Chapter 9. System

EnlightenDSM's System menu contains numerous tools for basic network management. With the System menu, administrators can view CPU summaries for any given TTY port, monitor and manipulate swap space processes, shut down or reboot the system, manage crontab entries, change a host's clock settings, maintain and update mail aliases, manage files and directories, and disallow or allow logins.

The System menu options are:

The features described in this chapter are part of the EnlightenDSM/Advanced product. A License Advisory window similar to the one shown on page 1-3 will appear if you attempt to access this menu with the Workgroup version.

CPU Summary by TTY

You can use this program to view a summary of all process activity by TTY (Figure 9-1).

Figure 9-1. Summary of Processes by TTY window


The information shown is the TTY number, the login user, the number of processes running on the TTY, and the CPU time used. You can further investigate one or more of the TTYs listed by using the Processes button. The rest of this section describes how to use the buttons in the window.

Processes

To view the processes, highlight the TTYs you wish to view and click the Processes button. A window will appear displaying all processes for the highlighted TTYs. To further manipulate this information, see “Process Status”.

Graph

To graph the processes, highlight the information you wish to view and then click the Graph button. A window will appear displaying the amount of CPU utilization on each highlighted TTY in a stacked bar graph format. The left axis shows the amount of processes.

Swap Space

You can use this program to check the swap space usage (Figure 9-2).

Figure 9-2. Swap Space Usage window


The information shown is the total amount of swap space in KB, the amount used, the amount available, and the amount used as a percentage. The rest of this section describes how to use the buttons in this window.

Processes

To view the processes, highlight the hosts you wish to view and click the Processes button. A window will appear displaying all processes for the highlighted hosts. To further manipulate this information, see “Process Status”.

Graph

To graph the swap space usage, highlight the information you wish to view and then click the Graph button. A window will appear displaying the amount of free and used swap space for each highlighted host in a stacked bar graph format. The left axis shows the number of KB of swap space.

Shutdown/Reboot

You can use this program to either shut down or reboot all hosts in the current pool (Figure 9-3).

Figure 9-3. Shutting down and rebooting hosts


The rest of this section details how to use this window's functionality.

Fields

This window has the following fields:

Hostnames

Use this field if you want to perform the shutdown/reboot operation only on a subset of the currently managed hosts. You can also click the arrow button to the right to bring up a pick list of all currently managed hosts and make your selections. Leave a blank space between each hostname if you are specifying multiple entries.

If you leave this field blank, all hosts in the current pool will be shutdown/reboot.

Delay Time

You can use this field to specify a delay before the shutdown/reboot occurs. The delay time should give users enough time to prepare for the system shutdown/reboot.The default is 60 seconds.

This field will accept both relative and absolute time formats. See Appendix C, “Time Formats,” for more details.

Countdown

Use this toggle to choose whether a countdown should occur prior to starting the shutdown or reboot. A countdown will display warning messages at regular intervals to the terminals of all hosts being taken down or rebooted. The default is Yes.

Banner Mode

Use this toggle to choose whether the (user-definable) broadcast message should be displayed in extremely large text. This message should be relatively brief. The default is Yes.

Reconfigure

Use this toggle to choose whether the hosts should be reconfigured when they are rebooted. The default is Yes.

Shutdown Options

Use this toggle to choose whether the hosts should be put in an initialized state of a single-user mode when they are shut down. The default is Off. This choice only matters if you then use the Shutdown button.


Note: Some systems, like Solaris 2.x, will cut power to the CPU during a shutdown.

Broadcast Message

You can use this text field to type in the message to be broadcast to all hosts prior to shutdown. Otherwise, the default message “System Going Down in n Minutes” will be used.

Buttons

This window has the following buttons:

Shutdown

Click this button to selectively begin to shut down the host specified in the Hostnames field. You will be prompted for confirmation of this action. If you leave the Hostnames field blank, all hosts in the current pool will be shut down.

