Mqa90 PDF
Mqa90 PDF
Mqa90 PDF
IBM MQ Appliance
IBM
Version 9 Release 0
IBM MQ Appliance
IBM
Note
Before using this information and the product it supports, read the information in “Notices” on page 873.
This edition applies to version 9 release 0 modification 4 of IBM MQ Appliance and to all subsequent releases and
modifications until otherwise indicated in new editions.
When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any
way it believes appropriate without incurring any obligation to you.
© Copyright IBM Corporation 2015, 2017.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Chapter 1. Product overview . . . . . . 1 Tool requirements . . . . . . . . . . . 60
Introduction to the IBM MQ Appliance . . . . . 1 Installing the appliance in a rack . . . . . . . 60
Appliances and the appliance firmware . . . . . 2 Installing rails in the rack frame . . . . . . 60
Relationship with IBM DataPower appliances . . 2 Installing the appliance on the rails . . . . . 62
Appliance specification . . . . . . . . . . . 3 Considerations to connect the appliance to an AC
What's new in release 9.0.4 . . . . . . . . . 4 power source . . . . . . . . . . . . . 64
What's new in release 9.0.3 . . . . . . . . . 4 Connect the appliance to a network . . . . . 65
What's new in release 9.0.2 . . . . . . . . . 4 Setting up the initial firmware configuration . . . 66
What's changed in release 9.0.2 . . . . . . . . 4 Configuration requirements . . . . . . . . 66
What's new in release 9.0.1 . . . . . . . . . 5 Firmware considerations . . . . . . . . . 67
What's changed in release 9.0.1 . . . . . . . . 5 Procedure 1 of 3: Connecting the serial cable to
High availability . . . . . . . . . . . . . 6 the appliance . . . . . . . . . . . . . 68
Disaster recovery for a high availability Procedure 2 of 3: Initializing the appliance . . . 69
configuration . . . . . . . . . . . . . 9 Procedure 3 of 3: Accepting the license agreement 70
Disaster recovery . . . . . . . . . . . . . 9 Maintenance . . . . . . . . . . . . . . 71
Accessibility features for IBM MQ Appliance . . . 10 Diagnosing your appliance . . . . . . . . 71
Notices . . . . . . . . . . . . . . . . 12 Troubleshooting your appliance . . . . . . 77
Trademarks . . . . . . . . . . . . . 14 Removing or replacing the appliance or parts . . 80
Terms and conditions for product documentation 14 Removing the batteries . . . . . . . . . 97
IBM Online Privacy Statement . . . . . . . 15
Chapter 4. Upgrading and
Chapter 2. Planning . . . . . . . . . 17 downgrading . . . . . . . . . . . 101
Differences between administering an IBM MQ Installing new firmware . . . . . . . . . . 101
Appliance and an IBM MQ installation . . . . . 17 Installing a new level of firmware by using the
Control commands on the IBM MQ Appliance. . 17 command line . . . . . . . . . . . . 102
Differences between queue managers that are Installing a new level of firmware by using the
running on the IBM MQ Appliance and an IBM MQ IBM MQ Appliance web UI . . . . . . . 103
installation . . . . . . . . . . . . . . 22 Reverting firmware . . . . . . . . . . . 104
Exits and services on the IBM MQ Appliance . . 23 Reverting to the previous level of firmware by
Queue manager configuration on the IBM MQ using the command line . . . . . . . . . 104
Appliance . . . . . . . . . . . . . . 23 Reverting to the previous level of firmware by
IBM MQ objects on the IBM MQ Appliance . . 24 using the IBM MQ Appliance web UI . . . . 104
XA transactions . . . . . . . . . . . . 25 Downgrading . . . . . . . . . . . . . 105
Planning a high availability system . . . . . . 25 Suspending an appliance from an HA group for
Network requirements for high availability . . . 27 maintenance . . . . . . . . . . . . . . 105
Planning a disaster recovery system . . . . . . 28 Upgrading a version 8.0 IBM MQ Appliance to
Hardware limitations for disaster recovery . . . 29 version 9.0 . . . . . . . . . . . . . . 105
Planning network connections . . . . . . . . 30 Upgrading to version 9.0 by using the command
Network configuration guidance . . . . . . 34 line . . . . . . . . . . . . . . . . 106
Planning SAN storage . . . . . . . . . . . 38 Upgrading to version 9.0 by using the IBM MQ
Capacity planning . . . . . . . . . . . . 39 Console . . . . . . . . . . . . . . 107
Security planning . . . . . . . . . . . . 40
Chapter 5. Configuring . . . . . . . 109
Chapter 3. Installing . . . . . . . . . 43 Command line access. . . . . . . . . . . 109
Safety . . . . . . . . . . . . . . . . 43 Connecting to the serial port . . . . . . . 109
Guidelines for servicing electrical equipment . . 44 Configuring the SSH service . . . . . . . 109
Inspecting for unsafe conditions . . . . . . 45 Configuring the IBM MQ Appliance web UI . . . 112
Safety statements . . . . . . . . . . . 46 Changing the IBM MQ Appliance web UI IP
Introducing the IBM MQ Appliance . . . . . . 49 address and port . . . . . . . . . . . 112
Specifications and features . . . . . . . . 50 Configuring certificates for IBM MQ Appliance
Intrusion detection . . . . . . . . . . . 51 web UI . . . . . . . . . . . . . . 113
Components on the front . . . . . . . . . 51 Customizing the user interfaces . . . . . . . 116
Components on the rear . . . . . . . . . 57 Supported markup for the user interface
Prepare for installation . . . . . . . . . . 58 customization file . . . . . . . . . . . 116
Rack requirements . . . . . . . . . . . 58 Template of the custom user interface file . . . 118
iv IBM MQ Appliance
Switching over to a recovery appliance . . . . 275 Resetting a user's password by using the IBM
Switching back to the main appliance . . . . 276 MQ Appliance web UI . . . . . . . . . 386
Replacing a failed node in a disaster recovery Resetting a user's password by using the
configuration . . . . . . . . . . . . 286 command line . . . . . . . . . . . . 386
Replacing failed high availability nodes in a Forcing a password change by using the IBM
disaster recovery configuration . . . . . . 290 MQ Appliance web UI . . . . . . . . . 387
Testing the recovery appliance. . . . . . . 293 Forcing a password change by using the
Reversing disaster recovery roles . . . . . . 294 command line . . . . . . . . . . . . 387
Viewing the status of a disaster recovery queue Resetting failed login count by using the IBM
manager . . . . . . . . . . . . . . 295 MQ Appliance web UI . . . . . . . . . 388
Managing files by using the IBM MQ Appliance Resetting failed login count by using the
web UI . . . . . . . . . . . . . . . 297 command line . . . . . . . . . . . . 388
Managing files by using the REST management TLS certificate management . . . . . . . . 389
interface . . . . . . . . . . . . . . . 299 Working with self-signed certificates. . . . . 389
Watchdog timer . . . . . . . . . . . . 303 Working with CA-signed certificates. . . . . 392
Listing certificates for a queue manager . . . 397
Chapter 7. Migrating and Viewing a certificate for a queue manager . . . 398
consolidating . . . . . . . . . . . 305 Deleting a certificate . . . . . . . . . . 399
Managing certificates on the appliance . . . . 399
Moving queue managers from other IBM MQ
FIPS compliance . . . . . . . . . . . . 404
platforms . . . . . . . . . . . . . . . 305
Moving a queue manager . . . . . . . . 306
Moving queue managers secured by using TLS 308 Chapter 9. Monitoring and reporting 407
Planning for incompatible features in the queue Monitoring system resource usage . . . . . . 407
manager . . . . . . . . . . . . . . 309 Monitoring system resource usage by using the
Handling incompatible features in the queue status command . . . . . . . . . . . 407
manager . . . . . . . . . . . . . . 310 Monitoring system resource usage by using the
Editing qm.ini files . . . . . . . . . . 311 amqsrua command . . . . . . . . . . 408
Transferring queue managers to other IBM MQ Monitoring system resource usage . . . . . 410
Appliances . . . . . . . . . . . . . . 315 Monitoring the appliance by using the show
Transfer from an existing single appliance to a command . . . . . . . . . . . . . 420
new single appliance by using archive files . . 315 Developing your own resource monitoring
Transfer from an existing single appliance to a program . . . . . . . . . . . . . . 421
new single appliance by using DR commands . 315 Application activity trace . . . . . . . . . 422
Transfer from an existing appliance in a disaster Subscriptions to application activity trace . . . 423
recovery configuration . . . . . . . . . 319 Creating subscriptions to application activity
Transfer from an existing high availability pair trace . . . . . . . . . . . . . . . 423
of appliances to a new pair of appliances . . . 324 Application activity trace: subscriptions
compared with central collection . . . . . . 425
Chapter 8. Security . . . . . . . . . 331 Using amqsact to view trace messages . . . . 425
Configuring trace levels . . . . . . . . . 427
Types of user and how they are authenticated . . 331
System topics for monitoring and activity trace . . 428
User authorization, credential mapping, and access
Monitoring the appliance by using the REST
profiles . . . . . . . . . . . . . . . 332
management interface . . . . . . . . . . 429
Access policies . . . . . . . . . . . . 333
Example of retrieving status by using REST . . 429
Role based management. . . . . . . . . . 344
Monitoring the IBM MQ Appliance by using
Important: avoiding user lock out when
SNMP . . . . . . . . . . . . . . . . 432
configuring role based management . . . . . 346
User authentication with LDAP . . . . . . 346
User authentication with XML file . . . . . 362 Chapter 10. Troubleshooting . . . . . 433
User authentication with local users . . . . . 365 Error logs . . . . . . . . . . . . . . 433
Credential mapping with an XML file . . . . 367 Viewing system error log files . . . . . . . 434
Credential mapping with local user groups . . 372 Viewing queue manager error log files . . . . 435
Password policy . . . . . . . . . . . 376 Viewing the first failure data captures . . . . 436
Account policy . . . . . . . . . . . . 378 Deleting log files . . . . . . . . . . . 437
Local users and user groups . . . . . . . 380 Downloading error logs . . . . . . . . . 437
Routine user administration . . . . . . . . 385 Reason codes . . . . . . . . . . . . 438
Changing your own password by using the IBM Event logs . . . . . . . . . . . . . . 439
MQ Appliance web UI . . . . . . . . . 385 Types of log target. . . . . . . . . . . 439
Changing your own password by using the Configuring log targets . . . . . . . . . 440
command line . . . . . . . . . . . . 385 Using trace . . . . . . . . . . . . . . 440
Using trace in the IBM MQ Console . . . . . . 441
Contents v
Resolving a partitioned problem in a high Chapter 11. Reference. . . . . . . . 455
availability configuration . . . . . . . . . 442 Command reference . . . . . . . . . . . 455
Resolving a partitioned problem in a disaster IBM MQ commands . . . . . . . . . . 455
recovery configuration . . . . . . . . . . 443 Appliance commands . . . . . . . . . 584
Resolving an HA queue manager left in an REST management interface . . . . . . . . 865
indeterminate state . . . . . . . . . . . 444 REST request structure . . . . . . . . . 866
Troubleshooting file copy . . . . . . . . . 445 REST response structure . . . . . . . . . 867
Troubleshooting SAN problems . . . . . . . 447 REST management resources . . . . . . . 868
Problems resizing queue managers . . . . . . 448 Query parameters . . . . . . . . . . . 871
Help with using runmqras . . . . . . . . . 448 Messages . . . . . . . . . . . . . . . 872
Recovering from hardware failures . . . . . . 449
Appliance fails, both disks unaffected . . . . 449 Notices . . . . . . . . . . . . . . 873
Appliance fails, one disk unaffected . . . . . 450
Programming interface information . . . . . . 875
Appliance operational, one disk in RAID pair
Trademarks . . . . . . . . . . . . . . 875
fails . . . . . . . . . . . . . . . 452
vi IBM MQ Appliance
Chapter 1. Product overview
The IBM® MQ Appliance is an appliance-based offering of IBM MQ.
For an introduction to and overview of IBM MQ, see IBM MQ Technical overview
in the IBM MQ documentation.
IBM MQ Appliance
The appliance firmware can be updated by downloading update files from IBM.
No other installation or maintenance application on the system is required.
You can use the IBM MQ Console part of the IBM MQ Appliance web UI for
simple browser-based management of your queue managers, see “Using the IBM
MQ Console” on page 207. After you have created a queue manager on the
appliance, you can use IBM MQ management tools such as the IBM MQ Explorer
or runmqsc from a remote system, or other IBM or third-party management
products, to work with the queue manager.
Because only IBM certified firmware updates can be installed on the appliance, all
applications that connect to appliance queue managers do so by using the IBM MQ
Client protocol. For information about migrating queue managers and applications
on to the appliance platform see Chapter 7, “Migrating and consolidating,” on
page 305.
The IBM MQ Appliance firmware builds on the long-term expertise that IBM has
in developing network appliances by including components from the IBM
DataPower Gateway family of products. This relationship is visible in a number of
places, for example, you will see mentions of 'DPOS' (the low level
firmware/operating system of the appliance) in the system logs. The IBM MQ
Appliance is, however, a discrete and stand-alone product; there is much
functionality from IBM DataPower Gateway appliances that is not present in the
IBM MQ Appliance, and vice versa.
You do not need to be familiar with IBM DataPower to work with the IBM MQ
Appliance. The information that you need is supplied in this documentation, and
2 IBM MQ Appliance
day to day management tasks are intuitive, whichever interface you choose to use.
However, in many cases you will find that any experience with DataPower
appliances (for example, first-time setup, working with the CLI, web UI, and other
management interfaces) is valuable and carries over to the IBM MQ Appliance.
Appliance domains
One fundamental aspect of the IBM DataPower appliance that is not carried over
to the IBM MQ Appliance is the concept of an 'Application Domain'. In DataPower
products, domains provide a mechanism for the separation of applications from
unrelated areas (Lines of Business, Test versus Production, and so on). In some
senses, this is similar to the separation provided by connecting applications to a
different queue manager hosted on the same appliance.
Therefore, the domain feature is not currently used in the IBM MQ Appliance, and
creation of new domains is disabled. However, by the very nature of the platform,
you will come across 'domains' mentioned in a few contexts, for example, in
creating REST URIs, or displaying system objects. Therefore, for the purposes of
DPOS as exploited in the IBM MQ Appliance, only the 'default' domain is
required, and 'default' should always be supplied in these contexts.
Appliance specification
The following table provides the technical details of the IBM MQ Appliance
hardware configuration.
You can use these details to help in performance planning and sizing activities. Do
not, however, assume 'like for like' mappings for other installations of IBM MQ, for
example, installations on UNIX platforms. For detailed planning, the best source of
information when assessing expected performance (message throughput) are the
following performance reports:
v IBM MQ Appliance Performance Report
v IBM MQ Appliance HA/DR Performance Report
Table 1. Appliance specification
M2001 (current model) M2000 (previous model)
2 x 10 core "Ivy Bridge" x86 processors (6 2 x 10 core "Ivy Bridge" x86 processors (6
cores active in B model). 2.80 GHz, cores active in B model). 2.80 GHz,
Hyperthreading enabled. Hyperthreading enabled.
192 GB RAM, 1600 MHz DIMMs 192 GB RAM, 1600 MHz DIMMs
2 x Management 1 Gb Ethernet ports (one 2 x Management 1 Gb Ethernet ports (one
supporting IPMI) supporting IPMI)
8 x 1 Gb Ethernet ports 8 x 1 Gb Ethernet ports
4 x 10 Gb Ethernet ports 2 x 10 Gb Ethernet ports
2 x 3.2 TB SSDs under hardware controlled 2x 1.2 TB HDDs under hardware controlled
mirrored RAID (3 TB effective) mirrored RAID (1 TB effective)
1 GB RAID cache 1 GB RAID cache
This topic describes new features in version 9.0.4 of the appliance firmware.
4 IBM MQ Appliance
v The timeout behavior for the IBM MQ Appliance web UI has changed. There is
a distinction between the IBM MQ Appliance web UI and the IBM MQ Console.
The IBM MQ Console is a component within the web UI that is used to work
with IBM MQ. Because the work can involve monitoring, the console session
never times out. The IBM MQ Appliance web UI is used to administer the
appliance itself, and does time out. As soon as you switch from the console back
to the web UI, the timeout timer starts. The default timeout is 600 seconds. If
this time elapses with no user input, the user is automatically logged out. You
can change the timeout period by using the idle-timeout command (see
“idle-timeout” on page 862).
This topic describes new features in version 9.0.1 of the appliance firmware.
This topic describes significant features that have changed in version 9.0.1 of the
appliance firmware.
High availability
The IBM MQ Appliance might experience outages both planned and unplanned.
The high availability (HA) features of the appliance enable queue managers to
have maximum availability. The HA features of the IBM MQ Appliance give the
appliance an ability to withstand software or hardware outages. Therefore, it is
available as much of the time as possible. These outages might be planned events,
such as maintenance and backups, or unplanned events, such as hardware failures
or power failures.
To configure HA for the IBM MQ Appliance, you can connect a pair of appliances
either directly, or by using switches (a separate switch for each link). You must
then create an HA group for this pair of appliances. To work most effectively as a
high availability solution, the two appliances need to be in close physical
proximity to one another. For this reason the HA solution is not intended to
provide disaster recovery, although you can configure a disaster recovery solution
for queue managers that run on your HA pair.
For details of combining HA and disaster recovery on the appliance, see “Disaster
recovery for a high availability configuration” on page 9. A queue manager can
belong to an HA group and be part of a disaster recovery configuration.
The HA group controls the availability of any HA queue managers that are created
on the appliances. By default, the HA queue managers are run on the appliance on
which they are created, when that appliance is available. This appliance is known
as the preferred appliance of the HA queue manager. You can use commands to
specify the other appliance as the preferred appliance, if required, or to specify that
the queue manager has no preferred appliance.
If an appliance in the pair is stopped for any reason, the HA queue managers that
are running on that appliance automatically start to run on the other appliance.
That is, the queue managers are failed over to the other appliance. When the
stopped appliance is restarted, and the required data is replicated back to that
appliance, it resumes running the HA queue managers for which it is the preferred
appliance. Persistent messages are preserved.
6 IBM MQ Appliance
To ensure that the HA queue manager is ready to run on either appliance, queue
manager data is replicated synchronously between the appliances. In some
situations, such as when one appliance is unavailable, the queue manager data
cannot be replicated synchronously. When the appliance becomes available, the
queue managers in the HA group enter a catch-up phase, in which the queue
manager data is replicated. The appliances use a dedicated 10 Gb Ethernet
connection for replication.
This HA solution enables all the HA queue managers in the HA group to continue
running when one appliance in the group is stopped. If both appliances in the HA
group fail at the same time, the HA queue managers cannot run until at least one
of the appliances is restarted.
Appliances in an HA group can run other queue managers that are outside of the
HA group, but if the appliance fails or is stopped, then that queue manager stops.
Appliances can belong only to one HA group.
Applications can connect to HA queue managers in one of two ways. They can
have an IP address configured for the data interface on each of the appliances in
the HA group, and the application itself determines which one to use for
connecting to the active queue manager. Alternatively, applications can use a single
floating IP address to access a particular queue manager, and that IP address will
work for that queue manager whichever appliance it is running on (note that the
appliances still both require an interface configured with a static IP for the floating
IP address to map to). Using a floating IP address in this way makes queue
manager failover almost invisible to the connecting application.
Example HA group
In the example configuration, two IBM MQ Appliances, named castor and pollux,
are located in the same data center, in adjacent racks. The three cables that connect
the two appliances are less than a meter long, and so communication between the
two has the minimum of delay.
The appliance that is named pollux runs one queue manager, terentia1, which is
inside the HA group. The appliance that is named castor has two queue managers
that are running within the HA group, cicero1 and cicero2. It also has another
queue manager, tullia2, that runs outside the HA group. Both castor and pollux
have shadow versions of the HA queue managers on the other appliance. These
queue managers are kept up to date by replication across the replication interface.
Two more interfaces, a primary and a secondary, track the heartbeat of the other
appliance.
The rack that castor is in suffers a power failure. The appliance that is named
pollux detects that castor has failed, and starts to run the queue managers cicero1
and cicero2. The queue manager tullia2 is outside the HA group, so does not fail
over to pollux.
When power is restored, the queue managers cicero1 and cicero2 run on the
appliance that is named castor again.
8 IBM MQ Appliance
Demonstration HA with put and get operation
View the video for a demonstration of the simple put and get demonstration
running on an HA pair of IBM MQ Appliances.
Disaster recovery
The IBM MQ Appliance disaster recovery solution provides for the situation where
you have a complete outage at your data center. The work can be resumed by
another IBM MQ Appliance running at a distant location.
Disaster recovery (DR) is provided on a per-queue manager basis. When you create
a queue manager on your main appliance, you create a secondary instance on your
recovery appliance at the distant site. The two appliances are linked by a
Chapter 1. Product overview 9
high-speed connection. The work of the primary queue manager is replicated to
the secondary queue manager asynchronously. For example, an IBM MQ PUT or
GET completes and returns to the application before the event is replicated to the
secondary queue manager. Asynchronous replication means that, following a
recovery situation, some messaging data might be lost. But the secondary queue
manager will be in a consistent state, and able to start running immediately, even if
it is started at a slightly earlier part of the message stream.
The main and recovery appliances are connected by a single replication link.
Unlike the high availability solution, there is no heartbeat detection between the
two appliances. An appliance at the recovery site can host secondary queue
managers from multiple appliances at the main site, or at different main sites. For
example, you could have an appliance in Glasgow that provided disaster recovery
for appliances in Birmingham, Paris, and Frankfurt. Equally, an appliance at your
main site could have secondary queue managers on different appliances at
different recovery sites.
When a disaster occurs, and the main appliance is lost and a primary queue
manager stops running, the secondary queue manager at the distant site can be
started manually. Applications must connect to the recovery appliance (using
automatic client reconnection). The secondary queue manager can then process
application messages until such time as normal operation can be resumed. There
can be up to 4 MB of data in the TCP send buffer of a primary queue manager,
ready to be replicated to the secondary instance, and this data is lost if a disaster
occurs.
When the two appliances in a DR configuration are connected, any updates to the
persistent data for a DR queue manager are transferred from the primary instance
of the queue manager to the secondary instance. This is known as replication.
If the network connection between the appliances is lost, the changes to the
persistent data for the primary instance of a queue manager are tracked. When the
network connection is restored, a different process is used to get the secondary
instance up to speed as quickly as possible. This is known as synchronization.
10 IBM MQ Appliance
Accessibility features
IBM MQ Appliance uses the latest W3C Standard, WAI-ARIA 1.0, to ensure
compliance to US Section 508, and Web Content Accessibility Guidelines (WCAG)
2.0. To take advantage of accessibility features, use the latest release of your screen
reader in combination with the latest web browser that is supported by this
product.
Keyboard navigation
This product uses standard navigation keys.
Interface information
The fully accessible way of using IBM MQ Appliance is to use the command line
interface. For more information about using commands, see “Command reference”
on page 455.
The IBM MQ Appliance user interfaces do not have content that flashes 2 - 55
times per second.
The IBM MQ Appliance web user interface does not rely on cascading style sheets
to render content properly and to provide a usable experience. However, the
product documentation does rely on cascading style sheets. IBM MQ Appliance
provides an equivalent way for low-vision users to use a user’s system display
settings, including high-contrast mode. You can control font size by using the
device or browser settings.
In addition to standard IBM help desk and support websites, IBM has established
a TTY telephone service for use by deaf or hard of hearing customers to access
sales and support services:
TTY service
800-IBM-3383 (800-426-3383)
(within North America)
For more information about the commitment that IBM has to accessibility, see IBM
Accessibility.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
12 IBM MQ Appliance
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
J46A/G4
555 Bailey Avenue
San Jose, CA 95141-1003
USA
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows:
Portions of this code are derived from IBM Corp. Sample Programs.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the web at www.ibm.com/legal/
copytrade.shtml.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
Java™ and all Java-based trademarks and logos are trademarks of Sun
Microsystems, Inc. in the United States, other countries, or both.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
and/or other countries.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Applicability
These terms and conditions are in addition to any terms of use for the IBM
website.
Personal use
You may reproduce these publications for your personal, noncommercial use
provided that all proprietary notices are preserved. You may not distribute, display
or make derivative work of these publications, or any portion thereof, without the
express consent of IBM.
14 IBM MQ Appliance
Commercial use
You may reproduce, distribute and display these publications solely within your
enterprise provided that all proprietary notices are preserved. You may not make
derivative works of these publications, or reproduce, distribute or display these
publications or any portion thereof outside your enterprise, without the express
consent of IBM.
Rights
IBM reserves the right to withdraw the permissions granted herein whenever, in its
discretion, the use of the publications is detrimental to its interest or, as
determined by IBM, the above instructions are not being properly followed.
You may not download, export or re-export this information except in full
compliance with all applicable laws and regulations, including all United States
export laws and regulations.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from users via cookies and
other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, see: (i) IBM's Privacy Policy at http://www.ibm.com/privacy; (ii)
IBM's Online Privacy Statement at http://www.ibm.com/privacy/details (in
particular the section entitled "Cookies, Web Beacons and Other Technologies");
and (iii) the "IBM Software Products and Software-as-a-Service Privacy Statement"
at http://www.ibm.com/software/info/product-privacy.
Planning any deployment of IBM MQ, and applications that communicate by using
the messaging services that it provides, requires an understanding of both general
messaging concepts and IBM MQ-specific terminology and environment
considerations. For IBM MQ general information and information on planning, see
IBM MQ Technical overview and Planning in the IBM MQ documentation
To use the IBM MQ control commands, you must enter the IBM MQ
administration mode by entering the command mqcli on the command line. You
can exit the IBM MQ administration mode by entering the command exit.
The following example shows how to enter the IBM MQ administration mode and
create a queue manager:
mqa# mqcli
mqa(mqcli)# crtmqm QM1
MQ Appliance queue manager created. Creating or replacing default objects for queue manager ’QM1’.
Default objects statistics : 79 created. 0 replaced. 0 failed. Completing setup.
Setup completed.
mqa(mqcli)# exit
mqa#
Unsupported commands
The commands that are not supported are listed in the following table:
Table 2. Unsupported commands
Command Comment
crtmqcvx Use of exits is not supported on the appliance. See “Exits
and services on the IBM MQ Appliance” on page 23.
crtmqenv Use the mqcli command line environment “setmqvar” on
page 501 command.
18 IBM MQ Appliance
Table 2. Unsupported commands (continued)
Command Comment
setmqinst See Chapter 4, “Upgrading and downgrading,” on page 101
setmqm See Chapter 4, “Upgrading and downgrading,” on page 101.
setmqspl Replaced by the SET/DISPLAY POLICY configuration using
runmqsc, see “runmqsc” on page 486, see “Configuring IBM
MQ Advanced Message Security” on page 166.
setmqprd See Chapter 4, “Upgrading and downgrading,” on page 101
strmqcfg Run IBM MQ Explorer from an external system.
strmqcsv External control of some queue manager components is not
supported on the IBM MQ Appliance.
strmqweb You cannot start or stop the mqweb server manually on the
appliance.
The appliance does not support the queue manager security parameter CONNAUTH
CHCKLOCL.
Supported commands
The IBM MQ commands that you can use on the IBM MQ Appliance are listed in
the following table.
Table 3. Supported IBM MQ commands
Command Comments
“crtmqm” on page 456 Create queue manager. The following parameters are not
supported:
v -lc
v -ll
v -ld
v -g
v -md
v -oa group
v -q
v -si
v -ss
v -z
The following parameters have been added:
v -fs FileSize
v -sx
“dltmqm” on page 459 Delete queue manager. The following parameter is not
supported:
v -z
“dmpmqcfg” on page 460 Dump queue manager configuration
Chapter 2. Planning 19
Table 3. Supported IBM MQ commands (continued)
Command Comments
“dspmq” on page 463 Display queue managers. The following parameters are not
supported:
v -o installation
v -o standby
v -x
The following parameters have been added:
v -o ha
v -o dr
“dspmqrte” on page 465 Display route
“dspmqtrn” on page 472 Display transactions
“dspmqver (display Display version and build information. The following parameter
version information)” on is not supported:
page 474 v -i
The output of this command is not the same as for the IBM MQ
dspmqver command. Information about the operating system,
installation details, and data paths are not displayed. That is,
only the name, version, level, and build type information is
displayed.
dspmqweb Display information about the configuration of the mqweb
server. The mqweb server is used to support the IBM MQ
Console and administrative REST API.
“endmqm” on page 476 End queue manager. The following parameters are not
supported:
v -s
v -x
v -z
“endmqtrc” on page 478 End trace
“mqrc” on page 479 IBM MQ return code
“rcrmqobj” on page 481 Generate a client channel definition table (CCDT)
“rsvmqtrn” on page 481 Resolve transaction
“runmqras” on page 483 Run diagnostics collection. The following parameters are not
supported:
v -outputdir
v -zipfile
v -workdirectory
“runmqsc” on page 486 Run MQSC commands. The following parameters are not
supported:
v -n
v -c
“runswchl” on page 488 Switch cluster channel
20 IBM MQ Appliance
Table 3. Supported IBM MQ commands (continued)
Command Comments
“strmqm” on page 490 Start queue manager. The following parameters are not
supported:
v -x
v -z
v -a
v -r
“strmqtrc” on page 492 Start trace
“setmqvar” on page 501 Add or remove an environment variable for the appliance or for
a specified queue manager
setmqweb Add or remove an mqweb server configuration property.
New commands
New IBM MQ commands that are specific to the IBM MQ Appliance are listed in
the following table:
Table 4. Appliance commands
Command Description
“dspmqerr” on page 564 Display the IBM MQ error log files.
