Professional Documents
Culture Documents
RMA V3R2.2 Users Guide
RMA V3R2.2 Users Guide
User's Guide
Version 3.2.2
GC30-4106-17
1
Note:
Before using this information and the product it supports, be sure to read the general information under “Notices” on page
393.
September 2017
This edition applies to Version 3.2.2 of the licensed program Remote Management Agent (program number 5639-TK4) and to
all subsequent releases and modifications until otherwise indicated in new editions.
If you send information to Toshiba Global Commerce Solutions (Toshiba), you grant Toshiba a nonexclusive right to use or
distribute whatever information you supply in any way it believes appropriate without incurring any obligation to you.
© Copyright Toshiba Global Commerce Solutions, Inc. 2017
Contents
Figures.......................................................7 Java..................................................................................... 30
Supported operating systems......................................... 30
Tables...................................................... 13 POS sensor drivers........................................................... 30
Touch screens ...................................................................31
UPOS Peripherals.............................................................31
About this guide..................................... 15 Compatibility with prior versions of RMA.........................31
Who should read this guide.................................................. 15 RMA Master and General agents...................................31
Where to find more information...........................................15 RES/Director......................................................................31
Additional references............................................................. 15 Network requirements........................................................... 31
Conventions used in this guide............................................ 16 Discovering General Agents that are on different
Notice statements....................................................................16 subnets than the Master Agent............................................. 33
Installing on Linux..................................................................47
Part II. Installing and using the 32/64 bit libraries during Director installation ...................48
Remote Management Agent.................. 25
Chapter 6. Installing and upgrading
Chapter 3. RMA Requirements.............. 27 Retail Extensions and RES on
Hardware requirements.........................................................27
IBM Systems Director Server hardware
Windows.................................................. 49
requirements .................................................................... 27 Installing and upgrading Retail Extensions for IBM
IBM Systems Director / Retail Enterprise Service Systems Director on Windows..............................................49
software requirements............................................................28 Verify RMA Retail Extensions for IBM Systems
Java..................................................................................... 28 Director Server Installation.............................................55
Supported Operating Systems........................................29 Installing RES on Windows................................................... 55
IBM Systems Director Server..........................................29 Upgrading Retail Extensions on the Windows
Director Server database requirements.........................29 platform ................................................................................... 62
Browser Requirements.................................................... 29 Upgrading RES on Windows platform................................63
RMA software requirements................................................. 30
Chapter 17. Event management.......... 233 Chapter 21. Power Management......... 359
Introduction to Event management................................... 233
Event management resources.......................................234
Using the Director Event Log ...................................... 234 Chapter 22. Troubleshooting
Configuring the event Log............................................ 238
Managing event filters..........................................................255 problems............................................... 367
Managing event types.......................................................... 255 Logs......................................................................................... 367
Defining an event action plan............................................. 256 RMA Agents....................................................................367
Using the event action plan builder............................ 256 Agent JVM diagnostics.................................................. 368
Associating the event action plan................................ 258 IBM Systems Director information.............................. 368
Activating the event automation plan.........................264 Troubleshooting.................................................................... 370
Verifying the event automation plan.......................... 266 RMA utilities..........................................................................372
Event management for 4690 operating systems............... 266
Event severity override in 4690.................................... 276
Event severity overrides file on IBM Systems Appendix A. Stopping and starting
Director............................................................................ 277 RMA Director RES................................ 375
System event config file on Master Agent ................. 277
Contents 5
Appendix B. Agent Monitoring
Support..................................................377
Figures 9
254. ACE Pin Pad inventory................................................ 227 298. Edit Event Filter created window...............................254
255. Export All - view 1........................................................ 227 299. View Summary of Event filter created window.......254
256. Export All - view 2........................................................ 228 300. View event filter window............................................ 255
257. Saving exported inventory data..................................228 301. Event Actions tab.......................................................... 256
258. Resource Explorer > Groups > All Retail Client 302. Create Action wizard....................................................257
Systems window................................................................... 229
303. Create Action wizard....................................................258
259. Selecting Columns from the Actions drop down
menu....................................................................................... 229 304. Event Automation tab.................................................. 258
260. Columns Order view.................................................... 229 305. Create Event Automation wizard...............................259
261. Selecting the SerialNumber attribute......................... 230 306. Name and Description window..................................259
262. Saving and closing the Columns window.................230 307. Target window.............................................................. 260
263. New column in IBM Systems Director Console....... 231 308. Event window............................................................... 260
264. Flow of events from CIM to RMA to Director.......... 233 309. Common event types window....................................261
265. Store Event filter window............................................ 235 310. Advanced Event Filters window................................ 261
266. Events table window.................................................... 235 311. Start Saving History window......................................262
268. IBM System Director Console window..................... 236 313. Time range window - default view............................ 263
269. Event entries listed in the agent MEP Properties 314. Time range window - customized view.................... 263
window...................................................................................237 315. Event automation Summary window........................264
270. Event entries.................................................................. 237 316. Event Automation Plans window ............................. 265
271. Define Master Agent window.....................................238 317. Event Automation Plans confirmation message...... 265
272. Event log view............................................................... 239 318. Resource Explorer window......................................... 266
273. Agent Offline Event...................................................... 239 319. Event Filters window................................................... 268
274. Agent Online Event...................................................... 240 320. Create Events window................................................. 269
275. Both Master Agent and General Agent offline......... 240 321. Create Events filter type window...............................270
276. Both Master Agent and General Agent online......... 240 322. Types of events to include........................................... 271
277. Agent offline event properties.................................... 241 323. 4690 message groups displayed..................................272
278. Agent online event properties.....................................242 324. Searching the 4690 message groups .......................... 273
279. The LHS pane of Director............................................ 243 325. List of event numbers and filters ............................... 274
280. The Welcome page of Director....................................243 326. Severity and Category Window..................................275
281. Edit event window........................................................244 327. Wizard Summary Window......................................... 275
282. Filter Type window ..................................................... 244 328. Created event log filters............................................... 276
283. Event Type wizard .......................................................245 329. Event Log View............................................................. 279
284. List of Component Categories.....................................245 330. Navigation: Home -->Status Manager....................... 280
285. Component Types for each category......................... 246 331. Aggregate Health of Systems...................................... 280
286. Severity and Category pane - Custom view............. 247 332. Systems with Warning State........................................281
287. Event Sender window - Default view........................ 247 333. Scoreboard view............................................................281
288. Event Sender window - Custom view....................... 248 334. Problems screen.............................................................282
289. Event Text window - Default view............................ 249 335. Problems detail page.................................................... 282
290. Event text window - Custom view.............................249 336. Resource Navigator view.............................................283
291. Time Range window - All view.................................. 250 337. Resource Properties View............................................283
292. Time Range window - Custom view..........................250 338. Active Status view........................................................ 284
293. Summary Window........................................................251 339. Problems view............................................................... 284
294. Events Filter tab window.............................................251 340. Ignore Problems............................................................ 285
295. Copy event filter - filter name..................................... 252 341. Scope of Ignore Operation........................................... 285
296. Create Event filter from existing event window...... 253 342. Problem Status View after events being ignored..... 286
297. Create Simple Event Filter window........................... 253 343. Ignored Events Tab.......................................................286
354. Generic (user defined) warning event for 396. Install wizard summary page..................................... 339
PowerState attribute............................................................. 299 397. Active and Scheduled Job status.................................340
355. Generic (user defined) Resolution event for 398. Software Distribution status........................................340
PowerState attribute............................................................. 300
399. Update Manager summary page................................ 342
356. Agent Monitoring......................................................... 301
400. Compliance policy page...............................................343
357. Launching RES Software Package Manager............. 310
401. Create and configure compliance policies page....... 343
358. RES Authorization Management window................ 310
402. Optional list of systems................................................ 344
359. RES Software Package Manager application user
interface.................................................................................. 311 403. Show compliance policies............................................344
360. Create Package in RES Software Package Manager.312 404. Compliance policies......................................................345
361. Enter General Information for package..................... 313 405. Critical or high update severity level icon................ 346
362. Enter staging destination directory for package...... 314 406. Unknown or inapplicable update severity level
icon.......................................................................................... 346
363. Enter installation destination directory for
package................................................................................... 315 407. In compliance icon........................................................ 346
364. Select package files........................................................316 408. Medium or low severity level icon.............................346
365. Enter first command..................................................... 316 409. Inaccessible system or no inventory collected icon. 346
366. Enter second command................................................317 410. Update compliance section..........................................347
367. Package Commands window......................................317 411. Table of systems............................................................ 347
368. Installation Target State and Post Installation 412. View all compliance issues.......................................... 348
Action......................................................................................318 413. Expanded and filtered list of systems with
369. Update Manager Product Information window...... 319 compliance issues..................................................................348
370. Save Package window..................................................320 414. Compliance issues page............................................... 348
371. Newly created package visible in application.......... 320 415. Compliance status.........................................................349
372. View of existing packages in RES Software 416. Recommended compliance actions............................ 349
Package Manager.................................................................. 322 417. Show and install updates page................................... 350
373. Edit package in RES Software Package Manager.....322 418. List of systems to be scanned for update view......... 351
374. Edit package wizard..................................................... 323 419. Show and install updates error message................... 352
375. Finish and save edits to package................................ 324 420. List of applicable updates............................................ 353
376. Remove package........................................................... 325 421. Install tab view.............................................................. 354
377. Delete package...............................................................325 422. Installation wizard welcome page..............................354
378. Importing Packages using Update Manager............ 326 423. Restart options...............................................................355
379. Check for updates......................................................... 327 424. Summary page...............................................................355
380. Select and add packages to be updated.....................328 425. Launch job page............................................................ 356
381. Job scheduling options................................................. 328 426. Active and scheduled job page - job status............... 356
382. Import updates from file system................................ 329 427. Software Distribution status........................................357
383. Browse to directory containing package files........... 330 428. Power Management Options available for
384. Import Job window.......................................................330 General agent Managed End points(MEP)....................... 360
Figures 11
429. Complete job creation...................................................361
430. Job Created Successfully.............................................. 361
431. Active and Scheduled Jobs.......................................... 362
432. General tab..................................................................... 362
433. Targets tab......................................................................363
434. Logs tab.......................................................................... 363
435. RES Software Package Manager................................. 381
436. Create Package.............................................................. 381
437. Enter package information.......................................... 382
438. Enter Windows installation information...................382
439. Select files to distribute................................................ 383
440. Set JAVA_HOME to valid JRE location..................... 384
441. Set RMA_JAVA_PATH to valid JRE location...........384
442. Package Commands..................................................... 385
443. Enter Update Manager product information............385
444. New JRE package.......................................................... 386
445. RES Software Package Manager (Linux)................... 386
446. Create Package (Linux)................................................ 386
447. Enter package information (Linux)............................ 387
448. Enter Linux installation information..........................387
449. Select files to distribute (Linux).................................. 388
450. Set executbale permissions (Linux)............................ 389
451. Set RMA_JAVA_PATH (Linux)..................................389
452. Delete shell script.......................................................... 390
453. Set file access permission (Linux)............................... 390
454. Linux package commands........................................... 391
455. Enter Update Manager product information
(Linux).................................................................................... 391
456. New JRE package (Linux)............................................392
Additional references
The following publications provide additional information on using the Remote Management
Agent.
• 4690 OS User's Guide
• 4690 OS Programming Guide
• 4690 OS Communications Programming Reference
• Store Integrator User's Guide
• Store Integrator Programming Guide
• Store Integrator Graphical Interface Programming Guide
• Data Integration Facility User's Guide
• Unified Point of Sale (UPOS) publications at http://www-1.ibm.com/support/search.wss?
rs=219&q=PUBUPOS.
environment variables
This document uses percent signs (%VAR%) to designate environment variables in
Windows, and it uses $VAR to designate environment variables in Linux. Follow the
appropriate format for your operating system.
Notice statements
Notices in this guide are defined as follows:
Notes
These notices provide important tips, guidance, or advice.
Important
These notices provide information or advice that might help you avoid inconvenient or
problem situations.
Attention
These notices indicate potential damage to programs, devices, or data. An attention notice
is placed just before the instruction or situation in which damage could occur.
CAUTION
These statements indicate situations that can be potentially hazardous to you. A caution
statement is placed just before the description of a potentially hazardous procedure step
or situation.
DANGER
These statements indicate situations that can be potentially lethal or extremely hazardous
to you. A danger statement is placed just before the description of a potentially lethal or
extremely hazardous procedure step or situation.
This publication includes updates for Version 3.2.2 of Remote Management Agent. The
following is new for this release:
• 4690OS installer section
• Whitelisting section
• Windows 10 2016 and CBB support
• 6145- 2TN/2TC support
This update documents the changes to the Remote Management Agent User's guide for RMA
Version 3.2.1.
Update of GC30-4106-15
This update documents the changes to the Remote Management Agent User's guide for RMA
Version 3.2.0.
Remote Management Agent (RMA), along with IBM® Systems Director, allows you to view,
track and control your retail hardware and software environment. RMA includes the following
key functions:
• System health status
• Power management of POS systems
• POS hardware monitoring
• System monitoring of system performance and availability
• Event management to track and respond to various error conditions
• Asset tracking and inventory management of hardware and software systems
• Software distribution system for application or device driver updates
Inventory
RMA and IBM Systems Director support the collection of hardware and software inventory
information, including retail-specific information for peripherals. This information is stored in
the IBM Systems Director database, where it can be monitored or queried (even when not
connected).
RMA serves as a gateway to all store resources. At the enterprise level, there are numerous
integration possibilities for enterprise management, as Figure 1 illustrates:
IBM Systems Director, enterprise management tools based on JMX, and custom management
applications written to the RMA APIs can all connect to the Master Agent to manage store
resources. These are the components that make up the RMA infrastructure in the store, and they
comprise an IBM Systems Director deployment at the enterprise:
This section describes the hardware and software requirements for all of the systems in RMA-
Director solution. This includes in-store systems running the Master Agent (MA) or General
Agent (GA), as well as the enterprise systems running the IBM Systems Director server or
console.
Hardware requirements
The MA runs on the in-store processor. The in-store processor is a Microsoft® Windows®, Linux®,
or 4690 V7 Enhanced system that runs the RMA service and provides a point of interface for
enterprise applications or other in-store applications. The in-store processor should have a
minimum 1 GHz processor with 2 GB of RAM. The MA service requires approximately 80 MB of
memory without any extensions or connected General Agents. Memory usage will increase as
extensions are added, connections are made, and policies are applied.
The GA runs as a system service on a Windows or Linux system, or on a 4690 controller, or as an
embedded agent in a Java virtual machine (JVM). The MA and GA services cannot be installed
on the same computer. The GA service requires approximately 70 MB of virtual memory when
running in a Windows environment and 40 MB of virtual memory when running in a Linux or
4690 environment.