Reboot

Click this button to selectively begin to reboot the host specified in the Hostnames field. You will be prompted for confirmation of this action. If you leave the Hostnames field blank, all hosts in the current pool will be shut down.

Status

Click this button to display the status of all pending shutdowns and/or reboots. The following window will appear (Figure 9-4).

Figure 9-4. Status of pending shutdowns or reboots


You can then highlight any pending shutdowns and/or reboots and click the Abort button. EnlightenDSM will abort the pending shutdowns and/or reboots you selected.

Abort

Click this button to abort all pending shutdowns and/or reboots immediately. You will be prompted for confirmation of this action. EnlightenDSM will then abort all pending shutdowns and/or reboots on hosts in the current pool.

Cancel

Click this button to close the window without making any changes.

Cron Management

You can use this module to manage crontab entries on multiple heterogeneous hosts. You can add, change, delete, or copy cron jobs; perform a query on all cron jobs; or manage user access to crontab. The actual options are:

  • Configure

  • Query

  • Cron Users

The rest of this section details how to use each of these options.

Configure

You can use this program to view all crontab jobs for all hosts in the current pool. The Crontab Configuration window will appear
(Figure 9-5).The list box will show the current cron jobs for all users on all hosts in the current pool.

Figure 9-5. Crontab Configuration window


From here, you have the option to:

Add 

Create a new crontab job

Modify 

Modify an existing crontab entry

Delete 

Selectively delete all marked crontab jobs

Copy 

Create another cron job using the settings of the first selected cron job

Add

Click this button to create a new crontab job. The Add Crontab Entry window will appear (Figure 9-6).

Figure 9-6. Add Crontab Entry window


A crontab entry consists of six fields. Any combination of the five time fields (minutes, hours, days, months, and/or days) defines when the command (sixth field) will execute. By default, the job will run every hour if all the time fields are left blank.


Note: This feature is system dependent; you may not be able to use all combinations of time settings on your system. Check your local cron for its precise workings.


Add Fields

The Add Crontab Entry window has the following fields:

Hostname

If you want to limit this job to specific hostnames within a pool, enter those hostnames in this field. If you are using multiple entries, leave a blank between each entry. You can also use the arrow button to the right to select the available hosts from the current pool.

User Name

You can use this field to specify which user will run this job. You can also click the arrow button on the right to display a list of users and select one.

Description

You can use this field to briefly describe this job's purpose.

Command

Use this field to specify the cron command (and arguments) to be run at the time established by the remaining five fields.You can use a maximum of 256 characters to specify this command.

Minutes

Use this field to specify what point in the specified hour(s) the job will run. Enter a whole number between 0 and 59. Or you can specify a range by using a dash (-), for example, 0-20. If you are using multiple entries, leave a blank between each entry.

Hours of Day
Days of Month
Months of the Year
Days of the Week

Click on the appropriate boxes in these fields to further define when this job will run. You may select multiple values per field.

Add Buttons

This window has the following buttons:

Add

Once you've made all the selections for the new job, click this button to selectively create the crontab job.

Clear Fields

Click this button to clear the existing choices in all fields.

Close

Click this button to discard any changes and close the window.

Modify

Click this button to modify a selected crontab entry. A pop-up window similar to the Add Crontab Entry window will appear, except the User Name field is view-only.

There are also two button differences in the Modify window:

  • You can use the Modify button (rather than the Add button) after you've made all your changes, and

  • You can use the Next button to modify additional jobs if you've selected more than one job to modify from the Crontab Configuration list.

For a description of the rest of the buttons and fields in this window, see “Add”.

Delete

Click this button to delete a job from the Crontab Configuration list. EnlightenDSM will prompt you to confirm your action. EnlightenDSM will not delete a Cron job for a non-existent user.

Copy

Click this button to copy the settings in a cron job. The Add Crontab Entry window will appear showing the highlighted job's settings in each field. You can edit this window as needed and then click the Add button to complete the copy.

