT Linux Plugin ForeScout CounterACT Linux Plugin Version 1.1.0 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5 Requirements...

More information

Shell Programming Systems Skills in C and Unix

Shell Programming Systems Skills in C and Unix Shell Programming 15-123 Systems Skills in C and Unix The Shell A command line interpreter that provides the interface to Unix OS. What Shell are we on? echo $SHELL Most unix systems have Bourne shell

More information

INTRODUCTION TO LINUX

INTRODUCTION TO LINUX INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free

More information

IBM License Metric Tool 9.0 Installation

IBM License Metric Tool 9.0 Installation ILMT Central Team IBM License Metric Tool 9.0 Installation Questions & Answers Welcome This is the twenty second Q&A event prepared by the ILMT Central Team We concentrate on License Metric Tool version

More information

Tivoli Web Solutions. Upgrade Notes

Tivoli Web Solutions. Upgrade Notes Tivoli Web Solutions Upgrade Notes Tivoli Web Solutions Upgrade Notes Note Before using this information and the product it supports, read the information in Notices on page 7. IBM Tivoli Web Solutions

More information

6.033 Computer System Engineering

6.033 Computer System Engineering MIT OpenCourseWare http://ocw.mit.edu 6.033 Computer System Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. M.I.T. DEPARTMENT

More information

BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description:

BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description: BIOINFORMATICS POST-DIPLOMA PROGRAM SUBJECT OUTLINE Subject Title: OPERATING SYSTEMS AND PROJECT MANAGEMENT Subject Code: BIF713 Subject Description: This course provides Bioinformatics students with the

More information

Installing Prime Optical

Installing Prime Optical 5 CHAPTER This section describes how to install Cisco Prime Optical 9.8 with an Oracle 11g database. To ensure a successful installation, use the checklist provided in the Installation Scenarios and Checklists,

More information

Using bash. Administrative Shell Scripting COMP2101 Fall 2017

Using bash. Administrative Shell Scripting COMP2101 Fall 2017 Using bash Administrative Shell Scripting COMP2101 Fall 2017 Bash Background Bash was written to replace the Bourne shell The Bourne shell (sh) was not a good candidate for rewrite, so bash was a completely

More information

NetBackup Deployment Template User Guide for Chef

NetBackup Deployment Template User Guide for Chef NetBackup Deployment Template User Guide for Chef September 25, 2017 Third-party mass-deployment tools such as Chef and System Center Configuration Manager (SCCM) make deploying software on different platforms

More information

List of Linux Commands in an IPm

List of Linux Commands in an IPm List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir

More information

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0

AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 z/tpf V1.1 Title: z/tpf File System Review Subtitle: Our Greatest Hits Name: Stephen Record Venue: DBDF Subcommittee AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition

More information

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A

HP StorageWorks Performance Advisor. Installation Guide. Version 1.7A HP StorageWorks Performance Advisor Installation Guide Version 1.7A notice Copyright 2002-2004 Hewlett-Packard Development Company, L.P. Edition 0402 Part Number B9369-96068 Hewlett-Packard Company makes

More information

DBaaS (Oracle and Open Source)

DBaaS (Oracle and Open Source) DBaaS (Oracle and Open Source) Vess Natchev vess@us.ibm.com Power Cloud Team Leader Systems Lab Services IBM Systems Lab Services Proven IT Infrastructure Expertise 1 Agenda Definition Life Cycle of Database

More information

Manual Shell Script Linux If File Exists And

Manual Shell Script Linux If File Exists And Manual Shell Script Linux If File Exists And Is Not Empty read Bash Conditional Expressions in the manual, and use the -r and -w operators glenn jackman Dec 10 '14 at -s FILE True if file exists and is

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Booting a Galaxy Instance

Booting a Galaxy Instance Booting a Galaxy Instance Create Security Groups First time Only Create Security Group for Galaxy Name the group galaxy Click Manage Rules for galaxy Click Add Rule Choose HTTPS and Click Add Repeat Security

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity

More information

Chapter 10: File System. Operating System Concepts 9 th Edition

Chapter 10: File System. Operating System Concepts 9 th Edition Chapter 10: File System Silberschatz, Galvin and Gagne 2013 Chapter 10: File System File Concept Access Methods Disk and Directory Structure File-System Mounting File Sharing Protection 10.2 Silberschatz,