The RMA agent (Master or General) running on the 4690 Master Controller is used to manage
each terminal in the store. This will require additional memory for each terminal.
Note: When using the Systems Workload Estimator, the number of Operating Systems should be
zero (0) when considering the number of retail endpoints. Retail extensions do not expose
separate endpoints for the operating system. The tool limit is 10,000. Update when the final
scalability numbers are determined.)
Java
The Java requirements to run RES are as follows:
An appropriate Java Run time Environment (JRE) for the Platform should be present on the
system to run RES.
Note: For RMA 3.2.2 onwards, JRE will not be shipped/bundled along with RES. The user will
need to provide the JRE.
The JRE required to run RES should meet the following criteria:
Browser Requirements
The following link provides a list of the supported web browsers for the IBM Systems Director
console web application: http://www-01.ibm.com/support/knowledgecenter/SSAV7B_635/
com.ibm.director.plan.helps.doc/fqm0_r_supported_web_browsers.html?
cp=SSAV7B_635%2F2-1-4-4-3
A Java 6 or later JRE must be installed on the system running the IBM Systems Director console
in order to run RMA Store Manager or RES Software Package Manager through Java Webstart.
Java
An appropriate JRE for the Windows or Linux Platform should be present on the system to run
Master Agents and General Agents.
Note: The JRE will not be shipped/bundled along with RMA version 3.2.2 and later. The user
will need to provide the JRE. For OS4690 Remote Management Agents, the user will not need to
provide the JRE as the OS will facilitate the same.
The JRE required to run RMA software should meet the following criteria:
• JRE version should be of 8.
• JRE should be of 32 bit/64bit basing on system type.
• JRE should at least be compliant with the Java SE standards for Java 8.
JRE should be present on the system before installation process is initiated.
UPOS Peripherals
To support peripheral inventory and events, the UPOS drivers must be installed with systems
management enabled.
The following peripheral is supported by RMA 3.2.2:
• 6145-2TC/2TN (Printer)
RES/Director
The RES is backwards compatible with prior versions of RMA, supporting the ability to connect
to MA systems running the latest version of RMA V3 (3.2.1, 3.2.0).
Network requirements
If you are setting up a lab environment or a single-store scenario with no outside internet
connectivity, you can install the RMA MA on the same system as the Director Server, although
this is generally not desirable for a production environment.
Network infrastructure can sometimes be complex, but the basic rules are as follows:
• The RMA MA system must be able to communicate with the RMA GA system IP address,
and vice-versa. (You can usually test this by using the "ping" command – try to ping the IP
address of the MA from the GA, and vice-versa.) More specifically, multicast traffic on UDP
port 31200 must be able to flow between subnets. See “Discovering General Agents that are
on different subnets than the Master Agent” on page 33.
• The Director Server system must be able to communicate with the RMA MA system’s IP
address, and vice-versa. (Again, you can usually test using the ping command.)
The network ports used by the RMA GA are shown in the following table:
The network ports used by the RMA MA are shown in the following table:
The network ports used by the RES are shown in the following table:
The network ports used by IBM Systems Director Server 6.3 are shown in Table 4. The list
supplied is intended to be a guide and may not be current. For the most accurate information,
see to the following link in the Director publications: www.ibm.com/support/knowledgecenter/
SSAV7B_6.3.7/com.ibm.director.plan.helps.doc/fqm0_r_ports_for_the_management_server.html.
Discovering General Agents that are on different subnets than the Master
Agent
Typically, the MA and GA will be on the same subnet within the store. If they are not on the
same subnet and are connected by an in-store router, there is an additional configuration step to
set the TCP/IP time-to-live parameter on the RMA agents.
First, use the tracert command to identify the number of hops between the MA and GA systems.
This command could be executed from either system and should use the IP address of the other
system (similar to the ping command).
The number of hops returned by the tracert command is what you will need to set as the time
to live for each of your general agents.
To set the time to live, add the following property to the rmauser.properties file on each of
your general agents (simgmt.pro on V2R6 or earlier agents):
The rmauser.properties and simgmt.pro files are found in the following locations:
• Windows: C:\Program Files\Toshiba\RMA\user\rma\
• 4690 Classic: m:\rma\user\rma\
• 4690 Enhanced: f:\rma\user\rma\
Note: The routers in between the systems must also pass the necessary RMA traffic between the
systems in addition to just the time to live properly.
The following instructions describe the steps required to install the RMA GA, the RMA MA,
RES, and IBM Systems Director Server. The instructions serve as a summary for installing all
components of the solution. The detailed installation and configuration instructions for each
component are located in other chapters in this guide. These instructions are for RMA 3.2.2 and
IBM Systems Director 6.
It is possible to set up a mixed environment in which one or more of the components is running
on a different operating system with IBM Systems Director Server on a Windows or Linux
platform, and each agent on a Windows, Linux, or 4690 platform. To learn about using RMA in
these other environments, you should first read and understand this chapter, then refer to
“Setting up RMA on 4690 ” on page 101.
The following systems are involved in the solution. With the exception of RES and IBM Systems
Director server, these components are installed on separate systems, as follows:
• The RMA GA should be installed on all the POS systems in a particular store. These systems
can have DHCP or static IP addresses.
• The RMA MA should be installed on a single system within each store that will act as the
RMA entry-point for the store. The system may have either a static IP address or a dynamic
IP address provided the hostname can be resolved by DNS to the correct IP address for the
MA. This system does not need to be a server-class system.
• The IBM Systems Director Server should be installed on a system residing outside the store -
typically, it will be installed at the corporate I/T headquarters or data-center. When you
install the Director Server, the installation program automatically installs the Director Agent
(to monitor the server on which it is installed) along with Director Server. The Director Server
should run on a dedicated server-class computer according to the recommendations set forth
by their publications. See “IBM Systems Director Server hardware requirements ” on page 27
for more information. Also see “Director Server database requirements” on page 29 for more
information about options and requirements for the IBM Systems Director database.
• The RES is a service used to support the Retail Extensions for IBM Systems Director. It must
be installed on the same system as the IBM Systems Director Server.
• The IBM Systems Director Console is a web application, so the console application runs
through a web browser. Unlike Director 5.20, there is no separate installation for the console.
Certain tasks (such as the RMA Store Manage and RES Software Package Manager) are
launched through Java WebStart, and require a JRE supporting Java WebStart to be installed
in order to run. See the “Browser Requirements” on page 29 for more details.
Note: Please make sure the appropriate Java is present on the system to run RES and RMA
agents.
To understand the Java requirements for RES and agents refer to:
• “Java” on page 28, under "IBM Systems Director / Retail Enterprise Service software
requirements."
• “Java” on page 30, under "RMA software requirements".
The overall installation process is as follows:
1. Download IBM Systems Director Server 6, see “Step 1 - Downloading IBM Systems Director
Server 6” on page 36.
2. Download RMA (which includes the Retail Extensions for IBM Systems Director), see “Step
2 - Downloading RMA and the Retail Extensions for IBM Systems Director” on page 37.
Step 2 - Downloading RMA and the Retail Extensions for IBM Systems
Director
1. Go to the following website: http://www.toshibacommerce.com/?urile=wcm:path:/en/home/
support/product-support/support-software/support-remote-management-agent
Note: Credentials are required to access Toshiba downloads.
2. Download the latest version of RMA ISO Image by clicking on Download Options.
Step 5 – Installing RMA Retail Extensions for IBM Systems Director Server
Retail Extensions for IBM Systems Director must be installed on the same system as the Director
Server. See Chapter 6, Installing and upgrading Retail Extensions and RES on Windows on page
Step 7 – Verify Retail Extensions for IBM Systems Director and RES
Installation
The following steps verify that Retail Extensions for IBM Systems Director and RES is installed
through Director Console.
1. Create user IDs for Director Console users:
a. Add user IDs as members of the appropriate Director user group, such as smadmin for
authority to login and perform various Director Console functions.
b. Also add user IDs as members of the RESAdmin group for each user that needs access
to launch the RES Configuration Console and the RES Software Package Manager from
the Director Console.
2. Browse to the Director Server using: https://ip_address:8422/ibm/console/logon.jsp - where
ip_address is the IP address of the Director Server machine.
3. Log into the Director Console with an authorized Director Console user ID.
4. On the Resource Explorer window, click Retail Groups, then click All RES Systems. Verify
that RES:127.0.0.1:10520 is displayed with OK access.
Installing on Linux
The instructions for installing IBM Systems Director Server 6 on Windows shows the type of
input that would also be required for installing on Linux. You can use the instructions for
installing on Windows as guidelines for what input to expect to provide for installing on Linux.
The standard RHEL 6.4 and 6.5, 64 bit installation does not include some 32 bit packages that
IBM Systems Director 6.3.x requires. When you run the Director installation, a pre-installation
check is run and the install stops if the prerequisites are not met. Consult the summary report
that is specified in the output when the install stops (//tmp/checkds/reports/check
DS_Summary_<yyyymmdd>_<hhmmss>.html).
This sections includes information to help you install and upgrade Retail Extensions and RES on
Windows.
Figure 27. Verifying the IBM Systems Director Server stopped successfully
11. Select Done when the installation is completed.
12. Verify that the IBM Systems Director is restarted successfully. You should verify that the
server is started successfully by ensuring there is a "green circle" in the task bar. This may
take several minutes.
Figure 28. Verifying the IBM Systems Director Server restarted successfully - part 1
Figure 29. Verifying the IBM Systems Director Server restarted successfully - part 2
Note: The installation log for Retail Extension is placed under C:\temp folder.
Note: On Windows 2012 OS, right click on setup.exe and set the compatibility mode to
Windows 8.
3. Run setup.exe.
4. After a few minutes elapse, the Toshiba Retail Enterprise Service Installer screen is
displayed.
5. Click Next on the Welcome page. After some time elapses, the Software License Agreement
page displays. Select I accept the terms in the License Agreement, and click Next.
This sections includes information to help you install and upgrade Retail Extensions and RES on
Linux.
The following procedure has to be done before installing Retail Extensions and RES on the Red
Hat Linux Platform. This is to increase the limit on the number of open file handles in the
operating system, which is needed for smooth functioning of RMA and to support scalability.
Make the following system changes:
1. Edit the /etc/security/limits.conf file by adding the following lines:
2. Save and close the /etc/security/limits.conf file. This updates the system limits to
increase the number of open file handles.
3. Reboot the system.
The Start IBM Systems Director Server panel asks you whether or not you want to start
IBM Systems Director Server after installation completes. Make the appropriate selection
and press Enter.
8. A summary page is displayed with the following details: product name, install folder,
required disk space, free disk space, and disk space information.
Note: If you have chosen to restart the IBM Systems Director after installation in Step 7, the
installer will wait until the ISD start state is reached. If there is an issue with starting the
IBM Systems Director and if the state does not reach the starting state, the installer will retry
every 3 minutes for 10 minutes to restart, then will stop the installation.
Post installation
A post installation Retail folder will be created at opt/ibm/director/Retail. Following is
the contents of the Retail folder:
A retail folder with the contents, the folders events,healthstatus,inv and retail-
isd.properties, will be placed in /opt/ibm/director/proddata. The folders,
Execution logs
At the time of installation, the debug level of the execution logs will be created at /tmp/
Retail_Inst_Debuglog.txt. The install command execution log will be placed at /tmp/
ISD_RetailPlugin_installLog.txt.
Figure 56. Retail Extension for IBM Systems Director - Upgrade Confirm
2. The Retail Extensions for IBM Systems Director Upgrade panel is displayed confirming that
the prerequisite for an upgrade is met.
Figure 57. Retail Extension for IBM Systems Director - Prerequisite for an upgrade check
Note: The text, “Unable to install the Java Virtual machine included with this installer” will
be displayed in the panel. Please ignore this as this will not affect the functionality and it is a
limitation from the dependent Install Anywhere application.
8. If the JRE provided at JAVA_HOME environment variable or user selected JRE is not valid,
as per the criteria mentioned in Java Requirements, the Invalid Java Home panel will be
displayed.
Press Enter.
Type 1 and press Enter. Now, specify the absolute path to the Java VM executable.
9. The Select Java Virtual Machine panel will be displayed. User has to provide the
appropriate complete Java executable location as explained in Step 8.
10. A Summary panel is displayed with the following details: Product Name, Install Folder,
Java VM selected, Disk Space Information etc.
After the installation, a RES Services should be listed in System --> Administration --> Services.
RMA is delivered on a single DVD, which includes the Remote Management GA and MA.
Before attempting to install the RMA software, read all the installation instructions in this
chapter.
The installation software uses InstallAnywhere installer on Windows. To install RMA, follow the
procedures described in “Interactive installation on Windows” on page 79, “Silent installation
of RMA on Windows” on page 91, or “Interactive installation on Linux ” on page 92.
Installation procedure
The steps below detail how to install RMA on Windows.
Before you begin, Java/JRE for Windows platform should be present on the system. Refer to
“Java” on page 30, under "RMA software requirements".
1. Log on with Administrator authority.
2. Insert the installation DVD into the DVD drive.
3. To run the installation program, open a command prompt window and issue the D:
\windows\rma\<xxx>\setup.exe command, where D is the DVD drive and xxx is the
RMA installer type (i.e. x86 or x86_64).
4. On the Welcome panel of the InstallAnywhere wizard for RMA, verify the version and click
Next.
5. On the Software License Agreement panel, read the license document and select I accept the
terms in the License Agreement. Installation cannot continue until you read and agree to
the license terms. Click Next.
If the user selects No, select a different Java VM, the next panel shown will allow the user
to choose a diferent JRE.
7. Select the valid java executable on the machine by clicking Choose Java Executable or
Search Another Location.
Figure 76. Select Java Virtual Machine
Note: If the Master Agent is running in enhanced security mode, then the IBM Systems
Director Server/Management application will need to supply credentials before it will gain
Note:
1. If a MA running in enhanced security mode was installed, you can make custom changes to
the RMAAdmin security group. For more information about group membership when
running in enhanced security mode, see “Security groups” on page 117.
2. If there are any additional security applications (other than Firewall) installed on any of the
agent machines (for eg. Symantec Endpoint protection), the respective application should be
configured to allow RMA.
Linux prerequisites
The list below details the prerequisites for installing RMA on Linux.
1. A Linux JRE with the following specifications should be present on the system.
SFCB Installation
The following RPM packages, included in the Suse Linux Enterprise distribution, provide SFCB
support on a SUSE Linux Enterprise system:
• sblim-sfcb (minimum version sblim-sfcb-1.3.2-18.10.1)
• sblim-sfcc
• cim-schema
• cmpi-bindings-pywbem
• cmpi-provider-register
• libRaTools0
• libsblim-cmpiutil1
• sblim-cim-client2
• sblim-cmpi-base
• sblim-cmpi-dhcp
SFCB configuration
After SFCB is installed, it must be configured to use unauthenticated Hypertext Transfer
Protocol (HTTP) for RMA.