“crthagrp” on page 549 Create a high availability (HA) group of appliances.
“dsphagrp” on page 551 Display the status of the appliances in the high availability
(HA) group.
“makehaprimary” on page Specifies that an appliance is the 'winner' when resolving a
553 partitioned situation in the high availability group.
“prepareha” on page 554 Prepare an appliance to be part of an HA group that uses a
unique, generated key for communication between
appliances.
“sethagrp” on page 555 Pause and resume an appliance in a high availability group.
“crtdrprimary” on page 558 Augment an existing queue manager to become the primary
queue manager in a disaster recovery configuration.
“crtdrsecondary” on page Create a secondary version of a queue manager on the
560 recovery appliance in a disaster recovery configuration.
“makedrprimary” on page Switch a disaster recovery queue manager to have the
560 primary role in the disaster recovery configuration.
“makedrsecondary” on page Prevent a queue manager on an appliance in a disaster
561 recovery configuration from starting, and specifies that it has
the secondary role.
“dltdrprimary” on page 562 Remove a queue manager currently in the primary role from
DR control.
“dltdrsecondary” on page Remove a queue manager currently in the secondary role
563 from DR control and delete it.
“dspmqini” on page 498 Display attributes from the qm.ini or mqat.ini file of a
specified queue manager.
“dspmqvar” on page 499 Display environment variables set for a specified queue
manager.
Chapter 2. Planning 21
Table 4. Appliance commands (continued)
Command Description
“setmqini” on page 500 Add or remove an attribute from the qm.ini file of a
specified queue manager. Set a value for an attribute in the
mqat.ini file.
“addcert” on page 508 Add the public part of a certificate to the keystore of a
specific queue manager.
“createcert” on page 509 Create a self-signed certificate for a queue manager.
“createcertrequest” on page Create a certificate request for a queue manager.
511
“deletecert” on page 513 Delete a certificate from the keystore of a specific queue
manager.
“deletecertrequest” on page Delete a certificate request that was previously issued from a
513 specific queue manager.
“detailcert” on page 514 Show detailed information about a certificate for a specific
queue manager.
“detailcertrequest” on page Show detailed information about a certificate request for a
515 specific queue manager.
“keybackup” on page 517 Back up the queue manager key repository to a file.
“keyrestore” on page 518 Restore a key repository
“listcert” on page 519 List the certificates that are held in the keystore of a specific
queue manager.
“listcertrequest” on page 520 List the certificate requests that are outstanding in the
keystore of a specific queue manager.
“receivecert” on page 520 Receive a certificate signed by a Certificate Authority (CA)
as the result of a previous request.
“recreatecertrequest” on Re-create a certificate request for a specific queue manager.
page 521
“usercreate” on page 503 Create user IDs for messaging users.
“userdelete” on page 504 Delete a messaging user.
“usermodify” on page 504 Modify user IDs for messaging users.
“userlist” on page 505 List the messaging users.
“groupcreate” on page 505 Add user groups for messaging users.
“groupdelete” on page 506 Delete user groups for messaging users.
“grouplist” on page 506 List groups for messaging users.
“userbackup” on page 506 Back up messaging users.
“userrestore” on page 507 Restore messaging users.
22 IBM MQ Appliance
Exits and services on the IBM MQ Appliance
You cannot run user code on the IBM MQ Appliance. Any attempts to create
administrative objects that reference user code are rejected.
Maximum channels
If you want to limit the maximum number of client channels, use the per-channel
MAXINST and MAXINSTC attributes on the SVRCONN channel definitions to define
limits for each SVRCONN channel:
MAXINST
Sets the maximum number of simultaneous instances of an individual
SVRCONN channel that can be started.
MAXINSTC
Sets the maximum number of simultaneous individual SVRCONN
channels that can be started from a single client. In this context,
Chapter 2. Planning 23
connections that originate from the same remote network address are
regarded as coming from the same client.
You can use the DEFINE CHANNEL command to set these attributes. For more
information, see DEFINE CHANNEL in the IBM MQ documentation.
Circular logging
When you use the crtmqm command to create a queue manager on the appliance, a
file system is created where all queue manager data, recovery logs, and errors logs
are stored. The default size of this file system is 64 GB, but you can alter the size
by using the -fs parameter with the crtmqm command.
There are differences between applications that are connecting to a queue manager
that is running on an IBM MQ Appliance, and one running in an IBM MQ
installation. Queue managers that are running on the appliance support only
applications that connect by using TCP, over IBM MQ channels.
Listeners
When creating listeners on the IBM MQ Appliance, you should configure the
listener to start and stop with the queue manager. You can set the listener by using
the CONTROL(QMGR) argument to the DEFINE LISTENER MQSC command (see DEFINE
LISTENER in the IBM MQ documentation). Alternatively, you can set the control
property in the listener widget in the IBM MQ Console (see “Working with
listeners” on page 215).
Even if you leave the control property of a listener set to manual, note that it will
automatically stop when the queue manager stops on the appliance.
24 IBM MQ Appliance
Channels
The default client channel definition table (CCDT) for a queue manager is not
automatically available on the IBM MQ Appliance. Use the rcrmqobj command to
generate a CCDT file for a queue manager. The generated CCDT file can be
downloaded from the appliance from the mqbackup:// URI (see “Creating and
downloading a CCDT file” on page 251).
For more information about client channel definition tables see Client channel
definition table in the IBM MQ documentation.
XA transactions
Queue managers on an IBM MQ Appliance cannot act as XA transaction managers.
See “High availability” on page 6 for an overview of the high availability solution.
When you plan a high availability implementation, consider the following points:
v Appliances:
– A high availability group requires two IBM MQ Appliances.
– Both appliances should be running the same level of appliance firmware.
(Appliances can operate at different levels to allow time to upgrade the
appliances separately, but you should avoid configuring HA queue managers,
including adding or removing queue managers, during this period.)
– You can run queue managers on both appliances (there is no concept of an
'active' and a 'standby' appliance).
– An appliance can run high availability queue managers or disaster recovery
queue managers, and queue managers that do not belong to either group. You
can also run high availability queue managers that belong to disaster recovery
configurations.
– An appliance can belong to only one HA group.
– You can create the HA group from either of the appliances.
– The date and time settings must be sychronized between the two appliances.
You can achieve this by configuring both appliances to use the same NTP
server (see “Configuring the locale, date, and time” on page 139).
v Queue managers:
– You specify that a queue manager belongs to an HA group when you create
the queue manager.
– You can create an HA queue manager on either of the two appliances in the
HA group.
Chapter 2. Planning 25
– The appliance that you create the queue manager on is the preferred
appliance for that queue manager. The queue manager runs on its preferred
appliance so long as that appliance is available.
– A queue manager that belongs to a high availability group can also be set to
belong to a disaster recovery configuration.
– You can specify a floating IP address for individual HA queue managers.
Applications can use the floating IP address to connect to a queue manager
regardless of which appliance it is actually running on. You specify an
interface name to connect on when you create the floating IP address (for
example eth22). That interface must be a physical interface configured with a
static IP address on both appliances.
v Physical configuration:
– The appliances in the HA group synchronize by replicating queue manager
data across a 10 Gb Ethernet link. Use the eth21 interface for the replication
link.
– The appliances in the HA group are also connected by a primary and a
secondary interface that both use 1 Gb Ethernet links. These interfaces are
used to monitor the presence of the other appliance in the group and detect a
failover situation. Use the eth13 interface for the primary link, and the eth17
interface for the secondary link.
– For the best performance of synchronization and failover, the two appliances
need to be as physically close as possible, ensuring short connecting cable
lengths. However, the two appliances should not be in the same rack, in case
the rack fails.
– If you connect the two appliances by using a network switch, you should use
a separate switch for each of the three connections.
– If you locate the two appliances in different data centers, you should be
aware the limitations outlined in “Network requirements for high
availability” on page 27.
26 IBM MQ Appliance
Figure 3. Example HA group
Note: High availability must use the dedicated network interfaces described here
for communication between the appliances (eth13, eth17 and eth21). You cannot set
up a VLAN or link aggregation interface definition on the appliance in place of
these named interfaces. (You can configure a VLAN on network switches, if
required.)
It is recommended that you locate the appliances in a high availability pair in the
same data center (preferably in adjacent racks).
If you choose to locate the appliance in different data centers, you must be aware
of the following limitations:
v Performance degrades rapidly with increasing latency between data centers.
Although IBM will support a latency of up to 10 ms, you might find that your
application performance cannot tolerate more than 1 to 2 ms of latency.
v You must configure the primary and secondary Ethernet interfaces used for HA
across completely redundant links (that is, do not rely on shared networking
hardware, cabling, or power supplies for these connections). It is recommended
that the replication interface is connected over a third redundant link.
v The links must have sufficient dedicated bandwidth with no contention.
v The data sent across the replication link is not subject to any additional
encryption beyond that which might be in place from using MQ AMS.
v Be aware that if you lose the network connections between the two appliances, a
partitioned situation can arise where the same queue manager continues to run
on each appliance and each instance has a different set of queue manager data.
Chapter 2. Planning 27
When the connection is restored you must take action to specify which set of
data you want to preserve, and which you want to discard. (This is sometimes
called a 'split-brain' situation).
Use ping to test that you can connect to the other appliance in a high availability
pair:
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type the following command to test your connection:
ping remote_IP_address
Use traceroute to test the connection, reporting the addresses of any hosts used to
make the connection, and the latency of the connection:
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type the following command to test your connection:
traceroute remote_IP_address
Because of the load it imposes on the network, do not use this command too often
during typical operations.
When you plan a disaster recovery implementation, consider the following points:
28 IBM MQ Appliance
v Appliances:
– A disaster recovery configuration requires two IBM MQ Appliances.
– Both appliances should be running the same level of appliance firmware.
(Appliances can operate at different levels to allow time to upgrade the
appliances separately, but you should avoid configuring DR queue managers
during this period.)
– You run a queue manager on the main appliance, with a back-up of that
queue manager ready to run on the recovery appliance.
v Queue managers:
– You specify that an existing queue manager is to be part of a disaster
recovery configuration on the main appliance. You then run a command on
the recovery appliance to create a secondary instance of that queue manager.
– A queue manager can belong to a high availability group, and also belong to
a disaster recovery configuration (see “Disaster recovery for a high
availability configuration” on page 9).
– If an event occurs that interrupts the operation of the main appliance, you can
start the queue manager on the recovery appliance.
– Messaging data is replicated asynchronously between primary and secondary
queue manager. When the secondary queue manager starts, some of the
messaging data might be lost (because it has not been replicated before the
main appliance failed).
v Physical configuration:
– The appliances in a disaster recovery configuration synchronize by
transferring queue manager data across a 10 Gb Ethernet link.
v Security
– The link that is used to replicate queue manager data between the appliances
is not subject to any secure encryption at the appliance level. As it is likely
these connections will be wide area network connections that leave your
secure enterprise network, it is important to make appropriate arrangements
to encrypt these connections externally to the IBM MQ Appliance, for
example, by using a hardware or software Virtual LAN product.
Note: Disaster recovery must use the dedicated network interface described here
for communication between the appliances (eth20). You cannot set up a VLAN or
link aggregation interface definition on the appliance in place of this named
interface. (You can configure a VLAN on network switches, if required.)
Network requirements for disaster recovery
v The replication link between the two appliances must use the eth20 10
Gb Ethernet interface.
v The data sent across the replication link is not subject to any additional
encryption beyond that which might be in place from using MQ AMS.
v The maximum latency for the replication link is 100 ms.
v If the IP addresses used for the two eth20 ports do not belong to the
same subnet (with that subnet used only for the disaster recovery
configuration) then you must set up an IP route between the eth20 ports
on each appliance.
Chapter 2. Planning 29
v It is recommended that the remaining 10 Gb Ethernet interfaces are used
for application traffic (eth22 and eth23 on an M2001 appliance are
intended for application traffic).
The network connections are situated on the front of an IBM MQ Appliance. The
location of the network connections is shown in the following illustration.
You can configure each of the interfaces when you run the installation wizard for
the appliance. Alternatively, you can configure them by using the CLI or the IBM
MQ Appliance web UI (see “Configuring the appliance” on page 119).
30 IBM MQ Appliance
Aggregate linking and configuration for VLANs is supported for connections,
except where the connections are used in a high availability or disaster recovery
configuration.
You must use the mgt0 interface on the appliance for your IPMI connection. You
can dedicate mgt0 to IPMI, or you can share the mgt0 connection (for example,
with administration interfaces). If you share the connection, IPMI requires the
allocation of a second IP address in the same VLAN and subnet as the mgt0
interface.
Because of the nature of IPMI and the level of control that can be obtained over
the IBM MQ Appliance that uses this interface, either connect mgt0 to a secure
management network, or do not connect it at all.
Administration
You can administer the appliance by using a command line interface (connecting
via SSH) or a web user interface. You can restrict these interfaces either to mgt0 or
mgt1 to create a restricted management network.
High availability
If you are implementing a high availability (HA) configuration, note that the
following connections are dedicated to HA:
v eth13 - primary link
v eth17 - secondary link
v eth21 - replication link
Ideally, you should have a dedicated subnet for each of the HA interfaces. The
following table shows a set up for two appliances in an HA configuration, named
quirinus and romulus, using IPv4 addresses and Class C private networks for each
connection:
Table 5. Example HA configuration
Interface quirinus romulus
eth13 192.168.13.149 192.168.13.150
eth17 192.168.17.149 192.168.17.150
eth21 192.168.21.149 192.168.21.150
Chapter 2. Planning 31
Disaster recovery
If you are implementing a disaster recovery (DR) configuration, note that eth20 is
dedicated to replication for DR. The eth20 interface on each appliance in the DR
configuration can be in a different subnet, although the subnets should be
dedicated to DR replication.
Naming interfaces
The IBM MQ Appliance enables you to specify a host alias for a specific IP address
that is assigned to a network interface. You can use this alias to reference the
interface, rather than explicitly using the IP address. Using aliases makes it easier
to copy a configuration to another appliance, or migrate between environments,
without making extensive changes to accommodate different IP addresses.
For example, the following table shows interfaces that are defined and host aliases
allocated. In this example, the data connection has the host alias “data-int”; you
can use this host alias in IBM MQ commands instead of explicitly referencing the
IP address 10.61.121.5. The following example shows the command that is used to
create a listener and bind it to the data interface:
define listener(CHA2L) trptype(TCP) control(QMGR) IPADDR(data-int)
If you then start the listener and display the status, you can see that “data-int” was
resolved to IP address 10.61.121.5:
start listener(CHA2L)
display lsstatus(CHA2L)
AMQ8631: Display listener status details.
LISTENER(CHA2L) STATUS(RUNNING)
PID(43918) STARTDA(2016-05-04)
STARTTI(09.31.56) DESCR( )
TRPTYPE(TCP) CONTROL(QMGR)
IPADDR(10.61.121.5) PORT(1414)
BACKLOG(100)
32 IBM MQ Appliance
For more information about defining host aliases, see “Host Alias commands” on
page 695.
Table 6.
Interface IP address Comment Host alias
eth10 10.61.121.5/24 Used for IBM MQ data-int: 10.61.121.5
data
eth11 10.161.121.5/25 Used for logging log-int: 10.161.121.5
eth13 192.168.121.5/29 Used for HA Primary hap-int: 192.168.121.5
eth17 192.168.122.5/29 Used for HA has-int: 192.168.122.5
Secondary
eth21 192.168.123.5/29 Used for replication har-int: 192.168.123.5
Data connections
You must configure one or more Ethernet connections for the IBM MQ data
handled by the appliance. You can use link aggregation to improve the resilience
and bandwidth of your data connection.
The M2001 appliance has two 10 Gb connections, eth22 and eth23, that are not
used for HA or DR. You can aggregate these two links together to act as a single
data interface.
Example
The following table shows the network configuration of an example appliance. The
appliance is part of an HA group, and also supports disaster recovery for queue
managers. IBM MQ data is carried on link aggregated 10 Gb connections, logging
data is sent to link aggregated 1 Gb connections.
Table 7. Example network configuration for M2001 appliance
Interface Used for
mgt0 Web UI and IPMI
mgt1 Command line access (SSH)
eth10 Not used
eth11 Not used
eth12 Link aggregated 1 Gb interface for logging data
eth13 HA primary group interface
eth14 Not used
eth15 Not used
eth16 Link aggregated 1 Gb interface for logging data
eth17 HA group alternative interface
eth20 DR replication link
eth21 HA replication interface
eth22 Link aggregated 10 Gb data interface
eth23 Link aggregated 10 Gb data interface
Chapter 2. Planning 33
Network configuration guidance
You can configure your own network connections on the IBM MQ Appliance using
this guidance to help.
One of the advantages of the appliance is that all the administration tasks can be
carried out by a single appliance administrator. This guidance helps you to set up
networking on the appliance even if you are not yourself a networking expert.
When you install firmware on your appliance for the first time, you can set up one
management interface and a default gateway as part of the running the installation
wizard, which is enough to set up connectivity with the outside world. You might
well require a more sophisticated network configuration, however, and as the
appliance has many network interfaces, you need to plan before you configure
additional interfaces. You need to consider the following points:
v What is the topology of the network that you are connecting to?
– Do you have a dedicated management subnet?
– Do your brokers need to connect to multiple subnets?
v What is the motivation for configuring multiple appliance connections?
(performance, redundancy, or security are possible reasons)
You can use the show route command to display the information currently
available to the appliance in making these decisions. The show route command
shows the appliance routing table. The table includes static and default routes from
appliance interface configurations.
34 IBM MQ Appliance
Configure HA and DR connections into separate, dedicated subnets, or define
static routes
Put direct HA and DR connections into separate, dedicated subnets. Giving
each direct connection its own subnet will completely remove any potential
issues for clashes. Such connections do not need gateways or routers of
any kind, since all traffic on these direct connections will be peer-to-peer
within that subnet.
If you are not using direct cable connections for your HA or DR interfaces,
you should still use discrete dedicated subnets for each connection (this is
most likely to be true for your DR connection, which would usually be at a
different site rather than physically nearby as for HA systems).
Chapter 2. Planning 35
If you cannot configure dedicated subnets, define static routes for your HA
and DR connections.
36 IBM MQ Appliance
Consider defining separate static routes to hosts or subnets for specific MQ and
appliance management traffic
For example, if you know that all of your management traffic should be
coming to and from 192.168 (private network) addresses, define static
routes on mgt0 and/or mgt1 to ensure that traffic with these systems takes
a known route and does not interfere with other (for example, application)
traffic.
Chapter 2. Planning 37
Planning SAN storage
38 IBM MQ Appliance
You can configure an IBM MQ queue manager to use a storage area network
(SAN) for queue manager data.
By default, queue managers use the built-in RAID storage on the appliance. You
can specify that a non-high availability queue manager stores all its data on SAN
storage if you require enhanced capacity, speed, and resilience. The appliance has a
fibre channel interface for connection to the SAN.
You must first configure your appliance to use the SAN. You can then specify that
a queue manager uses SAN-storage when you create it on the appliance.
You must configure your SAN to provide one or more dedicated partitions for
appliance use. Each queue manager uses a separate storage end point, conceptually
a separate disk or device. SAN storage does not provide support for shared storage
(for example, multi-instance queue managers).
The appliance supports access to a switched SAN fabric accessed by using fibre
channel host bus adapters. You must configure your SAN so that each queue
manager uses a separate, dedicated LUN. Ensure that your storage network is
zoned so that only the appliance using a particular volume can access the LUN in
normal operations. In a disaster recovery scenario, it might be appropriate for
multiple appliances to have access to a single LUN, although only one appliance
has the volume active (enabled) at any given time.
Ensure administrative access to the data stored on SAN volumes is controlled and
audited appropriately.
Queue manager data is not encrypted by the appliance, so you must take steps to
secure your SAN storage independently. Volumes configured for appliance use are
used to store sensitive information, including certificates and password files
relating to the queue manager.
Capacity planning
There is no architectural limit on the IBM MQ Appliance as to the number of
queue managers which can be hosted on a single appliance. However, there are
some guidelines to upper limits based on the capacity of the appliance hardware
and IBM tested configurations.
v For stand-alone queue managers, observe a maximum of 60 queue managers on
a single appliance.
v For queue managers configured for high availability or disaster recovery (or
both), observe a maximum of 30 queue manager per HA or DR pair of
appliances.
v For an appliance hosting a mixture of HA or DR queue managers, and
stand-alone queue managers, estimate the maximum by assuming that HA/DR
queue managers consume approximately twice the resources that stand-alone
queue managers consume. For example, you could plan a system with a
maximum capacity of 40 stand-alone queue managers and ten HA queue
managers.
v You must allocate disk storage to each queue manager from your available
storage when you create the queue manager. An HA or DR queue manager
requires twice the storage of a stand-alone queue manager.
These guidelines assume relatively light loading on each queue manager. For
heavily loaded queue managers you might not achieve acceptable performance in
Chapter 2. Planning 39
practice at these levels of co-tenancy. One heavily loaded queue manager is capable
of consuming all resources in the system, dependent on your configuration. For
more information on this, and other performance and capacity characteristics, refer
to the appliance performance report documents:
v IBM MQ Appliance Performance Report
v IBM MQ Appliance HA/DR Performance Report
Security planning
Security planning involves thinking about administrative access to the appliance
itself, and thinking about implementing security for IBM MQ messaging.
User security
There are two types of user on the IBM MQ Appliance: appliance users, and
messaging users. Appliance users are users that can administer the appliance and
IBM MQ resources. Messaging users are users that can perform operations on
messaging resources.
Messaging users are defined using IBM MQ commands. You can use role based
management delegate the IBM MQ authority checks from an appliance user to a
matching messaging user. This means that you can effectively have a single user
ID to cover both functions.
For more information about role based management, see “Role based
management” on page 344.
For more information about messaging users, see “Administering messaging users”
on page 245.
Form more information about how users are authorized to use different resources,
see “User authorization, credential mapping, and access profiles” on page 332.
For examples of how to set up different users on your appliance to access different
resources, see “Configuring user access to the IBM MQ Console and the CLI” on
page 156.
The appliance supports the Transport Layer Security (TLS) protocol to provide link
level security for message channels and MQI channels. The appliance supports the
same levels of TLS as IBM MQ, although the implementation details are different.
For more information about TLS in IBM MQ, see SSL and TLS security protocols in
the IBM MQ documentation.
40 IBM MQ Appliance
For more information about how the appliance implements TLS, see “TLS
certificate management” on page 389.
If you require a higher level of security for sensitive data flowing through the IBM
MQ, you can implement IBM MQ Advanced Message Security on the appliance.
Under AMS, certificates are distributed to IBM MQ clients, and the clients then
encrypt and decrypt data at the application. Use of AMS guarantees that message
data has not been modified between when it is originally placed on a queue and
when it is retrieved. In addition, AMS verifies that a sender of message data is
authorized to place signed messages on a target queue.
MCA interceptor
If you are unable to configure some or all of your IBM MQ clients to
encrypt and decrypt data at the application, you can use an AMS MCA
interceptor to give some of the benefits of AMS without making changes to
the client. Using an MCA interceptor, data is encrypted/decrypted as it
enters or leaves the queue manager or queue manager network by the
channel itself, and therefore only users/applications with access to the
appropriate certificates can decrypt data as stored internally to the queue
manager. Use this mechanism where managing the encryption at the
endpoint is not an option. Only client applications that cannot manage
encryption should connect on interceptor-enabled channels.
Use of the MCA interceptor can give you increased protection against users
without physical access to the appliance, including any appliance
administrative users who do not have access to the mqcli command. The
intercept can thus give increased protection against 'privilege escalation'
style attacks from other users.
Use of the MCA interceptor should not, however, be regarded as
equivalent to full end-to-end encryption using client-side certificates, or (on
platforms where available) full disk encryption. The certificates that are
used to encrypt or sign messages are stored on the appliance disks,
alongside the actual queue manager data. This storage means that
administrators who have access to the mqcli command on the appliance
can request that a copy of this certificate store is exported from the system.
Also, anyone with physical access to the appliance could potentially
remove the disks and access the certificate store by installing the disks in
another system. You should bear these limitations in mind when planning
to use MCA intercepts.
Chapter 2. Planning 41
42 IBM MQ Appliance
Chapter 3. Installing
Plan for your installation, install, and verify the installation of the IBM MQ
Appliance.
Installation demonstration
Safety
Before you install this product, read the Safety Information.
Arabic
Brazilian Portuguese
Antes de instalar este produto, leia as Informações de Segurança.
Chinese (simplified)
Chinese (traditional)
Croatian
Czech
Danish
Læs sikkerhedsforskrifterne, før du installerer dette produkt.
Dutch Lees voordat u dit product installeert eerst de veiligheidsvoorschriften.
Finnish
Ennen kuin asennat tämän tuotten, lue turvaohjeet kohdasta Safety
Information.
French
Avant d'installer ce produit, lisez les consignes de sécurité.
German
Vor der Installation dieses Produkts die Sicherheitshinweise lesen.
Greek
Hebrew
Hungarian
Korean
Macedonian
Norwegian
Les sikkerhetsinformasjonen (Safety Information) før du installerer dette
produktet.
Polish
Portuguese
Antes de instalar este produto, leia as Informações sobre Segurança.
Russian
Slovak
Slovenian
Pred namestitvijo tega proizvoda preberite Varnostne informacije.
Spanish
Antes de instalar este producto, lea la información seguridad.
Swedish
Läs säkerhetsinformationen innan du installerar den här produkten.
Consider the following conditions, and the safety hazards that they present:
v Electrical hazards (especially primary power). Primary voltage on the frame can
cause serious or fatal electrical shock.
v Explosive hazards, such as a damaged CRT face or a bulging capacitor.
v Mechanical hazards, such as loose or missing hardware.
Procedure
1. Make sure that the power is off and the power cords are disconnected.
2. Make sure that the exterior cover is not damaged or broken, and inspect for
any sharp edges.
3. Check the power cords:
a. Make sure that the third-wire ground connector is in good condition. Use a
meter to measure third-wire ground continuity for 0.1 ohm or less between
the external ground pin and the frame ground.
Chapter 3. Installing 45
b. Make sure that the power cords are the correct type.
c. Make sure that the insulation is not frayed or worn.
4. Check for pinched cables.
Safety statements
Safety statements are available on the included CD-ROM.
The IBM Systems: Safety Notices document is available on the CD-ROM provided
with the system.
Safety notices
These notices apply to this product.
DANGER notices warn you of conditions or procedures that can result in death or
severe personal injury. CAUTION notices warn you of conditions or procedures
that can cause personal injury that is neither lethal nor extremely hazardous.
ATTENTION notices warn you of conditions or procedures that can cause damage
to machines, equipment, or programs.
Danger notices
The following DANGER notices apply to this product.
DANGER
To prevent a possible shock from touching two surfaces with different
protective ground (earth), use one hand when possible to connect or
disconnect signal cables. (D001)
DANGER
Overloading a branch circuit is potentially a fire hazard and a shock hazard
under certain conditions. To avoid these hazards, ensure that your system
electrical requirements do not exceed branch circuit protection requirements.
Refer to the information that is provided with your device or the power
rating label for electrical specifications. (D002)
DANGER
If the receptacle has a metal shell, do not touch the shell until you complete
the voltage and grounding checks. Improper wiring or grounding might place
dangerous voltage on the metal shell. If any of the conditions are not as
described, stop. Ensure that the proper voltage or impedance conditions are
corrected before proceeding. (D003)
DANGER
An electrical outlet that is not correctly wired might place hazardous voltage
on the metal parts of the system or devices that attach to the system. The
customer is responsible to ensure that the outlet is correctly wired and
grounded to prevent an electrical shock. (D004)
DANGER
46 IBM MQ Appliance
When you work on or around the system, observe the following precautions:
To disconnect:
1. Turn off everything (unless instructed otherwise).
2. Remove the power cords from the outlets.
3. Remove the signal cables from the connectors.
4. Remove all cables from devices.
To connect:
1. Turn off everything (unless instructed otherwise).
2. Attach all cables to devices.
3. Attach the signal cables to the connectors.
4. Attach the power cords to the outlets.
5. Turn on the devices.
(D005)
Caution notices
The following caution notices apply to this product.
CAUTION:
v Do not install a unit in a rack where the internal rack ambient temperature
exceeds what the manufacturer recommends for each of your rack-mounted
devices.
v Do not install devices in a rack where the air flow is compromised. Ensure
that air flow is not blocked or reduced on any side, front, or back of a
component that is used for air flow through the unit.
v Pay attention to the connection of the equipment to the supply circuit so that
overloading of the circuits does not compromise the supply wiring or
overcurrent protection. To provide the correct power connection to a rack, refer
to the rating labels on each piece of equipment in the rack and determine the
total power requirement of the supply circuit.
Chapter 3. Installing 47
v For sliding drawers, do not pull out or install any drawer or feature if the rack
stabilizer brackets are not attached to the rack. Do not pull out more than one
drawer at a time. The rack might become unstable if you pull out more than
one drawer at a time.
v Fixed drawers must not be moved for servicing unless specified by the
manufacturer. Attempting to move the drawer partially or completely out of
the rack might cause the rack to become unstable or cause the drawer to fall
out of the rack. (R001 part 2)
CAUTION:
The battery contains lithium. To avoid possible explosion, do not burn or charge
the battery.
