Deploying SQL Assurance VTI rules


You can deploy rules from a SQL Assurance Manage Violations to Ignore (VTI) Rules view to one or more Db2 subsystems. The deploy process copies the selected rules to the target subsystems.

To deploy SQL Assurance VTI rules

  1. In the Product Tools perspective, select a SQL Assurance Manage Violations to Ignore Rules view from the navigation pane.
  2. In the Violations to Ignore Rules grid, select one or more rules that you want to deploy.
  3. Click Deploy rules NW_file_arrow_right.png
  4. In the Deploy SQL Assurance Violations to Ignore Rules dialog box, perform the following steps:
    1. In the Name field, accept the default name, or provide a name for the deployment.
      The name can contain up to 50 characters, including all printable ASCII characters.
    2. Select one or more Db2 subsystem connections to which you want to deploy the rules.

      Tip

      You can select to show only your favorites.

    3. Specify whether to continue if an error occurs for a selected Db2 subsystem:
      • Clear the check box to stop the deployment immediately.
      • Select the check box to continue the deployment with the next Db2 subsystem.
    4. Click Next.
  5. From the Deploy SQL Assurance Violations to Ignore Rules Rule List , clear any rules that you do not want to deploy.

    To filter the Rule List based on Action, use the Add, Overwrite, and Error buttons. If all rows in the list are for a single action, the buttons are not displayed.

    If BMC AMI Command Center detects a connection problem in a target Db2 subsystem, the application performs the following tasks:

    • Removes the check box from all the affected rows in the list. For information about the connection problem, hover over any row without a check box .
    • Displays an error message in the lower left-hand corner of the wizard, which identifies the Db2 subsystem that has a connection problem.
  6. Click Next.
  7. Review the summary of the rule deployment, and click Finish.
    The deployment view is displayed under Deployment in the navigation pane. The Rule List and Results tabs are displayed in the results pane.

    Important

    Details of the deployment processing are displayed in the Results tab. 

    The Deployment view persists in the workspace during your current session . The Deployment view is removed from the workspace when you log out. 

  8. (Optional) To save the deployment report, perform the following steps:
    1. Click View report  NW_file_text_o.png.
    2. Click Save output text  NW_floppy.png.

To deploy SQL Assurance VTI rules by using an existing deployment view

Use this procedure to redeploy Violations to Ignore rules that have already been defined in a deployment view. For example, you might have corrected a Db2 issue that previously prevented the rules from being deployed.

Important

The Deployment view persists in the workspace during your current session . The Deployment view is removed from the workspace when you log out. 


  1. In the Product Tools navigation pane, select a Violations to Ignore Rules deployment view.
    The results pane is populated with the Rule List and Results tabs.
  2. Click Deploy  NW_file_arrow_right.png.
  3. In the Deploy SQL Assurance Violations to Ignore Rules dialog box, select one or more Db2 subsystem connections to which you want to deploy the rules.
  4. Specify whether to continue if an error occurs for a selected Db2 subsystem:
    • Clear the check box to stop the deployment immediately.
    • Select the check box to continue the deployment with the next Db2 subsystem.
  5. Click Next.
  6. In the Rule List, select the rules that you want to deploy.
    By default all rules are selected.
    Use the check box at the top of the first column to clear or select all rules from the list

    Tip

    To filter the Rule List based on Action, use the Add, Overwrite, and Error buttons. If all rows in the list are for a single action, the buttons are not displayed.

  7. Click Next.
    A summary of the deployment is displayed.
  8. Click Finish.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*