See “Add” for a description of how to use this window's fields and buttons.

Query

You can use this program to find specific cron jobs. You can search for hostnames, user names, the command itself, the time settings, and so on. Once your query is successful, you can then modify, delete, or copy the cron job.

When you activate this program, the window in Figure 9-7 will appear.

Figure 9-7. Finding cron jobs


The cron job must match all fields to get a successful match. The fields in this window have a logical AND relationship. Blank fields always match and you can also negate fields with the ! character (e.g., !Monday).

Fields

This window contains the following fields:

Hostnames

If you want to limit the search to specific hostnames within a pool, enter those hostnames in this field. If you are using multiple entries, leave a blank between each entry.

User Names

If you want to limit the search to specific users, specify which one(s) in this field. If you are using multiple entries, leave a blank between each entry. You can also use the arrow button to the right to select from a pick list of the users.

Command

Use this field to limit the search for a specific cron command (or any of its options). You can use a maximum of 256 characters in this field, including the standard UNIX wildcards.

Time
Weekdays
Days of Mon.
Months

You can use these fields to specify times or time ranges. This limits the search to find jobs executing at/between the times entered in these field. See Appendix C, “Time Formats,” for more details on using these fields.

Buttons

This window contains the following buttons:

Execute Search

Once you've selected your search criteria, click the Execute Search button. If you click this button without filling in any of the fields, all current cron jobs will be displayed. A window similar to the Crontab Configuration window appears with the results listed.

Then you can use the following options to act further on the results:

  • Modify

  • Delete

  • Copy

See “Configure” for more details.

Clear Fields

Click this button to clear the existing choices in all fields.

Close

Click this button to discard any changes and close the window.

Cron Users

cron has built-in security features allowing it to control which users are allowed to execute cron jobs. There are five possible user access states:

  • Only root is allowed to execute cron jobs

  • Only selected users are allowed to execute cron jobs

  • All users are allowed to execute cron jobs

  • All users except specified users are allowed to execute cron jobs

  • No users are allowed to execute cron jobs

You can use this program to display the cron security status of all hosts, as shown in Figure 9-8.

Figure 9-8. Cron security status of hosts


From here, you can highlight which users' accessibility you want to change and click the Modify button. This action will bring up the Modify Crontab User Access window (Figure 9-9). You can then use this window to modify the cron user access for multiple hosts. The rest of this subsection details how to use the Modify Crontab User Access window.

Figure 9-9. Modify Crontab User Access window


Fields

This window contains the following fields:

Hostnames

If you want to limit this modification to specific hostnames within a pool, enter those hostnames in this field. If you are using multiple entries, leave a blank between each entry. You can also use the arrow button to the right to select the available hosts from the current pool.

User Access

Use this set of toggles to specify what type of user cron access you want to allow.

User Names

If you want this modification to allow or exclude (deny) specific users, enter the user name(s) in this field. If you are using multiple entries, leave a blank between each entry. You can also use the arrow button to the right to select from a pick list of the users.

Buttons

This window contains the following buttons:

Modify

After making your selections, click the Modify button to make the crontab user access modifications.

Clear Fields

Click this button to clear the existing choices in all fields.

Close

Click this button to discard any changes and close the window.

Clock Management

You can use this module to synchronize or set a host's clock. The options are:

  • Clock Synch

  • Clock Set

The rest of this section describes how to use each of these options.

Clock Synch

You can use this program to choose when to synchronize a host's clock on the time kept by a master clock. When you activate this program, the window in Figure 9-10 will appear.

Figure 9-10. Synchronizing a host clock


From here, you have the option to:

Add 

Create a clock synchronization process

Modify 

Modify an existing clock synchronization

Delete 

Selectively delete all marked clock synchronization processes

The rest of this subsection details how to use this window's features.

Add

Click the Add button to set up a synchronization process. The window shown in Figure 9-11 appears.