Do not:
v Drop or immerse into water
v Heat to more than 100° C (212° F)
v Repair or disassemble
Exchange only with the part approved by IBM. Recycle or discard the battery as
instructed by local regulations. In the United States, IBM has a process for the
collection of this battery. For information, call 1-800-426-4333. Have the IBM part
number for the battery unit available when you call. (C003)
CAUTION:
This product might contain one or more of the following devices: CD-ROM
drive, DVD-ROM drive, DVD-RAM drive, or laser module, which are Class 1
laser products. Note the following information:
v Do not remove the covers. Removing the covers of the laser product can result
in exposure to hazardous laser radiation. There are no serviceable parts inside
the device.
v Use of the controls or adjustments, or performance of procedures other than
what the instructions specify, can result in hazardous radiation exposure.
(C026)
CAUTION:
Data processing environments can contain equipment that transmits or receives
data with laser modules that operate at greater than Class 1 power levels. To
prevent permanent injury, never look into the end of an optical fiber cable or
open receptacle. (C027)
CAUTION:
The weight of this part or unit is 18 - 32 kg (39.7 - 70.5 lb). It takes two persons
to safely lift this part or unit. (C009)
48 IBM MQ Appliance
Labels
One or more of the following safety labels may apply to this product.
DANGER
Hazardous voltage, current, or energy levels are present inside. Do not open
any cover or barrier. (L001)
DANGER
Rack-mounted devices are not to be used as shelves or work spaces. (L002)
DANGER
Multiple power cords. The product might be equipped with multiple power
cords. To remove all hazardous voltages, disconnect all power cords. (L003)
The IBM MQ Appliance has the model number M2001, and the MTM 8436-55X.
Chapter 3. Installing 49
Specifications and features
This section contains information about the specifications and features of the
appliances.
Specifications
Hardware specifications for the appliance.
Hardware features
The hardware features include processor, disk space, and memory of the appliance.
The following table describes the CPU, disk space, and memory of the appliance.
Disk drive modules are serial-attached SCSI (SAS) drives.
Table 9. IBM MQ Appliance hardware features M2001
CPU Disk space Memory
Two 10-core 2.80 GHz Intel Two 3200 GB SSDs 192 GB (Twelve 1600 MHz
Xeon E5-2680V2 processors configured as RAID 1 DDR3 DIMMs)
50 IBM MQ Appliance
The system disk contains 16 GB space for system file storage.
On an M2001 model the RAID array for user storage contains 3200 GB of space.
Allocation of storage is set during appliance initialization.
Intrusion detection
There is an intrusion detection switch inside of the appliance.
M2001 model
Figure 5. Controls, connectors, and status indicators on the front of the appliance.
The labels in this figure correspond to the following components on the front of
the appliance:
▌1▐ LCD display.
▌2▐ Solid state disk drive 1.
▌3▐ Solid state disk drive 2.
▌4▐ Fault LED.
▌5▐ Locate LED.
▌6▐ Power LED.
▌7▐ Power button.
▌8▐ Two USB ports (not active).
▌9▐ Console connector.
▌10▐ mgt0 management port.
Chapter 3. Installing 51
▌11▐ mgt1 management port.
▌12▐ 1 Gb Ethernet module.
▌13▐ 10 Gb Ethernet module.
▌14▐ 16 Gb fibre channel module.
M2000 model
Figure 6. Controls, connectors, and status indicators on the front of the appliance.
The labels in this figure correspond to the following components on the front of
the appliance:
▌1▐ LCD display.
▌2▐ Hard disk drive 1.
▌3▐ Hard disk drive 2.
▌4▐ Fault LED.
▌5▐ Locate LED.
▌6▐ Power LED.
▌7▐ Power button.
▌8▐ Two USB ports (not active).
▌9▐ Console connector.
▌10▐ mgt0 management port.
▌11▐ mgt1 management port.
▌12▐ 1 Gb Ethernet module.
▌13▐ 10 Gb Ethernet module.
▌14▐ 16 Gb fibre channel module.
LCD module
The front panel has an LCD module that includes an LCD and five menu buttons.
The LCD displays the product name and the installed firmware version. The menu
buttons adjacent to the LCD are not functional.
Locate LED
The front has a locate LED to help you identify the intended appliance.
52 IBM MQ Appliance
The locate LED shows a steady blue light when activated. The LED remains on
until deactivated to help you identify the intended appliance.
From the CLI
Use the locate-device command in Global configuration mode.
v To activate, enter locate-device on.
v To deactivate, enter locate-device off.
Power button
The front of the appliance has a power button.
When the appliance is powered off, press the button to turn on the appliance.
When the appliance is powered on, press the button to start a graceful hardware
shutdown.
Console port
The front has a console port for serial communications.
The console port receives an RJ45 jack from either of the supplied serial console
cables.
For initial configuration, use one of the supplied serial cables to connect from an
ASCII terminal1 to the appliance or to connect from a PC that is running terminal
emulation software to the appliance.
Network ports
The network ports transmit and receive data communications between the
appliance and external sources.
The network ports of a IBM MQ Appliance are grouped and located by function.
Two management Ethernet ports (mgt0 and mgt1) are part of the appliance. All
other network ports are removable modules.
The 1 Gb Ethernet module contains eight ports for the RJ45 interface.
Chapter 3. Installing 53
Figure 7. M2000 model network ports
54 IBM MQ Appliance
▌4▐ 1 Gb Ethernet module, eth13
▌5▐ 1 Gb Ethernet module, eth14
- 1 Gb Ethernet module, eth15
- 1 Gb Ethernet module, eth16
▌6▐ 1 Gb Ethernet module, eth17
▌7▐ 10 Gbyte Ethernet module, eth20
▌8▐ 10 Gbyte Ethernet module, eth21
▌9▐ 10 Gbyte Ethernet module, eth22
▌10▐ 10 Gbyte Ethernet module, eth23
▌11▐ Fibre channel module port 0
▌12▐ Fibre channel module port 1
The mgt0 and mgt1 management Ethernet ports provide access to the management
interfaces of the appliance.
These ports provide remote management access to the appliance and are not to be
used as data ports. mgt0 supports IPMI over LAN (including serial over LAN).
Ethernet modules:
The left module contains eight 1 Gb Ethernet ports, and the right module contains
two or four 10 Gb Ethernet ports.
1 Gb Ethernet module
The 1 Gb Ethernet module contains eight ports for the RJ45 interface. The
Ethernet ports are placed in two rows and are numbered sequentially from
lower left to upper right. The lower row is numbered eth10 to eth13 and
the upper row is numbered eth14 to eth17. Each port has speed and
activity indicator LEDs.
Notice that the speed and activity LEDs on the lower and upper rows have
opposite orientation.
Chapter 3. Installing 55
Figure 9. 1 Gb Ethernet module with eight ports for RJ45 interface
▌1▐ eth14
▌2▐ 1 Gb Ethernet port speed LED
▌3▐ 1 Gb Ethernet port activity LED
▌4▐ eth10
Use eth13 as the HA group primary interface and eth17 as the HA group
secondary interface in a high availability pair.
4 x 10 Gb Ethernet module (M2001 models)
The 10 Gb Ethernet module has four small-form-factor pluggable (SFP+)
ports. The port designators are eth20, eth21, eth22, and eth23. SFP+ ports
support optical or electrical interfaces with the appropriate transceiver.
Figure 10. 10 Gb Ethernet module with two ports for SFP+ interface
56 IBM MQ Appliance
Fibre channel module:
The fibre channel module contains two ports, identified as port 0 and port 1. Each
port has a firmware activity (green) and port activity (yellow) light.
Chapter 3. Installing 57
The following figure shows the components at the rear of the appliance.
The fan modules and power modules are installed from the rear of the appliance.
Fan modules
There are three fan modules in the rear of the appliance.
Each fan module contains a cooling fan with an LED that indicates the status of
the module.
A single power supply module can supply the power to support appliance
operations. Each power supply module contains an LED that indicates the status of
the module.
DANGER
Multiple power cords. The product might be equipped with multiple power
cords. To remove all hazardous voltages, disconnect all power cords. (L003)
Rack requirements
Observe the rack requirements when you plan for installation.
58 IBM MQ Appliance
The appliance can fit in a standard 19 in (48.26 cm) rack with a minimum of 28 in.
(71.1 cm) of depth. When you plan for installation, observe the following
requirements for the rack:
v The appliance rails require four mounting points in the rack.
v There must be at least 30 in. (76.20 cm) of free space behind the rack frame to
remove replaceable parts.
v The ambient temperature in the operating environment and within the rack
should not exceed 95° F (35° C).
DANGER
When you work on or around the system, observe the following precautions:
To disconnect:
1. Turn off everything (unless instructed otherwise).
2. Remove the power cords from the outlets.
3. Remove the signal cables from the connectors.
4. Remove all cables from devices.
To connect:
1. Turn off everything (unless instructed otherwise).
2. Attach all cables to devices.
3. Attach the signal cables to the connectors.
4. Attach the power cords to the outlets.
5. Turn on the devices.
(D005)
Chapter 3. Installing 59
CAUTION:
v Do not install a unit in a rack where the internal rack ambient temperature
exceeds what the manufacturer recommends for each of your rack-mounted
devices.
v Do not install devices in a rack where the air flow is compromised. Ensure
that air flow is not blocked or reduced on any side, front, or back of a
component that is used for air flow through the unit.
v Pay attention to the connection of the equipment to the supply circuit so that
overloading of the circuits does not compromise the supply wiring or
overcurrent protection. To provide the correct power connection to a rack, refer
to the rating labels on each piece of equipment in the rack and determine the
total power requirement of the supply circuit.
v For sliding drawers, do not pull out or install any drawer or feature if the rack
stabilizer brackets are not attached to the rack. Do not pull out more than one
drawer at a time. The rack might become unstable if you pull out more than
one drawer at a time.
v Fixed drawers must not be moved for servicing unless specified by the
manufacturer. Attempting to move the drawer partially or completely out of
the rack might cause the rack to become unstable or cause the drawer to fall
out of the rack. (R001 part 2)
Tool requirements
You need the following tools and hardware to install the appliance rack-mounting
kit.
v A medium Phillips screwdriver
v Two (2) standard rack screws
You need at least two (2) and up to 12 network cables to connect the appliance to
your network.
The rails for the appliance are for a 19 in. (48.26 cm) rack. A complete rail kit is
required to install the appliance. If any item is missing, contact IBM support.
Note: When you install a 2U appliance, be sure to install the slide rails in the
bottom of the 2U area in the rack.
60 IBM MQ Appliance
Procedure
1. Open the front rail latches, as shown in the following figure.
Notice that each slide rail is marked with an R (right) or an L (left) to indicate
on which side of the rack it will be installed. R and L are determined as you
face the rack opening with the front portion nearest you.
a. Select one of the slide rails and push up on the front moveable tab ▌1▐;
then, pull out the front latch ▌2▐.
b. If a thumbscrew is installed in the slide rail ▌3▐, remove it.
2. Install the rear end of the slide rails into the rack, as shown in the following
figure.
a. From the front of the rack, line up the two pins on the rear of the slide rail
with the corresponding holes at the selected location at the rear of the rack.
b. Push the rails so that the pins go through the holes ▌1▐, and the top pin
seats into place ▌2▐.
3. Install the front end of the rails, as shown in the following figure.
Chapter 3. Installing 61
Figure 17. Install the front end of the slide rails.
a. Guide the front latch around the appropriate hole and pull the slide rail
forward to fit the pins through the front of the rack.
b. Rotate the front moveable tab ▌1▐ to the downward position so that the
teeth engage with the front latch.
c. Push the front latch ▌2▐ in as far as it will go.
4. Repeat steps 1 through 3 to install the other rail into the rack. Make sure that
each front latch is fully engaged.
5. Install a 10-32 screw in the rear of right rail, as shown in the following figure.
62 IBM MQ Appliance
Figure 19. Securing the appliance in the rack
CAUTION:
The weight of this part or unit is 18 - 32 kg (39.7 - 70.5 lb). It takes two persons
to safely lift this part or unit. (C009)
DANGER
Rack-mounted devices are not to be used as shelves or work spaces. (L002)
Procedure
1. Pull the slide rail forward ▌1▐.
2. Use two people to carefully lift the appliance from the lifting points ▌2▐ and tilt
it into position over the slide rails so that the rear nail heads ▌3▐ on the
appliance line up with the rear slots ▌4▐ on the slide rails.
3. Slide the appliance down until the rear nail heads slip into the two rear slots,
and then slowly lower the front of the appliance ▌5▐ until the other nail heads
slip into the other slots on the slide rails.
4. Make sure that the front latch ▌6▐ slides over the nail heads.
5. Next, slide the appliance into the rack.
If the appliance is locked into place, slide the appliance toward you.
The following figure shows the numbered components that are mentioned in the
steps.
Chapter 3. Installing 63
Figure 20. Sliding the appliance into the rack.
Procedure
1. Secure the brackets to the appliance with the captive screws ▌1▐.
2. Slide the appliance into the rack ▌2▐.
DANGER
Overloading a branch circuit is potentially a fire hazard and a shock hazard
under certain conditions. To avoid these hazards, ensure that your system
electrical requirements do not exceed branch circuit protection requirements.
Refer to the information that is provided with your device or the power
rating label for electrical specifications. (D002)
DANGER
If the receptacle has a metal shell, do not touch the shell until you complete
the voltage and grounding checks. Improper wiring or grounding might place
dangerous voltage on the metal shell. If any of the conditions are not as
described, stop. Ensure that the proper voltage or impedance conditions are
corrected before proceeding. (D003)
DANGER
An electrical outlet that is not correctly wired might place hazardous voltage
on the metal parts of the system or devices that attach to the system. The
customer is responsible to ensure that the outlet is correctly wired and
grounded to prevent an electrical shock. (D004)
You must use the provided power cords to connect both power supply modules to
an AC power source. An unconnected module is considered by the system to be in
a failed state.
64 IBM MQ Appliance
Connect the appliance to a network
Considerations for when you connect the appliance to a network.
DANGER
To prevent a possible shock from touching two surfaces with different
protective ground (earth), use one hand when possible to connect or
disconnect signal cables. (D001)
CAUTION:
Data processing environments can contain equipment that transmits or receives
data with laser modules that operate at greater than Class 1 power levels. To
prevent permanent injury, never look into the end of an optical fiber cable or
open receptacle. (C027)
Do not use a fiber optic cable that is longer than 100 meters. The cables for
small-form factor pluggable (SFP+) modules can be longer than 100 meters. See the
product documentation for detailed information on SFP+ modules.
The appliance is provided with the following cables, which can be used to connect
the two appliances in a high availability pair:
v Two Cat5e cables that can be used to connect ports eth13 and eth17 on one
appliance to ports eth13 and eth17 on the other appliance in an HA pair.
Chapter 3. Installing 65
v One Direct Attach Copper cable with SFP+ connectors that can be used to
connect port eth21 on one appliance to port eth21 on the other appliance in an
HA pair.
Procedure
1. Read the hardware and information requirements, and read the considerations
for the operation modes and the password for the admin account. (see
“Considerations for the password of the admin account” on page 67 and
“Appliance modes” on page 67)
2. Connect the serial cable to the appliance.
3. Initialize the appliance by changing the password for the admin account and
interactively defining the base configuration.
4. Accept the license agreement and verify the base configuration.
Configuration requirements
You must meet both hardware and information requirements to perform the initial
firmware configuration.
Before you begin the initial firmware configuration, make sure that you meet the
following requirements:
v You review and comply with the hardware requirements.
v You obtain the required network data.
Hardware requirement
You must use a serial connection to perform the initial configuration.
The package contains a USB serial console cable (USB to RJ45) and a DE-9 serial
console cable (DE-9 to RJ45). For initial configuration, use a supplied cable to
connect from an ASCII terminal to the appliance or to connect from a PC that is
running terminal emulation software to the appliance.
Information requirements
Before you define the base configuration, obtain the essential network data from
your network administrator.
Tip:
v The IBM MQ Appliance web UI is required to accept the license agreement.
66 IBM MQ Appliance
v If you want to use an IPMI connection (including serial over LAN), it must be
configured on mgt0.
Firmware considerations
During the initial firmware configuration, the script prompts you for supported
operational modes and the password for the admin account.
Attention: Do not forget or misplace the password for the admin account. If you
forget or misplace this password, security best practice recommends that you
return the appliance to IBM to reset this password. However, if another user
account can log in and has the appropriate access permission, that user can reset
the password for the admin account. You can define additional administrative
accounts, see Configuring appliance users in IBM Knowledge Center.
When you receive the appliance after a password-reset, you must perform an
initial firmware setup that removes all existing configuration data from the
appliance.
Appliance modes
You must confirm which mode your IBM MQ Appliance appliance operates in.
Depending on the product license purchased, the IBM MQ Appliance can operate
in one of two modes:
v IBM MQ Appliance M2001A (or ) is aimed at larger enterprise workloads.
v IBM MQ Appliance M2001B (or ) is designed to meet the needs for smaller
workloads and offers a lower processing capability.
You can verify in IBM Passport advantage which product license you have
purchased for your appliance.
The first time that you power on the IBM MQ Appliance, you are asked to confirm
which license you have purchased. The appropriate appliance is then applied.
Please take care when making this choice. If you accidentally configure this setting
incorrectly, you must apply a factory reset to the appliance (see Factory reset) or
contact IBM Support.
Once configured you will not be asked again as the appliance mode has now been
selected. The mode is indicated in the LCD panel on the front of the appliance and
the welcome banner when logging in to the IBM MQ Appliance CLI.
Chapter 3. Installing 67
If you later require more capacity, you can purchase an upgrade to convert an
M2001B (or ) appliance to an M2001B+ (or ) appliance, which has the same
capacity as an M2001A (or ) appliance.
Upgrading from an M2001B to M2001B+ (or ) does not require a factory reset or
loss of queue manager data, but does require a reboot of the appliance for the
update to take effect. Full instructions for this process are supplied on purchase of
the upgrade part through passport advantage.
For initial configuration, you must connect to the appliance console port from an
ASCII terminal, or a computer that is running terminal emulation software.
The DE-9 (sometimes called DB-9) serial console cable connects a 9-pin socket to an
8-position modular plug (RJ45). The cable conforms to the EIA/TIA-574 standard
as data circuit-terminating equipment (DCE).
If your PC does not recognize the USB serial console cable, you might need to
install a device driver. Standard drivers with installation instructions are on the
Resource Kit in an archive file.
v The driver for Windows systems is in the driver/win/ directory.
v The drivers for Mac OS systems are in the driver/mac/ directory.
Notes:
v Do not connect an Ethernet network cable to the appliance serial console port.
v Do not connect a digital or analog Telephone network cable to the appliance
serial console port.
DANGER
To prevent a possible shock from touching two surfaces with different
protective ground (earth), use one hand when possible to connect or
disconnect signal cables. (D001)
Procedure
1. Use the appropriate cable to connect from an ASCII terminal or PC that is
running terminal emulation software to the appliance.
2. Ensure that the terminal or PC software is configured for standard, 115200,
8N12, and no flow control data transfer.
2. 8N1 is a notation for a serial configuration in asynchronous mode, where there are eight data bits, no (N) parity bit, and one stop
bit.
68 IBM MQ Appliance
What to do next
Procedure
1. Press the power button at the front of the appliance. The green power LED
illuminates.
v You might hear the fans start.
v You might hear the fans change speed as the screen displays DPOS boot -
press <ESC> within 7 seconds for boot options...
Wait for the appliance to boot.
2. At the Login: prompt, enter admin3.
3. At the Password: prompt, enter admin4. The script prompts you later to change
this password.
4. Follow the prompts to enable the appropriate appliance mode. Select M2001A
or M2001B (or ) according to your license (see “Appliance modes” on page 67).
Attention: Use care when you select the operational modes. If you select an
incorrect mode, the only way to change an operational mode is to reinitialize
the appliance, which deletes all configuration settings on the appliance.
5. At the Please enter new password: prompt, enter a new password.
v Ensure that your keyboard does not have Caps Lock or Number Lock
engaged.
v Type the password from the keyboard. Do not copy and paste the password.
If you copy and paste, you might copy extra spaces or characters.
6. At the Please re-enter new password to confirm: prompt, enter the new
password again.
7. At the Do you want to run the Installation Wizard? prompt, enter y to start
the installation wizard.
Note: If you inadvertently enter n at the prompt, you can start the installation
wizard by entering the following commands:
configure terminal
startup
8. Follow the prompts to complete the base firmware configuration. You should
configure the following features at the minimum:
v At least one network interface for remote management.
v The SSH service.
3. admin is the name of a local user account. The owner of this account can perform all tasks on the appliance.
4. admin is the default password for the admin account.
Chapter 3. Installing 69
v The web management service. If this is not configured, you cannot accept the
license agreement, and will be able to take no further actions on the
appliance.
v The name for the system. This is mandatory if you are configuring the
appliance as one of a high availability pair, or part of a disaster recovery
configuration.
After you define the base firmware configuration, the screen displays
information that is similar to the following example. The screen shows
information specific to your appliance.
Welcome to IBM MQ appliance M2001A console configuration.
Copyright IBM Corporation 1999-2015
You must read and agree to the terms of the license agreement using the WebGUI.
If you did not configure the Web Management Interface, you must do it now with
the following command:
configure terminal;web-mgmt;admin-state enabled;local-address 0 9090;exit
mqa#
What to do next
You can discover the IP address by using the command show ipaddress on the
command line.
70 IBM MQ Appliance
Procedure
1. Open a web browser.
2. In the Address field, enter https://10.10.13.35:9090. If the web page is
displayed successfully, the base firmware configuration is successful.
3. Log in to the appliance with the local administrator account and password.
4. Click Login. The IBM MQ Appliance web UI displays the license agreement.
v Click I agree to accept the terms of the license agreement and non-IBM
terms. The appliance reloads the firmware. In a few minutes, you can log in
again after the appliance restarts.
v If you do not agree, click I do not agree. The initialization of the appliance
stops. You need to either power off the appliance or review and accept the
license agreement.
5. Log in again to verify that the admin account and other administrators can
access the appliance with their credentials.
What to do next
To access the information about completing the configuration beyond the base
configuration, such as creating additional users and groups, configuring interfaces,
setting up high availability and so on, see Configuring in IBM Knowledge Center.
Maintenance
Topics in this section describe general fault finding and maintenance of the
appliance.
Before you perform maintenance on this product, read the safety information.
Use the indication of LEDs, test hardware command, diagnostic self-test, and
status providers for the sensors to diagnose problems with the appliance and
modules.
Appliance LEDs
LEDs help you diagnose possible problems with the hardware components of an
appliance.
You can use the following LEDs to determine the behavior and diagnose a problem
with the appliance and components:
v Fault LED, locate LED, and power LED at the front of the appliance.
v Activity and speed LEDs of Ethernet modules.
v Activity LEDs of hard disk drive modules.
v LEDs of fan modules.
v LEDs of power supply modules.
Chapter 3. Installing 71
LEDs on the front of the appliance:
The labels in this figure correspond to the following LEDs on the front of the
appliance:
▌1▐ Fault LED.
This indicator shows steady amber light when the appliance detects a
critical hardware event.
▌2▐ Locate LED.
This indicator shows steady blue light when activated.
▌3▐ Power LED.
This indicator shows green steady light when the power is connected and
the appliance is turned on.
▌4▐ 1 Gb Ethernet port speed LED
Green steady light indicates a 1 Gb Ethernet connection.
Amber steady light indicates a 10 or 100 Mbps connection.
▌5▐ 1 Gb Ethernet port activity LED
Green steady light indicates when the port is connected.
Green flashing light corresponds to port activity.
▌6▐ Hard disk drive activity LED
Green steady light is present when the module is inserted fully.
Green flashing light corresponds to the reading or writing of data on
the disk.
▌7▐ 10 Gb Ethernet port speed LED
Green steady light indicates a 1 Gb Ethernet connection.
Amber steady light indicates a 10 Gb Ethernet connection.
▌8▐ 10 Gb Ethernet port activity LED
Green steady light indicates when the Ethernet port is connected.
Green flashing light corresponds to port activity.
▌9▐ 16 Gb fibre channel port activity LED
Yellow - two fast flashes indicates a 4 Gbps link rate.
72 IBM MQ Appliance
Yellow - three fast flashes indicates a 8 Gbps link rate.
Yellow - four fast flashes indicates a 16 Gbps link rate.
▌10▐ 16 Gb fibre channel firmware activity LED
Green steady light indicates when the link is active.
The labels in this figure correspond to the following LEDs on the front of the
appliance:
▌1▐ Fault LED.
This indicator shows steady amber light when the appliance detects a
critical hardware event.
▌2▐ Locate LED.
This indicator shows steady blue light when activated.
▌3▐ Power LED.
This indicator shows green steady light when the power is connected and
the appliance is turned on.
▌4▐ 1 Gb Ethernet port speed LED
Green steady light indicates a 1 Gb Ethernet connection.
Amber steady light indicates a 10 or 100 Mbps connection.
▌5▐ 1 Gb Ethernet port activity LED
Green steady light indicates when the port is connected.
Green flashing light corresponds to port activity.
▌6▐ Solid state disk drive activity LED
Green steady light is present when the module is inserted fully.
Green flashing light corresponds to the reading or writing of data on
the disk.
▌7▐ 10 Gb Ethernet port speed LED
Green steady light indicates a 1 Gb Ethernet connection.
Amber steady light indicates a 10 Gb Ethernet connection.
▌8▐ 16 Gb fibre channel port activity LED
Yellow - two fast flashes indicates a 4 Gbps link rate.
Yellow - three fast flashes indicates a 8 Gbps link rate.
Yellow - four fast flashes indicates a 16 Gbps link rate.
Chapter 3. Installing 73
▌9▐ 16 Gb fibre channel firmware activity LED
Green steady light indicates when the link is active.
The LEDs on the rear panel of the appliance provide diagnostic information about
power supply and fan modules.
The labels in this figure correspond to the following LEDs on the rear of the
appliance:
▌1▐ Fan LEDs.
v Amber single flash shows when power is first applied to the fan
module.
v Amber steady light indicates that the fan is operating at less than 1200
revolutions per minute (RPM) or there is a fault in the module.
v No illumination when there is no power present or there is no problem.
▌2▐ Power module LEDs.
v Green steady light indicates that the module is connected to a power
source.
v Red steady light indicates that the module is not functioning within
design specifications.
v If not illuminated, there is no power to the module.
To test the hardware from the configuration, enter the following commands:
# configure terminal
(config)# test hardware
74 IBM MQ Appliance
Depending on the state of the hardware, the command produces output that shows
the status of each component:
v success
v warning
v failure
The output of the test hardware command is part of any generated error report.
Chapter 3. Installing 75
About this task
Only use the diagnostic self-test when directed by IBM Support to help confirm a
potential hardware problem with the appliance.
Procedure
1. Connect the serial cable.
2. If the appliance is not turned on, press the power button to turn on the
appliance. The green power LED illuminates. You should hear the fans start.
3. When you see DPOS boot - press <ESC> within 7 seconds for boot options,
press ESC. You should see the DPOS prompt followed by the boot options menu.
DPOS boot - press <ESC> within 7 seconds for boot options.. <ESC>
DPOS> ?
Available boot options:
DPOS>
4. At the DPOS prompt, enter diagnostics to start the appliance and display the
diagnostics main menu.
Hardware Diagnostics Tool Version 1.0
(C) Copyright 2011, 2014 - IBM Corporation
Main Menu:
1. Inventory n/a
2. BMC/Sensors n/a
3. Network n/a
4. Memory n/a
5. Disks n/a
0. Exit Diagnostics
Select action>
5. To select a test to run, enter its number at the Select action prompt.
Results
After a test completes, the diagnostic self-test produces one of the following
results:
v PASS
v FAIL
v RUNNING
v SKIP
v n/a
76 IBM MQ Appliance
Fan speed sensors
Provides the measured speed in RPM for the fans in each fan module. You
can view the results of the fan speed sensors from the the CLI, enter show
sensors-fans.
Temperature sensors
Provides the measured temperature in degrees Celsius for internal
components:
v Temperature of each CPU and each DIMM of the CPU components
v Air temperature
– The System 1 sensor reads the temperature at the front of the
appliance.
– The System 2 sensor reads the temperature at the rear of the
appliance.
You can view the results of the temperature sensors from the CLI, enter
show sensors-temperature. The temperature is in degree Celsius.
Voltage sensors
Provides the measured voltage for the components in millivolts. You can
view the results of the voltage sensors from the CLI, enter show
sensors-voltage.:
Current sensors
Provides the measured current for the internal components in
milliamperes. You can view the results of the current sensors from the CLI,
enter show sensors-current.
RAID battery backup status
Monitors the power backup unit connected to the RAID controller. You can
view the RAID battery backup status from the CLI, enter show
raid-battery-module.
Other sensors
Provides Boolean values for the status of intrusion switch and power
supply modules.
v A value of true indicates that the condition exists.
v A value of false indicates that the conditions does not exist.
v For the intrusion switch, the value indicates whether it was tripped.
v For each power supply, the value indicates the condition:
– Output Failure: The power supply module failed.
– AC lost: The power cord is not attached.
v For each hard disk in the array and the battery, the values indicates the
state:
– Fault
– Present
You can view the results of the other sensors from the CLI, enter show
sensors-other.
Chapter 3. Installing 77
Troubleshooting workflow
Use this workflow to troubleshoot the problem and determine whether you need
to contact IBM Support for assistance or to order a replacement part.
Procedure
1. Did you receive a critical event through SMTP notification?
The following messages are examples of critical messages:
v [system][critic] sensors: tid(id): System power supply number has
failed.
v [system][critic] sensors-fans: tid(id): Chassis cooling fan number
operating too slowly.
For information about creating log targets for notification, see the managing
logs topic.
Yes Continue to step 3.
No Continue to step 2.
2. Does the log file contain a critical message?
For information about viewing logs, see the viewing logs topic.
Yes Continue to step 3.