1. Open /etc/sfcb/sfcb.cfg in a text editor (such as vi).
2. Set enableHttp: to true.
SFCB troubleshooting
Issue: While querying a class instance using wbemcli command, the command halts even
though SFCB service status shows running.
Resolution: This may happen if the 64 bit libraries' configuration is not correct. To overcome the
issue below steps may help.
• Check the "lib" folder name in /var path. It will have either only "lib" or both "lib" and "lib64"
folder
• If only /var/lib folder is present then edit the/etc/sfcb/sfcb.cfg file.
• Point all /var/lib64 path in sfcb.cfg file to /var/lib.
• Restart the SFCB service
Upgrade
To upgrade an RMA Agent from RMA V2 on a Linux system, perform these steps:
1. Log in as root.
2. Find the current version of RMA installed by issuing the command:
3. If RMA is installed, the command will return a set of package names, one of which will
correspond to RMA.
Example: posIBM-GA-2.6-1027
4. Issue the command to uninstall the RMA RPM package:
rpm -e posIBM-GA-2.6-1027
To upgrade RMA V3 from one release version to another, issue the command below:
Note: If RMA V3 release is already installed, the below command can be used to install a
later version of the V3 release:
Installation
To install an RMA Agent onto a Linux system, perform these steps:
1. Log in as root.
2. Insert the installation DVD.
3. Make sure the DVD is mounted. If the DVD is not mounted, mount it using the mount
command. For example, issuing the mount /dev/cdrom/media/cdrom command as root
mounts the DVD to the /media/cdrom directory.
Note: The myStoreId string cannot contain any of the characters comma (,), equals (=), colon (:),
quote ('), asterisk (*), pipe (|), or question mark (?).
To supply new values for the configuration properties, the script can be run any time following
installation. After running the script, the RMA agent must be restarted for the changes to be
reflected.
If a Master Agent was installed running in enhanced security mode, custom changes to the
rmaadmin security group can be made. For more information about group membership when
running in enhanced security mode, see “Security groups” on page 117.
The ssl.properties file, that defines the set of SSL parameters to be applied to the socket
factory is loaded via the classpath. You can override this file by adding your own modified file
to the classpath.
Note: When a fresh install of agent rpm gets killed due to any reason, there is a likelihood of the
rpm database getting corrupted. Use the rpm --rebuilddb command to clean up the database
post which the install could be attempting again. When an rpm upgrade gets killed, the lower
version needs to be uninstalled and the higher version needs to be reinstalled.
RMA on 4690
Prior to OS4690 V7 and RMA V3R2.2, RMA was distributed as part of OS4690. Beginning with
OS4690 V7, RMA will not be bundled and distributed as part a of OS. RMA will be distributed as
a separate installable.
Post installation
Post installation, you must restart the controller(s) for a new installation to take effect. Once the
restart begins, RMA service starts running. There will be an entry in the Report Module Level of
the controller named Remote Management Agent Ver3.
After selecting the option above and pressing ENTER to get into the Remote Management
Agent Ver3 option, you will see the following details:
Setup instructions
After you have installed and properly configured the 4690 operating system using the
instructions in the 4690 Planning, Installation, and Configuration Guide, use the following
instructions to prepare the OS for RMA and to enable RMA on the system.
1. As you go through the steps in the 4690 Planning, Installation, and Configuration Guide, do the
following:
• Define a HOSTNAME logical name (on each controller).
• Ensure the system HOST file has mappings for "localhost" and for each controller's node
ID.
• Update the TCP/IP batch file for each controller to include the local loopback address.
• For each "enhanced" mode controller, update the TCP/IP batch file to include the
appropriate "eloopaddr" statements.
Note: The "eloopaddr" address is essentially an external loopback address; specify last or
choose an unused address within the subnet of the controller.
The following screen shots illustrate these configuration settings. In the examples, the
controller node IDs are VM and VZ:
Uninstall result
After uninstalling RMA for Windows:
• The installation or root installation directory %RMA_HOME% remains.
• The %RMA_HOME%/logs and %RMA_HOME%/user folders remain as per user's decision at the
time of uninstallation.
• The RMA service is removed.
• The Environment Variables are updated or removed.
This chapter describes the steps to uninstall Retail Extensions for IBM System Director. Complete
the following to manually uninstall Retail Extensions for IBM System Director on Windows and
Linux:
1. Log in as Administrator (windows) / root (linux) user.
2. Stop the IBM Systems Director server.
3. Delete the Retail plugins placed under Windows: C:\Program Files\IBM\Director
\Retail\eclipse\plugins for Windows server Linux: /opt/ibm/director/
Retail/eclipse/plugins for RHEL server.
4. Remove Uninstall entry from Windows registry (This step is not applicable for linux)
Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows
\CurrentVersion\Uninstall\Retail Extensions for IBM Systems Director.
5. Start the IBM Systems Director server.
6. Reinstall required version of Retail Extensions for IBM Systems Director.
This section explains how to uninstall the Toshiba Retail Enterprise Service.
Uninstallation result
After uninstalling RES for Windows:
RMA V2R5 introduced security enhancements to improve Master Agent and General Agent
security. The security changes to the Master Agent improved the authentication method used by
management applications to access the Master Agent. The General Agent security enhancements
prevented unauthorized access to General Agents within a store.
Security groups
Enhanced authentication not only validates a given username and password, but also verifies
that the user is a member of a specific system group. The group membership requirements on
each platform are described below.
Note: You must have a valid username and password when connecting to a Master Agent in
enhanced security mode. You should have an Administrator username (added to RMAAdmin
group) and password to connect to a Master Agent on Windows. On Linux, it has to be 'root'
user (added to RMAAdmin group) and password.
Windows
During installation of a Master Agent on Windows, a Windows local group called RMAAdmin is
created for RMA authentication. During authentication, the supplied username is checked for
membership in this group, and the username and password are verified. During installation, the
local Administrators group of the system is added to the RMAAdmin group. You can modify the
contents of the RMAAdmin group to contain other local or domain user accounts and groups.
4690 OS
To use RMA enhanced security mode for a Master Agent running on 4690 V6R4 or V6R5, enable
4690 Enhanced Security in System Configuration > Enhanced Security.
Linux
Enhanced security mode is the default mode for Linux MAs.
The rma-config script which is run post installation, allows the user to specify the store id, the
network interface, and the desired mode.
To change it manually to the desired mode, the com.ibm.retail.si.mgmt.security.mode
property in ../user/rma/security/security.properties must be edited.
Authenticating with the store, as described in “Retail Store Authorization” on page 205, will
remove the lock icon, discover the managed end points in the store, and allow them to interact.
This section explains how to configure the General Agent or Master Agent after installation is
complete.
Directory structure
The configuration files and extensions for the installed RMA agents are in the %RMA_HOME%/
user/rma directory. Under this directory is a set of subdirectories (listed in Table 5), each
containing configuration, data, or extension files.
com.ibm.retail.si.mgmt.remote.interface
Name of the network interface (such as eth0) that is used for management (General Agent) or
is exposed to management applications (Master Agent).
com.ibm.retail.si.mgmt.generalagent.protocol
(General Agent) Name of the protocol to use for the General Agent's JMXConnectorServer
(soxs). This should not be changed. RMI is the default protocol for OS 4690 and soxs is the
default for Windows and Linux platforms.
com.ibm.retail.si.mgmt.generalagent.discovery.ttl
(General Agent) Time to live (TTL) value to use for RMA Discovery Multicast Packets (default
is 1). When General Agents are on a different subnet than the Master Agent, this value must be
configured.
com.ibm.retail.si.mgmt.remote.rmi.socket.timeout
Property for specifying the socket read timeout (in milliseconds [ms]) for connections made to
the agent's Remote Method Invocation (RMI) JMXConnectorServer.
com.ibm.retail.si.mgmt.remote.rmi.socket.connect.timeout
Property for specifying the socket connect timeout (in ms) for connections made to the agent's
RMI JMXConnectorServer.
rma.security.disable.md5.algorithm=false
Property for explicitly enabling MD5 algorithm for certification path processing and TLS
handshake. RMA by default sets this property to false to enable MD5 algorithm, as the latest
JRE's by default disable MD5 algorithm. RMA enables MD5 by default to facilitate migration
scenarios and backward compatibility. Users can ensure security by using custom certificates
generated with secure algorithms such as SHA256WithRSA. It is highly recommended to
change value of this property to true once all components of RMA are upgraded to version
3.2.2.
rmi.leaseValue
Value for the java.rmi.dgc.leaseValue system property. The value of this property
represents the lease duration (in ms) granted to other virtual machines (VMs) that hold remote
references to objects that have been exported by this VM. Clients usually renew a lease when it
is 50% expired, so a short value will increase network traffic and risk late renewals in exchange
for reduced latency in calls to Unreferenced.
com.ibm.retail.si.mgmt.eventcontrol.storeandforward.buffersizethreshold
The number of events that are buffered (default is 200).
com.ibm.retail.si.mgmt.eventcontrol.storeandforward.buffertimeoutthreshold
The time threshold for the in-memory event buffers (in ms). After this amount of time passes without any
events being fetched, the memory buffer is flushed to disk (default is 300000).
com.ibm.retail.si.mgmt.eventcontrol.storeandforward.eventExpirationTimeout
The maximum number of days before the event buffer, and the entire set of persisted events, will be
deleted for a Master Agent (MA). When checked, if the earliest persisted event for an MA is older than
this number of days, the entire event collection is deleted.
com.ibm.retail.si.mgmt.eventcontrol.storeandforward.eventExpirationCleanupFreq
uency
The number of hours between checks for expired events.
com.ibm.retail.si.mgmt.notifications.memoryQueueCapacity
Parameter for the maximum number of events held in the Notification Processor's incoming event queue
before it will begin to buffer events to disk (the default is 1000).
com.ibm.retail.si.mgmt.capture.historyDeletionThreshold
The time threshold, in days, for how long a data capture policy invocation will remain in progress before
being terminated and cleaned up (the default is 1).
com.ibm.retail.si.mgmt.capture.initXferRetryPeriod
Parameter for the initial timeout period (in ms) for transferring data capture files over the network. After
the initial timeout, file transfer will retry at increasing intervals up to the maxXferRetryPeriod (the
default is 15000).
com.ibm.retail.si.mgmt.capture.maxXferRetryPeriod
Parameter for the maximum timeout period (in ms) for transferring data capture files over the network
(the default is 600000).
com.ibm.retail.rma.phome.connectionTimeout
The time in seconds (s), minutes (m), hours (h), or days (d) (e.g., 3h) that reconnection attempts
will stop if communication with the server (RES) side is not re-established. The default value is
1d.
com.ibm.retail.rma.phome.reconnectFrequency
The time in seconds (s), minutes (m), hours (h), or days (d) (e.g., 3h) between re-connection
attempts with the server (RES) side. The default value is 30s.
com.ibm.retail.rma.phome.newClientReconnectFrequency
The time between attempts to establish an initial connection with the server (RES) side. The
default is 30 minutes. This property only comes into play when the RES information is
complete in the phonehome.properties file located in the %RMA_HOME%/user/rma/config/
phonehome directory.
com.ibm.retail.si.mgmt.storeId=StoreIdValue
Note: The store ID value can be a number or string identifier of your choice. However, the
Store ID cannot contain the comma (,), equals (=), colon (:), quotation ('), asterisk (*), pipe (|),
or question mark (?) characters.
The store ID value will be taken only if it is valid. It will be invalid if store id key does not exist
or store id value is blank or contains invalid special characters.
Security configuration
The security configuration file is called security.properties. This file is located in directory
%RMA_HOME%\user\rma\security.
There are three properties in the security configuration. The first is the security mode, which is
either standard or enhanced. Standard mode security is the only mode available on RMA
V2R4 and earlier; however, standard mode security is still supported on later versions.
Enhanced mode security requires a username and password to unlock access to a Master Agent.
The second and third properties are related to enhanced security. The
ConnectionKeyLifetime property defines the lifetime of the authentication public/private
key pair. The RenewKeysPercentOfLifetime property defines the percentage of the lifetime
that passes before the Master Agent generates a key expiration warning event. The key pair is
renewed automatically when the IBM Systems Director server receives the expiration warning
event. The following example shows the default contents of the security.properties file:
# Property indicating percentage of the lifetime for when key expiration warning
# event is generated. The event triggers automatic key renewal. Default for
# invalid or missing property value is 75%.
RenewKeysPercentOfLifetime=75%
Post successful migration to RMA newer version across the RMA solution stack (Director
plugin, RES, master Agents and General Agents), the MD5 algorithm can be disabled as
mentioned above. The updated rma.properties can be distributed (via SWD as well) to
General Agents first and then to Master Agents. Post changes on agents, RES can be
updated with updated res.properties.
Users can ensure security by using custom certificates generated with secure algorithm like
SHA256WithRSA.
4. RMA uses SSL sockets for communication so that data is encrypted when transmitted. A
default RMA SSL certificate is installed with each system, providing an initial level of
security. The RMA truststore has two alias/entries, the rmacert and rsscert. The rmacert is
signed with SHA256withRSA algorithm and rsscert is signed with MD5withRSA algorithm.
The validity of rmacert is from Fri Apr 01 08:43:20 IST 2016 until: Sat Mar 20 08:43:20 IST
2066. The validity of rsscert is from Fri Mar 07 22:30:27 IST 2014 until: Sun May 24 22:30:27
IST 2065. RMA KeyStore will have one private key entry re-signed with SHA256WithRSA
algorithm.
Create override SSL properties file with new custom filenames and
password
For the new custom keystore and truststore files to be used, it is necessary to create or update the
user SSL properties file on the IBM Systems Director Server and on each RMA Master Agent and
General Agent with the new keystore and truststore filenames and password.
The following steps are used to create a different version of userssl.properties for each platform
that RMA agents run on and for the Retail Enterprise Service on the Director server since the
paths specified in userssl.properties to the keystore and truststore files are different for each
platform.
The steps to deploy the new versions of the userssl.properties file are done later in “Deploying
new custom SSL related files to RMA Agents” on page 137.
1. If userssl.properties exists in the classes directory on the Director server (refer to step
2 in previous section for location of the classes directory) and the filenames and password of
the new keystore and truststore created in the previous section are the same as already
specified for the current custom keystore and truststore in userssl.properties, then
this section can be skipped.
Note: In userssl.properties, the SSL.KeyFileName property specifies the current
custom keystore filename and the SSL.TrustFileName property specifies the current custom
truststore filename.
2. Select any RMA agent to use in the steps below to create a version of
userssl.properties with the new keystore and truststore filenames and password.