Figure 9-11. Setting up a synchronization process


Add Fields

This window contains the following fields:

Synch. Clock on Host(s)

Use this field if you want to limit the clock synchronization to a subset of the currently managed hosts. If you are using multiple entries, leave a blank between each entry. You can also click the arrow button to the right to bring up a pick list of all currently managed hosts and make your selections from there.

Master Clock Hostname

Use this field to specify which host will act as the master timekeeper.

Interval

You can use this field to specify when the clock synchronizations should occur. This field will accept both relative and absolute time formats. See Appendix C, “Time Formats,” for more details.

Add Buttons

This window contains the following buttons:

Apply

Once you've made your selections, click this button to establish the synchronization for all selected hosts' clocks in the current pool. You will be prompted to confirm your action.

Clear Fields

Click this button to clear the existing choices in all fields.

Cancel

Click this button to close the window without making any changes.

Modify

Click this button to modify an existing clock synchronization process. A pop-up window similar to the Clock Synchronization window will appear, except:

  • You also have access to a pick list option in the Master Clock Hostname field, and

  • You can use the Next button to modify additional jobs if you've selected more than one process to modify from the Clock Synchronization Configuration list.

For a description of the rest of the buttons and fields in this window, see “Add”.

Delete

Click this button to delete a process from the Clock Synchronization Configuration list. EnlightenDSM will prompt you to confirm your action.

Clock Set

You can use this program to reset a host's clock. When you activate this program, the window shown in Figure 9-12 will appear. The rest of this subsection details how to use this window's functionality.

Figure 9-12. Resetting a host clock


Fields

This window contains the following fields:

Hostnames

Use this field to specify which hosts in the current pool will have their clocks reset. If you are using multiple entries, leave a blank between each entry. You can also click the arrow button to the right to bring up a pick list of all currently managed hosts and make your selections from there.

Set Time Option

Use these toggles to choose whether the new time setting should be based on a specific time (default) or a reference host's clock setting.

Reference Host

If you set the Set Time Option toggle to Use Reference Host, use this field to specify which host's clock setting should be referenced for the correct time. You can also click the arrow button to the right to bring up a pick list of all currently managed hosts and select one of them.

This can be any host, but it cannot be in the current pool.

Date
Time

If you set the Set Time Option toggle to Use Specified Time, you can use these fields to specify the date and time. The default values are the current date and time. See Appendix C, “Time Formats,” for more details on using these fields.

Buttons

This window contains the following buttons:

Apply

After making your selections, click this button to reset the clock for all selected hosts' clocks in the current pool. You will be prompted to confirm your action.

Clear Fields

Click this button to clear the existing choices in all fields.

Cancel

Click this button to close the window without making any changes.

Mail Aliases

You can use this module to manage mail aliases. You can add, change, delete, view, copy, or perform a query on all mail aliases. The actual options are:

  • Configure

  • Query

The rest of this section details how to use each of these options.

Configure

When you create user accounts, you can have a mail alias created for those accounts and/or have them included in a mail list. Use this program to set up the mail lists and mail aliases.

You can also create these when you create user accounts. See “Add” for more details.

When you activate this program, the window shown in Figure 9-13 will appear.

Figure 9-13. Configuring mail aliases


This window displays a list of all mail aliases for the hosts in the current pool. If the alias is a mail list (has more than one entry), the number of users in the list is displayed; otherwise, the user name and the respective Realname are displayed.

From here, you have the option to:

Add 

Create a new mail alias

Modify 

Modify an existing mail alias (on multiple hosts)

Delete 

Delete an existing mail alias from a host

View 

View a summary of the mail alias

Copy 

Copy a selected mail alias to one or more hosts

NIS 

Push the NIS maps on any active NIS servers

The rest of this subsection details how to use the Mail Aliases Configuration window's features.

Add

Click the Add button to create a new mail alias. The window in Figure 9-14 appears.