No Continue to step 4.
3. Does the critical event or critical log message identify the part that is failing or
has failed?
Yes Continue troubleshooting to determine whether you need a
replacement part:
v If a fan module, see “Troubleshooting fan modules.”
v If the power supply module, see “Troubleshooting power supply
modules” on page 79
v If the hard disk drive module, see “Troubleshooting disk drive
modules” on page 79.
v If field replaceable unit (FRU) parts, contact IBM Support.
No Continue to step 4.
4. Is the Fault LED illuminated on the front of the appliance?
Yes Continue with step 5.
No The problem is with the appliance, use the appliance troubleshooting
procedure.
5. Are the LEDs lit for any modules?
Yes
If a fan module, see “Troubleshooting fan modules.”
If the power supply module, see “Troubleshooting power supply
modules” on page 79
If the hard disk drive module, see “Troubleshooting disk drive
modules” on page 79.
No The problem is with the appliance, use the appliance troubleshooting
procedure.
78 IBM MQ Appliance
About this task
When one or more fans are not working, turn off the appliance as soon as possible
to avoid overheating. The remaining fans might not be able to maintain the
appropriate environmental temperature.
Procedure
1. View sensor status.
v From the CLI, run the show sensors-fans command.
v If the output shows that all fans are running at 0 RPM, the fan module is not
seated correctly in the appliance.
v If the output shows that one or more fans are running at less than 1200 RPM,
contact IBM Support.
2. View the fan module LED.
v Amber single flash shows when power is first applied to the fan module.
v Amber steady light indicates that the fan is operating at less than 1200
revolutions per minute (RPM) or there is a fault in the module.
v No illumination when there is no power present or there is no problem.
What to do next
If the module is not seated correctly, remove and reinsert the module.
If you believe that the module must be replaced, contact IBM Support.
Procedure
1. View sensor status.
v From the CLI, run the show other-sensors command.
2. View the power supply model LED.
v Green steady light indicates that the module is connected to a power source.
v Red steady light indicates that the module is not functioning within design
specifications.
v If not illuminated, there is no power to the module.
3. Remove the power cord from the power supply module. The appliance can
operate with a single power supply module.
What to do next
If the module is not seated correctly, generally it is not locked in place. To ensure
that the module is seated, remove and reinsert the module.
If the module has no AC power, ensure that the power cords are connected to the
power supply and to a working AC power outlet.
If you believe that the module must be replaced, contact IBM Support.
Chapter 3. Installing 79
Procedure
1. View RAID status.
v From the CLI, run the show raid-physical-drive command.
If the state shows Unconfigured Bad, the hard disk drive is damaged and must
be replaced.
2. Contact IBM Support to replace the disk drive module.
When you can connect to the CLI, use the test hardware command to troubleshoot
your appliance.
When you cannot connect to the CLI, use the boot-time diagnostic self-test to
troubleshoot your appliance.
The appliance includes two of three types of replacement parts: Tier 2 customer
replaceable unit (CRU) and field replaceable unit (FRU). Following is a list of the
three types of replacement part:
Tier 1 CRU
Replacement of a Tier 1 CRU is your responsibility. If an IBM
representative installs a Tier 1 CRU at your request, you are charged for
the installation.
Tier 2 CRU
Replacement of a Tier 2 CRU can be completed by you or an IBM
representative for no charge if still under warranty. If installed by an IBM
representative after your warranty expires, you are charged for the
installation.
FRU Replacement of a FRU must be performed by an IBM representative only.
For information about the terms of warranty, see the IBM Statement of Limited
Warranty document in the Resource Kit.
80 IBM MQ Appliance
Orange can also indicate touch points on hot-swap components. See the
instructions for removing or installing a specific hot-swap component for
other procedures that you might have to complete before you remove or
install the component.
– Blue
- Blue on a component indicates touch points. You can grip touch points to
remove or install the appliance, open, or close a latch, or for other
purposes.
Attention: Static electricity can damage the chassis and other electronic devices.
To avoid damage, keep static-sensitive devices in their static-protective packages
until you are ready to install them.
Note: You might be charged for the replacement appliance or part if IBM does not
receive the defective appliance or part within a reasonable amount of time. Contact
IBM support with any questions.
Parts listing
The IBM MQ Appliance includes Tier 2 CRU parts and FRU parts.
For information about the terms of warranty, see the IBM Statement of Limited
Warranty document on the Resource Kit.
Chapter 3. Installing 81
CRU parts list - M2001:
The Ethernet modules, solid state disk drive modules, fan modules, power supply
modules, and power cords are Tier 2 CRU parts.
The following figure shows the CRU parts on the front and rear of the appliance.
82 IBM MQ Appliance
Table 10. Part numbers for the IBM MQ Appliance. (continued)
Tier 2 CRU part
Label Description number
- DE-9 to RJ45 serial console cable 46N5656
- USB to RJ45 serial console cable 97Y0517
- Rail kit to mount the appliance into the rack. 60Y0328
- Cat5e Ethernet cable x 2 01AF038
- SFP+ direct attach copper wire Ethernet cable 90Y9432
- SFP+ SR transceiver 46N5592
The following table lists the FRU parts that are in the appliance.
Table 11. FRU part numbers for the appliance
Description Part number
Shipping box 00VM076
Full MQ appliance system 01LK676
2U chassis - 8436-54X 00VM631
2U chassis - 8436-55X 00VM675
16 GB DDR3 DIMM 00VM040
16 GB eUSB flash drive 00VM049
CMOS Button Cell battery 00RY543
CPU - Intel IvyBridge E5-2680-V2 00Y2786
RAID controller card and cache module 00VM235
RAID power backup capacitor and cable 00VM236
Emulex Fibre Channel card with carrier assembly 00VM053
Power cords
When you receive your appliance, the shipping carton contains power cords for
rack mounted appliances.
To maintain warranty or service contracts, you must use IBM parts for power
cords and rack cable cords.
Chapter 3. Installing 83
Table 12. Power cords and cords (continued)
Country Tier 2 CRU part number Description
Chile 39M5165 2.8m, 220 - 240V, C13 to CEI 23-16
China 39M5206 2.8m, 10A/250V, C13 to GB2099.1
Denmark 39M5130 2.8m, 10A/250V, C13 to DK2-5a
Europe 39M5123 2.8m, 10A/250V, C13 to CEE 7/7
India 39M5226 2.8m, 10A/250V, C13 IS 6538
Israel 39M5172 2.8m, 10A/250V, C13 to SI 32
Italy 39M5165 2.8m, 220 - 240V, C13 to CEI 23-16
Japan 39M5186 2.8m, 12A/240V, C13 to JIS C-8303
Japan 39M5199 2.8m, 12A/100V, C13 to JIS C-8303
Korea 39M5219 2.8m, 12A/250V, C13 to KSC 8305
South Africa 39M5144 2.8m, 10A/250V, C13 to SANS 164
Switzerland 39M5158 2.8m, 10A/250V, C13 to SEV 1011-S24507
Taiwan 39M5247 2.8m, 10A/125V, C13 to CNS 10917-3
Taiwan 39M5254 2.8m, 10A/250V, C13 to CNS 10917-3
United 39M5151 2.8m, 10A/250V, C13 to BS 1363/A
Kingdom
United States 39M5081 2.8m, 10A/125V, C13 to NEMA 5-15P
United States 39M5095 2.8m, 10A/250V, C13 to NEMA 6-15P
Rack power 39M5377 2.8m, 10A/125-250 VAC, IEC 320 C13 to
cords (all IEC 320 C14
countries)
DANGER
Hazardous voltage, current, or energy levels are present inside. Do not open
any cover or barrier. (L001)
Procedure
1. Save the changes from the running configuration to the startup configuration.
From the IBM MQ Appliance web UI
Click Save Configuration.
From the CLI
Use the write memory command.
2. Run the shutdown halt command to shut down the appliance.
3. Complete a graceful shutdown by pressing the power button at the front of the
chassis.
84 IBM MQ Appliance
What to do next
Verify that the power LED at the front of the appliance is not illuminated. To
remove all power from the system, the power cords must be unplugged from both
power supply units.
Procedure
v “Replacing a fan module”
v “Replacing a power supply module” on page 87
v “Replacing a solid state disk drive module - M2001 appliances” on page 88
v “Replacing an Ethernet module” on page 91
You must turn off the appliance and replace a fan module when directed by IBM
Support.
When one or more fan modules are not working, turn off the appliance as soon as
possible to avoid overheating. The remaining fans might not be able to maintain
the appropriate environmental temperature.
DANGER
Hazardous voltage, current, or energy levels are present inside. Do not open
any cover or barrier. (L001)
DANGER
Rack-mounted devices are not to be used as shelves or work spaces. (L002)
DANGER
Chapter 3. Installing 85
Multiple power cords. The product might be equipped with multiple power
cords. To remove all hazardous voltages, disconnect all power cords. (L003)
Procedure
1. If the appliance is not turned off, complete a graceful shutdown by pressing
the power button at the front of the appliance. Wait until the power LED is no
longer illuminated to indicate that the appliance power is turned off.
2. Unplug all network cables and power cords.
3. Remove the fan module.
The following figure shows the numbered components that are mentioned in
the steps.
a. Unscrew the two thumbscrews on the fan module until they twist without
resistance ▌1▐. The fan module thumbscrews are designed to remain
attached to the fan module.
b. Pull the fan module to remove it from the appliance ▌2▐.
4. Set the faulty module aside.
Attention: Ensure that the gold connectors at the rear of the module do not
come into contact with your hands or with the packing material as you
unpack the replacement module. Avoid damaging the gold connectors against
the appliance as you insert the replacement module.
5. Unpack the replacement module.
86 IBM MQ Appliance
6. Carefully align the replacement module, and insert until the module face is
flush with the rear panel.
7. Tighten the thumbscrews on the fan module.
8. Plug in all power cords.
9. Turn on the appliance by pressing the power button.
10. After you replace the fan module, confirm that the new module is working by
verifying that the following statements are true.
a. The fan module LED is not illuminated.
b. The fault LED at the front of the appliance is not illuminated.
What to do next
After you verify that the replacement module is working, return the failed part to
IBM.
You must have purchased a power supply module. The part number of a power
supply module is 97Y0440.
There are two hot-swap power supplies in the rear of the appliance. You need to
replace a power supply module as soon as possible when directed by IBM Support
or if any of the following situations occur.
v When the appliance generates a critical or warning message to indicate which
power supply module is in a failure state.
v When the LED on one of the power supply modules is illuminated red.
v The amber fault LED at the front of the appliance is illuminated when a
hardware fault is detected.
DANGER
Hazardous voltage, current, or energy levels are present inside. Do not open
any cover or barrier. (L001)
DANGER
Rack-mounted devices are not to be used as shelves or work spaces. (L002)
Procedure
1. Unplug the power cord of the failed module.
2. Remove the power supply module.
The following figure shows the numbered components that are mentioned in
the steps.
Chapter 3. Installing 87
Figure 26. Removing a power supply module.
a. Rotate, then firmly grip the handle ▌1▐ of the failed module.
b. Push the orange release latch ▌2▐ toward the handle ▌1▐ and hold in this
position.
c. Pull the failed module from the appliance ▌3▐.
3. When fully removed from the appliance, set aside the failed module.
Attention: Ensure that the gold connectors at the rear of the module do not
come into contact with your hands or with the packing material as you unpack
the replacement module. Avoid damage to the gold connectors as you insert the
replacement module.
4. Unpack the replacement module.
5. Replace the module.
a. Carefully align the replacement module with the open space in the
appliance.
b. Completely insert the module until the release latch clicks into place.
c. Pull the handle to ensure that the module is secure.
6. Plug in the power cord to the replaced module.
7. Verify that the new module is working.
a. The power supply LED is illuminated green.
b. The fault LED is not illuminated.
What to do next
After you verify that the replacement module is working, return the failed part to
IBM.
88 IBM MQ Appliance
Before you begin
The solid state disk drive modules are not hot-swappable. Hot swapping the
modules causes your system to crash, and might damage your appliance. You must
turn off the appliance before you replace the solid state disk drive module.
You need to replace a solid state disk drive module when the solid state disk state
is Unconfigured Bad or if directed by IBM Support.
Chapter 3. Installing 89
DANGER
When you work on or around the system, observe the following precautions:
To disconnect:
1. Turn off everything (unless instructed otherwise).
2. Remove the power cords from the outlets.
3. Remove the signal cables from the connectors.
4. Remove all cables from devices.
To connect:
1. Turn off everything (unless instructed otherwise).
2. Attach all cables to devices.
3. Attach the signal cables to the connectors.
4. Attach the power cords to the outlets.
5. Turn on the devices.
(D005)
Procedure
1. If the appliance is not turned off, complete a graceful shutdown by pressing
the power button at the front of the appliance. The green power LED turning
off indicates that the appliance is powered off.
The following figure shows the numbered components that are mentioned in
the steps.
90 IBM MQ Appliance
Figure 27. Removing a solid state disk drive module.
2. Press the locking arm release latch ▌1▐ and the locking arm is released.
3. To unlock the module, rotate the locking arm approximately 40 degrees by
pulling out ▌2▐.
4. To remove the module, pull the module out of the appliance ▌3▐.
5. Set aside the failed module.
Attention: Ensure that the gold connectors at the rear of the module do not
come into contact with your hands or with the packing material as you
unpack the replacement module. Avoid damaging the gold connectors against
the appliance as you insert the replacement module.
6. Unpack the replacement module.
7. Carefully align the module, and insert into the opening until the module is
seated.
8. Push the locking arm towards the appliance until the release latch clicks into
place.
9. Connect all network cables and power cords.
10. Turn on the appliance by pressing the power button that is on the front of the
appliance.
11. Verify that the power LED is illuminated steady green.
12. Verify that the new module is working.
a. The solid state disk drive activity LED illuminates steady green.
b. The solid state disk state is not Unconfigured Bad.
What to do next
After you verify that the replacement module is working, return the failed part to
IBM.
Chapter 3. Installing 91
Before you begin
You must turn off the appliance before you replace the Ethernet module. When
you disconnect network cables from the appliance, be sure to label each so that
you can connect them in the proper location.
You can replace an Ethernet module if you have a problem with your module or if
directed by IBM Support if the following situation occurs.
v You are unable to connect to the network even though the cable is plugged in.
v If the output from the test hardware command includes Expected number of
interfaces: x - found y.
v When you use listing, all the Ethernet ports in the module are not included in
the list:
– From the IBM MQ Appliance web UI select Manage Appliance > Network >
Ethernet Interface > ..
– From the CLI, use the show interface command.
92 IBM MQ Appliance
DANGER
When you work on or around the system, observe the following precautions:
To disconnect:
1. Turn off everything (unless instructed otherwise).
2. Remove the power cords from the outlets.
3. Remove the signal cables from the connectors.
4. Remove all cables from devices.
To connect:
1. Turn off everything (unless instructed otherwise).
2. Attach all cables to devices.
3. Attach the signal cables to the connectors.
4. Attach the power cords to the outlets.
5. Turn on the devices.
(D005)
DANGER
Multiple power cords. The product might be equipped with multiple power
cords. To remove all hazardous voltages, disconnect all power cords. (L003)
Procedure
1. If the appliance is not turned off, complete a graceful shutdown by pressing
the power button at the front of the appliance. When the power LED is no
longer illuminated, the appliance is powered off.
The following figure shows the numbered components that are mentioned in
the steps.
Chapter 3. Installing 93
Figure 28. Removing the 10 Gb Ethernet module (M2001 model).
2. Grasp the blue latch ▌1▐ rotate slightly and pull outward.
3. Pull the module out of the appliance ▌2▐ with care to support the module
weight as it exits.
4. Set aside the Ethernet module.
Attention: Ensure that the gold connectors at the rear of the module do not
come into contact with your hands or with the packing material as you
unpack the replacement module. Avoid damaging the gold connectors against
the chassis as you insert the replacement module.
5. Unpack the replacement module.
6. Carefully align the module, and insert into the appliance.
7. Push the Ethernet module forward until the module is securely in place.
8. Push the blue latch back in place to lock the module.
9. Turn on the appliance by pressing the power button at the front of the
appliance and verify that the power LED is illuminated steady green.
10. After you replace the module, verify that the new module is working.
a. You can connect to the network after you plug in the cable and the activity
LED is illuminated.
b. The fault LED light is not illuminated.
What to do next
After you verify that the replacement module is working, return the failed part to
IBM.
94 IBM MQ Appliance
Before you begin
v The part number of a short reach transceiver module is 46N5592.
v The part number of a long reach transceiver module is 46N5593.
DANGER
When you work on or around the system, observe the following precautions:
To disconnect:
1. Turn off everything (unless instructed otherwise).
2. Remove the power cords from the outlets.
3. Remove the signal cables from the connectors.
4. Remove all cables from devices.
To connect:
1. Turn off everything (unless instructed otherwise).
2. Attach all cables to devices.
3. Attach the signal cables to the connectors.
4. Attach the power cords to the outlets.
5. Turn on the devices.
(D005)
Procedure
1. If the appliance is not turned off, complete a graceful shutdown by pressing the
power button at the front of the appliance. Wait until the power LED is no
longer illuminated.
2. Unplug all power cords.
Chapter 3. Installing 95
The following figure shows the numbered components that are mentioned in
the steps.
DANGER
Rack-mounted devices are not to be used as shelves or work spaces. (L002)
CAUTION:
The weight of this part or unit is 18 - 32 kg (39.7 - 70.5 lb). It takes two persons
to safely lift this part or unit. (C009)
Procedure
1. If the appliance is not turned off, press the power button on the front of the
chassis. The power LED is no longer illuminated when the power is turned off.
2. Unplug all power cords from the appliance.
96 IBM MQ Appliance
The following figure shows the numbered components that are mentioned in
the steps.
DANGER
Multiple power cords. The product might be equipped with multiple power
cords. To remove all hazardous voltages, disconnect all power cords. (L003)
DANGER
Chapter 3. Installing 97
Improper disposal or incineration of batteries or capacitors can cause
life-threatening injury.
The Type 8436 appliance does not have any internal user serviceable parts. Any
battery or capacitor is to be accessed and removed only by trained personnel.
These instructions apply only to end-of-life recycling procedures.
Procedure
1. Turn off the appliance and disconnect all power cords and external cables from
the appliance.
2. Remove the cover of the appliance.
3. Locate the CMOS battery on the system board next. The battery is next to the
RAM slots.
4. Remove the battery with your fingers to release and lift the battery from the
connector.
98 IBM MQ Appliance
6. Loosen the indicated capacitor cover retention screw to remove the capacitor
cover.
7. Disconnect the RAID capacitor power connector and remove the capacitor from
the appliance.
What to do next
Chapter 3. Installing 99
100 IBM MQ Appliance
Chapter 4. Upgrading and downgrading
To upgrade your IBM MQ Appliance, you must install the latest level of firmware
on the appliance.
New function, security updates, and maintenance fixes for the IBM MQ Appliance
are made available through firmware releases. Additional maintenance through
iFixes are made available, as necessary, on the most recent firmware level release.
You can also downgrade your appliance, if required, either by reverting to the
previous level of firmware or by installing a specific firmware version.
Fixes are cumulative, so you should always download the most recent firmware
that is available on the IBM Fix Central website.
Both appliances in a high availability pair should have the same firmware level.
Appliances can operate at different levels to allow time to upgrade the appliances
separately, but you should avoid configuring HA queue managers during this
period.
If you have a high availability (HA) configuration, you must ensure that you
update both appliances to the new command level at the same time. Queue
managers running at one command level are not able to run on an appliance with
a different command level.
If you have a disaster recovery (DR) configuration, you must update the recovery
appliance to the new command at the same time that you update the main
appliance. This ensures that a queue manager that has run on the main appliance
can be started on the recovery appliance if required.
You download the new firmware image from the IBM Fix Central website, and
then copy the image to the appliance. You then reboot the appliance, and use the
new image.
If the appliance that you are upgrading is part of a high availability configuration,
then you pause the first appliance, then upgrade and resume the appliance. You
then pause, upgrade, then resume the second appliance. See “Suspending an
appliance from an HA group for maintenance” on page 267 for guidance.
You can use the back up and restore capabilities to provide a recovery or rollback
capability for your queue managers during the installation process. You can take
an archive of your queue managers and data before you start your queue
managers in the new environment. If you need to roll data back to the pre-upgrade
state, the queue manager data can be restored from the archive file, and the
appliance firmware rolled back to the last version. This use of archive files is
useful for stand-alone (non-HA/DR) queue managers where you want to ensure
that you have a backout strategy during migration. See “Backing up a queue
manager” on page 259 for instructions on backing up and restoring.
You can install the new firmware either by using the IBM MQ Appliance web UI
or by using the command line.
Use a computer with web access to download the required image from IBM Fix
Central. This website is a repository for all available and supported firmware
images for IBM MQ Appliances. The fixes are cumulative, so always choose the
most recent image.
Procedure
1. Back up your IBM MQ Appliance as described in “Back up and restore” on
page 253.
2. Restart the appliance as described in “Restarting the appliance” on page 252.
3. Ensure that all the queue managers are stopped.
4. Copy the firmware image from the computer that you downloaded it to to the
image: location on the appliance:
a. Connect to the command line of the appliance as described in “Command
line access” on page 109.
b. Log in to the appliance as an administrator.
c. Type config to enter configuration mode.
d. Type flash to enter the correct mode for firmware upgrade.
e. Copy the file by typing the following command:
copy scp://username@ipaddress/[/]directorypath/firmware_file image:
5. Restart the appliance with the new image by typing the following command:
boot image accept-license firmware_file
After you have downloaded the new level of firmware, you can install it by using
the IBM MQ Appliance web UI.
If you are installing firmware on a high availability (HA) configuration, see the
topic “Installing new firmware” on page 101 before you start installing. This topic
gives guidance on upgrading one appliance at a time and so remaining
operational.
Procedure
1. Back up your IBM MQ Appliance as described in “Back up and restore” on
page 253.
2. Start the web UI as described in “Configuring the IBM MQ Appliance web UI”
on page 112.
3. Restart the appliance:
a. Click the administration icon and select Main > System Control.
b. Set the Shutdown Mode to Reboot system.
c. Click Shutdown.
4. Click the console icon to switch to the IBM MQ Console and ensure that
all the queue managers are stopped.
5. Copy the new firmware image to the appliance and restart the system:
a. Click the administration icon and select Main > System Control.
b. In the Boot Image section, click Upload, and browse your local system for
the new firmware image in the upload file window. Click Upload to copy
the file to the appliance.
c. Select I accept the terms of the license agreement.
d. Click Boot Image.
6. When the appliance restarts, verify that the firmware image is upgraded:
a. Click the status icon and select System > Version Information.
b. Check that the version information is as you expect.
When you upgrade the IBM MQ Appliance firmware, the appliance retains current
configuration data. This feature is used to restore the appliance to a known, stable
state if required.
v The previous firmware image and associated configuration data is the secondary
installation.
v The newly installed firmware image and associated configuration data is the
primary installation.
When you switch between firmware images, the switch can take some time.
During this switch operation, do not power off or restart the appliance.
When you perform the boot switch operation, all system configuration reverts to
its state at initial upgrade. Any changes made since the firmware update are lost.
Losses include, for example, changes to network configuration or user definitions.
If any changes made immediately following the upgrade are the cause of problems
(and trigger the rollback), this state should be rectified by the boot switch
operation. However, data associated with queue managers is not modified when
the boot switch takes place, so, for example, messages are not lost in the rollback,
and security certificates and authority records retain any modifications.
Procedure
1. Connect to the command line of the appliance as described in “Command line
access” on page 109.
2. Log in to the appliance as an administrator.
3. Ensure that all queue managers are stopped.
4. Type config to enter configuration mode.
5. Type flash to enter the correct mode for firmware roll-back.
6. Restart the appliance with the original image by typing the following
command:
boot switch
You can revert to a previous level of firmware by using the IBM MQ Appliance
web UI.
Procedure
1. Start the web UI as described in “Configuring the IBM MQ Appliance web UI”
on page 112.
Downgrading
You can downgrade your appliance, if required, either by reverting to the previous
level of firmware or by installing a specific firmware version.
If you encounter a startup configuration error when you restart the appliance after
downgrading the firmware, complete the following steps:
1. Save the current configuration by completing the procedure described in
“Backing up or saving the appliance configuration” on page 254.
2. Restart the appliance by following the procedure described in “Restarting the
appliance” on page 252.
To achieve the managed failover, you put the appliance that you want to
temporarily remove from the group into standby mode. You then resume the
appliance after the maintenance is complete.
Note: While you have one appliance in standby mode, your queue managers can
run only on the remaining appliance. You should take care to avoid any outage on
the second appliance.
You use this technique when you update the firmware on the appliances in your
high availability group, for example to apply a fix pack. In this situation, you
suspend the first appliance, update the firmware, and then resume it. You can then
suspend the other appliance, upgrade the firmware, and then resume it.
You can upgrade a version 8.0 IBM MQ Appliance (running version 8.0 queue
managers) to version 9.0 (running version 9.0 queue managers).
There are a number of options in planning your upgrade, and the best approach
depends on your current environment, disaster recovery strategy, and planned
continuity of service during the upgrade window.
The Version 9.0 firmware includes new capabilities for simple backup and restore
of queue manager data, see “Backing up a queue manager” on page 259. These
capabilities can be used to provide a recovery or rollback capability for your
Version 8 queue managers during the upgrade process. You can take an archive of
your queue managers and data before you start your queue managers in the new
environment. If you need to roll data back to the pre-upgrade state, the queue
manager data can be restored from the archive file, and the appliance firmware
rolled back to the last version. This use of archive files is useful for stand-alone
(non-HA/DR) queue managers where you want to ensure that you have a backout
strategy during migration.
The IBM MQ Console has completely changed for version 9.0. You cannot migrate
your existing console layout from your version 8.0 appliance, but you should take
a backup of your console layout before you upgrade in case you want to
subsequently revert to version 8.0. See Backing up IBM MQ Appliance web UI
configuration data in the IBM MQ Appliance version 8.0 documentation for
instructions.
User authentication and authorization has completely changed for version 9.0 and
is now achieved through role based management (RBM). If you have controlled
user authorization by setting up user groups with limited access to certain
appliance command groups in version 8.0, then you will need to manually
reconstruct these authorizations by using RBM (see “Credential mapping with local
user groups” on page 372). Be sure to make a note of current user group command
groups before you upgrade because these groups are not visible after you upgrade.
You can use the command line interface to upgrade your version 8.0 IBM MQ
Appliance to version 9.0.
Follow this procedure to take back ups of your queue managers, and associated
logs and data, and then upgrade your appliance to IBM MQ version 9.0.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type mqcli to enter IBM MQ configuration mode.
4. Stop each of your queue managers:
endmqm Queue_Manager
5. Upgrade your appliance to the new firmware level:
boot image accept-license firmware_file
Where firmware_file is the file that contains the appliance firmware upgrade (see
“Installing a new level of firmware by using the command line” on page 102
for details on obtaining the file).
6. Create the location and allocate storage for your backup archive files:
createbackupfs -s size
Where size specifies the space that is allocated on the appliance RAID volume
for back ups in GB. A directory is created at the location mqbackup:///QMgrs.
7. Back up each of your queue managers:
mqbackup -m Queue_Manager
Follow this procedure to take back ups of your queue managers, and associated
logs and data, and then your appliance to IBM MQ version 9.0.
Procedure
1. Start the IBM MQ Console as described in “Using the IBM MQ Console” on
page 207.
2. Stop each of your queue managers:
a. Select the queue manager that you want to stop from the list in the local
queue manager widget.
b. Click the stop icon in the local queue manager widget toolbar.
c. Confirm that you want to stop the queue manager by clicking Stop.
3. Upgrade your appliance to the new firmware level. For this operation you use
the IBM MQ Appliance web UI:
a. Start the IBM MQ Appliance web UI, and click the administration icon
.
b. Select Main > System Control
c. In the Boot Image section, select the license accept option. Select the image
that you want to use from the Firmware File list. This list contains all the
files in the Image directory on the appliance. (You can use the buttons in this
window to upload files to the appliance or move them to the Image
directory as required.)
d. Click Boot Image to restart the appliance with the new firmware installed.
4. When the appliance has restarted, create the location and allocate storage for
your backup archive files:
createbackupfs -s size
Where size specifies the space that is allocated on the appliance RAID volume
for back ups in GB. A directory is created at the location mqbackup:///QMgrs.
5. Open the IBM MQ Console again. Back up each of your queue managers:
a. Select the queue manager that you want to back up from the list in the local
queue manager widget.
b. Select Back Up from the widget menu.
6. Restart your queue managers:
a. Select the queue manager that you want to restart from the list in the local
queue manager widget.
b. Click the start icon in the local queue manager widget toolbar.
To use the IBM MQ control commands you must enter the IBM MQ administration
mode by entering the command mqcli on the command line. You can exit the IBM
MQ administration mode by entering the command exit.
Before you connect to the serial port, ensure that the configuration for the terminal
or PC is for standard 9600 8N1 and no flow control operation. 8N1 is a notation for
a serial configuration in asynchronous mode, where there are eight (8) data bits, no
(N) parity bit, and one (1) stop bit.
To make the serial connection, use the appropriate cable to connect the terminal or
PC to the console connector on the appliance. You require a serial-to RJ45 converter
cable or USB-to-RJ45 converter cable to connect.
When properly connected, the terminal or PC prompts for credentials for a locally
defined user. With a serial connection, the following restrictions apply:
v Authentication does not use RBM. Therefore, only locally defined users can log
in to the serial port. If a non-local user attempts to log in, the log contains the
following message:
auth error 0x81000034 User ’user001’ failed to log in.
v There can be only one active serial connection at a time.
v In addition to being local, the user must be the admin account or a privileged
user.