Note: These steps should be done on an agent in a test store instead of a real store if
possible.
3. On the selected RMA agent system, change to the following directory:
For Windows agent: %RMA_HOME%\user\rma\classes
For 4690 Enhanced controller: F:\rma\user\rma\classes
For 4690 Classic controller: M:\rma\user\rma\classes
For Linux agent: /opt/toshiba/rma/user/rma/classes
4. Save a backup copy of the current ssl.properties file in the classes folder.
5. Modify the following properties in ssl.properties to the names of the new keystore file
and the new truststore file:
SSL.ServerKeyFileName=<path>New_Custom_Keystore
SSL.KeyFileName=<path>New_Custom_Keystore
SSL.ServerTrustFileName=<path>New_Custom_Truststore
SSL.TrustFileName=<path>New_Custom_Truststore
SSL.ServerKeyPassword_encrypted
SSL.KeyPassword_encrypted
SSL.ServerTrustPassword_encrypted
SSL.TrustPassword_encrypted
7. Replace the encrypted password with the unencrypted value of Custom_PW for the
following properties:
SSL.ServerKeyPassword=Custom_PW
SSL.KeyPassword=Custom_PW
SSL.ServerTrustPassword=Custom_PW
SSL.TrustPassword=Custom_PW
8. Restart the RMA agent to encrypt the password in ssl.properties. Refer to Appendix A,
Stopping and starting RMA Director RES on page 375 for how to stop/start RMA agent.
Note: The Custom_PW password will be encrypted in ssl.properties when RMA starts.
9. Create a copy of ssl.properties named userssl.properties.<platform> for each
of the platforms with an RMA agent in the enterprise:
For Windows Agent: userssl.properties.windows
For 4690 controller: userssl.properties.4690
For Windows Director: userssl.properties.WinDirector
For Linux Director: userssl.properties.LinuxDirector
For Linux agent: userssl.properties.Linux
10. Repeat step 5 for each userssl.properties.<platform> file created in step 9. The fully
qualified path to specify when doing step 5 is the path for the platform the file is for.
11. Save the userssl.properties.<platform> files to use later in “Deploying new custom
SSL related files to RMA Agents” on page 137 and “Creating res-ssl.jar with new custom
SSL related files” on page 135.
12. Restore the agent back the way it was before doing step 4 above by deleting the
ssl.properties file, copying the original ssl.properties that was saved in step 4
into the classes folder, and restarting RMA.
In the case where custom ssl has already been deployed on RMA ( prior to version 3.2.2), there
will be two ssl configuration properties files, ssl.properties and userssl.properties.
Upgrading from RMA 3.2.1/3.2.0 to 3.2.2 will replace the original ssl.properties file with the
file that has SSL.protocol=TLSv1,TLSv1.2 and SSL.provider=IBMJSSE2.
However, the userssl.properties file will not change. In this case, the value for the above
properties needs to be set in the userssl.properties file, and the property file needs to be
manually deployed on RES to the respective agents by Software Distribution.
Create jar file for remote embedded agents with new custom SSL
related files
For the new keystore and truststore files to be used by RMA remote embedded agents, a jar file
with those files and an updated ssl properties file must be deployed to each system that has an
application that starts a remote embedded agent. This section explains the steps to create the jar
file with custom SSL files.
Note: The following steps do not apply to local embedded agents. Only a remote embedded
agent will be discovered and appear in Director as a separate agent. A local embedded agent will
be discovered locally by the RMA service agent that is running on the same system, therefore a
local embedded agent will not appear in Director as a separate agent.
1. Select any RMA agent to perform the steps below. It is recommended to use an agent in a
test store instead of a real store.
2. Create a temporary directory on the agent called EA-tmp.
3. Copy the New_Custom_Keystore and New_Custom_Truststore files from the following
directory on Director to the EA-tmp directory:
From Windows Director: %res_home%\ security
From Linux Director:/opt/toshiba/res/security
4. If the default RMA SSL certificate is currently being used in the enterprise as determined in
step 2 of “Creating new custom keystore and truststore files” on page 128:
1. In command window, change to following directory where simgmt.jar is located:
On Windows agent: %RMA_HOME%
On 4690 controller: F:\rma\lib (M: for Classic controller)
On Linux agent: /opt/toshiba/rma/jar
2. Get a copy of rma-ea-ssl.properties from simgmt.jar by running:
On Windows or Linux system:
<path>jar xf simgmt.jar rma-ea-ssl.properties
where <path> is location to jar command for JDK (may need to install JDK)
On 4690 controller:
java2sdk:jar -xf simgmt.jar rma-ea-ssl.properties
3. Move the copy of rma-ea-ssl.properties to the EA-tmp directory.
4. Skip step 5.
5. If a custom RMA SSL certificate is currently being used in the enterprise as determined in
step 2 of the “Creating new custom keystore and truststore files” on page 128 section:
From Windows Director: %res_home%\security
From Linux Director /opt/toshiba/res/security
1. For an application that starts a remote embedded agent, determine what jar file contains
the current custom SSL related files for the embedded agent to communicate with the
Master Agent.
SSL.ServerKeyFileName=*New_Custom_Keystore
SSL.KeyFileName=*New_Custom_Keystore
SSL.ServerTrustFileName=*New_Custom_Truststore
SSL.TrustFileName=*New_Custom_Truststore
7. Remove the "_encrypted" portion from the name of the following properties:
SSL.ServerKeyPassword_encrypted
SSL.KeyPassword_encrypted
SSL.ServerTrustPassword_encrypted
SSL.TrustPassword_encrypted
8. Replace the encrypted password with the unencrypted value of Custom_PW for the
following properties:
SSL.ServerKeyPassword=Custom_PW
SSL.KeyPassword=Custom_PW
SSL.ServerTrustPassword=Custom_PW
SSL.TrustPassword=Custom_PW
SSL.ServerKeyFileName=*New_Custom_Keystore
SSL.KeyFileName=*New_Custom_Keystore
SSL.ServerTrustFileName=*New_Custom_Truststore
SSL.TrustFileName=*New_Custom_Truststore
5. Create a res-ssl.jar file by issuing the following command from the res-ssl-tmp
folder:
For Director server on Windows: "%dir_home%\db2\java\jdk\bin\jar" -cvf res-
ssl.jar New_Custom_Keystore New_Custom_Truststore userssl.properties
ssl.properties
For Director server on Linux: /opt/ibm/director/db2/java/jdk64/bin/jar -cvf
res-ssl.jar New_Custom_Keystore New_Custom_Truststore
userssl.properties ssl.properties
com.ibm.retail.isd.console.checjmx.lic.task_3.2.2.jar
com.ibm.retail.isd.console.resconfig.lic_3.2.2.jar
com.ibm.retail.isd.console.swpkgmgr.lic_3.2.2.jar
12. The signed res-ssl.jar must be placed into the above jar files in place of the existing
res-ssl.jar in the lib folder of each jar by running the following command from the
plugins directory:
The new RMA SSL certificate must be used by the remote embedded agents to successfully
communicate with the RMA Master Agent. The location to deploy EA-SSL.jar that was saved in
step 11 of “Create jar file for remote embedded agents with new custom SSL related files” on
page 133 depends on the type of application that starts the embedded agent.
1. For 4690 terminals with an RMA remote embedded agent:
1. Copy EA-SSL.jar to the same location on the 4690 controllers where simgmt.jar is
loaded from. The location may be in a 4690 preload bundle.
2. For a Store Integrator application, rename EA-SSL.jar to a jar filename that is in the
current classpath, for example, siuser.jar, which is not currently being used, or
merge the files from EA-SSL.jar into a file like siuser.jar. Otherwise, add EA-SSL.jar
to the application classpath in 4690 Terminal Configuration and activate Terminal
Configuration.
3. If a 4690 preload bundle was changed, then run adxpldrb to rebuild the preload
bundles, and run adxrtccl to rebuild the terminal load-shrink file.
4. Reload the 4690 terminals with embedded agents.
2. For each Window or Linux system with an RMA remote embedded agent:
1. Copy EA-SSL.jar that was saved in step 11 of “Create override SSL properties file with
new custom filenames and password” on page 131 to the same location as
simgmt.jar.
2. Add EA-SSL.jar to the application classpath.
3. Restart the application to restart the embedded agent on each system with an RMA remote
embedded agent.
Windows PATH
The agent service constructs its own PATH during startup. This PATH includes a minimal set of
directories required to run the agent. To extend this path, define a system environment variable
called RMA_PATH_EXT. The value of this variable will be added to the end of the agent PATH.
Logging configuration
RMA uses the Commons-Logging API for logging, and the Java logging implementation. RMA
supplies the Java Development Kit (JDK) logging configuration in a file in the following
locations:
• Windows: %RMA_HOME%\mgmt_log.pro
• 4690 Classic: M:\rma\lib\mgmt_log.pro
• 4690 Enhanced: F:\rma\lib\mgmt_log.pro
• Linux: /opt/toshiba/rma/mgmt_log.pro
To change logging levels or other settings, edit this file and restart the agent. A user-provided
logging configuration file can also be modified to override logging levels in the base logging file.
The name and location for the user configuration file is %RMA_HOME%\user\rma\ext
\user_log.pro. If you make logging-level changes for RMA extensions or overrides to the
supplied levels in this file, the user logging configuration is preserved when an agent install is
upgraded.
As of V2R3, RMA uses a memory logging configuration to buffer high-level logging messages in
memory and only push them to disk when a more serious error occurs. This change greatly
increases the serviceability of RMA but does change how RMA logging is configured. To
understand the changes to logging configuration, one must first understand how Java logging
works.
Java logging is organized in a layered hierarchy that systematically filters and controls the
output that is passed down to the next lower layer. The following image from the Java 1.4.2
Documentation found at http://www.oracle.com/technetwork/java/archive-139210.html
diagrams this hierarchy.
There are two main areas of the configuration where logging levels are adjusted. One of these is
at the handler and the other is at the logger. In RMA, the handlers are
com.ibm.retail.si.mgmt.logging.RMALogHandler, which handles memory logging,
and java.util.logging.FileHandler, which handles regular disk logging. As seen in
Logging levels
As seen in Figure 110, filtering is done at each level of the hierarchy. Thus, in order to collect all
of the needed data in the RMALogHandler, ready to be pushed to disk on a trigger, the logger
(com.ibm.retail.si.mgmt.level) must be configured to FINE. FINE level logging should
be sufficient for diagnosing problems encountered in a production environment. FINEST level
logging provides a much more granular logging view not necessary outside of a development or
lab environment.
The Commons-Logging implementation provides six levels of logging: FATAL, ERROR, WARN,
INFO, DEBUG, and TRACE. The FATAL level is not used by RMA. Table 12 describes the type
of data we log at each level and how the Commons-Logging levels translate into Java logging
levels of SEVERE, WARNING, INFO, FINE, FINER, and FINEST, accordingly.
Note: The Java logging levels are used when setting up the logging configuration files.
The level of both the handlers and the loggers can be changed dynamically using the JMX
Browser. Modifications to handler and logger levels with the JMX Browser, however, are only in
effect until the agent is restarted. To permanently modify the handler and logger levels, use the
user-provided logging configuration file at %RMA_HOME%\user\rma\ext\user_log.pro.
Default: 10
Minimum: 1
Maximum: ? (disk-dependent)
MgmtAgentStartupMBean
Each management agent service exposes an interface, the AgentStartupMBean, in order to
facilitate adding to or removing from the agent startup sequence. It has the following
characteristics:
• Maintains its configuration in an XML file that is read and processed when the MBean is
registered. It contains both of the following lists:
• List of MBeans to create during startup, including class name and object name
• List of NotificationListeners to add during startup
Agent configuration
This MBean processes an XML configuration file named AgentStartupConfig_1.xml. This
configuration file contains all of the MBeans to instantiate at startup (after the default startup
sequence has been processed), and all NotificationListeners to register. The following
code is an example XML configuration:
<AgentStartupConfig>
<MBeans>
<MBean classname="foo.pkg.mbeans.Hello"
objectName="masteragent:SIFComponent=MyComp,Id-1234"/>
<MBean classname="foo.pkg.other.mbeans.Bye"
objectName="masteragent:SIFComponent=MyComp,Id=4567">
<MBeanArg type="int">5</MBeanArg>
<MBeanArg type="string">ABC</MBeanArg>
</MBean>
</MBeans>
<NotificationListeners>
<NotificationListener
listener="masteragent:SIFComponent=MyComp,Id=1234"
mbean="masteragent:SIFMBean=true,SIFComponent=MGMT,Id=NotificationControl"/>
</NotificationListeners>
</AgentStartupConfig>
Each of the MBean elements under MBeans represent an MBean to be created during startup.
Each NotificationListener element under NotificationListeners represents a
NotificationListener to be added after all MBeans have been created. Only MBeans can be
added as listeners to other MBeans, not Java objects that implement NotificationListener.
To extend the agent startup sequence, all that is required is to create or edit an XML file in one of
the following directories and restart the Agent Service:
• Windows: %RMA_HOME%\user\rma\config\startup
• Linux: /opt/toshiba/rma/user/rma/config/startup
• 4690 Classic: M:\rma\user\rma\config\startup
• 4690 Enhanced: F:\rma\user\rma\config\startup
Additionally, the configuration can be changed using the MBean interface. (For additional
information, refer to the RMAJavadoc.pdf file that is associated with this user guide.)
Agent roles
Agent roles enable sets of descriptive information to be provided about the device on which the
agent is running. This information gives an additional set of criteria for identifying groups of
agents in addition to platforms, which is useful in applying storewide policies.
Information from the agent roles takes the form of a role name and an associated model. By
default, the RMA agent comes installed with one of two roles, RMA-GA or RMA-MA, and an
associated model RMA-V2. Upon starting the agent on Toshiba hardware not running 4690 OS,
the system's four-character machine type is added as a role and its three-character machine
model is added as a model. For example, a system with the model and type 4800-741 results in a
role being created named "4800" with an associated model named "741."
Event qualifiers
All events in RMA use a dotted notation called event qualifiers to identify a general event
category that is used to filter events on IBM Systems Director and to build event action plans.
The qualifiers for Windows events piped from the log have this format:
WindowsEventLog.LogType.EventSource.EventCategory
EventSource
The name of the event source, as defined by the application that sources the event. Any
period (.) character in the event source name is replaced by an underscore (_) character.
EventCategory
The name of the event category, as defined by the application that sources the event. If no
category is specified, there will not be a fourth qualifier. If this qualifier contains a period,
each half is treated as a qualifier, so that you can subdivide the categories for further
granularity.
