SysWorks©

SysWorks
System Management Guide


Previous Contents Index


Chapter 12
Layered Product Specifics

This chapter describes actions specific to managing individual layered products.

12.1 DECfax

If SysWorks is installed at the Turnkey level or at the System level and overnight processing is enabled, it will manage the cleanup of the DECfax database in place of the default DFX$CLEANER procedure provided with DECfax. To enable the correct operation of overnight processing it is necessary to edit the following DECfax startup command procedure to stop submission of the DFX$CLEANER job:


SYS$STARTUP:DFX$START_COMPONENTS.COM 

Normally this command procedure starts various DECfax components and then submits the DFX$CLEANER job. Placing the DCL command line $ exit after the last DECfax manager utility and before the use of the lexical f$getqui(...) will stop the command procedure from submitting the DFX$CLEANER job.

12.2 Pathworks (LAN Manager)

SysWorks provides a utility to directly access the LAN Manager share database from DCL so that the SWRK_MANAGE_PATHWORKS.COM command procedure can manage share as appropriate.

12.3 Pathworks (Macintosh)


Chapter 13
Monitoring the System

This chapter describes what and how to use SysWorks to monitor the system.

The monitor process watches various activites on the system and takes appropriate action when an undesirable state exists. Basically, a scan of the system is made every SWRK_MONITOR_INTERVAL (usually 1) minutes. The following notes outline the activites watched and the actions to be taken.

13.1 Application and Group Control Jobs

Application and group control jobs (eg. BOOT and SHUTDOWN) are submitted to the SWRK$BATCH batch queue. These control jobs should be aborted if they accumulate more than SWRK_CONTROL_JOB_TIMEOUT worth of elapsed time. Note that the queues are scanned each SWRK_CONTROL_JOB_TIMEOUT minutes rather that SWRK_MONITOR_INTERVAL, except that when jobs are detected which would timeout before the next SWRK_CONTROL_JOB_TIMEOUT minutes are elapsed, the time until the next batch queue scan is reduced from SWRK_CONTROL_JOB_TIMEOUT minutes down to a time which should match the timeout time of the next job to timeout. This algorithm reduces the overhead of checking the batch queues every SWRK_MONITOR_INTERVAL minutes. Note also that if the node is a cluster member, a check is only made of batch queues executing on the local node.

13.2 Disk Free Space Low

Every SWRK_DISK_CHECK_INTERVAL minutes all the disk volumes directly attached to the local node, or served by a non host (eg HSC or DSSI) and having the appropriate allocation class are checked for a low space condition. This low space threshold is specified as a percentage of total disk space. Each volume may have a specific low space level, or by default a system wide low space level is used.

This scan takes some time which is why it is done only every SWRK_DISK_CHECK_INTERVAL minutes rather than SWRK_MONITOR_INTERVAL minutes - the main weakness being the increased time to detection.

13.3 Node Shutdown or Reboot

A check is made to see if the node is to be shut down. Appropriate warning messages are sent to all users, and at the indicated time, the monitor shuts down the node.

13.4 Restart

A check is made to see if the monitor should be restarted. The restart flag is set by the "Restart monitor" task in the operations menu, and by installations (or downloads) of the SWRK software.

13.5 Special Times

A number of special times are detected and appropriate action taken. These times include system wide application start (typically 8:00 am), system wide application stop (typically 6:00 pm), midnight (at which time the overnight system analysis and repair job is submitted and the monitor is automatically restarted), and a security domain time synchronization.

13.6 DECfax Servers

Every SWRK_DECFAX_CHECK_INTERVAL minutes a check is made that all of the defined DECfax servers are running. If any server is not running, a message is broadcast and that server is started using the FAX/MANAGER START SERVER command.

This scan takes some time which is why it is done only every SWRK_DECFAX_CHECK_INTERVAL minutes rather than SWRK_MONITOR_INTERVAL minutes - the main weakness being the increased time to detection.


Chapter 14
Miscellaneous Management Tasks

This chapter describes the remaining miscellaneous system management tasks that are not directly related to meta objects or described elsewhere in this manual.


Glossary

This glossary contains an alphabetic list of all the common prompts used in task dialogs. If a task has a specific prompts not used elsewhere, it is documented under that task. All other prompts are documented here.

: An account code may be entered. When adding an application environment, group or user, or when managing an account, this item is mandatory.

:

:

:

[SYS$BATCH]:

:

[Normal]:

[Yes]:

:

:

[USR]:

: A cluster name should be entered. By default, the cluster name from which the operation is being initiated is assumed. Note that this question will not be asked on clusters which are below the site level within the network.

:

:

[No]:

:

:

:

[Yes]: Indicates whether the associated environment should also be created. This question is only asked for add operations where an associated create operation also exists.

[Yes]:

: An optional value for a members details. The format is the DEC standard absolute date which is DD-MMM-YYYY.

[Yes]:

:

[No]:

[No]:

: A free text single line description may be entered. When adding an object, this attribute should be used, althiugh some objects use a default description if this attribute is left blank.

_Directory/Tape):

:

:

:

:

:

:

:

:

:

:

[TODAY]:

:

:

[No]:

:

:

:

:

:

:

:

[Source]:

:

: A required value for a member's details. The first letter of the given name is used to form part of the member lookup key. It also forms part of the default owner name.

:

:

:

:

:

:

[Yes]:

[Yes]:

[Yes]:

:

:

:

:

: A location code may be entered. When adding an application environment, group or user, or when managing a location, this item is mandatory.

:

:

:

:

:

:

:

[Ascii]:

: An optional value for a member's details. The first letter of the each middle name is used to form part of the member lookup key. These first letters also form part of the default owner name.

[Yes]:

_type:

:

:

:

:

:

:

:

:

:

:

:

:

:

:

:

:

:

[SYS$OUTPUT]: A specific output file specification may be entered. By default, SYS$OUTPUT (the standard output stream) is assumed.

[No]:

: The free format full name of the member. Where the member is a user who is granted access to the PATHWORKS system user class , this name is used as the AppleShare network alias name.

:

: A password may be entered. By default, a random password is used when objects are being added. Note that the minimum and maximum password lengths can be set as system wide parameters. In general the minimum password lengtn is 6 characters. If AppleShare or Microsoft products are being used, the maximum password length is 8 characters.

:

[Yes]:

[No]:

:

[Yes]:

:

:

:

:

:

:

:

[No]:

:

:

:

:

: An optional value for a members details. Used to indicate an alternative the the persons given name when generating a letter. For example the members given name may be William, but their salutation could be Bill.

:

:

:

:

:

[BEGINNING]:

:

:

:

:

:

: A required value for a member's details. The surname is used to form part of the member lookup key. It also forms part of the default owner name.

:

:

:

:

:

:

:

:

:

:

:

[TODAY]:

[Yes]:

:

:

[Default]: Indicates whether a secure task should secure files using the default action (i.e. SET SECURITY/DEFAULT) or an explicit action (i.e. SET SECURITY/ACL=(...)/OWNER=.../PROTECTION=(...)).

The advantage of the default secure action is that it is faster and does not change the modification dates of the secured files. This preservation of modification dates stops an incremental build following a secure task turning into an effective full build.

The advantage of the explicit secure action is that it is more thorough. It was also the action used in earlier versions of SysWorks. Note that an incremental build following a secure task using the explicit action effectively becomes a full build since all sources appear to be new.

By default the default action is used.

:

:

:

:

[Yes]:

:

:

:

[No]:

:

:

:

:


Index Contents