Without an explicit local address, the SSH service attempts to bind to the
management Ethernet interface. If the management Ethernet interface is not
defined, the SSH service binds to all configured interfaces.
If any of the Ethernet interfaces on the appliance are connected to the internet, or a
similar open access network, you might want to prevent access to the SSH service
from those interfaces. By restricting the Ethernet interface that can be used to
access the SSH service, you can ensure that the service can be accessed only from
an internal network. This restriction makes your environment more secure.
You can also fine tune the ciphers that are used by the SSH service, and the order
that they are used in.
Although many servers use password authentication for SSH login, the IBM MQ
Appliance requires an interactive process to protect credentials during the SSL
handshake. The IBM MQ Appliance initiates a secure channel and provides for an
encrypted login process.
As a side-effect of the initial connection, and depending on your SSH client, you
might see the extraneous "login as:" prompt. To bypass, press Enter.
The screen shows a warning about unauthorized access and the prompt for the
login credentials:
login as:
Unauthorized access prohibited.
login:
You configure the SSH service, and can then optionally go on to configure the
ciphers that the SSH service uses. By default the service uses 16 ciphers in a
recommended order. You can, if required, disable or re-enable certain ciphers and
reorder them.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Management > SSH Service.
3. Select Enable administrative state.
4. In the Local address field, enter the local address the appliance monitors for
incoming SSH requests.
5. In the Port number field, change the port on which the appliance monitors for
incoming SSH requests.
6. Click Edit next to the Access control list field to modify the SSH ACL.
7. Click Apply to save the changes to the running configuration.
8. Click Save Configuration to save the changes to the persisted configuration.
You configure the SSH service, and can then optionally go on to configure the
ciphers that the SSH service uses. By default the service uses 16 ciphers in a
recommended order. You can, if required, disable or re-enable certain ciphers and
reorder them.
Procedure
1. Enter the configuration mode by entering the following command:
config
2. Specify the IP address and port that the SSH service listens on by entering the
following command:
ssh IPAddress:Port
where:
IPAddress
Specifies the IP address of the Ethernet interface that you want to use
to access the SSH service.
port Specifies the port number that you want to use to access the SSH
service.
3. Exit the configuration mode by entering the following command:
exit
4. To work with SSH ciphers, enter the crypto SSH server mode by entering the
following commands:
crypto
sshserverprofile
5. Enter the following command to change the enabled ciphers and the order of
preference that they are used in:
ciphers cipher_string
Where cipher_string lists the enabled ciphers in the required preference order.
See “ciphers” on page 824 for the names of ciphers that you can specify in the
string.
6. Exit the configuration mode by entering the following command:
exit
7. Exit the crypto mode by entering the following command:
exit
The IBM MQ Appliance web UI can be accessed by using any of the supported
browsers. The browser must have JavaScript enabled. Currently supported
browsers are the latest versions of Firefox or Chrome, or Internet Explorer 11.
Note: If you are using Internet Explorer, you must ensure that you are running in
standards mode, not compatibility mode. To change the mode, press F12. Check
the Document Mode: menu, and the Browser Mode: menu, and make any
necessary changes.
You can connect to the IBM MQ Appliance web UI by entering the following URL:
Note: This URL uses the default port value. If you changed the port value, replace
the 9090 section of the URL with your port number.
https://IP_Address:9090
Where:
IP_Address
Specifies the IP address of the management Ethernet interface.
You can determine the IP address of the management Ethernet interface by
using the show int command.
If any of the Ethernet interfaces on the appliance are connected to the internet, or a
similar open access network, you might want to prevent access to the IBM MQ
Appliance web UI from those interfaces. By restricting the Ethernet interface that
can be used to access the IBM MQ Appliance web UI, you can ensure that the IBM
MQ Appliance web UI can be accessed only from an internal network. This
restriction makes your environment more secure.
Procedure
1. Ensure that you are not in the IBM MQ administration mode by entering the
following command:
exit
If you want to configure client validation, you import the certificates of the clients
that are going to be allowed to connect. You then create definition objects for the
certificates, which are used when you create a validation credential (valcred) object.
The valcred object is in turn used when you configure the SSL server profile.
The example in this topic assumes that you have a signed certificate for the
appliance. When making certificate requests for an appliance, the CN part of the
distinguished name must be the URL that you type to reach the web UI. For
example, myappliance1.ourcompany.com. If you want to set up the profile to
validate connecting clients, you also require the relevant client certificates.
By default the web management service listens on all of the appliance ports (local
address set to 0.0.0.0). You can, however, configure the service so that it listens on
Procedure
v To upload certificates to your appliance:
1. Ensure that you have the following items:
– A private key to access the appliance certificate.
– The appliance certificate.
– Client certificates (optional).
2. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
3. Log in as a user in the administrators group.
4. Type the following command to enter configuration mode:
config
5. Upload the key and certificates to the appliance by using the copy command,
for example:
copy scp://username@otherserver//home/username/myappliance1key.pem cert:
copy scp://username@otherserver//home/username/myappliance1.cer cert:
copy scp://username@otherserver//home/username/client1.cer cert:
copy scp://username@otherserver//home/username/client2.cer cert:
copy scp://username@otherserver//home/username/client3.cer cert:
You can also copy the certificates to your appliance by using the IBM MQ
Appliance web UI, see “Uploading certificates to the appliance” on page 400.
v To create definition objects for the appliance certificate and key:
1. From configuration mode, type crypto to enter crypto configuration mode.
2. Create a crypto key definition for the private key that is used for generating
the appliance certificate:
key key_alias cert:///keyfile
For example:
key WebUiKey01 cert:///myappliance1key.pem
3. Create a crypto certificate definition for the appliance:
certificate cert_alias cert:///certfile
For example:
certificate WebUiCert01 cert:///myappliance1.cer
4. Create a crypto credential definition for the appliance:
idcred credential_name key_alias cert_alias
For example:
idcred WebUiCred01 WebUiKey01 WebUiCert01
v To create a crypto valcred definition for validating clients (this is optional):
1. From the crypto configuration mode, create a certificate definition object for
each of the client certificates that you have imported:
certificate cert_alias cert:///certfile
For example:
certificate WebUiClientCert01 cert:///client1.cer
certificate WebUiClientCert02 cert:///client2.cer
certificate WebUiClientCert03 cert:///client3.cer
For example:
ssl-server myappliance1
admin-state enabled
idcred WebUiCred01
protocols TLSv1d2
valcred WebUIvalcred01
request-client-auth on
require-client-auth on
send-client-auth-ca-list on
v To save all the changes you have made in crypto configuration mode:
1. Type exit to leave crypto configuration mode.
2. Type write mem to save your configuration changes.
v To associate the SSL server profile with the web UI:
1. From configuration mode, type web-mgmt to enter web management
configuration mode.
2. Enter the following command:
ssl-server SSL_Svr_Profile_name
For example:
ssl-server myappliance1
v To save your web management configuration:
1. Type exit to leave web-mgmt configuration mode.
2. Type write mem to save your configuration changes.
3. Type exit again to leave configuration mode.
You customize the user interfaces using an XML file. You create the file that
defines your customizations and then copy it to the appliance.
You can use any text editor to create the XML file. You must cut and paste the
markup, and then specify the content of each customized message within the
markup.
After the XML file is complete, you can, if you want, validate the conformance of
the file against its schema. The schema is available on the appliance under
store:///schemas/dp-user-interface.xsd.
Copy the file to the appliance store URI, and use the custom-ui-file command to
implement your customizations, for example:
mqa# config
mqa (config)# system
mqa (config system)# custom-ui-file store:///CustomUI.xml
You can copy and paste elements from the supplied template file to create the file,
(see “Template of the custom user interface file” on page 118). The schema for the
XML file supports the following case-sensitive elements:
<User-Interface>
The <User-Interface> element is the root element of the XML file and
defines the required namespace statements. The XML file must contain this
element copied and pasted from the template without modification.
<CustomPrompt>
The <CustomPrompt> element indicates whether to extend the CLI prompt
with the system name. To enable this aspect, add an element of the form:
<CustomPrompt>%s</CustomPrompt>
The system name is the only customization available for the CLI prompt.
The system name can be set using the name command, see “name” on page
846.
<MarkupBanner>
The <MarkupBanner> element identifies the messages to display in the web
UI. The file can contain up to four <MarkupBanner> elements, based on a
combination of the type attribute and location attribute.
type="message-type"
The type attribute identifies the type of message. This attribute
supports the following keywords.
For CLI messages, the content of the <TextBanner> element cannot include
other HTML or XML elements.
The following template is an XML file to help you create the custom user interface
file for your IBM MQ Appliance. This template conforms to the schema
(store:///schemas/dp-user-interface.xsd).
<User-Interface
xmlns="http://www.datapower.com/schemas/user-interface/1.0">
Ethernet interfaces
You must configure the Ethernet interfaces on your IBM MQ Appliance to enable
communications.
Note:
1. By default, the appliance blocks non-management traffic when at least one
network interface has an invalid configuration. When this situation occurs, the
appliance supports only management traffic over SSH and web management
interfaces. Until you correct the problem, the appliance cannot accept and
process client requests.
2. You must not disable Ethernet links that are used for high availability or
disaster recovery configurations. If you do disable such links, high availability
operation or disaster recovery operation are no longer available, and you might
have to set up the configuration again.
3. You must not change IP addresses for Ethernet links that are used for high
availability or disaster recovery configurations. If you do change IP addresses,
high availability operation or disaster recovery operation are no longer
available, and you might have to set up the configuration again. See “Changing
You use the Network section of the IBM MQ Appliance web UI to configure the
Ethernet interfaces on your IBM MQ Appliance. The IBM MQ Appliance web UI
itself contains detailed help on the fields that you need to configure. Here we
describe the major steps that you need to complete.
Note: There are restrictions on changing the IP addresses of the Ethernet ports
used by high availability and disaster recovery configurations. See “Changing IP
addresses in high availability configurations” on page 169 and “Changing IP
addresses in disaster recovery configurations” on page 187.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Interface > Ethernet Interface.
3. Click New to define a new configuration.
4. Specify a name for the configuration. You must specify the name of the
Ethernet interface that you want to configure. The following names are
available:
v eth10
v eth11
v eth12
v eth13
v eth14
v eth15
v eth16
v eth17
v eth20
v eth21
v eth22 (M2001 appliances only)
v eth23 (M2001 appliances only)
v mgt0
v mgt1
5. Define the basic configuration for that interface. Here you specify whether the
interface is active or not, and whether the interface uses static addressing, or an
autconfiguration scheme. If you choose either of the autoconfiguration schemes,
the appliance ignores the remaining configuration data about the physical
interface.
To configure an Ethernet interface from the command line, you enter Ethernet
configuration mode, specifying the interface to configure, and enter the required
Ethernet commands.
Note: There are restrictions on changing the IP addresses of the Ethernet ports
used by high availability and disaster recovery configurations. See “Changing IP
addresses in high availability configurations” on page 169 and “Changing IP
addresses in disaster recovery configurations” on page 187.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure an Ethernet interface:
ethernet name
Where name identifies the interface that you want to configure and has one of
the following values:
v eth10
v eth11
v eth12
v eth13
v eth14
v eth15
v eth16
v eth17
v eth20
v eth21
v eth22 (M2001 appliances only)
v eth23 (M2001 appliances only)
v mgt0
v mgt1
4. Use the following Ethernet interface commands to configure the interface:
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“flow-control” on page 645 Sets the flow control mode of the Ethernet interface.
Command Description
“disable-ethernet-hardware-offload” Manages the temporary disabling of hardware offload.
on page 646
“packet-capture” on page 654 Manages a packet-capture for the Ethernet interface session.
6. After you configure the Ethernet interface, enter exit to save the configuration
and exit, or type cancel to exit without saving.
Example
VLAN interfaces
You can configure the VLAN interfaces on your IBM MQ Appliance.
A VLAN interface allows multiple logical LANs to coexist on the same Ethernet
segment. VLAN packets are identified by the IEEE 802.1Q protocol. You can define
multiple VLAN interfaces on a single parent interface. The parent interface can be
an Ethernet interface or a link aggregation interface.
Note: By default, the appliance blocks non-management traffic when at least one
network interface has an invalid configuration. When this situation occurs, the
appliance supports only management traffic over SSH and web management
interfaces. Until you correct the problem, the appliance cannot accept and process
client requests.
You use the Network section of the IBM MQ Appliance web UI to configure VLAN
interfaces on your IBM MQ Appliance. The IBM MQ Appliance web UI itself
contains detailed help on the fields that you need to configure. Here we describe
the major steps that you need to complete.
You must configure the parent interface before you configure the VLAN interface.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Interface > VLAN Interface.
3. Click New to define a new configuration.
4. Specify a name for the configuration.
5. Define the basic configuration for that interface. Here you specify whether the
interface is active or not, and whether the interface uses static addressing, or
an autconfiguration scheme, and whether the parent interface is Ethernet or
link aggregation. If you choose either of the autoconfiguration schemes, the
appliance ignores the remaining configuration data about the physical
interface.
6. Specify the parent interface of the VLAN. Specify the name of either the
Ethernet or link aggregation configuration.
7. Define the identifier for the VLAN you are configuring, and the priority level
for outbound VLAN headers for packets.
8. Define IP addressing. Here you optionally define the primary IP address and
one or more secondary addresses.
9. Define IP routing. Here you optionally define default gateways for IPv4 and
IPv6 IP addresses. You can set up a routing table that defines static routes.
10. Optionally define advanced options that modify the way that the VLAN
interface works within the network.
11. Click Apply to save the changes to the running configuration.
To configure a VLAN interface from the command line, you enter VLAN
configuration mode, specifying the interface to configure, and enter the required
VLAN commands.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure a VLAN interface:
vlan name
Where name identifies the interface that you want to configure. The name can
have a maximum of 128 characters. The following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name that consists of a single period, or including two
periods together, is not permitted)
4. Use the following VLAN interface commands to configure the interface:
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“ethernet-interface” on page 853 Sets the Ethernet interface to provide connectivity.
“identifier” on page 853 Sets the VLAN identifier.
“ip-address” on page 854 Assigns the primary network address for the VLAN interface.
“ip-config-mode” on page 854 Identifies the configuration mode for the VLAN interface.
“ip-route” on page 855 Manages static routes in the routing table for the VLAN interface.
“ip-secondary-address” on page Manages secondary network addresses for the VLAN interface.
856
“ipv4-default-gateway” on page Designates the default IPv4 gateway for the VLAN interface.
857
“ipv6-dadtransmits” on page 857 Sets the number of IPv6 duplication address detection attempts for the VLAN
interface.
“ipv6-default-gateway” on page Designates the default IPv6 gateway for the VLAN interface.
858
“ipv6-nd-retransmit-timer” on Sets the interval between IPv6 neighbor discovery attempts for the VLAN
page 858 interface.
“link-aggregation-interface” on Indicates whether the VLAN interface is part of an aggregate interface.
page 859l
“mtu” on page 859 Sets the maximum transmission unit of the VLAN interface.
“outbound-priority” on page 860 Sets the priority value in outbound packets.
Command Description
“packet-capture” on page 861 Manages a packet-capture for the VLAN interface session.
6. After you configure the VLAN interface, enter exit to save the configuration
and exit, or type cancel to exit without saving.
You must configure the Ethernet interfaces, and enable them for link aggregation,
before you create a link aggregation interface.
Link aggregation is not supported for links used for high availability
configurations or disaster recovery configurations.
Note: By default, the appliance blocks non-management traffic when at least one
network interface has an invalid configuration. When this situation occurs, the
appliance supports only management traffic over SSH and web management
interfaces. Until you correct the problem, the appliance cannot accept and process
client requests.
You use the Network section of the IBM MQ Appliance web UI to configure a link
aggregate interface on your IBM MQ Appliance. The IBM MQ Appliance web UI
itself contains detailed help on the fields that you need to configure. Here we
describe the major steps that you need to complete.
Note: You must configure the Ethernet interfaces that you want to aggregate, and
enable them for link aggregation, before you create the link aggregation interface.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Interface > Link Aggregation Interface.
3. Click New to define a new configuration.
4. Specify a name for the link aggregation interface.
To configure a link aggregation interface from the command line, you enter link
aggregation configuration mode, specifying the interface to configure, and enter
the required link aggregation commands.
Note: You must configure the Ethernet interfaces that you want to aggregate, and
enable them for link aggregation, before you create the link aggregation interface.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure a link aggregation interface:
link-aggregation name
Where name identifies the interface that you want to configure. The name can
have a maximum of 128 characters. The following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name that consists of a single period, or including two
periods together, is not permitted)
4. Use the following link aggregation interface commands to configure the
interface:
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
Command Description
“packet-capture” on page 718 Manages a packet-capture for the aggregate interface session.
6. After you configure the link aggregation interface, enter exit to save the
configuration and exit, or type cancel to exit without saving.
IPMI Settings
You can define an IPMI channel, and IPMI users on the IBM MQ Appliance.
An IPMI user can create, change, or delete user authentication records in the BMC.
Authentication records allow users to communicate with IPMI protocols over
external channels, such as an IPMI LAN channel. There can be eight IPMI users on
the appliance.
You configure the appliance Ethernet port mgt0 to provide an IPMI LAN channel,
which can include serial over LAN (SOL) access.
To configure an IPMI user from the command line, you enter IPMI channel mode,
and enter the required IPMI channel commands.
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“allowed-user” on page 703 Specifies the users allowed to use the channel.
“ip address” on page 704 Sets IP addresses with subnet mask for the IPMI LAN channel.
“ip default-gateway” on page 705 Sets the default gateway for the IPMI LAN channel.
“maximum-channel-privilege-level” Sets the maximum privilege level for users.
on page 705
“sol-enabled” on page 706 Indicates whether to support serial over LAN.
“sol-required-user-privilege-level”Sets the privilege level for serial over LAN.
on page 707
5. After you configure the channel, enter exit to save the configuration and exit,
or type cancel to exit without saving.
To configure an IPMI user from the command line, you enter IPMI user mode, and
enter the required IPMI user commands. Users are identified by an integer.
Possible identifiers are 3 to 10 inclusive.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type ipmi-user to enter IPMI user mode.
4. Enter the following command to define an IPMI user:
user-id identifier
DNS settings
DNS setting define the DNS servers to contact to resolve host names to IP
addresses.
The results from DNS resolution requests are cached to improve performance.
When a name server responds with an IP address, the response includes its time to
live (TTL) in the cache. The appliance uses the value from the DNS response or 10
seconds, whichever is greater. If the name server responds that a host name has no
associated IP address, the appliance caches the negative response for 30 seconds.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Interface > DNS Service.
3. Enable the DNS service.
4. Set whether you prefer IPv4 or IPv6 addresses.
5. Define the domains to search to match partial host name. Use the directional
arrows to set the search order.
6. Define the name servers to contact for resolution. Use the directional arrows to
set the contact order. For the first alive algorithm, you can set a maximum of
three name servers.
7. Define host-address maps for static hosts. (The use of static hosts does not
improve performance).
8. Select the load balancing algorithm.
v For the first alive algorithm, set the maximum number of query attempts
before an error is returned, and the time to wait for a response before
querying the next name server in the list.
v For the round robin algorithm, set the maximum number of query attempts
on a per-server basis.
9. Click Apply to save the changes to the running configuration.
To configure DNS settings from the command line, you enter DNS configuration
mode and enter the required DNS commands.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure DNS settings:
dns
4. Use the following DNS commands to configure the settings:
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“ip-preference” on page 640 Sets the preferred IP version when the DNS provider publishes both versions
of addresses.
“load-balance” on page 640 Sets the load-balancing algorithm that the appliance uses to resolve host
names.
“name-server” on page 641 Manages local DNS providers.
“retries” on page 642 Sets the number of times that the appliance attempts a failed query.
“search-domain” on page 642 Manages domain-suffixes in the search table for non-qualified domain names.
“static-host” on page 643 Manages host-address maps.
“timeout” on page 644 Sets the time to wait before the next query attempt.
You can clear hosts from the cache from the DNS Settings configuration.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Interface > DNS Service.
3. Click Actions > Flush DNS Cache.
SNMP Settings
You can configure the SNMP settings for the appliance by using the IBM MQ
Appliance web UI or the command line interface. The web UI settings are divided
into the following sections:
Main The main SNMP settings specify local connection and security settings. You
specify the local IP address and port that is listened on for incoming
SNMP requests. You can specify that all interfaces on the appliance are
listened on, if required. If you are using SNMP v3, you can specify the
SNMP users, security levels, and access levels.
Enterprise MIBs
You can view the three MIB files that specify the interaction of the
appliance with SNMP managers. You need to download the MIB files to
use them with an SNMP monitoring application. All of the objects that are
exposed through the IBM MQ Appliance MIBs are read only.
Trap Event Subscriptions
Enables the generation of event traps/notifications for certain appliance
conditions. Currently, you can enable or disable the generation of
traps/notifications in response to a default set of appliance events. Note
that events for IBM MQ operations are not currently supported.
SNMPv1/v2c Communities
If you are using SNMP version 1 or version 2c, you use this section to
specify one or more SNMP communities.
Trap and Notification Targets
If you have enabled the default event traps/notifications, you use this tab
to specify details of the SNMP manager (or managers) that the
traps/notifications are sent to.
You can use the IBM MQ Appliance web UI to configure SNMP. You use the Main
section of the interface to specify basic details and to enable the service.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > SNMP Settings.
3. Ensure that Enable administrative state is selected (this step enables SNMP).
4. Specify the IP address of the local interface on which the SNMP service listens
for SNMP requests in the Local IP Address field. Specify 0.0.0.0 (which is the
default value) to listen on all appliance interfaces.
5. Specify the port that is listened on in the Local Port field. The port for SNMP is
161 by default.
6. If you are configuring SNMP v3, complete the following steps:
a. If required by the chosen security level, add one or more local users who
have SNMPv3 credentials:
v Otherwise, click the plus icon to open the User Account dialog.
Create a new user and specify SNMPv3 credentials. Click Apply.
See “Configuring local users by using the web UI” on page 380.
b. Select the SNMPv3 security level. Choose one of the following options:
Authentication, Privacy
The SNMP connection requires authentication of users and
encryption of data. This setting is the default.
Authentication, No Privacy
The SNMP connection requires authentication of users but not the
encryption of data.
No Authentication, No privacy
The SNMP connection requires neither authentication of users nor
encryption of data.
c. Select the SNMPv3 access level. You should select the read-only option,
which allows an SNMP manager to request get, get-next, and get-bulk
operations. The read-only option is the default. (All of the objects that are
exposed through the IBM MQ Appliance MIBs are read only.)
What to do next
If you want to view the MIBs that control how SNMP managers work with the
appliance, open the Enterprise MIBs section of the dialog, or open the Trap Event
Subscriptions section to configure default traps/notifications. To specify
communities for SNMPv1 or SNMP v2c, open the SNMPv1/v2c Communities
section. Otherwise, if you have completed your SNMP configuration, click Apply.
The interaction of an SNMP manager with the appliance is controlled by MIB files,
which define the objects that the SNMP manager can collect data about. There are
three MIBs that control this interaction: configuration, status, and notifications.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > SNMP Settings.
3. Open the Enterprise MIBs section of the dialog.
4. Click the link for the MIB that you want to view. The MIB opens in a separate
browser window.
Open the Trap Events section to configure the default events that are generated by
the appliance.
The appliance has a set of default events that can be reported if you enable this
feature.
The default events report on the functioning on the appliance itself rather than the
operation of IBM MQ. You can enable or disable the generation of the default
events as a whole, and specify the level at which an event is generated for the
specified conditions.
The default events are specified by code. The codes correspond to the following
conditions:
0x00030002
Out of memory
0x00230003
Unable to allocate execution resources
0x00330002
Memory full
0x00b30014
Duplicate IP address
0x00e30001
NTP - Cannot Resolve Server Name
0x00e40008
NTP Timeout Error
0x00f30008
File is expired (refers to certificate file)
0x01530001
Time zone config mismatch
0x01a2000e
Installed battery is nearing end of life
0x01a40001
Throttling connections due to low memory
0x01a40005
Throttling connections due to low temporary file space
0x01a40008
Throttling connections due to low number of free ports
0x01b10009
Uncertified HSM firmware detected (not used)
0x01b20002
HSM is uninitialized (not used)
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > SNMP Settings.
3. Open the Trap Event Subscriptions section of the dialog.
4. Select Enable Default Event Subscriptions to enable the generation of
notification of trap events.
5. Select a minimum trap event priority from the Minimum Priority list. The
priorities are hierarchical. The lowest is listed last. Set to the minimum level of
event that will cause a trap/notification to be generated.
emergency
An emergency level message. The system is unusable.
alert
An alert level message. Immediate action must be taken.
critical
A critical message. Immediate action should be taken.
error
An error message. Processing might continue, but action should be
taken.
warning
A warning message. Processing should continue, but action should be
taken.
notice
A notice message. Processing continues, but action might need to be
taken.
information
An information message. No action required.
debug
A debug message for processing information to help during
troubleshooting.
If you are using SNMP v1 or v2c, open the SNMPv1/v2c Communities section to
specify community details. Otherwise, open the Trap and Notifications Targets
section to specify the destination for the default trap notifications, if you enabled
them.
If you are using SNMP version 1 or version 2c, you must specify one or more
communities.
The v1 and v2c versions of SNMP rely on a password phrase that is known as a
“community”. The name of the community accompanies SNMP requests, and is
used to determine whether the request can be fulfilled or not.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > SNMP Settings.
3. Open the SNMPv1/v2c Communities section of the dialog.
4. Click Add to add an SNMP community.
5. Specify the name of the community in the Community field.
6. Select the type of access that SNMP managers using this community name have
to the appliance from the Mode list.
7. Specify the IP address of the SNMP manager for the appliance in the Remote
Host Address field. Set the address to 0.0.0.0/0 to allow access to all SNMP
managers that use the community name.
8. If required, click Add to add more communities.
What to do next
If you have specified that the appliance can generate trap event notifications, open
the Trap and Notifications Targets section to specify where notifications are sent.
Otherwise, if you have completed your SNMP configuration, click Apply.
If you enable default trap events, you should also define a target to send them to.
The information that you supply when you configure a target depends on the
version of SNMP that you are using. SNMPv1 and v2c require different setup
information to SNMP v3.
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > SNMP Settings.
3. Open the Trap and Notification Targets section of the dialog.
4. Specify the IP address of the target recipient of traps/notifications in the
Remote Host Address field.
5. Specify the port to use when sending traps/notifications in the Remote Port
field. SNMP uses port 162 by default.
6. Select the version of SNMP you are using from the Version list.
v If you select version 1 or 2c, specify the name of the community to use when
sending trap events in the Community field.
v If you select version 3, specify the name of the SNMP user used to send
event notifications in the Security Name field, and select the security level
from the Security Level list to specify whether the user is authenticated and
data is encrypted.
What to do next
Enable SNMP and specify main connection and security and user details.
You can use the command line to configure connection details for SNMPv3.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type snmp to enter SNMP configuration mode.
4. Enable SNMP by entering the following command:
admin-state enabled
5. Specify the IP address of the local interface on which the SNMP service listens
for SNMP requests by entering the following command:
ip-address local_IP_address
Where port_number is the port listened on. The port is set to 161 by default.
7. Specify the security level by entering the following command:
security-level level
If you select either of the levels that specify user authentication, you must
define a local user for SNMP authentication, together with SNMP credentials.
See “Configuring local users by using the command line” on page 381.
8. Specify the user ID of the local user that is used for authentication:
user userName
9. Specify the access level of read-only by entering the following command:
access-level read-only
What to do next
The v1 and v2c versions of SNMP rely on a password phrase that is known as a
“community”. The name of the community accompanies SNMP requests, and is
used to determine whether the request can be fulfilled or not.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type snmp to enter SNMP configuration mode.
4. Enable SNMP by entering the following command:
admin-state enabled
5. Specify the IP address of the local interface on which the SNMP service listens
for SNMP requests by entering the following command:
ip-address local_IP_address
Where port_number is the port listened on. The port is set to 161 by default.
Where:
communityName
Specifies the name of the community.
access-level
Set access-level to read-only to specify that SNMP managers are
restricted to SNMP get operations, which means that these managers
can read, but cannot change management information base (MIB)
values.
ip_address
Optionally, specify an IP address to restrict access to the SNMP
manager in the named community with the specified IP address. By
default, any SNMP manager that belongs to the named community can
make requests.
What to do next
You can use the command line to enable or disable the reporting of default trap
events and to specify a target for them.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type snmp to enter SNMP configuration mode.
4. Enable default trap events by entering the following command:
trap-default-subscriptions on
Where:
ip_address
Specifies the IP address of the host that receives notifications.
Where:
ip_address
Specifies the IP address of the host that receives notifications.
port Optionally specify the port. The port is 162 by default.
snmpVersion
Specify 1 or 2c to indicate that you are using SNMPv1 or SNMPv2c.
community
Provides a community name, which is essentially a password, to
include in the SNMP message header. The default value is public.
What to do next
If you have finished configuring SNMP, type exit to save the configuration and
exit, or type cancel to exit without saving.
You can configure the date and time automatically by using network time protocol
(NTP) servers to synchronize the server time with another server. Using NTP
servers to synchronize the time ensures that the IBM MQ Appliance time is
automatically updated, and is therefore always correct. It is important for the IBM
MQ Appliance time to be correct as it is used in key information such as log files
and monitoring data.
You can configure a connection to an NTP server by using the web UI or by using
the command line interface.
