0% found this document useful (0 votes)
177 views

Control-M Workload Automation 8 - Training

This document provides an overview of Control-M Workload Automation 8 including how to create and test sample jobs, configure agents and users, set up conditions and node groups, and hold or order jobs. Key steps covered are creating a job, assigning properties, checking it in and ordering for processing, viewing logs after running, and managing permissions through user and group configuration. Control-M agents run on Windows and Linux servers to process jobs, and conditions can define prerequisites and dependencies between jobs.

Uploaded by

anantha0k0inti
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
177 views

Control-M Workload Automation 8 - Training

This document provides an overview of Control-M Workload Automation 8 including how to create and test sample jobs, configure agents and users, set up conditions and node groups, and hold or order jobs. Key steps covered are creating a job, assigning properties, checking it in and ordering for processing, viewing logs after running, and managing permissions through user and group configuration. Control-M agents run on Windows and Linux servers to process jobs, and conditions can define prerequisites and dependencies between jobs.

Uploaded by

anantha0k0inti
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Control-M Workload Automation 8

Luiz Miranda

Restricted - Confidential
Table of Contents
• Introduction to Batch Scheduling software & Control-M Workload Automation 8

• Creating a sample job

• Testing a sample job

• Control-M agents

• Control-M agent services

• New jobs prefixes

• User management (creating users/reset password/add users into groups/table(folder) permissions/resources/conditions)

• Conditions (variables)

• Node Groups

• Ordering jobs

• Holding jobs
Restricted - Confidential
2
Introduction

• Job Scheduling Software – computer application designed for controlling unattended


programs execution. It performs a Batch Processing.

 Batch Processing - Execution of a series of programs (jobs) on a computer without manual


intervention.

• Programs = scripts, routines, .exe files, commands, etc.

• Control-M => application for batch processing, currently known as a workload automation
tool with a graphical user interface and single point of control for definition and monitoring of
jobs in a computing distributed environment.

Restricted - Confidential
3
Control-M Architecture

Restricted - Confidential
4
Control-M 8 – current infrastructure

 PROD environment

• 3 processing servers (PROD-A, PROD-B, PROD-C)

• 1 Enterprise Manager Server (AUSCTMEMS3B01)

• SIT environment (Test, Dev, UAT)

• 2 processing servers (SIT-A, SIT-B)

• 1 Enterprise Manager Server (AUSCTMEMSITS3B)

Restricted - Confidential
5
Creating a sample job

• Access Control-M workload automation > Planning Domain > Blank Workspace

Restricted - Confidential
6
Creating a sample job

• Drag & drop the “OS template” from the available templates

• Inform the following fields in the job properties:

Restricted - Confidential
7
Creating a sample job

Restricted - Confidential
8
Creating a sample job

• Click on “check-in” –

• Then click on “order > selected entities” (to order the selected job):

Restricted - Confidential
9
Creating a sample job

• Then click “order” again:

• Once you receive the message informing that the job was ordered:

• Then go to the Monitoring Domain

Restricted - Confidential
10
Testing a sample job

• Locate your job in the active jobs:

• Click on the job with right click > free > yes.

• After the processing of the job, check the log by right click > log.

Restricted - Confidential
11
Testing a sample job

Restricted - Confidential
12
New Jobs Prefix

• SIT environment
• As it involves a “New Folder”, probably the requester will not have permission to create even
on SIT.

• Then the support person can creates the new folder and so assign this new folder to the user
group which the user belongs -> so the user will have access and he will be allowed to create
his jobs.
• Request (BMC Remedy > Service Request Management > Request Entry > Search for “Control-M”):

Restricted - Confidential
13
New Jobs Prefix

• PROD environment
• Any changes in PROD -> only implemented by a CRQ.

• User will submit the CRQ with the instructions for the jobs creation (new folder/new jobs) then
it will be created by the support.

• Instructions need to be attached to the CRQ.

• Mandatory before implementation of new jobs:

 Request to SIM rules Team (BMC Remedy > Service Request Management > Request Entry >
Search for “SIM Request”):

Restricted - Confidential
14
Control-M Agents

• Software installed at users servers to perform the processing of the jobs

• It runs on Windows or Linux OS

• It is associated with specific Control-M environments (PROD or SIT)

• Service associated: Control-M agent

Restricted - Confidential
15
Control-M Agents

• Sample of diagnostic report (generated directly on the agent server – ag_diag_comm)

Restricted - Confidential
16
Control-M Agent services

• 4 agent services:

 Control-M Agent/ File Watcher Windows Servers:

 Control-M Agent/ Listener

 Control-M Agent/ Router Linux Servers:

 Control-M Agent/ Tracker

Restricted - Confidential
17
User Management

• Performed at Control-M Configuration Manager

Restricted - Confidential
18
User Management

• Within Control-M Configuration Manager, click on Tools > Security > Control-M EM Authorizations

Restricted - Confidential
19
User Management

Restricted - Confidential
20
User Management

• From the Control-M Authorizations:

 Create a new user

 Create a new user group

 Reset passwords

 Add users into groups

Restricted - Confidential
21
User Management

• Folder permissions – configured at user group level

• Resources(Control & Quantitative) permissions – configured at user group level

 Reason – the groups in Control-M are based on job prefix (job name), which is the basis for
the user permisions in the system.

Restricted - Confidential
22
Conditions

 Variables added or removed based on a job processing.

• In Conditions – type of pre-requisite condition that must be in the active conditions list for the
job to run. Usually associated with an Out Condition of a successful execution of a job
(predecessor).

• Out Conditions - conditions added or deleted from the conditions table after a job completes
with status of OK.

• Global Conditions – global pre-requisites to stablish job dependencies accross different


Control-M servers (example: from PROD-A to PROD-B).

Restricted - Confidential
23
Conditions

• In Conditions

• Out Conditions

Restricted - Confidential
24
Conditions

• Tools > Conditions – Conditions Table

Restricted - Confidential
25
Node Groups

• Node Group = collection of hosts / pool of machines

• Purpose – Load Balancing for the job processing

• How to access:

• Control-M Configuration Manager > Tools > Hosts Management > Hosts Manager

Restricted - Confidential
26
Node Groups

Restricted - Confidential
27
Node Groups

• Directly on each CTM server: CTM_MENU > 6 (host Group)

Restricted - Confidential
28
Holding Jobs

• On the Monitoring Domain, select the job then right click > Hold.

• A “padlock” icon it will appear in the job after the hold operation, indicating that the job is held.

Restricted - Confidential
29
Ordering Jobs

• On the Monitoring Domain, click the “order” button.

• Then select the Control-M server that the job belongs.

• Inform the folder.

• On the “jobs” field select “selected jobs”.

• Select the job and click on “Order”.

 Important detail: always check

“ignoring scheduling criteria” and “Hold” options.

• After this procedure it is needed to “free” the job in

the Monitoring Domain (Right click > Free).

Restricted - Confidential
30
Questions

Restricted - Confidential
31

You might also like