Figure 9-14. Creating a new mail alias


Add Fields

This window has the following fields:

Hostnames

You can use this field to specify which hosts will have their alias list updated. If you are using multiple entries, leave a blank between each entry. You can also click the arrow button to the right to bring up a pick list of all the available hosts and make your selections from there.

Alias Name

Use this field to specify the name of the mail list alias.

Members

Use this field to specify which users and/or other aliases are members of this mail list. If you are using multiple entries, leave a blank between each entry. You can also use the Users and/or Aliases buttons to make your selections.

Add Buttons

This window has the following buttons:

Add

Once you've made all the selections for the new mail alias, click this button to create it.

Delete

Click this button to delete a mail alias from the Mail Aliases Configuration list. EnlightenDSM will prompt you to confirm your action.

Users

Click this button to pop up a pick list of all recognized users and select the one(s) you want to be members of this mail alias.

Aliases

Click this button to pop up a pick list of all currently known mail alias lists and select the one(s) you want to be included in this mail alias list.

Close

Click this button to discard any changes and close the window.

Modify

Click this button to modify an existing mail alias entry. A pop-up window similar to the Add Alias Entry window will appear, except the Alias Name field is view-only.

There are also two button differences in the Modify window:

  • You can use the Modify button (rather than the Add button) after you've made all your changes, and

  • You can use the Next button to modify additional jobs if you've selected more than one job to modify from the Crontab Configuration list.

For a description of the rest of the buttons and fields in this window, see “Add”.

Delete

Click this button to delete a highlighted mail alias from the Mail Aliases Configuration list. EnlightenDSM will prompt you to confirm your action.

View

Click this button to view a summary of the mail alias list. The Mail Alias View window will appear (Figure 9-15). The list box will display a list of each user and/or alias in this mail alias list.

Figure 9-15. Mail alias summary


View Fields

This window contains the following (display-only) fields:

Hostname

The name of the host(s) that use this alias.

Alias Name

The name of the mail alias.

# of user entries

The number of direct users in the alias.

# of list entries

The number of direct mail lists in the alias.

Total # of entries

The total number of effective users in the alias.

User names

This list box shows which users are a part of this alias.

View Buttons

This window contains the following buttons:

Print

Click this button to print the mail alias information.

Next

If you selected multiple aliases in the Mail Aliases Configuration window, click this button to view the next highlighted alias.

Close

Click this button to finish viewing the mail aliases and close the View window.

Copy

Click this button to copy the settings in one mail alias list to a second list. The Mail Aliases Configuration window will appear showing the highlighted mail aliases settings in each field except the Alias Name field. You can edit this window as needed and then click the Add button to complete the copy.

See “Add” for a description of how to use this window's fields and buttons.

NIS

Click this button to push/remake the NIS maps on any active NIS servers. This updates the NIS servers and hosts on your network with any Host Entry changes you've made to the Configuration list. If there are no NIS servers to update for your choice(s), EnlightenDSM will display a dialog box telling
you so.

Query

You can use this program to find specific mail aliases. You can search for hostnames, alias names, user names, and so on. Once your query is successful, you can then modify, delete, view, or copy the mail alias.

When you activate this program, the window in Figure 9-16 will appear.

Figure 9-16. Finding mail aliases


This search must match all fields to get a successful match. The fields in this window have a logical AND relationship. Blank fields always match. You can also negate fields with the ! character (e.g., !Joe).

Fields

This window contains the following fields:

Hostnames

To limit the search to specific hostnames within a pool, enter those hostnames in this field. If you are using multiple entries, leave a blank between each entry.

Alias Names

To limit the search to specific mail aliases, enter those names in this field. If you are using multiple entries, leave a blank between each entry. You can also click the arrow button to the right to bring up a pick list of all the recognized mail aliases and make your selections from there.

User Names

To limit the search to specific users, enter those user names in this field. If you are using multiple entries, leave a blank between each entry.

# of members

Use this field to specify how many members are in the alias. Enter a whole number between 1 and 100. Or you can specify a range by using a dash(-), for example, 10-20.

