Configuring a recovery action: Assumptions


  • The PATROL KM for Event Management and the PATROL KM for Oracle are installed and configured on the agent computer.
  • This scenario will consider one agent and, thus, will not address deploying configurations to multiple remote agents. For more information about deploying configurations, see the scenario Sending-E-mail-Notification-When-Disk-Space-is-Low.
  • The agent computer is a Unix server running Oracle.
  • The account that you want to run this recovery action under has the proper permissions to run the recovery action on the agent computer.
  • The recovery action is run by means of a PSL command.
  • To encrypt the account password, the PATROL DES encryption is used. However, you could also choose to use another encryption method as long as the PSL recovery action is able to decrypt the password. If you use PATROL DES encryption, the password is decrypted internally.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC PATROL for Event Management 2.9.00