Procedure
1. Start the IBM MQ Appliance web UI, and click the network icon .
2. Select Interface > NTP Service.
3. Enter the host name or IP address of the NTP server. Click Add to specify
multiple NTP servers. The servers are contacted in the order that you specify
them.
To configure NTP service settings from the command line, you enter NTP
configuration mode and enter the required NTP commands.
The appliance supports one NTP server at a time. To designate a new NTP server,
use the no ntp-service command to delete the current server, and then use the
remote-server command to designate the new server.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure NTP service settings:
ntp-service
4. Use the following NTP commands to configure the settings:
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“refresh-interval” on page 638 Sets the interval between clock synchronizations.
“remote-server” on page 638 Identifies an NTP server.
Procedure
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Device > Time Settings.
3. Select the timezone from the Local time zone list.
4. Click Apply to save the changes to the running configuration.
To configure timezone settings from the command line, you enter timezone mode
and enter the required timezone commands.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure timezone settings:
timezone
4. Use the following timezone commands to configure the settings:
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“custom” on page 627 Specifies the name of a custom time zone.
“daylight-name” on page 627 Specifies the name of the time zone when in Daylight Saving Time. This name
is appended to the time.
“daylight-offset” on page 628 Sets the offset, in hours, for Daylight Saving Time.
“daylight-start-day” on page 628 Specifies the day of the week when Daylight Saving Time starts.
“daylight-start-hours” on page Specifies the hour in the day when Daylight Saving Time starts.
629
“daylight-start-minutes” on page Specifies the minute in the hour when Daylight Saving Time starts.
629
“daylight-start-month” on page Specifies the month of the year when Daylight Saving Time starts.
630
“daylight-start-week” on page 631 Specifies the instance of the day in the month when Daylight Saving Time
starts.
“daylight-stop-day” on page 631 Specifies the day of the week when Daylight Saving Time stops.
“daylight-stop-hours” on page 632 Specifies the hour in the day when Daylight Saving Time ends.
“daylight-stop-minutes” on page Specifies the minute in the hour when Daylight Saving Time ends.
633
“daylight-stop-month” on page 633 Specifies the month of the year when Daylight Saving Time ends.
“daylight-stop-week” on page 634 Specifies the instance of the day in the month when Daylight Saving Time
ends.
“direction” on page 635 Specifies the direction, relative to Coordinated Universal Time, of the time
zone.
“name” on page 636 Sets the name of the time zone. This name is appended to the time.
“offset-hours” on page 637 Specifies the offset in hours, relative to Coordinated Universal Time, of the
time zone.
“offset-minutes” on page 637 Specifies the offset in minutes, relative to Coordinated Universal Time, of the
time zone.
5. After you configure the timezone settings, enter exit. The setting of the value
of the timezone becomes effective in the appliance when you issue the exit
command. If you do not want to make the setting effective, type cancel
instead.
6. Restart the appliance to ensure that the new timezone is used by all IBM MQ
processes.
First, you enable the language that the locale uses, and then you select the locale.
Procedure
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Device > Language.
3. Double-click the language that you want to enable to open its properties.
4. Select Enable administrative state, then click Apply.
5. Select Device > System Settings.
6. Select the locale from the System locale list.
7. Click Apply to save the changes to the running configuration.
First, you enable the language that the locale uses, and then you specify the locale.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to enable the language for the locale:
language language_code
admin-state enabled
Where language code specifies the language that you want to enable and is one
of the following codes:
v de (German)
v en (English)
v es (Spanish)
v fr (French)
v it (Italian)
v ja (Japanese)
v ko (Korean)
v pt_BR (Brazilian Portuguese)
v ru (Russian)
v zh_CN (Simplified Chinese)
v zh_TW (Chinese, Taiwan)
4. Type exit to leave config mode.
5. Type the following command to enter system settings mode:
system
6. Type the following command to specify the locale:
You must configure the appliance name if the appliance is part of a high
availability configuration or a disaster recovery configuration.
You use the Administration section of the IBM MQ Appliance web UI to configure
the appliance name on your IBM MQ Appliance. The IBM MQ Appliance web UI
itself contains detailed help on the fields that you need to configure. Here we
describe the major steps that you need to complete.
Note: There are restrictions on changing the names of appliances used by high
availability and disaster recovery configurations. See “Changing appliance names
in high availability configurations” on page 169 and “Changing appliance names in
disaster recovery configurations” on page 187.
Procedure
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Device > System Settings.
3. Specify the appliance name in the Appliance name field. Use letters and
numbers in the name, avoid special characters. The name should not consist of
numbers only.
4. Click Apply to save the changes to the running configuration.
To configure the appliance name from the command line, you enter system settings
mode and enter the required system name configuration command.
Note: There are restrictions on changing the names of appliances used by high
availability and disaster recovery configurations. See “Changing appliance names
in high availability configurations” on page 169 and “Changing appliance names in
disaster recovery configurations” on page 187.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
Where identifier is a string up to 127 characters long. Use letters and numbers in
the name, avoid special characters. The name should not consist of numbers
only.
5. After you configure the name, enter exit to save the configuration and exit, or
type cancel to exit without saving.
To query the appliance name from the command line, you enter system settings
mode and enter the required show command.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode. (You can also run this
command from the mqa# prompt.)
3. Type the following command to query the appliance name:
show system
See “Role based management” on page 344 for details of how to control the
authentication and authorization of appliance users.
You can use the REST management interface to configure and control your
appliance using REST requests.
You must configure REST management interface to enable it and define how it is
accessed.
You can configure the REST management interface by using the IBM MQ
Appliance web UI.
You use the Administration section of the IBM MQ Appliance web UI to configure
the REST management interface on your IBM MQ Appliance. The IBM MQ
Appliance web UI itself contains detailed help on the fields that you need to
configure. Here the major steps that you need to complete are described.
Procedure
1. Start the IBM MQ Appliance web UI, and click the objects icon .
2. Select Device management > REST Management interface.
3. Ensure that Enable administrative state is enabled.
4. Specify the IP address (or host alias) that is used to connect to the REST
management interface. Specify 0.0.0.0 to listen on all appliance interfaces.
5. Specify the port number to connect on. The port is 5554 by default for a REST
interface.
6. If you want to secure your REST connection with SSL (TSL), specify a Custom
SSL server type of Server Profile, and select the Custom SSL server profile (see
“Configuring certificates for the REST management interface” on page 146 for
instructions on creating the profile).
7. Click Apply to save the changes to the running configuration.
You can configure the REST management interface by using the command
interface.
To configure the REST management interface from the command line, you enter
rest-mgmt mode and enter the required rest-mgmt commands.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
You can configure the REST management interface to use certificates that you
supply.
You use the appliance command line interface to configure the REST management
interface to use your certificates.
To set up secure communication between a REST client and the REST management
interface and to handle certificates, you create an SSL server profile on the
appliance. You import the required certificates and key file to the appliance, and
create definition objects for them. The definition objects are used when you create
an ID credentials (idcred) object for the appliance. The idcred is in turn used when
you configure the SSL server profile. Finally, the SSL server profile is associated
with your web management profile.
If you want to configure client validation, you import the certificates of the clients
that are going to be allowed to connect. You then create definition objects for the
certificates, which are used when you create a validation credential (valcred) object.
The valcred object is in turn used when you configure the SSL server profile.
The example in this topic assumes that you have a signed certificate for the
appliance. When you make certificate requests for an appliance, the CN part of the
distinguished name must be the URL that you type to connect to the REST API.
For example, myappliance1.ourcompany.com. If you want to set up the profile to
validate connecting clients, you also require the relevant client certificates.
By default the REST management service listens on all of the appliance ports
(local address set to 0.0.0.0). However, you can configure the service so that it
Procedure
v To upload certificates to your appliance:
1. Ensure that you have the following items:
– A private key to access the appliance certificate.
– The appliance certificate.
– Client certificates (optional).
2. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
3. Log in as a user in the administrators group.
4. Type the following command to enter configuration mode:
config
5. Upload the key and certificates to the appliance by using the copy command,
for example:
copy scp://username@otherserver//home/username/myappliance1key.pem cert:
copy scp://username@otherserver//home/username/myappliance1.cer cert:
copy scp://username@otherserver//home/username/client1.cer cert:
copy scp://username@otherserver//home/username/client2.cer cert:
copy scp://username@otherserver//home/username/client3.cer cert:
You can also copy the certificates to your appliance by using the IBM MQ
Appliance web UI, see “Uploading certificates to the appliance” on page 400.
v To create definition objects for the appliance certificate and key:
1. From configuration mode, type crypto to enter crypto configuration mode.
2. Create a crypto key definition for the private key that is used for generating
the appliance certificate:
key key_alias cert:///keyfile
For example:
key WebUiKey01 cert:///myappliance1key.pem
3. Create a crypto certificate definition for the appliance:
certificate cert_alias cert:///certfile
For example:
certificate RESTmgmt cert:///myappliance1.cer
4. Create a crypto credential definition for the appliance:
idcred credential_name key_alias cert_alias
For example:
idcred RESTmgtCred01 RESTmgtKey01 RESTmgtCert01
v To create a crypto valcred definition for validating clients (this step is optional):
1. From the crypto configuration mode, create a certificate definition object for
each of the client certificates that you have imported:
certificate cert_alias cert:///certfile
For example:
certificate RESTClientCert01 cert:///client1.cer
certificate RESTClientCert02 cert:///client2.cer
certificate RESTClientCert03 cert:///client3.cer
For example:
ssl-server myappliance1
admin-state enabled
idcred RESTmgtCred01
protocols TLSv1d2
valcred RESTcred01
request-client-auth on
require-client-auth on
send-client-auth-ca-list on
v To save all the changes that you have made in crypto configuration mode:
1. Type exit to leave crypto configuration mode.
2. Type write mem to save your configuration changes.
v To associate the SSL server profile with the REST management interface:
1. From configuration mode, type rest-mgmt to enter REST management
interface configuration mode.
2. Enter the following command:
ssl-server SSL_Svr_Profile_name
For example:
ssl-server myappliance1
v To save your REST management interface configuration:
1. Type exit to leave rest-mgmt configuration mode.
2. Type write mem to save your configuration changes.
3. Type exit again to leave configuration mode.
You can use the REST management interface to view and alter IBM MQ Appliance
configurations.
148 IBM MQ Appliance
When you use the REST management interface for this purpose, you send HTTP
requests to the REST interface port and receive JSON-formatted responses with a
payload and indication of success or failure. You can incorporate requests into
programs and so automate interaction with the appliance.
For a reference guide to the REST management interface, see “REST management
interface” on page 865.
There are a number of major steps that are involved in retrieving configuration
information from the IBM MQ Appliance by using the REST management
interface.
To begin retrieving the required configuration information from the appliance, first
identify the specific object class that you need. The configuration root URI for as
/mgmt/config/. To retrieve a list of all available configuration object classes on the
appliance, make a request based on the following example:
GET https://mqhost.com:5554/mgmt/config/
To identify the exact formatting of the object class name, you search the received
response payload. The following listing shows some fragments of the received
response:
{
"_links": {
"self": {
"href": "/mgmt/config/"
}
},
"AccessControlList": {
"href": "/mgmt/config/{domain}/AccessControlList"
},
"AuditLog": {
"href": "/mgmt/config/{domain}/AuditLog"
},
"CertMonitor": {
"href": "/mgmt/config/{domain}/CertMonitor"
},
"CRLFetch": {
"href": "/mgmt/config/{domain}/CRLFetch"
},
"CryptoCertificate": {
"href": "/mgmt/config/{domain}/CryptoCertificate"
},
...
"TimeSettings":{
"href":"/mgmt/config/{domain}/TimeSettings"
},
"TraceTarget":{
"href":"/mgmt/config/{domain}/TraceTarget"
},
"User":{
"href":"/mgmt/config/{domain}/User"
},
"UserGroup":{
Alternatively, you can examine the URI that is displayed in the web UI browser
window when an object or object list is accessed to identify the format of the object
class.
After you identify the required object class name, you can retrieve a list of objects
that exist for that class. To retrieve the list, you construct a URI of the form
/mgmt/status/domain/class_name, replacing domain with the string “default” and
class_name with the desired object class. The following request shows a URI to
retrieve information from the User object class within the default domain:
https://mqhost.com:5554/mgmt/status/default/User
You can also retrieve the configuration information about a specific object, instead
of retrieving the object list output in its entirety. To retrieve information about a
specific object, you construct a URI of the form /mgmt/config/domain/class_name/
object_name. You replace domain with the string “default”, class_name with the
required object class, and object_name with the name of a particular object that has
been configured. For example, you could enter the following URI to retrieve just
the details for the user with the ID “bob”:
https://mqhost.com:5554/mgmt/config/default/User/bob
You can also retrieve the value of a particular property from the configuration
information of a specific object. To retrieve the value of a property, you construct a
URI of the form /mgmt/config/domain/class_name/object_name/property_name.
You replace domain with the string “default”, class_name with the required object
class, object_name with the name of a particular object that has been configured,
and property_name with the name of the property whose value you want to
retrieve. For example, you could enter the following URI to retrieve the value of
the AccessLevel property for the user with the ID “bob”:
https://mqhost.com:5554/mgmt/config/default/User/bob/AccessLevel
To modify an existing property value, you overwrite the existing value with a
payload that contains an updated value. To overwrite the value, first retrieve the
current property value, see Retrieve an individual object property.
In this example, you want to change the IP address that is assigned to Ethernet
interface 4 on the appliance. First, you retrieve the current value of the IPAddress
property of the eth4 object that belongs to the EthernetInterface object class:
GET https://mqhost.com:5554/mgmt/config/default/EthernetInterface/eth4/IPAddress
Modify the property payload that is received to remove the _links{} stanza and
change the property value to the new required value. Any properties that reference
other configuration objects on the appliance must also remove the embedded href
link. In the case of the IPAddress property example, the following listing shows the
modified payload:
{"IPAddress" : "203.0.113.10/24"}
After the modified payload is composed, you can overwrite the existing property
value by sending an HTTP PUT request as shown in the following example.
Updating the configuration on the property level allows for updating one property
value per request.
PUT https://mqhost.com:5554/mgmt/config/default/EthernetInterface/eth4
To update multiple property values with a single request, an update on the object
level is required.
The payload is modified to remove the _links{} stanza and amend property
values as required:
{
"mAdminState" : "enabled",
"UserSummary" : "The Thurleigh server",
"IPAddress" : "198.51.100.99"
}
You then put the payload that describes the Thur_server object back to the
HostAlias configuration:
PUT https://mqhost.com:5554/mgmt/config/default/HostAlias
You can delete configurations at the object level. For example, you can delete a
particular host alias from the HostAlias configuration:
DELETE https://mqhost.com:5554/mgmt/config/default/HostAlias/Green_server
You can create a new configuration by using the REST management interface.
To create an object configuration, create a valid payload that contains the new
configuration. To begin constructing the payload, identify the structural description
of the target object, that is, the object schema. You can retrieve a schema from the
metadata resource of the REST management interface by using a request of the
following form:
GET https://mqhost.com:5554/mgmt/metadata/default/object_name
Where object_name identifies the configuration object that you want to create. For
example, to retrieve the metadata resource for the host alias configuration object,
you would make the following request:
GET https://mqhost.com:5554/mgmt/metadata/default/HostAlias
You can also acquire the metadata for the object that you want to create by looking
up the appliance Service-Oriented Management Interface (SOMA) schema for the
configuration object. The SOMA schemas are located in the store:///xml-mgmt.xsd
file.
From the resource metadata, you can identify the properties that are required to
create the target object. You can also identify the property names to use in the
payload. By using this information, you can create a proper JSON request payload.
A JSON payload has the following structure:
{
"object_class_name": {
"name": "object_name",
"property1_name": "property1_value",
"property2_name": "property2_value",
"property3_name": "property3_value",
"property4_name": "property4_value"
...
}
}
Using the information that you retrieved about the host alias configuration object,
you could create the following payload:
{
"HostAlias": {
"name": "Key_server",
"UserSummary": "Alias for Keysoe server",
"IPAddress": "198.51.100.30",
}
}
You can choose from two approaches to create a configuration object. Both
approaches achieve the same result, but target a different URI. The first approach
uses an HTTP POST request, and the second uses an HTTP PUT request. Use the
POST request to create objects because a POST request results in failure if an object
with the same name exists in the target domain. This approach prevents you from
accidentally overwriting an existing object configuration. However, you can create
an object configuration by using a PUT request. Issuing a PUT request on an
existing object configuration overwrites the configuration with the values in the
request payload.
The following POST request could be used to create the host alias object that is
defined by the example payload:
POST https://mqhost.com:5554/mgmt/config/default/HostAlias
The following PUT request could also be used to create the host alias object that is
defined by the example payload:
PUT https://mqhost.com:5554/mgmt/config/default/HostAlias/Key_server
Note that, if you repeat the POST request with the same payload, the command
will fail. If you repeat the PUT request, the command will succeed.
To illustrate how you can configure the appliance in this way, this topic
implements the following scenario:
v Alice requires full administrative access to both appliance system settings and
IBM MQ.
v Bob requires administrative access to appliance system settings but he does not
require access to IBM MQ.
v Carlos requires full administrative access to the IBM MQ Console but no access
to appliance system settings.
v Dave requires full administrative access to the IBM MQ Console and access to
the IBM MQ CLI.
v Erin requires read-only administrative access to the IBM MQ Console so she can
monitor IBM MQ and its configuration.
v Frank requires limited access to one queue manager using the IBM MQ Console.
There are two different ways that you can grant Alice the user access that she
requires:
v You can create a privileged local user account for Alice
v You can add Alice as a user to a user group that grants full administrative
access.
In this scenario, we use the IBM MQ Appliance web UI for all tasks, and assume
that you are the admin user.
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Account.
3. Enter a name for the user account, in this case enter Alice.
4. Specify an initial password for Alice.
5. Select the access level Privileged.
6. Click Apply to create the user account.
v To create a user group with administrative access, and add Alice to it, complete
the following steps:
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Group.
3. Select New.
4. Enter a name for the user group, in this case enter Administrators.
5. Specify the following access policy in the access profile:
*/*/*?Access=r+w+a+d+x
This profile grants read, write, add, delete, and execute access to all resources
on the appliance.
6. Click Apply to create the user group
7. Create a user account for Alice. Select an Access level of Group defined, and
select the Administrators group that you just created in User group.
8. Click Apply to create the user account.
In this scenario, we use the IBM MQ Appliance web UI for all tasks, and assume
that you are the admin user.
Procedure
To create a user group with the required access, and add Bob to it, complete the
following steps:
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Group.
3. Select New.
4. Enter a name for the user group, in this case enter Appliance_admin.
5. Specify the following four access policies in the access profile:
Carlos, Dave, and Erin's user access is configured by defining different user groups
and adding Carlos,Dave, and Erin to the required groups.
In this scenario, we use the IBM MQ Appliance web UI for all tasks, and assume
that you are the admin user.
Procedure
v To create a user group with access to the IBM MQ Console, and add Carlos to it,
complete the following steps:
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Group.
3. Select New.
4. Enter a name for the user group, in this case enter MQConsole.
5. Specify the following access policies in the access profile:
– Define an access policy that enables group members to log into the IBM
MQ Console. Click Add and enter the following policy:
*/*/login/web-mgmt?Access=r
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Group.
3. Select New.
4. Enter a name for the user group, in this case enter MQConsoleCLI.
5. Specify the same policies as added to the MQConsole group previously
described. In addition, add the following policies:
– Define an access policy that enables users to log in to the appliance. Click
Add and enter the following policy:
*/*/login/ssh?Access=r
– Define another access policy that grants users in the group access to the
IBM MQ CLI. Click Add and enter the following policy:
*/*/mq/cli?Access=x
You can also use the policy builder to define the access policies. If you use
the builder, specify the following resources:
– Ssh (read privilege)
– MQ CLI Administration (execute privilege)
6. Create a user account for Dave. Select Access > User Account and specify
Dave as the user name.
7. Select an Access level of Group defined, and in User group select the
MQConsoleCLI group that you just created.
8. Click Apply to create the user account.
v To create a user group with read-only access to the IBM MQ Console and add
Erin to it, complete the following steps:
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Group.
3. Select New.
4. Enter a name for the user group, in this case enter MQConsoleReadonly.
There are two stages to configuring a user to have access to a single queue
manager, and no other parts of the IBM MQ or appliance configurations.
Firstly you create a user group that gives user access to the IBM MQ Console and
add Frank to that group. You use the IBM MQ Appliance web UI to complete this
stage.
Then you create a messaging user of the same name (Frank) so that MQ authorities
can be granted to Frank by using the MQ object authority manager (OAM). You
use the IBM MQ command line, MQCLI, to complete this stage.
Procedure
v To create a user group with access to the IBM MQ Console, and add Frank to it,
complete the following steps:
1. Start the IBM MQ Appliance web UI, and click the administration icon .
2. Select Access > User Group.
3. Select New.
4. Enter a name for the user group, in this case enter MQConsoleLimited.
5. Specify the following access policies in the access profile:
– Define an access policy that enables group members to log into the IBM
MQ Console. Click Add and enter the following policy:
You do not need to specify a password because the appliance user password
is used to log in to the IBM MQ Console. See “Administering messaging
users” on page 245 for more information about messaging users.
3. You must now run MQ authority commands to give Frank the required
access. You can define the access by using MQSC, and you can grant access
directly to Frank (you could also define a messaging group, add Frank to it,
and grant access to that group). Assuming Frank only wants to display
information about the queue manager QM1 and the queues defined on it,
run the following MQSC commands to grant Frank access to the IBM MQ
Console to display QM1 and associated queues:
mqa (mqcli)# runmqsc QM1
5724-H72 (C) Copyright IBM Corp. 1994, 2017.
Starting MQSC for queue manager QM1.
SET AUTHREC PROFILE(SYSTEM.ADMIN.COMMAND.QUEUE) OBJTYPE(QUEUE) PRINCIPAL(’Frank’) AUTHADD(PU
SET AUTHREC PROFILE(SYSTEM.REST.REPLY.QUEUE) OBJTYPE(QUEUE) PRINCIPAL(’Frank’) AUTHADD(PUT,G
SET AUTHREC OBJTYPE(QMGR) PRINCIPAL(’Frank’) AUTHADD(DSP)
SET AUTHREC PROFILE(**) OBJTYPE(QUEUE) PRINCIPAL(’Frank’) AUTHADD(DSP)
You could use the IBM MQ Console instead of runmqsc to define the MQ
authorities for Frank, if required.
You can use the graphical interface that is provided by the IBM MQ Console to
create and configure queue managers and associated objects. For details on how to
use the IBM MQ Console, see “Using the IBM MQ Console” on page 207.
The appliance also provides CLI commands that you can use to edit the qm.ini
file. You are most likely to edit the qm.ini file when you move existing queue
managers from other platforms to the appliance as part of consolidating your IBM
MQ estate. See “Editing qm.ini files” on page 311.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Add the environment variable:
v To add a global environment variable, enter the following command:
setmqvar -k Name -v Value
Where:
Name Specifies the name of the global environment variable.
Ensure that the value of Name is correct before you use the command
to add an environment variable. The value of Name is not validated.
Value Specifies the value of the specified environment variable.
If Value is a string that contains spaces, it must be enclosed in double
quotation marks. Any double quotation marks that are used in the
Value must be escaped by using a backslash ( \ ).
Ensure that the value of Value is correct before you use the command
to add an environment variable. The value of Value is not validated.
v To add an environment variable for a specific queue manager, enter the
following command:
setmqvar -m QMgrName -k Name -v Value
Where:
Example
The following example shows the addition of the global environment variable
MQSSLRESET with a value of 0:
setmqvar -k MQSSLRESET -v 0
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Modify the environment variable:
v To modify a global environment variable, enter the following command:
setmqvar -k Name -v Value
Where:
Name Specifies the name of the global environment variable to modify.
Ensure that the value of Name is correct before you use the command
to modify an environment variable. The value of Name is not
validated.
Value Specifies the value of the specified environment variable.
If Value is a string that contains spaces, it must be enclosed in double
quotation marks. Any double quotation marks that are used in the
Value must be escaped by using a backslash ( \ ).
Ensure that the value of Value is correct before you use the command
to modify an environment variable. The value of Value is not
validated.
v To modify an environment variable for a specific queue manager, enter the
following command:
setmqvar -m QMgrName -k Name -v Value
Example
The following example shows the modification of the global environment variable
MQSSLRESET with a value of 1000:
setmqvar -k MQSSLRESET -v 1000
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Remove the environment variable:
v To remove a global environment variable, enter the following command:
setmqvar -k Name -d
Where:
Name Specifies the name of the global environment variable.
Ensure that the value of Name is correct before you use the command
to remove an environment variable. The value of Name is not
validated.
v To remove an environment variable from a specific queue manager, enter the
following command:
setmqvar -m QMgrName -k Name -d
Where:
QMgrName
Specifies the queue manager for which the environment variable is
removed.
Example
The following example shows the removal of the global environment variable
MQSSLRESET:
setmqvar -k MQSSLRESET -d
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View one or more environment variables:
v To view all global environment variables, enter the following command:
dspmqvar
v To view a specific global environment variable, enter the following
command:
dspmqvar -k Name
Where:
Name Specifies the name of the global environment variable to view.
Ensure that the value of Name is correct before you use the command
to view an environment variable. The value of Name is not validated.
v To view all environment variables for a specific queue manager, enter the
following command:
dspmqvar -m QMgrName
Where:
QMgrName
Specifies the queue manager for which the environment variable is
viewed.
v To view a specific environment variable for a specific queue manager, enter
the following command:
dspmqvar -m QMgrName -k Name
Where:
QMgrName
Specifies the queue manager for which the environment variable is
viewed.
Name Specifies the name of the queue manager environment variable to
view.
Example
The following example views of the global environment variable MQSSLRESET:
dspmqvar -k MQSSLRESET
A full description of IBM MQ Advanced Message Security are given in the IBM
MQ documentation, see IBM MQ Advanced Message Security.
To implement IBM MQ AMS on the appliance you must use the runmqsc
commands to manipulate security policies for individual queue managers.
Specifically, you use the following commands:
v SET POLICY
v DELETE POLICY
v DISPLAY POLICY
Note: You cannot use the IBM MQ control commands setmqspl or dspmqspl to
work with security policies on the appliance.
You can view the MCA intercept configuration of a queue manager, or specific
server-connection channel, by using the following command:a
dspamschl -m QMgrName [-n Channel_Name]
For more information about AMS and MCA interception, see Message Channel
Agent (MCA) interception in the IBM MQ documentation.
For more information about HA on the IBM MQ Appliance, see “High availability”
on page 6.
To configure HA for a pair of appliances, you must complete the following steps:
1. Connect the appliances together. For more information, see “Configuring the
hardware for high availability.”
2. Create an HA group for the appliances. For more information, see “Configuring
the high availability group” on page 170.
3. Create HA queue managers on the appliances. For more information, see
“Configuring high availability queue managers” on page 173.
You need three Ethernet cables of sufficient length to directly connect the two
appliances together. Cables are provided with the appliance for this purpose, see
“Connect the appliance to a network” on page 65. If you supply your own cables,
note that these need to be straight through cables, not crossover cables.
If neither the HA group primary interface nor the HA group alternate interface are
connected, the appliances in the HA group are unable to determine the state of the
other appliance. This situation can cause high availability (HA) queue managers to
run on both appliances simultaneously.
Note: Do not disable these interfaces through the IBM MQ Appliance web UI or
the command line interface in an attempt to test the high availability features.
Disabling the links causes unexpected results; you cannot simulate real high
availability behavior by disabling a network interface.
What to do next
After the appliances are connected, you can create an HA group for the appliances.
For more information, see “Creating a high availability group” on page 170.
High availability (HA) configurations use the eth13, eth17, and eth21 ports on both
appliances in the HA. If you need to change IP addresses for any of these ports,
you must use the following procedure:
1. Remove the HA configuration on both appliances. You remove HA by
removing queue managers from HA control, see “Removing a queue manager
from a high availability group” on page 178, and then removing the HA group
itself, see “Deleting a high availability group” on page 172.
2. Allocate new IP numbers to the Ethernet ports as required, observing the
requirement that the addresses are on the same, dedicated subnet. See
“Configuring Ethernet interfaces by using the command line” on page 121.
3. Re-create the HA configuration by configuring the queue managers as
described in “Creating a high availability group” on page 170 and “Creating a
high availability queue manager” on page 173.
If you need to change appliance names, you must use the following procedure:
1. Remove the HA configuration on both appliances. You remove HA by
removing queue managers from HA control, see “Removing a queue manager
from a high availability group” on page 178, and then removing the HA group
itself, see “Deleting a high availability group” on page 172.
2. Allocate new appliance names as required, see “Configuring the appliance
name by using the command line” on page 143.
The HA group controls the availability of the queue managers within the group,
determining where the queue managers run. You must create the HA group before
you can create HA queue managers to run in the group. After you create the HA
group, you can view the status of the group. You can also view which queue
managers are in the HA group.
If you use messaging users and groups on the appliance for authentication records
in an HA queue manager, you must set up the same messaging users and groups
on both appliances. The users and groups are not automatically replicated between
the appliances.
Before you can create an HA group, you must configure the appliances that you
want to group. For more information, see “Configuring the hardware for high
availability” on page 167
The HA group controls the availability of the queue managers within the group,
determining where the queue managers run. You must create the HA group before
you can create HA queue managers to run in the group. After you create the HA
group, you can view the status of the group. You can also view which queue
managers are in the HA group.
To create an HA group and generate unique keys for communication between the
appliances in the group, you must enter commands on both appliances in the
group.