For example, a message from the Windows system event log has the following qualifier:
WindowsEventLog.System.Dhcp
WindowsEventLog.Application.MyRetailApp.Printer
Table 14. XML definition of the agent configuration file for Windows event log integration
XML tag Attributes
WindowsEventLog Top level container (no attributes)
ApplicationLog Container to define filter entries from the application log (no
attributes)
SecurityLog Container to define filter entries from the security log (no attributes)
SystemLog Container to define filter entries from the system log (no attributes)
Filter Entry Definition of an entry in the filter configuration.
sourcename
(Required) A case-sensitive string that contains the source name
of the event to match.
Note: You can use an asterisk to create a global entry (including
all ERROR entries in the log).
level
(Optional) A comma-separated string that identifies the level of
events to include (global). Valid values are OFF, INFO,
WARNING, ERROR, SUCCESS AUDIT, and FAILURE AUDIT.
errorseverity
(Optional) A string that identifies the error mapping to use for
error events (global).
Category Definition of the category to match in the filter along with the source
name.
Note:
1. Either ID or name must be specified.
2. The category tag is ignored if a wildcard is specified in the Filter
Entry. In other words, you can only specify categories on specific
filter entries.
id
The numeric identifier of the category of the event to match.
name
A string that contains the category name of the event to match
(which was loaded from the category resource bundle).
qualifier
The text string to use as the fourth level of the notification to be
sent for matching events.
level
(Required) A comma-separated string that identifies the level of
events to include. Valid values are OFF, INFO, WARNING, ERROR,
SUCCESS AUDIT, and FAILURE AUDIT.
errorseverity
(Optional) A string that identifies the error mapping to use for
error events.
Example layout:
<WindowsEventLog version="1">
<ApplicationLog>
<FilterEntry sourcename="appname" [level="xxx,yyy"] [errorseverity="zzz"] >
<Category id="#" qualifier="cccccc" level="xxx,yyy" />
<Category name="aaaaa" qualifier="bbbbb" level="xxx" [errorseverity="zzz"]/>
</FilterEntry>
...
</ApplicationLog>
<SecurityLog>
...
</SecurityLog>
<SystemLog>
...
</SystemLog>
</WindowsEventLog>
The top level container is always the WindowsEventLog tag. It contains one or more of the
following tags, each of which will only appear once: ApplicationLog, SecurityLog, and
SystemLog. These container tags scope the filter entries for that specific log type. Those tags
will contain one or more FilterEntry tags.
FilterEntry tags define the criteria used to determine if a log entry should be created in RMA
Notification. A filter entry must include a source name. Specifying the level on this entry
indicates the level to be applied for the handling of all events, regardless of category. If different
<WindowsEventLog>
<ApplicationLog>
<FilterEntry sourcename="MyRetailApp" level="ERROR" />
<Category id="1" qualifier="Printer" level="WARNING,ERROR" errorseverity="CRITICAL" />
</FilterEntry>
</ApplicationLog>
</WindowsEventLog>
This partial file indicates that events logged to the Windows Application event log, with an
event source of MyRetailApp (for any category) that are ERROR type events will be forwarded
to RMA. Events that have an event source of MyRetailApp and an event category of Printer
that are Warning- or Error-type events are also forwarded (note that ERROR was already covered
in the global category). Therefore, all Error-type events are mapped to the RMA Minor error
severity except for Printer Warning- or Error-type events, which are mapped to the RMA Critical
error severity.
Event mapping
Table 15 shows the mapping between a Windows event log record and an RMA Notification.
Note: RMA supplies the Event Category and Event Message values that are returned by the
resource bundle lookup for an event source, as defined by the CategoryMessageFile and
EventMessageFile registry keys. Refer to Microsoft documentation for more details.
EventType NotificationType
Strings MessageText
Data UserData
ComputerNameDeviceID of the GA that OriginatingDevice
originates the log
The Event Type is mapped using the scheme in Table 16. Note that the RMA Notification type is
the go between bridging the Windows event log event type to the IBM Systems Director severity,
which is why the configuration parameter is expressed in terms of the IBM Systems Director
severity level.
FATAL = RtlCriticalNotification
remotePort: The port on which the RES is listening for a phone home connection.
Default value is 10521 entryName: It is the name of the store as the user wants it
to appear on the Store Manager UI in the "Entry Name" column. The Store Manager UI
will display the name in the format "storeName-<StoreID> (Auto)" where storeName is
as given in the configuration file, <storeID> denotes the store identifier as given
in the agent configuration file rmauser.properties. If no name is
specified, then the entry will be of the form <Store IPaddress>-<StoreID> (Auto)
where <Store IPaddress> denotes the IP address of the store.
Fatal : 3
Fatal, Critical: 15
Fatal, Critical, Minor: 31 (This is the default filter value in UI)
Fatal, Critical, Minor, Warning: 127
Fatal, Critical, Minor, Warning, Harmless: 1023
All: 2047
This is one time configuration which will be read every time the master agent is restarted. The
Master Agent will retry every 30 minutes to ensure that the entry in the Store Manager UI gets
recreated if it is accidentally removed. If the store entry is to be permanently removed from the
Store Manager UI then, the phonehome.properties file needs to be removed from the
configuration directory along with deletion of the store entry in the UI. The reconnect interval
can be overridden by adding following entry to the agent configuration file
(rmauser.properties)
com.ibm.retail.rma.phome.newClientReconnectFrequency=<XX><s/m/h/d>, where
XX represents the numeric value and s/m/h/d represents the time unit - second/minute/hour/day.
Any invalid value to this property will be ignored and the default interval of 30 minutes will be
used.
The Retail Enterprise Service is a supporting background service that provides access to all RMA
resources in the enterprise. RES establishes and maintains communications with each RMA
Master Agent, and hides the details of other functions like event transport and software
distribution. Management applications can interact with the resources in each store using the
high level services provided by RES. IBM Systems Director 6 with Retail Extensions is an
example of a management application that utilizes RES. Figure 113 includes an illustration of
this architecture.
• If you are prompted with the Warning - Hostname Mismatch window (see Figure 116),
click Run and the Verifying Application window is displayed (see Figure 120).
• If you are prompted with the Security Warning window (see Figure 117), select the
checkbox for Always trust content from this publisher and click Yes and the Verifying
Application window is displayed (see Figure 120).
Each connection status is updated automatically whenever it changes. The status will be one
of the following:
• Stores in Standard Security Mode - Connected Green Circle.
• Stores in Enhanced Security Mode - Unauthenticated Yellow Inverted Triangle.
Figure 141. Finding a specific store in the Store Connection Information tab
• To Find by Entry Name, select the Entry Name radio button and enter the valid entry
name and click Find.
The Export Master Agent List pane is displayed. Select a location, enter a valid name to save
the list and click Save. The Export Master Agent List pane shows that the Store entries are
exported successfully with details of the location saved. Click OK to close the Export Master
Agent List pane.
The Remove Master Agent pane is displayed with a prompt to confirm the deletion of the
store entry. Click Yes to delete the store entry.
The Import Master Agent List pane is displayed. Navigate to the location where the list is
saved. Select the list and click Open.
The Import Master Agent List is displayed and shows the store entries are imported
successfully from the selected location. Click OK.
The "Connection Log" will display connection specific history information for that store entry.
Messages here can indicate problems such as issues resolving the hostname, firewall issues, or
configuration problems. If you need to contact a support representative about a connection issue,
submit the Connection Log information.
Click this menu item to display the details of the completed captures from each of the selected
stores as shown in Figure 157.
If any of the selected stores are not in the 'Connected' state, a message window is displayed as
shown in Figure 158.
For V2R6 agents the timestamp used in the data capture filename is the UTC time. For V3 agents,
the data capture filename will contain the time and timezone of the agent where capture is
generated. The Data Capture Occurred column in the Log Captures UI converts the time, which
is part of the capture file name, to the corresponding local time of the RMA Store Manager
remote session..
Deleting the data capture manually from MA under location %RMA_HOME%\user\rma\data
\capture\completed will still show the capture in Store Manager for the specific Store since
the data capture lists are retrieved from the DCH_*.xml file from directory %RMA_HOME%\user
\rma\config\capture in MA. These captures can be deleted from the UI using the Delete
Capture From Store option from the Edit menu of the Log Captures window.
Selecting Save Data Capture creates a pop-up window for you to select a location for saving the
log captures. Select a location, then click Save. See Figure 160.
After you select the location for saving, a progress window displays showing the transfer
progress Figure 161.
Once the data capture file is transferred successfully from the MA to the user-specified location
on the local system, a status window is shown that summarizes the status for the file transfer for
each of the files you have selected.
The status and progress of the capture bundles being deleted displays a pop-up window as
shown Figure 165.
When the capture bundles have been successfully been deleted, the capture list is updated
accordingly.
This chapter will provide the basics of IBM Systems Director Server 6 (IBM Systems Director),
along with some of the core features of RMA 3.2.2 and IBM Systems Director that will be used
throughout this book. For example, we introduce core concepts such as managed end points and
groups, and discuss how to use:
• Retail Agents Discovery, Authorization to Stores
• Collecting inventory on agents
• Viewing and managing events from agents
This state is applicable only to retail store MEPs. Enter your user name and password to access
and view properties, and to perform operations on retail stores.
Access State: Offline
Resources
Although this chapter provides "survival skills" for using IBM Systems Director and RMA, it is
not a replacement for the existing documentation for these products.
For more comprehensive information, see IBM Systems Director 6.3 Best Practices: Installation and
Configuration on http://www.redbooks.ibm.com/abstracts/redp4932.html?Open.
Each of the Retail Groups listed may have subgroups within them organizing the RMA agents
based on various criteria.
Viewing Systems
See the following for viewing systems:
1. All the Retail-related systems can be seen under three main categories:
• Name of the Agent MEP is defined by "StoreId.DeviceId". Device Id represents the host
name of the machine.The MEP agents corresponding Store ID will be prefixed with
Device ID.
• Every agent MEP has the reference of the store that it is tied to listed in the first column
"Retail Store ID".
• For all the Agent MEPs listed, the "Type" will be Generic.
• All the Agent MEPs will have their respective IP address listed under the IP Address
column.
6. All Systems: Lists all the systems that are discovered in Director -- All Retail Agents
(Type=Generic), Retail Enterprise Service MEP (Type=Generic), All Retail Stores
(Type=Retail Store) and Director native agents. Retail Store entries will have only "Store ID"
set as its name.
• Each categorized group will have the respective agents listed under it.
• 4690 Controller groups have nested groups, subcategorizing 4690 Alternate Controllers,
4690 Master Controllers and All 4690 Controllers.
Director Groups
Apart from the predefined groups listed under Resource Explorer, you can use IBM Systems
Director to organize logical sets of resources into Custom groups. These can be dynamic or static.
Any
Group membership is unlimited. Any resource can be in the group, including
systems, software, and management applications.
Managed System
Group membership is limited to system types such as different types of servers,
fabric, farms, hardware control points, controllers, operating systems, chassis,
switches, and storage.
Update
Group membership is limited to update types such as for firmware, IBM Systems
Director, and operating systems.
4. From the Location list, select the parent group to contain the group that you are creating. In
Resource Explorer, a parent group is created and is located under Personal Groups. Click
Next.
In the "Select criteria to refine group contents list", expand the tree and select a criterion for
the dynamic group to evaluate. Your selection is displayed below the list. Click Operators to
select how you want the criterion evaluated by the value you provide.
Click Value to select the value to use to evaluate the criterion. If you want to specify a
custom value, select Use from below and type the custom value in the field.
Note: Important: The custom value must match the value stored in the IBM Systems
Director Server database. Partial matches are not accepted. If the value does not match,
nothing is returned for this criterion.
Click OK. On the Define page, the criterion is displayed in the Criteria preview field.
Similarly, you can add additional criteria.
7. After adding another criterion, the Define page displays the logical AND and the logical OR
selections. These selections determine how the criterion that you create now will affect the
criterion you created previously.
If you want to change a criterion, select the criterion from the Criteria list and click Edit. The
Edit Criterion window is displayed with the settings for the selected criterion. Change the
settings and click OK.
If you want to delete a criterion, select the criterion from the Criteria list and click Delete. A
confirmation window is displayed; click Delete and the selected criterion is deleted from the
list.
On the Summary page, verify the details of the group. If you need to make changes, click
Back; otherwise, click Finish.
Any
Group membership is unlimited. Any resource can be in the group, including
systems, software, and management applications.
Managed System
Group membership is limited to system types such as different types of servers,
fabric, farms, hardware control points, controllers, operating systems, chassis,
switches, and storage.
Update
Group membership is limited to update types, such as for firmware, IBM Systems
Director, and operating systems.
Group
Group membership is limited to other existing groups.
4. From the Location list, select the parent group to contain the group that you are creating. In
Resource Explorer, a parent group is created and is located under Personal Groups. Click
Next.
.
5. In the Define window, select one or more groups of resources from the Available list and
click Add. You also can drill down into a group and select one or more resources. If you
want to remove a group or resource, select it from the Selected list and click Remove.
Note:
1. You cannot add a group's parent to itself. For example, if you define the parent group
location for Group 1 to be Personal Groups, then you cannot add Personal Groups to
Group 1.
2. If you select a resource to add, but the Add button is unavailable, then the selected
resource is not a valid selection due to its member type.
6. On the Summary page, verify the details of the group. If you need to make changes, click
Back; otherwise, click Finish.
Customizing columns
The default columns shown in the various tables contained within the views (Resource Explorer,
Inventory, Event Log and Groups for Retail Client Managed End Points) of IBM Systems
Director are of limited usefulness. Fortunately, you can customize these columns to add retail-
specific information about the MEP's attributes, inventory data, event information and group
attributes by using the following steps in the respective views.
The following is an example for the Resource Explorer view:
1. Navigate to Resource Explorer---> All Retail Client Systems
Figure 199. Adding a column from the Available columns options box
5. You then have the ability to select where you want the column to appear. This is done by
clicking the Up or Down options.
Discovery
RES, retail stores and their associated Master Agents and General Agents can be discovered by
IBM Systems Director using the following steps.
1. Log into IBM Systems Director Server.
Query/Verify Connection
Director 6 provides the Verify Connection function. Verify Connection queries RES and retrieves
and updates the current attributes of MEP which triggers the query.
1. Verify Connection can be initiated on any MEP by right clicking on MEP, and selecting
Security ---> Verify Connection.
This chapter describes the inventory data, a collection of mostly static information about the
remote system, including hardware and software information.
Some examples of inventory data are:
• Serial number, manufacturer, model
• BIOS version
• Memory and hard drives installed/capacity
• CPU type
• Operating system type, version
• Installed software packages (only available on Windows with RMA 2.5 and higher)
Inventory is collected and stored in the database on the IBM Systems Director Server, which
allows inventory information to be viewed even when the remote systems are offline.
