Space announcement

   

This space provides the same content as before, but the organization of the home page has changed. The content is now organized based on logical branches instead of legacy book titles. We hope that the new structure will help you quickly find the content that you need.

Deploying SQL Assurance Violation to Ignore rules

(SPE2010)

You can deploy rules from a SQL Assurance Manage Violations to Ignore Rules view to a subsystem. The deploy process copies the selected rules to the target subsystem.

To deploy SQL Assurance VTI rules

Use this procedure to deploy SQL Assurance Violations to Ignore rules:

  1. In the Product Tools perspective, select a SQL Assurance Manage Violations to Ignore Rules view from the navigation pane.
  2. In the Violations to Ignore Rules grid, select one or more rules that you want to deploy.
  3. Click Deploy rules 

  4. In the Deploy SQL Assurance Violations to Ignore Rules dialog box, perform the following tasks:
    1. In the Name field, accept the default name, or provide a name for the deployment.
      The name can contain up to 50 characters, including all printable ASCII characters.
    2. Select the Db2 subsystem connection to which you want to deploy the rules.

      Tip

        You can select to show only your favorites.

    3. Click Next.
  5. From the Deploy SQL Assurance Violations to Ignore Rules rule list, clear any rules that you do not want to deploy.

    If BMC AMI Command Center detects a connection problem in the target Db2 subsystem the application:

    • removes the check box on each of the affected rows in the list. Hover the cursor over any row without a check box for additional information about the connection problem.
    • displays an error message in the lower left-hand corner of the wizard, which identifies the Db2 subsystem that has a connection problem.
  6. Click Next.
  7. Review the summary of the rule deployment, and click Finish:
    • The deployment view is displayed under Deployment in the navigation pane.
    • The Rule List and Results tabs are displayed in the results pane.

    Note

    Details of the deployment processing are displayed in the Results tab. 

  8. (Optional) To save the deployment report, perform the following tasks:
    1. Click View report .
    2. Click Save report .

To deploy SQL Assurance VTI rules by using an existing deployment view

Use this procedure to redeploy Violations to Ignore rules that have already been defined in a deployment view. For example, you might have corrected a Db2 issue that previously prevented the rules from being deployed.

  1. From the Product Tools navigation pane, select a Violations to Ignore Rules deployment view.
    The results pane is populated with the Rule  List and Results tabs.

  2. Click Deploy  .

  3. In the Deploy SQL Assurance Violations to Ignore Rules dialog, select the subsystem connection to which you want to deploy the rules.

  4. Click Next.

  5. In the Rule list, select the rules that you want to deploy
    By default all rules are selected.

    Use the check box at the top of the first column to clear or select all rules from the list.

  6. Click Next.
    A summary of the deployment is displayed.

  7. Click Finish.

Was this page helpful? Yes No Submitting... Thank you

Comments