More information

ForeScout CounterACT. Configuration Guide. Version 1.2

ForeScout CounterACT. Configuration Guide. Version 1.2 ForeScout CounterACT Endpoint Module: Linux Plugin Version 1.2 Table of Contents About This Plugin... 4 Accessing and Managing Endpoints... 4 Remote Inspection... 4 SecureConnector... 5 What to Do... 5

More information

Upgrading an ObserveIT One-Click Installation

Upgrading an ObserveIT One-Click Installation Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

INTRODUCTION TO BIOINFORMATICS

INTRODUCTION TO BIOINFORMATICS Introducing the LINUX Operating System BecA-ILRI INTRODUCTION TO BIOINFORMATICS Mark Wamalwa BecA- ILRI Hub, Nairobi, Kenya h"p://hub.africabiosciences.org/ h"p://www.ilri.org/ m.wamalwa@cgiar.org 1 What

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

TME 10 Reporter Release Notes

TME 10 Reporter Release Notes TME 10 Reporter Release Notes Version 2.0 April, 1997 TME 10 Reporter (April 1997) Copyright Notice Copyright 1991, 1997 by Tivoli Systems, an IBM Company, including this documentation and all software.

More information

Introduction to Supercomputing

Introduction to Supercomputing Introduction to Supercomputing TMA4280 Introduction to UNIX environment and tools 0.1 Getting started with the environment and the bash shell interpreter Desktop computers are usually operated from a graphical

More information

ClearTrigger/ClearTrigger Lite Version Installation Guide

ClearTrigger/ClearTrigger Lite Version Installation Guide ClearTrigger/ClearTrigger Lite Version 12.10 Installation Guide ClearTrigger/ClearTrigger Lite Installation Guide (V12.10) Audience... 3 Product Demarcation... 3 Introduction... 4 CLEARTRIGGER OVERVIEW...

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!   We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : A2010-650 Title : Fundamentals of Applying Tivoli Endpoint Manager Solutions V1 Vendor : IBM Version : DEMO 1 / 5 Get

More information

Tivoli Netcool Supports Guide to Probe Event Replication by Jim Hutchinson Document release: 2.0

Tivoli Netcool Supports Guide to Probe Event Replication by Jim Hutchinson Document release: 2.0 Tivoli Netcool Supports Guide to Probe Event Replication by Jim Hutchinson Document release: 2.0 Table of Contents 1Introduction...2 1.1Overview...2 2General event replication...3 2.1Standard Input [stdin]

More information

Getting your department account

Getting your department account 02/11/2013 11:35 AM Getting your department account The instructions are at Creating a CS account 02/11/2013 11:36 AM Getting help Vijay Adusumalli will be in the CS majors lab in the basement of the Love

More information

LOG ON TO LINUX AND LOG OFF

LOG ON TO LINUX AND LOG OFF EXPNO:1A LOG ON TO LINUX AND LOG OFF AIM: To know how to logon to Linux and logoff. PROCEDURE: Logon: To logon to the Linux system, we have to enter the correct username and password details, when asked,

More information

Basic Linux (Bash) Commands

Basic Linux (Bash) Commands Basic Linux (Bash) Commands Hint: Run commands in the emacs shell (emacs -nw, then M-x shell) instead of the terminal. It eases searching for and revising commands and navigating and copying-and-pasting

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

Logical Agent. Installation Guide

Logical Agent. Installation Guide Logical Agent Installation Guide August 2017 Revision History Revision No. Date Shipped Description 1st issue 08.2017 Newly released Table of Contents Chapter 1 Introduction... 1 1.1 Overview of Logical

More information

Unix Scripts and Job Scheduling. Overview. Running a Shell Script

Unix Scripts and Job Scheduling. Overview. Running a Shell Script Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts

More information

IBM. Harshit Kumar Agrawal & Chethan Chandrashekar 3/5/2014

IBM. Harshit Kumar Agrawal & Chethan Chandrashekar 3/5/2014 IBM Installing and Configuring IBM Case Manager 5.2 with FileNet P8 5.2.0 on single server An in-depth guide for users to setup an IBM Case Management environment using CMPIT 5.2.0 on a single server.

More information