Inventory collection is the process by which IBM Systems Director Server establishes connections
with Retail Client managed end points that have already been discovered and collects data about
the hardware and software that is currently installed on those resources.
Note: Inventory collection is not supported on embedded agents.
Collecting Inventory
To collect inventory for one or more systems, complete the following steps:
1. Open the View and Collect Inventory page using either of these two methods:
a. On the Home page, click View and Collect Inventory under Optional tasks.
Figure 226. View and Collect Inventory selection in Director navigation area
The View and Collect Inventory page displays.
Note:
The View and Collect Inventory tab can also be displayed by using one of the following
methods:
1. From the Resource Explorer tab, select one or more target systems or groups, right click
to display a dropdown menu, select the Inventory option, then select View and Collect
Inventory.
2. From the Resource Explorer tab select one or more target systems or groups, click the
Action button to display a dropdown menu, select the Inventory option, then select
View and Collect Inventory.
2. In the Target Systems list, select the system you want to view or collect inventory data. If the
target system that you want to view is not in the Target Systems list, complete the following
steps to add the system to the list.
1. Click Browse to open the Context Chooser screen. The Context Chooser displays a list
of Target Systems.
Note: The Show field dropdown allows you to select Target Systems, All Targets,
Groups, or Recent Targets.
Schedule
Use the Schedule tab to set the inventory collection task to run immediately or at a
specified time and date in the future. You can also schedule the task to repeat at a
specified frequency.
Notification
Use the Notification tab to choose options for an email notification that you can
receive as the inventory collection process progresses.
Options
Use the Options tab to specify the time to use for the system time and how to handle
unavailable systems.
6. When you are finished with the Launch Job page, click OK. An inventory collection job is
created and a message is displayed with buttons and information about the job.
Note: Click Display Properties if you want to view the job status and progress.
7. The Active and Scheduled Jobs page is displayed and provides information about the job
including status, progress, a list of targets, a history, and job logs.
When inventory collection has completed on all managed objects, the inventory data is
viewable from the View and Collect Inventory tab by clicking the Refresh View button.
Viewing inventory
To display inventory data for a resource, complete the following steps:
1. Open the View and Collect Inventory tab using either of the following two methods:
a. On the Home page, click View and Collect Inventory under Discovery Manager tasks.
To view the inventory report for a target system, select (from the left Action pane) Resource
Explorer > All Retail Client Systems > Select the target system > Select Inventory tab and
click Refresh View.
For RMA V3 R1.4 and above Retail Extensions and RES, the EFIX level for Toshiba SurePOS
ACE and Toshiba SurePOS ACE EPS applications will be reported as seen in the screen shot
below (highlighted). The EFIX level will be reported for all supported RMA agents as well.
With RMA V3 R1.4, Terminal Sales Version details will be shown as part of the 4690 terminal
Inventory under system software.
ACE version will be reported for a 4690 terminal. The ACE version should be V7R4 or higher.
The c:\adx_idt1\ACETSVER.DAT file is automatically created, if it doesn't already exist,
when the master controller is rebooted.
File ACETSVER.DAT should be present on acting master controller at location C:\ADX_IDT1, to
populate the inventory data.
With RMA V3 R1.4, PIN Pad details will be shown as part of the 4690 terminal Inventory.
Pin pad inventory data will be reported for a 4690 terminal. The ACE version should be V7R5 or
higher.
The file c:\adx_idt1\EPSTRMPP.DAT is automatically created, if it doesn't already exist,
when the master controller is rebooted.
The EPSTRMPP.DAT file should be present on acting master controller in C:\ADX_IDT1 to
populate the inventory data.
Figure 259. Selecting Columns from the Actions drop down menu
3. The Columns popup view displays.
This chapter gives a basic introduction to the event management capabilities of RMA and IBM
Systems Director, along with examples of using event management with RMA/Director in an
IBM POS environment.
The following sources of events are included in the IBM POS solutions:
SMART events
On Windows, selected additional CIM events, such as SMART events (that is, predicting
hard drive failure) are also forwarded from CIM to RMA to IBM Systems Director.
Inventory alerts
These are generated within IBM Systems Director in response to inventory alerts that
have been configured.
Application-specific events
For example, the IBM CHEC self-checkout software automatically forwards a number of
events to RMA. In the case of CHEC, it is done via application-specific MBeans within
RMA, but it is also possible to send application events via CIM forwarding.
In Director console, click on System Status and Health in the left pane and select Event Log to
view the events logged for all systems discovered in Director. Figure 272 shows the Event Log
page.
If an agent comes back online, an online resolution event will be logged against the specific MEP
and the Health Status of the specific MEP will turn green.
If a Master Agent goes offline then an offline critical event will be logged against the specific
Master Agent as well as against the General Agents that are associated with it.
If a Master Agent comes back online then an online information event will be logged against the
specific Master Agent as well as against the General Agents that are associated with it.
The online/offline event that is logged for the MEPs will have the following event properties:
• Component Category = Retail/mgmt
• Component Type = connection
• Condition Type = status
The offline and online events are system events which are not persisted. The property
com.ibm.retail.si.mgmt.eventcontrol.storeandforward.buffertimeoutthresh
old in rmauser.properties file should not be set to a value lower than 300000 (which is the
default value).
The store and forward mechanism for events exists between:
• Master Agent and RES
• Master agent and Real General agents
• Master agent and terminals (Virtual (General) agents) running on/with 4690 Master
Controller with GA configured on it.
However, there is no store and forward mechanism between:
• RES and Director, hence the events that are generated in RES when Director is down will be
lost.
• Master agent running on Master Controller and terminals (Virtual (General) agents) running
on it.
StoreId-DeviceId
In the below example, event severity for W650 event with condition value E008 is set to Minor
severity in Director.
W650.E008 = 3
This file will by default contain events with severity overridden.
# OFF = 100;
# RTL_ALERT_NOTIFICATION = 1;
# RTL_CONSUMER_NOTIFICATION = 2;
# RTL_CRITICAL_NOTIFICATION = 3;
# RTL_DEBUG_NOTIFICATION = 4;
# RTL_EMERGENCY_NOTIFICATION = 5;
# RTL_ERROR_NOTIFICATION = 6;
# RTL_INFORMATION_NOTIFICATION = 7;
# RTL_NOTICE_NOTIFICATION = 8;
# RTL_TRACE_POINT_NOTIFICATION = 9;
# RTL_WARNING_NOTIFICATION = 10;
In this example, the offline event is set to '1' which make the event appear as CRITICAL severity
in Director.
Setting the event severity to '100' will suppress this event from being logged in Director
The Health Status component in Systems Director helps the user to manage the health of
resources configured. In the RMA/Director solution, “events” represents alerts/resolutions sent
from store (RMA ) to IBM Systems Director, which shows the health status of the MEPs on the
IBM Systems Director. Events received by Systems Director determine the status of resource.
Severity and category are used to determine the status. All alert events can cause red, yellow and
blue status of the resource where as a corresponding resolution event would bring the system
back to its OK (green) state.
The Welcome Summary page shows the aggregate health of the systems being managed.
Clicking the red /yellow/blue/green area on the pie chart or clicking on the line items beside it
will open a view of systems under that particular category. For instance, the above pie chart
shows 174 systems in OK state and two systems in warning state. Clicking on the warning
systems will show the two systems with warnings.
Clicking on problems in the Scoreboard view will show all alerts associated with the different
systems.
Problems view
Note: The Problems view does not include compliance alerts
The Problems view allows the user to view active problems reported for all discovered systems.
Events can be ignored on a particular selected resource or on all resources by using the radio
button.
The following figure shows the Problem Status view after events being ignored:
Reactivate
Ignored events can be reactivated by selecting them from the Ignored Status page. To reactivate
an ignore event, complete the following steps:
1. Click the Ignored Status... button to load the Ignored Status page.
2. Click the Activate button.
The following figure shows the Problem View after reactivating the alerts and sends alert if the
average value of readings have crossed the configured threshold. Resolution event will be sent
when the average value comes below the threshold.
Delete
Delete the current occurrence of the selected problem(s). Future events will update status
accordingly.
The following figure shows the Problem View after deleting alerts.
In this example, the event Retail.OS4690.W951 will resolve the Critical event
Retail.OS4690.W950.E001 that was previously included.
Component Component
Event Type Categories Type Condition Type Condition
CPU Fan Retail, HW LED CPUFanFailure On, Off
Failure
Motherboard Retail, HW LED MotherboardFailure On, Off
Failure
Hard Drive 0 Retail, HW LED HDD0Failure On, Off
Failure
Power Supply Retail, HW LED PowerSupplyFailure On, Off
Failure
Info LED Retail, HW LED Info On, Off
Hard Drive 1 Retail, HW LED HDD1Failure On, Off
Failure
Component Component
Event Type Categories Type Condition Type Condition
CPU Retail, HW CPU Temp Ok, Critical
Temperature
CPU Fan Retail, HW CPU Fan Ok, Critical
Enclosure Retail, HW Enclosure Temp Ok, Critical
Ambient
Temperature
Power Supply Retail, HW PowerSupply Fan Ok, Critical
Fan
Voltage Retail, HW System Voltage Ok, Critical
SSD Retail, HW SSD Temo Ok, Critical
Temperature
Resource Monitoring
RMA monitors the following aspects of system performance:
• CPU Utilization
• Memory Utilization
• Disk space Utilization
The threshold and configuration information for these monitors is specified in the agent
monitoring configuration (See “Configuration” on page 301).
Note: CPU Utilization monitoring is not supported for all version of 4690 OS.
• 4690 Disk Space Monitor only monitors "FIXED" disks (C:, D:, F:) and by default is not
enabled for 4690 Terminals.
• By default, Linux Disk Space Monitor only monitors the space under "Root" File System. It is
not user configurable.
Component Component
Event Type Categories Type Condition Type Condition
CPU Utilization Retail, Monitor CPU Utilization Warn, Normal
Memory Retail, Monitor Memory Utilization Warn, Normal
Utilization
Disk Space Retail, Monitor Disk Available Disk Warn, Normal
Utilization Space
With this feature, the user will have the ability to monitor end of life of SSD on 4690 enhanced
Controller, enhanced Terminal and enhanced Controller/Terminal machine from the time RMA
agent starts.
A critical event is logged in the Director UI when SSD needs to be replaced as its usage
percentage reaches the configured threshold value. This event will change the health indicator
status of the system in the Director console.
Table 23 lists the event type that is monitored under SSD Life monitoring for 4690.
Notes:
1. SSD End of Life monitoring is not supported for all version of 4690 OS. The SSD Life
Monitor MBean was created only from 4690 build number V6R3 0CD0 (Dec. 2012 CSD).
2. No resolution event will be supported.
3. MinimumThresholdDuration attribute is not applicable for this monitor as the Threshold
is not calculated based on the average values over the interval. The monitors checks for the
Threshold at an interval specified as SamplingFrequencyInterval. If the observed
Threshold is equal to or more than the configured Threshold, then a Critical Event is logged
in Director UI.
Peripheral Monitoring
End of life monitoring of Toshiba Global Commerce Solutions Retail POS peripherals, such as
POS Printers and RSS Displays, is supported.
Pre-requisites:
Note: Pre-defined monitor policies for the end of life monitoring of the POS printer attributes
mentioned above will be provided in the existing MonitorPolicies.xml file for an agent.
When RMA starts, the monitor will be started with default attribute values.
When the attribute values listed in the table above meet the threshold criteria value (as per the
policy set in the MonitorPolicies.xml file), a warning event (as per the configuration in
policy file) will be sent to Director and will be logged against the agent to which the POS printer
is attached. The warning events will be reflected in the health status of the MEP and will be
shown in the Active Status tab of the MEP as well.
A snapshot of the warning event that will be sent when the PaperCutCount POS Printer
attribute reaches the threshold value is provided below.
POS Printer attribute Retail, Monitor POS Printer Serial Number PaperCutWarn Warn/Normal
PaperCutCount For Ex: 41-ZKLPX
POS Printer attribute Retail, Monitor POS Printer Serial Number ReceiptLineFeedCountWarn Warn/Normal
ReceiptLineFeedCount For Ex: 41-ZKLPX
POS Printer attribute Retail, Monitor POS Printer Serial Number SlipCharacterPrintedCountWarn Warn/Normal
SlipCharacterPrintedC For Ex: 41-ZKLPX
ount
POS Printer attribute Retail, Monitor POS Printer Serial Number SlipLineFeedCountWarn Warn/Normal
SlipLineFeedCount For Ex: 41-ZKLPX
POS Printer attribute Retail, Monitor POS Printer Serial Number ReceiptCoverOpenCountWarn Warn/Normal
ReceiptCoverOpenCount For Ex: 41-ZKLPX
Notes:
1. When OS 4690 controller/terminal is configured on the same machine, monitor will run only
on the controller and all the events will be shown against the controller MEP. If controller
and terminal are configured on different machines then monitor will run wherever the
printers are attached, i.e. on terminal.
2. Only one POS Printer can be attached to the terminal/POS system at a time.
If the RSS display for which the warning event was sent is replaced by another RSS Display or if
the monitored value of the RSS_Display MBean attribute HoursPoweredCount is below 60 K, a
resolution event will be sent and displayed in the Event Log tab of the Director 6. This resolution
or info event will resolve/remove the earlier warning event in the Active status tab of Director 6,
which will also reflect the health status of the MEP.
With Generic (user defined) monitoring, the user can monitor any CIM or MBean attribute on
Windows and OS4690 platforms. The CIM/MBean attributes to be monitored should conform to
the specification explained in “MBean/CIM specification” on page 300.
Generic (user defined) monitoring will be applicable to monitoring the following CIM/MBean
attribute types:
• Numeric (int, long, double values)
• String
• Boolean
The MBean or CIM attribute to be monitored should be provided/configured by user in the
GenericMonitorPolicies.xml configuration file, located at RMA_INSTALL_LOC)\rma
\user\rma\config\monitor on agent. A sample file, by name
GenericMonitorPolicies_Sample.xml, will be provided by RMA and located at
%RMA_HOME%\user\rma\config\monitor. Users can refer to the sample file to create a
monitor/policy of their own to monitor any CIM/MBean attributes.
A unique monitor/policy needs to be created for each CIM/MBean attribute to be monitored. The
GenericMonitorPolicies.xml file can contain multiple policies, each one monitoring a
single attribute of an MBean or CIM class.
On startup, RMA reads the GenericMonitorPolicies.xml configuration file, applies all
configuration mentioned as part of the monitor/policy and starts monitoring this MBean/CIM
attribute as per the configuration.
When the monitored attribute value reaches or crosses the threshold value, a warning or critical
event, as configured by the user, will be sent from the agent.
A snapshot of the warning event generated by the RMA Generic Monitoring infrastructure when
the PowerState POS Key Board attribute crosses the threshold value of 2000 is shown below.