Procedure
1. Enter the IBM MQ administration mode on both appliances by entering the
following command:
mqcli
2. On the first appliance (machine A), enter the following command:
prepareha -s SecretText -a IPAddressOfMachineB [-t timeout]
where:
where:
-s SecretText
Specifies the same string that was specified in the prepareha command
on machine A.
-a IPAddressOfMachineA
Specifies the IP address of the HA primary interface on the first
appliance in the group. You must specify the IP address using ip v4
dotted decimal notation (for example, “192.0.2.8”).
Example
The following example shows the creation of an HA group for appliances appl1
and appl2 where a new, unique key is generated for communication between the
appliances. The HA group primary interface of appl2 has the IP address 192.0.2.8;
the HA group primary interface of appl1 has the IP address 192.0.2.7.
What to do next
After the HA group is created, you can create HA queue managers that are
controlled by the HA group. For more information, see “Creating a high
availability queue manager” on page 173.
You can view the status of appliances in a high availability (HA) group by using
the dsphagrp command on the command line.
The dsphagrp command returns information about the operational status of each of
the appliances in the HA group. The status can be one of the following statuses:
v Online. The appliance is available.
v Offline. The appliance is unavailable.
v Standby. The appliance has been temporarily removed from the HA group.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the status of the appliances in the HA group by entering the following
command from one of the appliances:
dsphagrp
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
You can view the status of appliances in a high availability (HA) group by using
the IBM MQ Console.
Procedure
1. Start the IBM MQ Appliance web UI and view the MQ Console.
2. Click the High Availability menu in the console title bar. The menu displays the
status of both appliances in the group.
You can delete an existing high availability (HA) group by using the dlthagrp
command on the command line.
You must delete all HA queue managers in the HA group before you delete the
group.
You run the command on one appliance and the HA group is deleted on both
appliances in the group. If the other appliance is not available at the time of the
delete, the command must be entered on the other appliance to delete the group
on that appliance.
You can delete an existing high availability (HA) group by using the IBM MQ
Console.
You must delete all HA queue managers in the HA group before you delete the
group.
You use the console on one appliance and the HA group is deleted on both
appliances in the group. If the other appliance is not available at the time of the
delete, the group must be deleted on that appliance when it is next available.
Procedure
1. Start the IBM MQ Appliance web UI and view the MQ Console.
2. Click the High Availability menu in the console title bar, and select Delete
group.
3. A window prompts you to confirm the deletion. Click Delete.
Before you can create an HA queue manager on an appliance, you must add the
appliance to an HA group. For more information, see “Creating a high availability
group” on page 170.
You create a queue manager and specify that it is part of an HA group. Each HA
queue manager that you create uses a unique port on the HA replication interface.
The first HA queue manager created uses port 7789, the second 7790, and so on.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Create the HA queue manager by using one of the following commands:
v Create the HA queue manager with the default file system size of 64 GB by
entering the following command:
Note:
v The HA queue manager is created on the appliance on which the crtmqm
command is run. The queue manager automatically starts on that appliance
after it is created. You cannot use the strmqm command to start the queue
manager.
v You can use other crtmqm parameters in the command. For more information
about the available parameters, see “crtmqm” on page 456.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
Example
Before you can add an existing queue manager to a group, the queue manager
must be stopped.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Enter the following command to stop the queue manager:
endmqm QMname
3. Enter the following command to add an existing queue manager to the HA
group:
sethagrp -i QMname
Example
The following example shows the existing queue manager QM1 being added to the
HA group:
sethagrp -i QM1
You can optionally specify a floating IP address for a high availability (HA) queue
manager such that an application can connect whichever appliance the queue
manager is running on.
Both appliances in the HA pair must be active when you specify a floating IP
address for an HA queue manager.
If you specify a floating IP address for a queue manager, an application can use
that address to connect to a queue manager regardless of which appliance in the
HA pair the queue manager is actually running on.
You can define only one floating IP address for IBM MQ traffic on a queue
manager, so you can only run the sethaint command once for each queue
manager.
When you specify the floating IP address for IBM MQ traffic, you also specify the
local interface that it can be reached on (for example, eth22). This interface must be
a physical interface that exists on both appliances, and each interface must have a
static IP address configured.
The floating IP address must be a valid IPv4 address that is not already defined on
either appliance, and it must belong to the same subnet as the static IP addresses
defined for the local interface.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Enter the following command to add the floating IP address to the queue
manager:
sethaint -m queue_manager -a -f floating_IP -l local_interface
Where:
queue_manager
Is the queue manager that the floating IP address applies to.
Example
The following example shows the floating IP address 192.0.2.15 being allocated for
queue manager QM1 and associated with the local interface eth22:
sethaint -m QM1 -a -f 192.0.2.15 - l eth22
What to do next
After you have defined a floating IP address for a queue manager, you can bind
that address to a listener or a channel.
For example, the following MQSC command binds a listener named “listy” to the
floating IP address 192.0.2.15:
DEFINE LISTENER(listy) IPADDR(192.0.2.15)
The following MQSC command binds a sender channel named “sendy” to the
floating IP address 192.0.2.15:
DEFINE CHANNEL(sendy) CHLTYPE(SDR) LOCLADDR(192.0.2.15)
Procedure
v To view the HA status of a queue manager by using the command line interface:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the status of an HA queue manager by entering the following
command from one of the appliances:
status QMgrName
Where:
the toolbar .
3. In the properties window, click on the High availability status section to
open it.
If the queue manager is also part of a disaster recovery (DR) configuration, you
must remove it from the DR configuration before you remove it from the HA
group. See “Removing a queue manager from a disaster recovery configuration by
using the command line” on page 190.
You must run the command on the queue manager primary appliance (the
appliance that the queue manager is running on). You can discover where the
queue manager is running by using the dspmq command or the status qmanager
command. Either command will report the status as Running for the current
appliance, or Running elsewhere for the other appliance in the HA group.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Enter the following command to stop the queue manager:
endmqm QMname
3. Enter the following command to remove the queue manager from the HA
group and run it as a stand-alone queue manager:
sethagrp -e QMname
Where QMname is the name of the queue manager. The queue manager is
removed from the group. You must then use the strmqm command to start the
queue manager.
4. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
The following example shows the queue manager HAQM1 being removed from the
HA group:
sethagrp -e HAQM1
The following tables show how the Ethernet ports are configured on the two HA
appliances, HA1 and HA2.
Table 13. Ethernet ports on appliance HA1
Ethernet port Example IP address Port Description
eth13 192.0.10.11 5404, 5405 for HA primary group
heartbeat, 2222 for interface
configuration
Both appliances in a high availability pair are typically located in the same data
center. If some disaster befalls the data center, and both appliances are unavailable,
you can manually start the queue manager on a recovery appliance located in
another data center. See “Disaster recovery for a high availability configuration” on
page 9 for an overview.
To configure disaster recovery for a high availability queue manager, complete the
following steps:
1. On the appliance where your HA queue manager is running, enter the IBM MQ
administration mode by entering the following command:
mqcli
2. Stop the HA queue manager:
endmqm queue_manager
Where:
-m QMName
Specifies the queue manager that you are preparing for participation in
a disaster recovery configuration.
-r RecoveryName
Specifies the name of the IBM MQ Appliance that is the recovery
appliance.
-i RecoveryIP
Specifies the IP address of the recovery appliance.
-p port
Specifies the port that the data replication listener on each appliance
uses.
-f floatingIP
The floating IP address is an IPv4 address that is used to replicate
queue manager data from whichever HA appliance the queue manager
is currently running on to the queue manager on the recovery
appliance. The floating IP address must be in the same subnet group as
the static IP address assigned to the replication port (eth20) on both
appliances.
Note that you do not physically configure an Ethernet port with this
address. Select a free IP address in the same subnet as the replication
ports on the two appliances, and specify it in the crtdrprimary
command to make it the IP used for replication with the recovery
appliance. You must specify a different floating IP address for each of
the HA queue managers that you configure disaster recovery for.
The crtdrprimary command configures the queue manager on both appliances
in the HA pair, and reserves storage for the data snapshot on both
appliances.The crtdrprimary command returns a crtdrsecondary command
when it has completed, for example:
Queue manager QM3 is prepared for Disaster Recovery replication.
Now execute the following command on appliance mydrappl:
crtdrsecondary –m QM3 –s 65536 –l myliveapp3 –i 198.51.100.10 –p 2015
4. Copy the crtdrsecondary command and run it on the recovery appliance. This
creates a secondary version of the queue manager, and queue manager data is
replicated from the primary queue manager.
The following tables show how the Ethernet ports are configured on the two HA
appliances, HA1 and HA2, and the DR appliance, DR.
Table 15. Ethernet ports on appliance HA1
Ethernet port IP address Description
eth13 192.0.10.11 HA primary group interface
eth17 192.0.20.11 HA group alternative
interface
eth20 192.0.40.11 Static IP address configured
for DR port
- 192.0.40.19 Floating IP address used by
appliance HA1 or HA2 for
replication with DR
appliance
eth21 192.0.30.11 HA replication interface
eth22 203.0.113.0 Data interface
When a node in an HA group fails, the queue managers fail over to the remaining
appliance in the group. To restore high availability function after you replace or
repair the failed appliance, you must first deconstruct the HA group by running
the queue managers stand-alone and deleting the HA group from the remaining
appliance. You then create a new HA group, and add the queue managers back to
it.
Before you create the new group, you must ensure that both appliances are
running the same level of firmware. If your new appliance is running a later
version of the firmware, you must either upgrade your existing appliance, or
downgrade your new appliance.
Procedure
1. On the appliance that did not fail, stop each queue manager by using the
following command:
endmqm QMname
2. If the queue manager is part of a disaster recovery configuration as well as part
of an HA group, you must remove it from the disaster recovery configuration.
Use the following command:
dltdrprimary -m QMname
3. Enter the following command to remove a queue manager from the HA group
and run it as a stand-alone queue manager. The queue manager must be
stopped before you run this command.
sethagrp -e QMname
Where QMname is the name of the queue manager. The queue manager is
removed from the HA group. You can use the strmqm command to restart the
queue manager and run it in a stand alone configuration while you replace the
failed node, if required.
Repeat this command for all HA queue managers.
Where QMname is the name of the existing queue manager. The queue manager
is added to the group and is started. Repeat for all the queue managers that
were previously part of the HA group.
7. Set the preferred appliance for the queue manager by running the following
command:
sethapreferred QMname
Repeat this command for each queue manager. Run the command on the
appliance that did not fail if you want that appliance to be the preferred
location. Run the command on the replaced or repaired appliance if you want
that appliance to be the preferred location.
8. If you want to restore disaster recovery capability to any of the queue
managers, follow the instructions in “Configuring disaster recovery for a high
availability queue manager” on page 180.
You cannot create a disaster recovery configuration on an appliance that has a high
availability group.
Procedure
1. Connect an Ethernet cable between port eth20 on the appliance and your
network. This connection is the replication interface.
2. Ensure that the Ethernet port has an IP address configured. If the port was not
configured when you initialized the appliance, then configure it by using the
procedure that is described in “Ethernet interfaces” on page 119. You can use
the IBM MQ Appliance web UI or the command line to configure the interface.
3. Ensure that the Eth20 port connects with the Eth20 port on the other appliance.
You can do this either by ensuring that the IP address of each Eth20 port
belongs to the same, dedicated subnet, or by defining a static IP route on each
appliance between the two Eth20 ports (see “ip-route” on page 648).
4. Ensure that both the main and recovery appliances have system names. If the
names were not assigned when you initialized the appliances, then name them
by using the procedure that is described in “Configuring the appliance name”
on page 143. You can use the IBM MQ Appliance web UI or the command line
to assign appliance names.
If you need to change IP addresses, you must use the following procedure:
1. Remove the disaster recovery (DR) configuration on both appliances. You
remove DR by removing both primary and secondary queue managers from
DR control, see “Removing a queue manager from a disaster recovery
configuration by using the command line” on page 190.
2. Allocate new IP numbers to the two eth20 ports as required, observing the
requirement that the addresses are on the same, dedicated subnet. See
“Configuring Ethernet interfaces by using the command line” on page 121.
3. Re-create the DR configuration by configuring the queue managers as described
in “Configuring queue managers for disaster recovery by using the command
line.”
You can also use the IBM MQ Appliance web UI to perform these operations.
Follow the related links for details.
If you need to change appliance names, you must use the following procedure:
1. Remove the disaster recovery (DR) configuration on both appliances. You
remove DR by removing both primary and secondary queue managers from
DR control, see “Removing a queue manager from a disaster recovery
configuration by using the command line” on page 190.
2. Allocate new appliance names as required, “Configuring the appliance name by
using the command line” on page 143.
3. Re-create the DR configuration by configuring the queue managers as described
in “Configuring queue managers for disaster recovery by using the command
line.”
You can also use the IBM MQ Appliance web UI to perform these operations.
Follow the related links for details.
You must have configured a main appliance and a recovery appliance as described
in “Configuring the hardware for disaster recovery” on page 185.
When you configure disaster recovery, you specify that an existing queue manager
on your main appliance is the primary queue manager. When that command
completes, it outputs a further command that you run on your recovery appliance
to create the secondary queue manager. You then run that command on the
recovery appliance to create another instance of that queue manager and specify
that it is the secondary queue manager.
You must ensure that there is sufficient free memory for the snapshot of the queue
manager data that is required for disaster recovery. For example, a queue manager
created with the default 64 GB size requires a further 64 GB of free space to be
reserved for the snapshot of the queue manager data.
You cannot configure queue managers for disaster recovery if any of the queue
managers on the appliance belong to a high availability group.
Procedure
1. On the appliance that is designated as your main appliance, run the
crtdrprimary command, specifying an existing queue manager. The queue
manager must be stopped when you run this command.
crtdrprimary -m QMName -r RecoveryName -i RecoveryIP -p Port
Where:
-m QMName
Specifies the queue manager that you are preparing for participation in
a disaster recovery configuration. The queue manager must be stopped
when you run the command.
-r RecoveryName
Specifies the name of the IBM MQ Appliance that is the recovery
appliance.
-i RecoveryIP
Specifies the IP address of the DR connection (eth20) of the recovery
appliance.
-p port
Specifies the port that the data replication listener on each appliance
uses. The port must be in the range 1025-9999 and must be the same on
both appliances (do not use port 2222, it is reserved by the appliance).
Each listener is active only on the replication interface (eth20), but you
must ensure that the listener does not conflict with any services
configured to listen on all appliance interfaces (for example, MQ
listeners, or SSH and WebUI services, where these are not restricted to
particular local IP addresses). The data replication listener must also
not be blocked by any routing or firewalls between the appliances on
the replication network
For example:
crtdrprimary –m QM1 –r mydrappl –i 198.51.100.3 –p 2015
On successful completion, the command outputs the crtdrsecondary command.
You can now restart the queue manager.
2. On the appliance that is designated as your recovery appliance, run the
command that was output by the crtdrprimary command on its successful
completion, for example:
You must have configured a main appliance and a recovery appliance as described
in “Configuring the hardware for disaster recovery” on page 185.
When you configure disaster recovery, you specify that an existing queue manager
on your main appliance is the primary queue manager. When that command
completes, it outputs a further command that you run on your recovery appliance
to create the secondary queue manager. You then run that command on the
recovery appliance to create another instance of that queue manager and specify
that it is the secondary queue manager.
You must ensure that there is sufficient free memory for the snapshot of the queue
manager data that is required for disaster recovery. For example, a queue manager
created with the default 64 GB size requires a further 64 GB of free space to be
reserved for the snapshot of the queue manager data.
You can use the chart widget to see the amount of free space available. Configure
the widget to display Disk usage - platform wide, and select Appliance data -
free space (see “Monitoring system resource usage” on page 231).
You cannot configure queue managers for disaster recovery if any of the queue
managers on the appliance belong to a high availability group.
Procedure
1. On the appliance that is designated as the main appliance, create the primary
instance of the queue manager.
a. Start the IBM MQ Appliance web UI on the main appliance and view the
MQ Console.
b. In the Queue Manager widget, select the queue manager that you want to
designate as a primary instance in the disaster recovery configuration.
c. Ensure that the queue manager is stopped. (Click the stop icon in
the queue manager widget toolbar, if necessary.)
d. Select More > Disaster Recovery and click Create DR Primary.
e. Specify the name of the appliance that will host the secondary instance of
the queue manager.
Procedure
v To remove a primary queue manager from a disaster recovery configuration:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Ensure that the queue manager is stopped. Enter the following command if
necessary:
endmqm qmanager
3. Enter the following command to remove the queue manager from the
disaster recovery configuration.
Procedure
v To remove a primary queue manager from a disaster recovery configuration:
1. Open the console and find the widget that displays the queue manager.
2. Ensure that the queue manager is stopped. (Click the stop icon in
the queue manager widget toolbar, if necessary.)
3. Select More > Disaster Recovery and select Delete DR Primary.
v To remove a secondary queue manager from a disaster recovery configuration:
1. Open the console and find the widget that displays the queue manager.
2. Select More > Disaster Recovery and click Delete DR Secondary.
Procedure
v To view the DR status of a queue manager by using the command line interface:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the status of a DR queue manager by entering the following command
from one of the appliances:
status QMgrName
Where:
Both appliances in a high availability pair are typically located in the same data
center. If some disaster befalls the data center, and both appliances are unavailable,
you can manually start the queue manager on a recovery appliance located in
another data center. See “Disaster recovery for a high availability configuration” on
page 9 for an overview.
To configure disaster recovery for a high availability queue manager, complete the
following steps:
1. On the appliance where your HA queue manager is running, enter the IBM MQ
administration mode by entering the following command:
mqcli
2. Stop the HA queue manager:
endmqm queue_manager
3. Specify that the queue manager is the primary instance in a disaster recovery
configuration and include a floating IP address that can be used by either of
the appliances in the HA pair:
crtdrprimary –m queue_manager –r RecoveryName –i RecoveryIP
–p port_number -f floating_IP
Where:
-m QMName
Specifies the queue manager that you are preparing for participation in
a disaster recovery configuration.
-r RecoveryName
Specifies the name of the IBM MQ Appliance that is the recovery
appliance.
-i RecoveryIP
Specifies the IP address of the recovery appliance.
-p port
Specifies the port that the data replication listener on each appliance
uses.
-f floatingIP
The floating IP address is an IPv4 address that is used to replicate
queue manager data from whichever HA appliance the queue manager
is currently running on to the queue manager on the recovery
Note that you do not physically configure an Ethernet port with this
address. Select a free IP address in the same subnet as the replication
ports on the two appliances, and specify it in the crtdrprimary
command to make it the IP used for replication with the recovery
appliance. You must specify a different floating IP address for each of
the HA queue managers that you configure disaster recovery for.
The crtdrprimary command configures the queue manager on both appliances
in the HA pair, and reserves storage for the data snapshot on both
appliances.The crtdrprimary command returns a crtdrsecondary command
when it has completed, for example:
Queue manager QM3 is prepared for Disaster Recovery replication.
Now execute the following command on appliance mydrappl:
crtdrsecondary –m QM3 –s 65536 –l myliveapp3 –i 198.51.100.10 –p 2015
4. Copy the crtdrsecondary command and run it on the recovery appliance. This
creates a secondary version of the queue manager, and queue manager data is
replicated from the primary queue manager.
Figure 38. Configuring an HA queue manager for disaster recovery (using example IP addresses)
The following tables show how the Ethernet ports are configured on the two HA
appliances, HA1 and HA2, and the DR appliance, DR.
Table 18. Ethernet ports on appliance HA1
Ethernet port IP address Description
eth13 192.0.10.11 HA primary group interface
eth17 192.0.20.11 HA group alternative
interface
eth20 192.0.40.11 Static IP address configured
for DR port
- 192.0.40.19 Floating IP address used by
appliance HA1 or HA2 for
replication with DR
appliance
eth21 192.0.30.11 HA replication interface
eth22 203.0.113.0 Data interface
You can configure the IBM MQ Appliance so that queue managers can use SAN
storage.
When you want to use a SAN for queue manager storage you must configure a
suitable SAN, configure the appliance to connect to the SAN using the appliance's
host bus adapters, and finally create queue managers that use SAN storage.
Queue manager data is not encrypted by the appliance, so you must take steps to
secure your SAN storage independently. Volumes configured for appliance use are
used to store sensitive information, including certificates and password files
relating to the queue manager.
The appliance supports access to a switched SAN fabric accessed by using fibre
channel host bus adapters. You must configure your SAN so that each queue
manager uses a separate, dedicated LUN.
Ensure that your storage network is zoned so that only the appliance using a
particular volume can access the LUN in normal operations. In a disaster recovery
scenario, it might be appropriate for multiple appliances to have access to a single
LUN, although only one appliance has the volume active (enabled) at any given
time.
Ensure administrative access to the data stored on SAN volumes is controlled and
audited appropriately.
You must complete the following major steps to configure SAN storage for queue
managers on your appliance:
1. Configure the SAN to create the LUNs to be used by queue managers, and
allow access from the appliance host bus adapters. LUNs are identified by LUN
UUIDs (LUIDs).
2. Define a volume for each LUN, using the LUID to identify it. You require a
separate volume for each proposed queue manager, see “Configuring volumes”
on page 198.
SAN disks are potentially available to multiple appliances at the same time (one
reason for using SAN disks is to obtain higher availability of queue managers).
There is a potential risk of more than one appliance trying to use a disk at the
same time. To prevent this happening, an IBM MQ Appliance uses SCSI persistent
reservations to reserve a disk for its exclusive use. In normal operation, the
appliance handles these reservations without involving any administrator action;
an appliance reserves the disk before enabling it and then releases the reservation
after disabling it. If an appliance attempts to enable a volume that is already
reserved by a different appliance, the attempt fails, with appropriate messages
reported in the system log. However, if an appliance fails abruptly while holding a
reservation on a disk the reservation is not automatically released, and the failed
appliance cannot release the reservation either. In this situation, you must remove
the SCSI persistent reservation by using thefibre-channel-unlock-volume
command before another appliance can enable the volume and the queue manager
can resume.
You must use a storage area network (SAN) that the appliance host bus adapters
(HBA) can operate with, and set up SAN to provide storage for queue managers.
You (or the SAN administrator) must create one SAN device (LUN) for each queue
manager that the appliance persists to remote storage. The SAN must be
appropriately zoned to permit the appliance or appliances that use a particular
LUN to connect to the SAN. The SAN server must report a genuinely unique ID of
The appliance HBA is an Emulex 16Gb FC Dual-port HBA Gen 5 (see “Fibre
channel module” on page 57). Full details of the device can be found at
https://www.broadcom.com/products/storage/fibre-channel-host-bus-adapters/
lpe16002b.
Configuring volumes
You define volume objects on the appliance that represent the storage that a queue
manager can access.
You define volume objects that are then used when you create queue managers to
define the LUN used by the queue manager.
Procedure
v To configure a volume object by using the IBM MQ Appliance web UI:
1. Start the IBM MQ Appliance web UI, and click the object icon .
2. Select Network Settings > Fibre Channel Volume.
3. Click New.
4. Enter a Name for the volume.
5. Click fibrechannel to reveal the fibre channel options.
6. Ensure that Enable Administrative State is enabled.
7. Specify the LUID that identifies the LUN that this volume is used to access.
8. Select or deselect the Use Multipath option as required.
9. Click Apply.
v To configure a volume object by using the command line interface:
1. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to create your volume object and enter volume
configuration mode:
fibre-channel-volume volume_name
4. Specify the LUID that identifies the LUN that the volume is used to access:
lun-uid logical_unit_number
5. Specify whether the volume uses multipath connections or not:
Before you use a volume for the first time, you must initialize the file system.
Important: You must only initialize the volume file system once, after you create it
and before you attempt to use it. Initializing after you have used the volume erases
all the contents of the volume.
Procedure
v To initialize the file system by using the IBM MQ Appliance web UI
1. Start the IBM MQ Appliance web UI, and click the object icon .
2. Select Network Settings > Fibre Channel Volume.
3. Select the volume you are initializing the file space for to view its
configuration.
4. Disable the administrative state.
5. Select Actions > Initialize File System
6. Enable the administrative state for the volume and save your changes.
v To initialize the file system by using the command line:
1. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to enter volume configuration mode for your
volume:
fibre-channel-volume volume_name
4. Type the following commands to disable your volume, and leave volume
configuration mode:
admin-state disabled
exit
5. Type the following command to initialize the file space for your volume:
fibre-channel-fs-init volume_name
6. Type the following commands to re-enter configuration mode for your
volume, re-enable your volume, and leave volume configuration mode:
fibre-channel-volume volume_name
admin-state enabled
exit
7. Type exit to leave global configuration mode.
You configure a queue manager to use SAN storage when you create the queue
manager.
You must create volume objects before you can create queue managers that use
SAN storage. See “Configuring volumes” on page 198.
You configure a queue manager to use SAN storage by specifying a volume object
when you create the queue manager. The volume object in turn specifies the LUN
that the queue manager uses for storage. A queue manager must be uniquely
associated with a LUN, you cannot create a queue manager that shares a LUN
with another queue manager.
If the appliance on which you are running a queue manager fails, you can re-create
the queue manager on another appliance and re-associate it with its SAN storage.
Procedure
v To configure a queue manager by using the IBM MQ Console:
1. Open the IBM MQ Console (see “Using the IBM MQ Console” on page 207).
2. In the Queue Manager widget, click the plus icon to start the Create
queue manager wizard.
3. Enter the name for the queue manager and click Next.
4. Click Next again to skip the high availability set up page (you cannot create
a high availability queue manager that uses SAN storage).
5. Select Yes for Use external storage.
6. Select the volume object you created for this queue manager from the SAN
volume name list.
7. Select New if this is the first time the queue manager volume is used, or
Re-create If you are recreating a queue manager after an appliance failure,
and want to reconnect to SAN storage for that queue manager
8. Click Create to create the queue manager.
v To configure a queue manager by using the command line:
1. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109. Log in as a user with permissions to create IBM MQ objects.
2. Enter the mqcli command to enter IBM MQ administration mode.
3. If you are creating a new queue manager, enter the crtmqm command to
create a queue manager.
crtmqm qm_name -fc volume_object
where volume_object is the volume object previously created that specifies the
LUN that will be exclusively allocated to the queue manager.
You can use other options when you create the queue manager, as described
in “crtmqm” on page 456, but you cannot use the -sx option to specify high
availability capability.
4. If you are re-creating a queue manager that was running on a failed
appliance, enter the addmqm command:
addmqm -fc volume_object -m qm_name
where volume_object is the volume object that specifies the LUN that will be
exclusively allocated to the queue manager, and qm_name is the name of the
queue manager that you are recreating.
You can remove a queue manager that you have configured to use SAN storage.
You can remove a SAN queue manager using either the IBM MQ Console or the
command line.
You use a different method for removing a queue manager that uses SAN storage
than one that uses appliance storage. You use remove rather than delete (the
rmvmqinf command rather than the dltmqm command), this method leaves the
queue manager data intact.
After you have removed the queue manager, you must then remove the volume
object used by the queue manager (unless you are intending to reuse it for a
different queue manager).
Procedure
v To remove a queue manager by using the IBM MQ Console:
1. Open the IBM MQ Console (see “Using the IBM MQ Console” on page 207).
2. Select the queue manager that you want to remove in the queue manager
where qm_name is the name of the queue manager that you are removing.
What to do next
Remove the volume object that was associated with the removed queue manager.
Alternatively, you can associate the volume object with a new queue manager.
The mqweb server that hosts the IBM MQ Console and administrative REST API is
provided with a default configuration. You can alter some of this configuration, if
required.
You can view the current configuration of the logs by using the dspmqweb
properties command with the -a flag. For more information, see dspmqweb. You
can reset the logging configuration by using the setmqweb properties command
with the -k and -d flags. For more information, see setmqweb.
Procedure
Use the setmqweb properties command from the mqcli prompt to configure
logging:
v To set the maximum log file size, use the following command:
setmqweb properties -k maxTraceFileSize -v size
where size specifies the size, in MB, that each log file can reach. The default
value is 20.
v To set the maximum number of files to use for logging, use the following
command:
setmqweb properties -k maxTraceFiles -v max
where max specifies the maximum number of files. The default value is 2.
v To configure the level of logging that is used, use the following command:
setmqweb properties -k traceSpec -v level
where level is one of the values listed in Table 21. The table outlines the logging
levels in increasing level of detail. When you enable a logging level, you also
enable each level before it. For example, if you enable the *=warning logging
level, you also enable *=severe, and *=fatal logging levels.
The default value is *=info. Change this value when IBM Service requests it.
Table 21. Valid logging levels
Value Logging level applied
*=off Logging is turned off.
*=fatal Task cannot continue and component,
application, and server cannot function.
*=severe Task cannot continue but component,
application, and server can still function.
This level can also indicate an impending
unrecoverable error.
*=warning Potential error or impending error. This level
can also indicate a progressive failure (for
example, the potential leaking of resources).
*=audit Significant event affecting server state or
resources
When users log in to the IBM MQ Console, an LTPA token is generated. If you use
token based authentication with the administrative REST API, an LTPA token is
generated when the user logs in using the /login REST API resource with the
HTTP POST method. The token is used to authenticate the user without the user
being required to log in again with their user ID and password, until the token
expires. The default expiry interval is 120 minutes, but you can configure when the
tokens expire by using the setmqweb command.
You can view the current configuration of the token expiry by using the dspmqweb
properties command with the -a flag. For more information, see dspmqweb. You
can reset the value of the token expiry by using the setmqweb properties
command with the -k and -d flags. For more information, see setmqweb.
Procedure
Use the setmqweb properties command from the mqcli prompt to configure the
expiry interval:
where time specifies the time, in minutes, before the LTPA token expires and the
user is logged out. The default value is 120 minutes.