Buttons

This window contains the following buttons:

Execute Search

After selecting your search criteria, click the Execute Search button. If you click this button without filling in any of the fields, all mail aliases will be displayed. A window similar to the Mail Aliases Configuration window appears with the results listed.

Then you can use the following options to act further on the results:

  • Modify

  • Delete

  • View

  • Copy

  • NIS

See “Configure” for more details.

Clear Fields

Click this button to clear the existing choices in all fields.

Close

Click this button to discard any changes and close the window.

Remote File Distribution

EnlightenDSM also supports Remote File Distribution. You can create files and directories; set file and directory ownerships and permissions; and run downloaded scripts that return TTY output and program exit codes. When you choose this command, the Remote File Distribution Configuration window appears (Figure 9-17).

Figure 9-17. Remote File Distribution Configuration window


From here you can:

Add 

Create a file distribution job

Modify 

Modify an existing file distribution job

Delete 

Delete selected file distribution jobs

Copy 

Copy an existing file distribution job

Execute Now 

Execute (run) the first selected file distribution job now regardless of the actual scheduling status

Status Logs 

View the Remote File Distribution Logs

The rest of this section details how to use this window's functions.

Add

Click the Add button to define a new file distribution job. The Add Remote File Distribution Job window will appear (Figure 9-18).

Figure 9-18. Add Remote File Distribution Job window


The rest of this section details how to use this window's features.

Fields

This window contains the following fields:

Job Name

Use this field to assign a name to the remote file distribution job.

Description

Use this field to give a brief description of the job. This is used along with the name to help identify jobs in the status logs.

Install to Hosts

You can use this field to limit which hosts will be accessed during the job. Leave a blank space between hostnames for multiple entries. You can also click the arrow button to the right to pop up a pick list of all hosts in the current pool with the selected O/S type(s) and make your selection(s) from there.

Target Directory

Use this field to specify the name of the directory where the files should be copied. Do not use hard or soft links in this field.

Min. Disk

You can use this field to define the minimum amount of free disk space the partition containing the target directory must have before this remote file distribution job will execute. You can specify the units in bytes or Kbytes.

Pre-Install Script

You can use this field to specify any scripts or programs that should be executed on the destination hosts before transferring the files. Enter the full pathname to the script and, optionally, an input data filename. Multiple scripts should be separated by semicolons.

Source Directory

You can use this field to specify the directory where the Pre-Install Script will be put and then run. Do not use hard or soft links in this field.


Note: Remote File Distribution fails if the source directory is read-only.

Post-Install Script

You can use this field to specify any scripts or programs that should be executed on the destination hosts after the files are transferred. Enter the full pathname to the script and, optionally, an input data file name. Multiple scripts should be separated by semicolons.

Directory

You can use this field to specify the directory where the Post-Install Script will be put and then run.

Source Directory

You can use this field to specify the directory where this job will be started on the local host.

Number of Retries

Use this field to choose how many times a remote copy to a given host should be attempted before the copy operation fails. This can be 0 (the default) through 5 times.

Rollback on

You can use this toggle to select if the copied files should be removed (or not) from the receiving hosts when an error occurs during the remote copy process. The choices are to remove the copied files from:

  • Ignore Errors (the default; no copied files are removed)

  • Failed Hosts Only (remove copies from failed hosts only)

  • All Hosts (if one host fails, remove copies from all hosts)

Overwrite Files

Use this toggle to specify if existing files in the destination directory should be overwritten by the new files being copied AND if new directories should be created as needed during the distribution job. The default is Yes.

Use Relay Host

Use this toggle to specify if this distribution of files should be broadcast to any Relay Hosts for distribution to hosts on other subnets. The default is No.

If you set this to Yes, you should also specify the Broadcast Relay Hosts in the Session Preferences window. See Chapter 2, “Configure.” for more details.

Distribution Files

This field is an editable scrolled list. You can click in this list once to activate it and then type in the full pathname of the files you want to be copied to other hosts.