MBean/CIM specification
The MBeans provided by RMA and OS4690 conform to the JMX MBean specification and have
the below mandatory Key value pairs.
If the user wants to monitor other third party MBeans, the MBean has to conform to the JMX
specification and needs to have the below mandatory key value pairs in the MBean Object
Name.
SIFType=TestMBean
Where SIFType is the key name and TestMBean is the MBean name. All RMA and OS4690
MBeans have this Key Value pair.
OR
AnyKey=TestMBean
Where AnyKey is the key name and TestMBean is the MBean name. This is to support any third
party MBeans.
DeviceId=hostname
Where DeviceId is the key name and hostname should be the name of the host where agent is
running.
For Ex: The Memory MBean object Name will be as follows:
masteragent:Id=Memory,SystemId=ma-NR.
10150,SIFType=Memory,SIFMBean=true,SIFComponent=JAVA,DeviceId=NR
Note: MBean and MBean attribute names are case sensitive. User should provide the appropriate
values, else monitors will not start.
Configuration
The configuration for RMA agent monitors is stored in %RMA_HOME%\user\rma\config
\monitor. There is a base file, MonitorPolicies.xml, which specifies the default
configuration. The base file should never be edited or deleted. It will be updated each time the
RMA agent is upgraded. Deleting the base file will result in disabling Monitor functionality in
the agent. To override the defaults, create a file named MonitorPolicies-user.xml. In this file you
can disable monitors, change application criteria, or specify override values for thresholds and
parameters.
Example:
Warning Threshold
The value, which when crossed either above or below, is dependent on the monitor for
which a warning condition is valid. The units for the threshold depend on the specific
monitor.
Error Threshold
The value which when crossed either above or below dependent on the monitor for
which a error condition is valid. The units for the threshold depend upon the specific
monitor.
MinimumThresholdDuration/MinimumDurationForWarningThreshold:
The amount of time, in milliseconds, for which the average of the samples must cross the
WarningThreshold before a warning event is sent.
Given a sampling frequency of two minutes and a minimum threshold duration of one
hour, there would be 30 samples taken before an average of the samples is calculated.
This average value is then compared against the warning threshold and an event is
generated when the average value crosses the warning threshold. When a new sample is
collected, the oldest sample will be dropped from the collection before recalculating the
average of the samples. The trigger value which is the average value of samples will be
shown in Event Properties in Director Console.
MinimumDurationForErrorThreshold
The amount of time, in milliseconds, for which all sample values must cross the
ErrorThreshold before a critical event is sent.
Given a sampling frequency of two minutes and a minimum duration for error threshold
of one hour, there would be 30 samples taken before checking the criteria to send error
event. These 30 samples are then compared against the error threshold and error event is
generated only when these 30 samples cross the error threshold value. When a new
sample is collected, the oldest sample will be dropped from the collection before
comparing the samples for error criteria. Unlike Warning event, Error event is not
triggered for a single average value since a set of samples need to be compared against
Error Threshold. So Trigger value will not be shown in Event Properties in Director
Console. Instead Trigger Criteria will be shown with details as "Sustained high
temperature".
PersistedMonitorValidityPeriod:
When the agent is restarted, the monitors are initialized with their previous state. If a
monitor previously sent a warning event, then when the agent is restarted it would keep
a persistent setting and not send another event. The PersistedMonitorValidityPeriod is
the value, in milliseconds, which determines how long the last monitor state will persist.
For OS4690, this value pertains to controllers only. Event status is not persisted for
terminals.
InitialSampleDelay
Applicable if a policy is intended to monitor an MBean class/attribute. This is an optional
tag. The delay (amount of time in milliseconds) for the initial sampling trigger to kick off
from the agent start time. This tag applies to the first sample only. If this tag is not
provided, then the first sampling trigger happens on the agent start up.
Tag is required when multiple instances are present for an MBean and it takes a couple of
minutes for all instances to register with RMA MBeanServer. The InitialSampleDelay
value can be approximately 2 to 3 minutes, by which time all instances of MBean being
monitored register with MBeanServer and when the first sampling trigger occurs, all
instances will be available. User can configure InitialSampleDelay value appropriately
based on the number of new MBeans/instances that get registered with the RMA
Mbeanserver.
AgentMonitor id
Identifier for the Monitor or policy. A unique and concise identifier should be given. This
Id will be used as key and will be part of the generic monitor events sent to the
management application.
Since monitor id is used to persist the event in the file system, OS file name validation
check will be applicable. In all of the attributes and parameters, only these characters are
valid: a-z A-Z 0-9 . _ @ # $ ! - and space
Criteria
Tag can be used if this monitor needs to be applied, only if the given criteria is met. The
criteria tag is optional. If this tag is not mentioned, the policy will apply to any system.
The Criteria tag is a combination of OSType, DeviceType, HardwareTypes, MachineType,
Model, and ModelPattern tags which are explained below.
• OSType specifies the Operating System on which this monitor needs to be run. Valid
options for this are : Windows or 4690.
• DeviceType is applicable only for 4690 and is used to differentiate between the
controller and terminal. Valid Options : EnhancedController, EnhancedTerminal,
ClassicController, ClassicTerminal.
• HardwareTypes are checked against the machine model number on which agent is
running. Ex:
<HardwareTypes>
<MachineType name="4800">
<Model>723</Model>
<ModelPattern>[7,C,F]43</ModelPattern>
</MachineType>
</HardwareTypes>
Description
The description of the monitor functionality. This tag is optional.
DataObjectType
Represents the type of class mentioned in DataObjectName tag. Values can be either
MBean or CIM. If type value is CIM, a CIM query will be made to get the class mentioned
in DataObjectName. If type value is MBean, the DataObjectName class will be queried
in the MBean server.
This is a Mandatory tag.
UniqueAttributeName
A Unique attribute name of CIM class or MBean class, which should be key differentiator
between multiple instances of the MBean class or CIM class. For ex: Attribute
SerialNumber of MBean UPOS_POSPrinter will be the key differentiator between
multiple instances of POS printers.
This tag is mandatory if monitoring multiple devices of the same type attached to the
POS System. In this case, multiple MBean instances corresponding to multiple devices
will be available for the same MBean / CIM Class. This tag is needed in order for events
from these instances to be uniquely identified.
For example: Consider two RSS Displays (MBean representing RSS Display will be
RSS_Display) are attached to the POS machine. On RMA start up, for RMA
MBeanServer, two instances of the RSS_Display MBean will be available. To monitor
both (multiple) RSS Displays, the UniqueAttributeName tag should be provided and
the value can be "SerialNumber," as each RSS Display will have a unique serial number.
UniqueAttributeValue
The value of UniqueAttributeName, which is explained above. This value must be
used when there are multiple instances of an MBean and one instance among them needs
to be monitored.
For example: Consider 2 RSS Displays, Display1 and Display2, attached to the POS
system (The MBean for RSS Display will be RSS_Display). On the agent start up, the
corresponding MBean instances for these 2 RSS Displays will be available. The MBean
attribute HoursPoweredCount needs to be monitored for only Display2. The
UniqueAttributeName can be "SerialNumber," as this attribute value will be different
for each Display. The UniqueAttributeValue can be the value of the serial number of
RSS Display2 (i.e. 41-zdcfh). A snippet of the monitor policy for this example is provided
below.
NameSpace
CIM Namespace value. This is applicable only to policies where CIM class/attribute
monitoring will be done. This is an optional tag.
If user doesn't provide this tag, and a policy is provided for CIM class/attribute
monitoring, by default RMA Generic monitoring infrastructure will use the CIM
Namespace as root\cimv2, which holds good for Windows platform.
HostName
The host name to use for CIM Connection. This is applicable only to policies where CIM
class/attribute monitoring will be done. This is an optional tag.
If user doesn't provide this tag, and a policy is provided for CIM class/attribute
monitoring, by default RMA Generic monitoring infrastructure will assume the value as
"localhost", i.e. it will try to connect to CIM Server on the same machine.
<Parameter name="HostName" type="java.lang.String">localhost</
Parameter>
ThresholdTestCondition
This is the test condition applicable if observed attribute value is of type Numeric. The
test conditions can be either "above" or "below". This is an optional tag and if not
provided, a value of "above" is assumed for this tag.
If a value of "below" is given, event will be generated when the samples reach or come
below the specified threshold value. If "above" is given, event will be generated when the
samples reach or cross the specified threshold value.
TestWarningThreshold
Enables monitoring for warning thresholds. This tag is mandatory if a "Warning" event
needs to be sent from the agent on crossing the threshold value provided in the
WarningThreshold tag). The boolean value "true" must be provided for this tag.
If this tag is not provided, a "false" value will be assumed.
<Parameter name="TestWarningThreshold"
type="java.lang.Boolean>false</Parameter>
TestErrorThreshold
Enables monitoring for error thresholds. This tag is mandatory if a "Critical" event needs
to be sent from the agent on crossing the error threshold value provided in the
ErrorThreshold tag). The boolean value "true" must be provided for this tag.
If this tag is not provided, a "false" value will be assumed.
<Parameter name="TestErrorThreshold"
type="java.lang.Boolean>true</Parameter>
MBeanUniqAttrValInstanceAvailRetryCount
Applicable if a policy is intended to monitor an MBean class/attribute. This is an optional
tag.
The number of sampling intervals RMA must retry for the required MBean instances to
be available. If this tag is not specified, the default value will be 5 sampling intervals. If
the InitialSampleDelay parameter is provided with an appropriate value, by the
time first sampling trigger happens all MBean instances will be available and retries may
not be needed.
Note: RMA starts monitoring only when at least one MBean instance of the MBean to be
monitored, as part of the policy, gets registered with MBeanServer. When multiple
instances are present for an MBean it takes a couple of minutes for all of them to get
registered with RMA MBeanServer.
<Parameter name="MBeanUniqAttrValInstanceAvailRetryCount"
type="java.lang.Integer>5</Parameter>
CIMConnectRetryCount
Parameter is applicable if a policy is intended to monitor a CIM class/attribute. This is an
optional tag/parameter.
Specifies the number of sampling frequencies the monitor will retry to get the value of the
ObservedAttribute from the CIM. This will be utilized by RMA only in a scenario
where the instance of the CIM class to be monitored is not available when RMA starts.
If not specified, a default value of 10 will be assumed.
<Parameter name="CIMConnectRetryCount" type="java.lang.Integer"
type="java.lang.Integer>10</Parameter>
DefaultMonitorState
Applicable if a policy is intended to monitor an attribute of type String. This is an
optional tag/parameter.
Indicates the type of event to be sent if observed attribute value has a value other than the
one specified in tags ErrorStrings, WarningStrings, NormalStrings. By default,
this will be taken as normal if not specified. Tag is useful when user knows only normal
IBM Systems Director with retail extensions provides the capability to create and manage retail
software packages that can be installed on Retail managed systems, as well as, facilitate and
schedule these packages for delivery and installation on the systems.
The Director Update Manager feature provides the ability to scan the software inventory of
systems to find systems that are not up to date.
This section describes the tools and functionality required to create and manage software
packages.
Launching locally
The resSwPkgMgr.bat file in %RES_HOME%\bin will allow users to launch the
application locally. It will connect to the locally running RES.
Note: After a package is edited, it has to be re-imported into Director for distribution. At
present, an edited package with the same Product Name and Product Version can be re-
imported/acquired by Director, but cannot be staged or installed. A clean-up command,
smcli cleanupd -m -F -v <package name> must be executed in a command window on the
Director server first (Special characters, such as a $, must be escaped on the Linux command
line). The edited package can then be imported and staged or installed into Director using
Update Manager. (Refer to the “Using Update Manager to import packages” on page 326
section). To see names of imported packages execute the following command: smcli lsupd.
If a package is edited and either the Product Name or Product Version is changed, the
package can be successfully acquired and staged or installed using Update Manager.
The process of importing and distributing software packages using Update Manager is
comprised of two steps:
1. Acquire updates
2. Show and install updates
As the error message explains, inventory must be collected on the selected systems in order
for the scan to proceed. The reason for this is that the scanning process compares the
information for each update with the information in software inventory.
After the inventory on all selected systems are up-to-date, the scanning process will list the
set of applicable updates.
Compliance policies
Compliance policies can be used to monitor systems and inform users when systems are missing
specific updates.
The Update Manager summary page provides information about compliance policies for
systems. It provides a quick view of the number of systems that are monitored by compliance
policies and the number of systems that are out of compliance. All compliance policy tasks are
initiated from the Update compliance section on this page.
Important: If a policy already exists and you select and configure the other policy, the
existing policy and its compliance checks are removed when you save the new policy. If the
chosen policy already exists, the table displays all associated compliance checks. If the
chosen policy does not already exist, the table is empty.
5. Choose a task to perform on the selected compliance policy:
Create a new compliance check. Complete the following steps:
1. In the displayed table, click Add. The Add page is displayed.
2. In the Show list, select the type of updates to display in the table.
Note: If you are adding a compliance check to the "Policy to ensure that the latest
released updates are always applied" policy, you can choose from among only dynamic
update groups. When a dynamic update group is examined, the compliance policy
indicates an 'out of compliance' situation only when updates that are needed by the
systems are not installed. This situation is verified by examining the needs relationship
on the update. If you are adding a compliance check to the "Policy to ensure that
specific version levels of updates are maintained" policy, you can choose from among
only individual updates or static update groups. When a static update group is
examined, each update contained within the group that is applicable to the system must
be found to be installed; otherwise, the compliance policy indicates an 'out of
compliance' situation. This situation is verified by examining what applies to
relationship on the update.
3. Choose the updates or update groups to include in the compliance policy.
4. Click OK to add the updates or update groups to the compliance policy.
6. Click Save to save the changes to the compliance policy. This will activate the selected
compliance policy and any compliance checks that you set up for it, and will remove any
previously existing compliance policies and compliance checks.
The icon below indicates a missing update severity that is not known or not applicable:
This icon indicates systems that are in compliance (no missing updates):
This icon indicates systems that are not accessible or do not have inventory collected:
To identify systems that are out of compliance according to an active compliance policy,
complete the following steps:
1. On the Update Manager summary page, find the Update Compliance section.
Figure 413. Expanded and filtered list of systems with compliance issues
9. The “Compliance issues” page is presented with an issue description and recommendation
for resolving it.
As the error message explains, inventory must be collected on the selected systems in order
for the scan to proceed. The reason for this is that the scanning process compares the
information for each update with the information in software inventory.
After the inventory on all selected systems are up to date, the scanning process will list the
set of applicable updates.
RMA provides support for managing the power states of POS systems in an enterprise. This
includes the ability to remotely shut down, suspend, reboot, and power on (using Wake On
LAN®). These operations can be invoked and scheduled from IBM Director 6 console.
