Deploying SQL Assurance Violation to Ignore rules
You can deploy rules from a SQL Assurance Manage Violations to Ignore Rules view to a subsystem. The deploy process copies the selected rules to the target subsystem.
To deploy SQL Assurance VTI rules
Use this procedure to deploy SQL Assurance Violations to Ignore rules:
- In the Product Tools perspective, select a SQL Assurance Manage Violations to Ignore Rules view from the navigation pane.
- In the Violations to Ignore Rules grid, select one or more rules that you want to deploy.
Click Deploy rules
.- In the Deploy SQL Assurance Violations to Ignore Rules dialog box, perform the following tasks:
- In the Name field, accept the default name, or provide a name for the deployment.
The name can contain up to 50 characters, including all printable ASCII characters. Select the Db2 subsystem connection to which you want to deploy the rules.
Tip
You can select to show only your favorites.
- Click Next.
- In the Name field, accept the default name, or provide a name for the deployment.
- From the Deploy SQL Assurance Violations to Ignore Rules rule list, clear any rules that you do not want to deploy.
If BMC AMI Command Center detects a connection problem in the target Db2 subsystem the application:
- removes the check box on each of the affected rows in the list. Hover the cursor over any row without a check box for additional information about the connection problem.
- displays an error message in the lower left-hand corner of the wizard, which identifies the Db2 subsystem that has a connection problem.
- Click Next.
- Review the summary of the rule deployment, and click Finish:
- The deployment view is displayed under Deployment in the navigation pane.
- The Rule List and Results tabs are displayed in the results pane.
Note
Details of the deployment processing are displayed in the Results tab.
- (Optional) To save the deployment report, perform the following tasks:
- Click View report .
- Click Save report .
To deploy SQL Assurance VTI rules by using an existing deployment view
Use this procedure to redeploy Violations to Ignore rules that have already been defined in a deployment view. For example, you might have corrected a Db2 issue that previously prevented the rules from being deployed.
From the Product Tools navigation pane, select a Violations to Ignore Rules deployment view.
The results pane is populated with the Rule List and Results tabs.Click Deploy
.In the Deploy SQL Assurance Violations to Ignore Rules dialog, select the subsystem connection to which you want to deploy the rules.
Click Next.
In the Rule list, select the rules that you want to deploy
By default all rules are selected.Use the check box at the top of the first column to clear or select all rules from the list.
Click Next.
A summary of the deployment is displayed.- Click Finish.
Comments