Time of RFD Job

You can use this field, along with the Schedule Type field, to schedule when a file distribution should be executed. See Appendix C, “Time Formats,” for details on specifying this value.

Schedule Type

Use this toggle to specify how and when the file distribution will occur. The choices are:

Weekly 

When you click this option, the days of the week will be displayed. Select the days of the week the file distribution should occur. The Time of RFD job field should contain the time of day the file distribution will occur.

Manual 

This is the default setting. You can run this type of job by clicking the Execute Now button.

Monthly 

When you click this option, the days of the month will be displayed. Select the days of the month the file distribution should occur. The Time of RFD job field should contain the time of day the file distribution will occur.

One time 

Use this option to specify in the Time of RFD job field a one-time date and time to run the file distribution. See Appendix C, “Time Formats,” for details on specifying this value.

Buttons

This window contains the following buttons:

Apply

Click this button to create the file distribution process.

If you didn't enter the Target Directory and Distribution Files information, EnlightenDSM will prompt you to supply the missing information. If any of the Distribution Files do not exist, EnlightenDSM will pop up an error box informing you which files could not be found and the remote distribution will stop. Otherwise, a status window will pop up to show the progress of the remote file distribution.

Clear Fields

Click this button to clear the existing choices in all fields.

Execute Now

Click this button to execute the file distribution job immediately without having to save it or schedule it. See “Execute Now” for more details.

Close

Click this button to discard any changes and close the window.

Modify

Click the Modify button to modify an existing file distribution job. A window similar to the Add Remote File Distribution Job window will appear, except you cannot modify the Job name field.

There are also two button differences in the Modify window:

  • You can use the Modify button (rather than the Add button) after you've made all your changes, and

  • You can use the Next button to modify additional remote distribution jobs if you've selected more than one to modify from the Remote File Distribution Configuration list.

For a description of the rest of the buttons and fields in this window, see “Add”.

Delete

Click this button to delete the selected file distribution jobs. EnlightenDSM will prompt you to confirm your action.

Copy

Click this button to copy an existing file distribution job and create a second job. The Add Remote File Distribution Job window will appear showing the highlighted job's settings in each field except the Job name field. You can edit this window as needed and then click the Apply button to complete the copy.

See “Add” for a description of how to use this window's fields and buttons.

Execute Now

Click this button to execute (run) the first file distribution job you've selected now, regardless of its actual scheduling status. The progress of the job distribution will be displayed in an xterm.

Status Logs

When file distribution jobs are run (in background) at their scheduled times, a log is created showing their execution time and completion status. Click the Status Logs button to view this log. The Remote File Distribution Logs window will appear (Figure 9-19).

Figure 9-19. Remote File Distribution Logs window


This window will display a list of available file distribution logs. From here, you can use the window's buttons to perform the following operations:

View 

View the backup log in a window

Delete 

Delete the selected backup logs

Print Log 

Print (make a hardcopy) a backup log

The rest of this subsection details how to use each of this buttons.

View

Click this button to view the contents of the selected status log in a separate window. Click the EnlightenDSM icon when you are done viewing the log.

Delete

Click this button to delete the selected distribution job status logs. EnlightenDSM will prompt you to confirm your action.

Print Log

Click this button to print the selected distribution job status logs to your default printer. EnlightenDSM will prompt you to confirm your action.

Login Status

You can use this menu choice to allow or disallow logins. The second option stops any users from gaining access to the system. This only works on systems that recognize the /etc/nologin mechanism. Typically you use the second option during system maintenance or when a large job is running that requires most of the CPU's resources.

Highlight the desired action and EnlightenDSM will prompt for confirmation, if needed. For example, if you highlighted Allow Logins and no confirmation appeared, you are already allowing logins. Otherwise a pop-up window will appear and you can click OK to execute the desired action.


Note: The only way to remove a temporary lockout from the system is to go back to the System menu and choose Allow Logins. Or you can reboot the system.