Power management options supported on Retail agents are Restart((S5 + S0), Shutdown and
Power Off(S5), Suspend(S3) and Power On (Wake On LAN).
The Power management options are available and can be triggered only on Retail systems ie
Master agents and General agents. These agents will show up as Managed end points(MEP) in
"All Retail Client Systems" group in Resource Explorer page of IBM Systems Director 6. The
power management options available for a retail MEP will be different based on both the type of
the managed object as explained in the table below.
The below table outlines the supported power management options for Retail agents.
To utilize power management, select one or more MEP in "All Retail Client Systems" group,
right-click and select a Power management option like "Restart" from the "Power Management"
category in the context menu.
Upon clicking the appropriate power management option like "Restart", Director will initiate a
power management job creation and shows a "Launch Job" page. This allows the user to
schedule the power management job as per their requirements. The user can choose to run the
job immediately or schedule later for execution.
Click OK to complete the Job creation and Director displays the Job status and details.
The "General" tab of "Active and scheduled Jobs" displays the Job details and status.
The "Targets" tab displays the Retail Managed End Points(MEP's) on which the power
management request is triggered.
The logs tab displays the power management request Job logs. The job log delineates the power
management request status step by step.
Note: If user schedules the power management Job for later execution, then the "Logs" page will
be empty. Only when Director initiates execution at the scheduled time, job logs will be
populated.
Note:
1. Power management operations like Restart, Shutdown and Power Off, Suspend is not
supported when MEP is already in offline/Online+Locked state. If user executes these power
management operations on MEP's which are offline/online+Locked state, then the power
#Param to specify the timeout value for Power management operation Suspend to
complete
# 1 sec = 1000 milliseconds, 1 min = 60 msecs 10 mins =600000
SUSPEND_PWR_TASK_TIMEOUT_VALUE=600000
#Param to specify the timeout value for Power management operation Shutdown to
complete
# 1 sec = 1000 milliseconds, 1 min = 60 msecs 10 mins =600000
SHUTDOWN_PWR_TASK_TIMEOUT_VALUE=600000
#Param to specify the timeout value for Power management operation Restart to
complete
# 1 sec = 1000 milliseconds, 1 min = 60 msecs 20 mins =1200000
RESTART_PWR_TASK_TIMEOUT_VALUE=1200000
#Param to specify the timeout value for Power management operation PowerOn(Wake
On LAN) to complete
# 1 sec = 1000 milliseconds, 1 min = 60 msecs 10 mins =600000
POWER_ON_PWR_TASK_TIMEOUT_VALUE=600000
#Param to specify the minimum size of the Thread pool for processing power
management status
PWR_MGMT_THREAD_POOL_CORE_SIZE=10
#Param to specify the maximum size of the Thread pool for processing power
management status
PWR_MGMT_THREAD_POOL_MAX_SIZE=60
#Param to specify the time out period for getting response for commands sent to
RES for power
#management related functionality.
#value should be provided in terms of milli secs
# 1 sec = 1000 milliseconds, default value is 5 min = 300000 milliseconds
POWER_MGMT_RES_CMD_TIMEOUT_VALUE=300000
11. Director plugin Downgrade scenario is not supported . If user needs to downgrade to a
lower version which doesn't support Power Management feature, then they need to just
delete the existing MEP's in the Director UI Resource Explorer and re-discover them.
Warning: Power management in the below scenarios is not recommended, due to the
Director 6 Architecture limitation. This may lead to power management request failure.
• User selecting and executing a power management operation on both Master agent and 1
or more GA' s from the same store.
• User selecting and executing a power management operation on both OS4690 terminals
and their associated controller GA/MA.
• User selecting and executing a power management operation on both OS4690 controller
and terminal configured on the same machine.
This section helps you find information about troubleshooting problems with the Toshiba
Remote Management Agent or the Retail Extensions for IBM Systems Director.
Logs
Log data is produced for the Master Agent, General Agent, and Retail Extensions for IBM
Systems Director.
Note: If you are facing any issue related to discovery from General Agent to Master Agent, you
should check RMA logs of both General Agent as well as Master Agent to get more details
RMA Agents
Problem Determination Bundle Collection
The rmaCollect program creates a single .zip file with all of the information needed to send to
open a PMR. It includes add agent logs plus configuration and data files. This program is
available on RMA V3 and later.
This program is located at:
• Windows: %RMA_HOME%\bin\rmaCollect.bat
• 4690 Classic: M:\rma\rmaCollect.bat
• 4690 Enhanced: F:\rma\rmaCollect.bat
• Linux: %RMA_HOME%\bin\rmaCollect.sh
The program will create .zip files in the following directories:
• Windows: %RMA_HOME%\pd
• 4690 Classic: M:\rma\pd
• 4690 Enhanced: F:\rma\pd
• Linux: %RMA_HOME%\pd
Files captured as part of RMA collect utility are:
• Values of environment variables (Classpath, RMA_HOME etc)
• Versions of RMA jars (from Version classes)
• All logs in $RMA_HOME\silogs
• Java core dump.txt files and heap dump .phd files from %RMA_HOME%
• A recursive directory listing of $RMA_HOME
• $RMA_HOME\User\rma\rma.properties, rmauser.properties
• All files from user\rma (excluding swd/pkgdist/pkgExtract, swd/pkgdist/
pkgJars, capture)
• Service logs for Linux agent /var/log/rmsvc-ma or rmsvc-ga
• Install logs for windows agent.
The logs for RMA are written to the following locations depending on the operating system. If
the product is installed on the default location, then the location of the logs directory is as
follows:
• Windows: %RMA_HOME%\logs
• 4690 Classic: M:\rma\logs
• 4690 Enhanced: F:\rma\logs
• Linux: %RMA_HOME%\silogs
Director information
Following is the Director information:
• Values of environment variables (PATH, RES_HOME, etc)
• Versions of RES and Director plugin jars (This and above will be in the EnvInfo.txt file in
the EnvInfo folder)
• Director version information (version.srv file): (This will go in the EnvInfo folder in the
zip file)
• All files from Director/lwi/logs
• The logging.properties file from DIR_HOME/lwi/conf/overrides
• Java core dump .txt files from DIR_HOME/lwi/runtime/core (This will go in the dumps
folder in the zip)
• Heap dump .phd files from DIR_HOME/lwi/runtime/core. (This will go in the dumps
folder in the zip)
• ISD Plugin version information: DIR_HOME/Retail/RetailPlugin.properties (This will go in
the EnvInfo folder in the zip file)
• The director debug info in the folder DIR_HOME/lwi/runtime/core/RCSDebug
RES information
This is the RES information:
• All logs from RES_HOME/logs
• A recursive directory listing of RES_HOME
• Java core dump .txt files and heap dump .phd files
• All files from RES_HOME/conf (There will be folder conf in the zip file where these files can
be found)
• Contents of the folder RES_HOME/data
• On Linux platform, the file /etc/sysconfig/resenv (This will go in the EnvInfo folder in
the zip file)
• RES_HOME/RES_Install_Log.txt (This will go in the EnvInfo folder in the zip file)
• On Linux platform, the file /tmp/RES_Inst_DebugLog.txt (This will go in the
EnvInfo folder in the zip file)
JVM Diagnostics
IBM Systems Director provides a command line interface for invoking tasks, using the smcli
program. This interface can be used for producing Java core dumps or Java heap snapshots of
the IBM Systems Director Server JVM to help diagnose problems. To produce a Java core dump,
issue the smcli dumpjava command. To produce a heap dump, issue the smcli dumpheap
Troubleshooting
Use Table 27 to determine the action to take due to symptoms of common problems.
On Windows the RMA 1. Check the Windows Application and System logs in the
Agent service is not started Windows Event Viewer for detailed error messages.
or returns an error 2. Check whether RMA system environment variable
message when starting. RMA_JAVA_PATH is set to valid JRE path required for
running agents.
Software Distribution of This problem may occur if one of the following scenarios is true.
Linux Agent fails with Correct them accordingly.
error code 127.
1. If user has provided 64 bit JRE in JAVA_HOME or
RMA_JAVA_PATH variable.
2. If version of the JRE provided at JAVA_HOME or
RMA_JAVA_PATH variable is less than Version 6.
3. If user has not set one of the Environment Variables,
RMA_JAVA_PATH or JAVA_HOME.
4. If JRE is not valid.
SSL Handshake error If the Linux agent is running on OpenJDK1.7 and is trying to
between RES and Linux connect to RES, an error might be thrown with respect to SSL
Agents running on Handshake and connectivity to RES will not succeed. This issue
OpenJDK 1.7. can be addressed by installing the Network security package on
Linux machine and restarting the agent service.
For Windows RES and Prior to installation, an environment variable JAVA_HOME
Agent installation, user should be set, pointing to the installed location of OpenJDK.
selected OpenJDK's java
validation might fail at
Select Java Virtual
Machine panel.
adxssp0l RMA -C
adxssp0l RMA -R
adxssp0l RMA -Q
To stop IBM Systems Director on windows (or use the Services window):
To start IBM Systems Director on windows (or use the Services window):
smstop
smstart
smstatus
/etc/init.d/resserver stop
/etc/init.d/resserver start
The following table outlines the support for hardware and resource monitoring by operating
system and hardware models. The table assumes that the system is running RMA V3 or later.
Note:
• W = Windows
• L = Linux
• E = 4690 Enhanced
• C = 4690 Classic
Hardware
System LED Sensor Service
Machine Type Models Monitoring Monitoring Processor Events
6140 100 W, E, L
6140 120 L
6140 x3x W
6140 x4x W
4900 x45, x75, x85, W, E, L
4900 786, 746 W, E
4852 566 W, L W, L
4852 526, 570 W, L
4852 580 W
4846 5x5 W
4838 (All Models) W, L W, L
4810 33x W
4810 34x W, L
4810 350 W, E, L
4810 360 W, E
4810 370, 380 W,E
4800 784, C84 W, E, L E W, L
4800 7x3, F43 W, E, C, L E, C W, L
4800 EU3 W, L E, C W, L
4800 782, C42, 742 W, E, C
4800 722 E, C
SLEPOS Installation:
Instructions Reference link: https://www.toshibacommerce.com/?urile=wcm:path:/en/home/
support/product-support/support-software/support-remote-management-agent
• Configuration-Step4-> Change the parameter in 01setupAdminServerLdap.sh according to
your network and configuration(i.e. Password, ipNetworkNumber, ipNetmaskNumber
ipHostNumber etc)
• On SLEPOS server machine, with firewall ON - configure the following DNS ports:
A custom package containing the user preferred JRE can be created using RES Software Package
Manager and transferred to agent systems using IBM System Director Update manager
(Software distribution) prior to RMA upgrade.
Note: For RMA 3.2.2, it is a pre-requisite to provide JRE for RMA agents to run.
The process to transfer user preferred JRE to Windows and Linux Agent systems is explained in
the sections below.
Appendix D. Using Update Manager for transferring JRE to RMA systems 383
Figure 440. Set JAVA_HOME to valid JRE location
7. This step is optional. If JAVA_HOME is set in step 6 this step can be skipped.
Click Add button to add command to set RMA_JAVA_PATH Environment Variable.
Path : cmd.exe
Arguments : /c SETX RMA_JAVA_PATH "${client.target.path}
\jre1.8.0_51" /M
The set of commands added shows up on the Package Commands screen. Click OK.
The custom JRE package will show up on the RES screen as below.
Appendix D. Using Update Manager for transferring JRE to RMA systems 385
Figure 444. New JRE package
9. Transfer the above created JRE package to the agent system using Update Manager. Refer to
“Using Update Manager” on page 326.
Appendix D. Using Update Manager for transferring JRE to RMA systems 387
than RMA), then user can set RMA_JAVA_PATH Environment Variable to the new JRE
location.
Note: Either the JAVA_HOME or RMA_JAVA_PATH Environment Variable needs to be set
to the valid JRE location for RMA to run on the agent system.
A sample script jre_pkg.sh is provided to set the RMA_JAVA_PATH Environment
Variable.
Content of the jre_pkg.sh file:
#!/bin/bash
#Checking for bash.bashrc.local file
if [ ! -e /etc/bash.bashrc.local ]
then echo "file does not exist"
touch /etc/bash.bashrc.local
fi;
#checking for RMA_JAVA_PATH, if exists then override else append to end of the
file
if grep -q "RMA_JAVA_PATH" "/etc/bash.bashrc.local"
then
echo "RMA_JAVA_PATH variable exists"
sed -i '/RMA_JAVA_PATH/d' /etc/bash.bashrc.local
fi;
echo "export RMA_JAVA_PATH=/usr/java/jre1.8.0_51" >> /etc/bash.bashrc.local
7. Select the script jre_pkg.sh if needed. Click the right arrow button to add the file to the
list of selected files on the right. Click OK.
Appendix D. Using Update Manager for transferring JRE to RMA systems 389
Path : rm ${client.target.path}/jre_pkg.sh
/usr/java can be replaced with ${client.target.path}
Click OK.
Newly created package will show up on the RES screen as shown below.
Appendix D. Using Update Manager for transferring JRE to RMA systems 391
Figure 456. New JRE package (Linux)
13. Transfer the above created JRE package to the agent system using Update Manager. Refer to
“Using Update Manager” on page 326.
The following paragraph does not apply to the United Kingdom or any other country where
such provisions are inconsistent with local law: TOSHIBA GLOBAL COMMERCE SOLUTIONS
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
OF NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR
PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain
transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein; these changes will be incorporated in new editions
of the publication. Toshiba Global Commerce Solutions may make improvements and/or
changes in the product(s) and/or program(s) described in this publication at any time without
notice.
Toshiba Global Commerce Solutions may use or distribute any of the information you supply in
any way it believes appropriate without incurring any obligation to you.
Any references in this information to non-Toshiba Global Commerce Solutions Web sites are
provided for convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this Toshiba Global
Commerce Solutions product and use of those Web sites is at your own risk.
Information concerning non-Toshiba Global Commerce Solutions products was obtained from
the suppliers of those products, their published announcements or other publicly available
sources. Toshiba Global Commerce Solutions has not tested those products and cannot confirm
the accuracy of performance, compatibility or any other claims related to non-Toshiba Global
Commerce Solutions products. Questions on the capabilities of non-Toshiba Global Commerce
Solutions products should be addressed to the suppliers of those products.
This information is for planning purposes only. The information herein is subject to change
before the products described become available.
T
trademarks 394
troubleshooting
logs 367
problem 367
solution 367
truststore 128
U
uninstallation 109
uninstallation result 111
Upgrade RMA on OS 4690 through
ASM 101
using inventory 213
Using Update Manager for transferring JRE
to RMA systems 381
W
Whitelisting (4690OS) Support for RMA 119
Windows event log integration, agent 145
Windows installation 79
Windows PATH 140