By default, the administrative REST API times out if the time taken to send a
response back to a client is longer than 30 seconds. you can configure the
administrative REST API to use a different timeout value by using the setmqweb
command.
You can view the current configuration of the timeout by using the dspmqweb
properties command with the -a flag. For more information, see dspmqweb. You
can reset the value of the timeout by using the setmqweb properties command
with the -k and -d flags. For more information, see setmqweb.
Procedure
Use the setmqweb properties command from the mqcli prompt to configure the
response timeout:
where timeout specifies the time, in seconds, before the time out.
By default, a web browser does not allow scripts, such as JavaScript, to invoke the
administrative REST API when the script is not from the same origin as the REST
API. That is, cross-origin requests are not enabled. You can configure Cross Origin
Resource Sharing (CORS) to allow cross-origin requests from specified origins.
You can access the administrative REST API through a web browser, for example
through a script. As these requests are from a different origin to the administrative
REST API, the web browser refuses the request because it is a cross-origin request.
The origin is different if the domain, port, or scheme is not the same.
You can enable cross-origin requests by configuring CORS and specifying the
origins that are allowed to access the administrative REST API.
Procedure
Use the setmqweb properties command from the mqcli prompt to configure CORS:
v View the current configuration by entering the following command and viewing
the mqRestCorsAllowedOrigins and mqRestCorsMaxAgeInSeconds entries:
dspmqweb properties -a
v Specify the origins that are allowed to access the administrative REST API by
entering the following command:
setmqweb properties -k mqRestCorsAllowedOrigins -v allowedOrigins
where allowedOrigins specifies the origin that you want to allow cross-origin
requests from. You can use an asterisk, *, to allow all cross-origin requests, or
Example
To use the command line to enter IBM MQ commands, you must enter the IBM
MQ administration mode. After you enter the IBM MQ administration mode, you
can use the control commands and appliance commands that are listed in the
“Command reference” on page 455. You can enter the IBM MQ administration
mode by using the mqcli command. You can exit the IBM MQ administration
mode by using the command exit.
The following example shows how to enter the IBM MQ administration mode and
create a queue manager:
mqa# mqcli
mqa(mqcli)# crtmqm QM1
MQ Appliance queue manager created. Creating or replacing default objects for queue manager ’QM1’.
Default objects statistics : 83 created. 0 replaced. 0 failed. Completing setup.
Setup completed.
mqa(mqcli)# exit
mqa#
For the full range of IBM MQ tasks, use the command line interface.
Note: This URL uses the default port value. If you changed the port value,
replace the 9090 section of the URL with your port number.
Note: The IBM MQ Console has different timeout behavior to the general IBM MQ
Appliance web UI. Because the console can be used for monitoring IBM MQ, the
console does not timeout. If you switch to the IBM MQ Appliance web UI, the
timeout counter will start. This is set to 600 seconds by default, but can be set to a
different value by using the idle-timeout command, see “idle-timeout” on page
862.
You can use the queue manager widget in the IBM MQ Console to create,
configure, and control local queue managers.
The queue manager widget lists the queue managers that are running on the
appliance. You can select individual queue managers from the list to work with.
You can add a queue manager widget to your dashboard by clicking Add widget
You can configure the widget by clicking the configure icon in the title bar of the
Procedure
v To create a new queue manager, click the plus icon in the local queue
manager widget toolbar. The Create a Queue Manager wizard opens.
1. Enter a name for the new queue manager. The name can contain up to 48
characters. Valid characters are letters and numbers and the ".", "/", "_", and
"%" characters.
2. Optional: Enter an available TCP/IP port for the queue manager to listen
on. The port number must not exceed 65535. If you are configuring a high
availability queue manager, the port must be available on both appliances
in the high availability group.
3. Optionally use File system size to specify the size of the file system that is
created for the queue manager in either GB or MB.
4. Select Automatic startup to have the queue manager start automatically
when the appliance starts.
5. Click Next to specify high availability (HA) features if the appliance is part
of an HA group, or to continue and specify SAN features. Otherwise click
Create to create and start the queue manager.
6. Select Replicated to specify that the queue manager belongs to a high
availability (HA) group.
7. Specify the floating IP address that is used to communicate with the queue
manager when it is part of an HA group:
a. Select the appliance interface that the floating IP address is associated
with from the Floating IP interface list.
b. Specify the floating IP address in IPv4 format in the Floating IP field.
8. Click Next to specify SAN features. (SAN features are not available if you
have configured high availability, or if you have changed the file system
size.) Otherwise click Create to create and start the queue manager.
9. Select the SAN volume name for the queue manager (you must configure
the volume before you create the queue manager, see “Configuring
volumes” on page 198).
10. Click New to create a new queue manager, or Re-create to re-create a queue
manager and attach it to the existing data on the SAN volume.
11. Click Create. The new queue manager is created and started.
v To start a local queue manager:
2. Click the start icon in the local queue manager widget toolbar.
v To stop a local queue manager:
1. Select the queue manager that you want to stop from the list in the local
queue manager widget.
2. Click the stop icon in the local queue manager widget toolbar.
3. Confirm that you want to stop the queue manager by clicking Stop.
v To delete a local queue manager:
1. Select the queue manager that you want to delete from the list in the local
queue manager widget.
2. If the queue manager is running, stop it.
3. Click the delete icon in the local queue manager widget toolbar.
4. Confirm that you want to delete the queue manager by clicking Delete. The
queue manager and all associated objects are deleted.
v To view and edit the properties of a local queue manager:
1. Ensure that the queue manager is running, and select it in the queue
manager list.
2. Click the properties icon in the local queue manager widget toolbar.
Alternatively, double-click the queue manager.
3. View the properties and edit them as required. If the property text box is
disabled, the property is read-only, or can be edited only from the command
line. Click the help icon to get information about a property, or view
the property information in IBM Knowledge Center.
If the queue manager belongs to a high availability (HA) group, the
properties include a High availability status category.
v To refresh security for the local queue manager:
1. Ensure that the local queue manager is running, and select it in the queue
manager list.
2. Select More > Refresh security
3. Select the queue manager security to refresh:
– Select Authorization service to refresh the list of authorizations that is
held internally by the authorization services component.
– Select Connection authentication to refresh the cached view of the
configuration for connection authentication.
– Select SSL to refresh the cached view of the SSL or TLS key repository.
This option also refreshes the locations of the LDAP servers that are used
for certified revocation lists, and any cryptographic hardware parameters.
v To work with authority records for the local queue manager:
1. Ensure that the local queue manager is running, and select it in the queue
manager list.
Note: Resizing file space for a queue manager does involve some I/O, and
might degrade the performance of other queue managers while the resize is in
progress.
You can use the IBM MQ object widgets in the IBM MQ Console to work with the
different types of IBM MQ object.
v To refresh the contents of the widget, click the refresh icon in the title
bar of the widget.
v To remove the widget, click the remove icon in the title bar of the
widget.
You can use the Queues widget in the IBM MQ Console to show the queues that
exist for a specific queue manager. You can then add and delete queues, add and
clear messages on a queue, browse messages, view and set the properties of a
queue, and manage the authority records of a queue.
You must create a queues widget before you can use it. For more information
about creating IBM MQ object widgets, see “Working with IBM MQ objects” on
page 211.
The queues widget lists the queues that exist for a specific queue manager. You can
select individual queues from the list to work with.
Procedure
v To add a queue:
2. Click the browse icon in the queues widget toolbar. The browse
message window opens, displaying messages on the queue.
v To delete a queue:
1. Select the queue that you want to delete from the list in the queues widget.
line. Click the help icon to get information about a property, or view
the property information in IBM Knowledge Center.
v To view and edit authority records for a queue:
1. Select the queue in the widget.
You can use the topics widget in the IBM MQ Console to add and delete topics,
and view and set the properties of a topic.
You must create a topics widget before you can use it. For more information about
creating IBM MQ object widgets, see “Working with IBM MQ objects” on page 211.
The topics widget lists the topics that exist for a specific queue manager. You can
select individual topics from the list to work with.
Procedure
v To add a topic:
line. Click the help icon to get information about a property, or view
the property information in IBM Knowledge Center.
v To publish a message on a topic:
You can use the listeners widget in the IBM MQ Console to add and delete
listeners, start and stop listeners, view and set listener properties, and manage the
authority records for a listener.
You must create a listeners widget before you can use it. For more information
about creating IBM MQ object widgets, see “Working with IBM MQ objects” on
page 211.
The listeners widget lists the listeners that exist for a specific queue manager. You
can select individual listeners from the list to work with.
Procedure
v To add a TCP/IP listener:
line. Click the help icon to get information about a property, or view
the property information in IBM Knowledge Center.
Note: By default, listeners are created with the control property set to manual.
Set it to Queue Manager to have it start and stop automatically with the queue
manager. On the appliance, listeners always stop automatically when the queue
manager stops, whatever the control property is set to.
v To view and edit authority records for a listener:
1. Select the listener in the listeners widget.
2. Click More > Manage authority records. The authority records show the
permissions that users and administrators have on the selected listener. For
details of editing the authority records, see “Working with authority records”
on page 228.
You can use the channels widget in the IBM MQ Console to add and delete
channels, start and stop channels, reset and resolve channels, and ping channels.
You can also view and set the properties of a channel, and manage authority
records for the channel.
You must create a channels widget before you can use it. For more information
about creating IBM MQ object widgets, see “Working with IBM MQ objects” on
page 211.
The channels widget lists the channels that exist for a specific queue manager. You
can select individual channels from the list to work with.
Procedure
v To add a channel:
You can use the client-connection channels widget in the IBM MQ Console to add
and delete client-connection channels on a queue manager, view and set the
properties, and manage the authority records for the channel.
You must create a client-connection channels widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
The client-connection channels widget lists the client-connection channels that exist
for a specific queue manager. You can select individual client-connection channels
from the list to work with.
Procedure
v To add a client-connection channel:
line. Click the help icon to get information about a property, or view
the property information in IBM Knowledge Center.
v To view and edit authority records for a client-connection channel:
1. Select the client-connection channel in the client-connection channels widget.
2. Click More > Manage Authority Records. The authority records show the
permissions that users and administrators have on the selected
client-connection channel. For details of editing the authority records, see
“Working with authority records” on page 228.
You can use the authentication information widget in the IBM MQ Console to add
and delete authentication information objects on a queue manager. You can also
view and set the properties, and manage the authority records for the objects.
You must create an authentication information widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
The queue manager authentication information forms part of IBM MQ support for
Transport Layer Security (TLS). These objects contain the definitions that are
Chapter 6. Administering 219
required to perform certificate revocation checking by using OCSP or Certificate
Revocation Lists (CRLs) on LDAP servers, and the definitions that are required to
enable user ID and password checking.
Procedure
v To add an authentication information object:
line. Click the help icon to get information about each property.
v To view and edit authority records for an authentication information object:
1. Select the authentication information object in the authentication information
widget.
You can use the subscriptions widget in the IBM MQ Console to add and delete
subscriptions on a queue manager, view and set the properties, and manage the
authority records for the subscriptions.
You must create a subscriptions widget before you can use it. For more
information about creating IBM MQ object widgets, see “Working with IBM MQ
objects” on page 211.
Subscriptions are issued to a queue manager and contain information about the
publications the subscriber wants to receive:
v The topic string that the subscriber is interested in; this topic can resolve to
multiple topic strings if wildcards are used.
v An optional selection string to be applied to published messages.
v The name of the queue on which selected publications are placed.
For more information about subscriptions, see Subscribers and subscriptions and
DEFINE SUB in the IBM MQ documentation.
Procedure
v To add a subscription object:
line. Click the help icon to get information about each property.
You can use the channel authentication records widget in the IBM MQ Console to
add and delete channel authentication records on a queue manager. You can also
view and set the properties for channel authentication records.
You must create a channel authentication records widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
To exercise more precise control over the access that is granted to connecting
systems at a channel level, you can use channel authentication records.
To enforce security, you can use blocking channel authentication records to block
access to your channels. You can also use address map channel authentication
records to allow access to specified users. To learn more about channel
authentication records, see Channel authentication records in the IBM MQ
documentation.
Procedure
v To add a channel authentication record with an SSL/TLS distinguished name
identity, see “Creating channel authentication records with an SSL/TLS
Distinguished Name identity” on page 223.
v To add a channel authentication record with a client application user ID identity,
see “Creating channel authentication records with a client application user ID
identity” on page 224.
line. Click the help icon to get information about each property.
You can use the channel authentication records widget to create allowing, blocking,
and warning channel authentication records with an SSL/TLS Distinguished Name
identity. The SSL/TLS distinguished name identity matches to users who present
an SSL or TLS personal certificate that contains a specified Distinguished Name.
You must create a channel authentication records widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
Procedure
You can use the channel authentication records widget to create allowing, blocking,
and warning channel authentication records with a client application user ID
identity. The client application user ID identity matches to client application IDs
from a client-connection channel.
You must create a channel authentication records widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
Procedure
You can use the channel authentication records widget to create allowing, blocking,
and warning channel authentication records with a remote queue manager name
identity. The remote queue manager name identity matches to the specified queue
manager.
You must create a channel authentication records widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
Procedure
You can use the channel authentication records widget to create allowing, blocking,
and warning channel authentication records with an address identity. The address
identity matches to specific IP addresses.
You must create a channel authentication records widget before you can use it. For
more information about creating IBM MQ object widgets, see “Working with IBM
MQ objects” on page 211.
You can use the channel authentication records widget to create blocking and
warning channel authentication records with a final assigned user ID identity. The
final assigned user ID identity matches to list of specified user IDs from a server
channel.
Procedure
1. Click the plus icon in the channel authentication record widget toolbar.
2. Select the Rule Type to indicate what type of rule you want on the channel
authentication record:
v Select Block to block access to inbound connections.
v Select Warn to warn about access to inbound connections that would be
blocked. The connection is allowed access, and an error message is reported.
If events are configured, an event message is created that shows the details
of what would be blocked. Only matched rules are reported.
3. Select the Final assigned user ID identity type from the list.
4. Click Next
5. Specify a Profile Name. The profile name is the name of the channel or set of
channels for which you are setting the channel authentication. The profile can
contain wildcards so that you can block a range of channels. For example, the
profile alphadelta* blocks channels named alphadelta1, alphadelta2, alphdelta3
and so on.
6. Specify the User list. The user list is a comma-separated list of user IDs to be
blocked from the channel.
7. Optional: Click Next.
8. Optional: Specify a Description for the channel authentication record.
9. Click Create. The new channel authentication record is created.
You can control the access that groups have to queue managers and IBM MQ
objects by specifying an authority record for that group.
For example, contrast the different permissions that are available for a queue
manager and a queue, as illustrated in the following images:
You use the Charts widget in the IBM MQ Console to view monitoring data for
queue managers.
Data is collected at 10-second intervals. The X-axis of the chart displays a timeline.
The Y-axis displays units appropriate to the resource that you are viewing. The
Y-axis is dynamically resized to accommodate the data that is returned.
You must have at least one running queue manager before you can configure a
chart widget.
a. Click the configure icon in the title bar of the Charts widget.
b. Optional: Enter a Widget title. This title is shown in the title bar of the
widget.
c. Select the Resource class to monitor:
Platform central processing units
Monitor the usage of the CPUs.
Platform persistent data stores
Monitor the use of disk resource.
API usage statistics
Monitor API calls.
API per-queue usage statistics
Monitor API calls by individual queues. When you choose this class,
you specify the queue name to monitor in the Object field.
d. Select the Resource type to monitor. The resource types that are available to
select depend on the resource class that is selected. The following table
shows the resource types:
Table 22. Resource types
Class Type Description
Platform central CPU performance – platform Select this type to view performance
processing units wide data for the CPUs and memory.
CPU performance – running Select this type to view performance
queue manager data for the CPUs and memory that is
related to the queue managers that you
are monitoring. A queue manager must
be running for you to monitor it. If you
are monitoring results from more than
one queue manager, different colors are
used to distinguish the performance
data in the chart.
Platform Disk usage – platform wide Select this type to view performance
persistent data data for global disk usage.
stores
Disk usage - running queue Select this type to view performance
managers data for the disk usage that is related
to the queue managers that you are
monitoring. A queue manager must be
running for you to monitor it. If you
are monitoring results from more than
one queue manager, different colors are
used to distinguish the performance
data in the chart.
e. Select the Resource element to monitor: The resource elements that are
available to select depend on the resource class and resource type that are
selected. The following tables show the resource elements:
Table 23. Elements for Platform central processing units resources
Type Element Description
CPU performance – User CPU time percentage Shows the percentage of CPU busy
platform wide in user state.
System CPU time percentage Shows the percentage of CPU busy
in system state.
CPU load – one-minute Shows the load average over 1
average minute.
CPU load – five-minute Shows the load average over 5
average minutes.
Results
After you configure the widget, there is a short delay before data is displayed in
the chart. Data is displayed along a time axis. Each data point represents the end
of the 10-second period over which the data is collected. You can hover over data
points in the chart to see detailed information as shown in the following example:
You can view the CPU monitoring information graphically by using the IBM MQ
Console, or you can view a text report by using the status command. Using the
IBM MQ Console gives you an ongoing view.
Two types of CPU statistics are reported: time percentage and CPU load. You can
view CPU time percentage information for the appliance as a whole, or for a
specified queue manager. CPU load is reported for the appliance as a whole.
The status command reports the total CPU percentage used. You can configure the
chart widget in the IBM MQ Console to display either percentage of system CPU
usage, or percentage of user CPU usage.
The status command reports the total CPU percentage used by the specified
running queue manager. You can configure the chart widget in the IBM MQ
Console to display either percentage of system CPU usage, or percentage of user
CPU usage for the running queue managers. The chart widget plots a line for each
running queue manager on the appliance.
CPU load
In the following example, the appliance is 75% CPU used, of which the queue
manager (PERF0) is using approximately 7%.
mqa(mqcli)# status
Memory: 16297MB used, 189.1GB total [8%]
CPU: 75%
CPU load: 6.62, 6.19, 5.07
Internal disk: 786432MB allocated, 2979.5GB total [26%]
System volume: 5270MB used, 14.7GB allocated [35%]
MQ errors file system: 175MB used, 2 FDCs, 15.8GB allocated [1%]
MQ trace file system: 3034MB used, 31.5GB allocated [9%]
You can configure each dashboard tab by clicking the arrow next to the tab name
. You can change the tab name, and add a description for the tab. You
can also configure how many columns the tab has.
You can configure the layout of the widgets within a dashboard tab by dragging
and dropping the widgets.
You can automatically create a dashboard tab that shows information about a
specific local queue manager. You can manually create and delete dashboard tabs.
Procedure
v To create a dashboard tab:
1. Click the plus icon next to your existing dashboard tabs
.
2. Enter a name for the new tab.
3. Optional: Enter a description for the new tab.
4. Click Add.
v To automatically create a dashboard tab for a specific queue manager:
1. Select the queue manager in the local queue manager widget.
2. Select More > Add new dashboard tab A new dashboard tab is created. The
tab has the name of the queue manager.
v To delete a dashboard tab:
You can save a dashboard layout by exporting it from the IBM MQ Console. You
can import a saved dashboard layout into the IBM MQ Console.
When you export a dashboard, you create a .json file on your local disk.
Subsequently, you can import the .json file to a dashboard to re-create the layout.
When you import a dashboard layout, you can choose to add the imported tabs to
an existing dashboard layout. Alternatively, you can replace the existing dashboard
layout with the imported layout.
Procedure
v To export a dashboard layout:
The port number is the same as that used by the appliance REST management
interface, see “Configuring the REST management interface” on page 145.
To use the administrative REST API, you must be a user with access to the
mq/webadmin or mq/webuser resource, and read access to the login/rest-mgmt
resource (see “User authorization, credential mapping, and access profiles” on page
332 and “Access policies” on page 333).
For detailed information, see Using the administrative REST API in the IBM MQ
documentation.
To use the IBM MQ control commands, you must enter the IBM MQ
administration mode by entering the command mqcli on the command line. You
can exit the IBM MQ administration mode by entering the command exit.
Command Description
“addmqm” on page 524 Add an existing queue manager that uses SAN storage (used
for recovery).
“crtmqm” on page 456 Create a queue manager.
“dltmqm” on page 459 Delete a queue manager.
“dmpmqcfg” on page 460 Dump the configuration of a queue manager.
“dspmq” on page 463 Display information about queue managers.
For a full description of commands that are supported on the IBM MQ Appliance,
see “Control commands on the IBM MQ Appliance” on page 17.
Messaging users are distinct from appliance users, who administer the IBM MQ
Appliance and configure IBM MQ on the appliance. See “Types of user and how
they are authenticated” on page 331 for an explanation of the distinction between
the two types of user.
After you create messaging users, you must use SET AUTHREC in runmqsc, or
use the IBM MQ Console to grant these users access to the required IBM MQ
resources.
The appliance reserves the following user IDs for its own use:
v hacluster
v mqm
v mqsystem
v root
v sshd
You cannot create user IDs with these names, or delete, modify, or list these user
IDs.
By default, all users belong to the group users. You cannot remove users from the
users group, but you can add them to additional groups.
The appliance reserves the following groups for its own use:
v haclient
v root
v sshd
v utmp
You cannot create groups with these names, or delete or list these groups.
You administer messaging users, and messaging user groups, by using the
command line. The commands are run in IBM MQ administration mode, which is
entered by typing mqcli on the command line. The following table lists the
commands that are available:
Command Description
“usercreate” on page 503 Creates user IDs for messaging users on the IBM MQ
Appliance.
“userdelete” on page 504 Deletes messaging users.
“usermodify” on page 504 Modifies messaging users
“userlist” on page 505 Lists messaging users, or lists details of a particular user ID.
“groupcreate” on page 505 Adds user groups for messaging users on the IBM MQ
Appliance.
“groupdelete” on page 506 Deletes groups for messaging users.
“grouplist” on page 506 Lists groups for messaging users.
“userbackup” on page 506 Backs up messaging users on the IBM MQ Appliance to a
file.
“userrestore” on page 507 Restores messaging users on the IBM MQ Appliance from a
file to which they were previously backed up.
You cannot create or edit files on the appliance, and you cannot copy existing
script files there, and so you cannot run scripts of MQSC commands directly on
the appliance.
You can, however, use MQSC interactively to run individual commands. You do so
by using the runmqsc command from the mqa(mqcli) prompt. See “runmqsc” on
page 486 for details.
For details of MQSC commands, see IBM MQ Script (MQSC) commands in the
IBM MQ documentation.
You can also run MQSC scripts on appliance message queues by running scripts
from remote machines.
See “Differences between queue managers that are running on the IBM MQ
Appliance and an IBM MQ installation” on page 22 for specific information about
using commands on the appliance.
You can use the client to run commands on queue managers that are running on
the appliance.
You can also use the client to run supplied sample programs that support putting
and getting messages, and publishing and subscribing to topics. Use these methods
if you cannot use the IBM MQ Console.
You must complete this task before you can run commands from a client, or run
sample programs to put or get messages, publish or subscribe to topics, or browse
message queues.
This procedure requires that you enter MQSC commands. You use the runmqsc
command on the IBM MQ Appliance to enter MQSC commands interactively. See
“runmqsc” on page 486.
Procedure
1. Type mqcli to enter IBM MQ administration mode.
2. Obtain a messaging user ID on the appliance your queue manager is running
on (see “Administering messaging users” on page 245). This user ID is the
authority under which the client connection runs on the queue manager. For
example:
usercreate -u testuser -p passw0rd
3. Create and start a queue manager (see “Message queue control commands”
on page 244):
crtmqm -p port queue_manager_name
strmqm queue_manager_name
For example:
crtmqm -p 1440 test1
strmqm test1
4. Enter the runmqsc command so that you can enter MQSC commands
interactively. For example:
runmqsc test1
5. Define a queue to be used by the sample programs. For example:
DEFINE QLOCAL(Q)
6. Define a channel for the sample program to use:
DEFINE CHANNEL(’channel-name’) CHLTYPE(SVRCONN) TRPTYPE(TCP) +
DESCR(’Channel for use by sample programs’)
On Linux, enter:
export MQSAMP_USER_ID=’userID’
For example:
SET MQSAMP_USER_ID=testuser
On Linux, enter:
export MQSERVER=’ChannelName/TransportType/ConnectionName’
For example:
SET MQSERVER=MDB.SVRCONN/TCP/192.0.2.24(1440)
What to do next
Your client application can now run the sample programs to put and get messages
to a queue, publish and subscribe to a topic, or browse a message queue.
Running commands from a client allows you to configure queue managers and
IBM MQ objects by running scripts, rather than by entering individual commands.
The sample programs are the accessible method for putting and getting messages
for queues that are running on the IBM MQ Appliance. The sample programs are
located in MQ_INSTALLATION_PATH\Tools\c\samples\bin (Windows) and
MQ_INSTALLATION_PATH/samp/bin (Linux).
v For information on running sample programs on a client that connects to a
queue manager on an IBM MQ Appliance, see “Setting up a queue manager to
accept client connections” on page 247.
v For information on using the get sample program, amqsgetc, see The Get sample
programs in the IBM MQ documentation.
v For information on using the put sample program, amqsputc, see The Put sample
programs in the IBM MQ documentation.
To put messages by using the sample program from the client system command
line:
1. Enter the command:
amqsputc queue_name queue_manager_name
For example:
amqsputc Q test1
2. When prompted, enter the password for the user ID running the sample
program (note that the password is displayed in plain text).
3. Type the messages that you want to put on the queue.
For example:
amqsgetc Q test1
2. When prompted, enter the password for the user ID running the sample
program (note that the password is displayed in plain text).
3. Messages from the queue are displayed.
Follow the related link for information on putting and getting messages from the
IBM MQ Console.
The sample programs are the accessible method for publishing and subscribing to
topics on the IBM MQ Appliance. The sample programs are located in
MQ_INSTALLATION_PATH\Tools\c\samples\bin (Windows) and
MQ_INSTALLATION_PATH/samp/bin (Linux). You can run the sample programs that are
supplied with the client to publish and subscribe to topics.
v For information on running sample programs on a client that connects to a
queue manager on an IBM MQ Appliance, see “Setting up a queue manager to
accept client connections” on page 247.
v For detailed information on using the publish/subscribe sample programs, see
The Publish/Subscribe sample programs in the IBM MQ documentation.
To publish messages by using the sample program from the client system
command line:
1. Enter the command:
amqspubc topic_name queue_manager_name
For example:
amqspubc mytopic test1
The publisher connects to the queue manager named test1 and responds with
the output, target topic is mytopic.
2. Enter the messages that you want to publish to mytopic.
For example:
amqssubc mytopic test1
The subscriber responds with the output, Calling MQGET : 30 seconds wait
time. From now onwards, lines you type into the publisher appear in the
output of the subscriber.
Follow the related link for information on publishing and subscribing to topics
from the IBM MQ Console.
The sample programs are the accessible method for browsing message queues on
the IBM MQ Appliance. The sample programs are located in
MQ_INSTALLATION_PATH\Tools\c\samples\bin (Windows) and
MQ_INSTALLATION_PATH/samp/bin (Linux). You can run the sample programs that are
supplied with the client to browse message queues.
v For information on running sample programs on a client that connects to a
queue manager on an IBM MQ Appliance, see “Setting up a queue manager to
accept client connections” on page 247.
v For detailed information on using the browse sample programs, see The Browse
sample programs in the IBM MQ documentation.
To browse messages by using the sample program from the client system
command line:
1. Enter the command:
amqsbcgc queue_name queue_manager_name
For example:
amqsbcgc Q test1
2. When prompted, enter the password for the user ID running the sample
program (note that the password is displayed in plain text).
3. Information about the message queues is displayed, followed by messages from
the queue.
IBM MQ client applications use the CCDT to determine the channel definitions
and authentication information to connect to a queue manager. For a client
application to use the CCDT, it must be copied to a file and downloaded from the
appliance to the client machine or to a location from where the client can access it.
You can use the IBM MQ Appliance web UI to download the file, see “Managing
files by using the IBM MQ Appliance web UI” on page 297.
You can shut down and restart the appliance by using the command line interface.
Complete the following steps:
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Enter flash mode by typing config to enter configuration mode and then
typing flash on the command line.
3. Type the following command:
shutdown reboot
You can also shut down and restart by using the IBM MQ Appliance web UI.
Complete the following steps:
1. Start the web UI as described in “Configuring the IBM MQ Appliance web UI”
on page 112.
2. Click the administration icon and select Main > System Control.
3. Set the Shutdown Mode to Reboot system.
4. Click Shutdown. The appliance restarts.
You shut down the appliance by using the command line interface. Complete the
following steps:
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Enter flash mode by typing global to enter configuration mode and then
typing flash on the command line.
3. Type the following command:
shutdown halt
2. Click the administration icon and select Main > System Control.
3. Set the Shutdown Mode to Power off system.
4. Click Shutdown. The appliance restarts.
Use the crtmqm command with the -sa option to create a queue manager with the
auto-start feature enabled (see “crtmqm” on page 456).
To check the auto-start capability of an existing queue manager, use the following
command:
dspmqini -m QM_name -s InstanceData
Where QM_name is the name of the queue manager whose auto-start setting you
want to check. The command displays the InstanceData stanza of the qm.ini file.
This contains the Startup key, which has the following setting:
v Startup = Automatic, auto-start is enabled.
v Startup = Manual, auto-start is disabled.
If dspmqini does not report the Startup key in the InstanceData stanza, then a
setting of Manual is implied. This means that the queue manager does not start
automatically when the appliance is restarted.
A high availability (HA) queue manager has a value of Startup = HA, and you
cannot modify this. If the queue manager is removed from HA control, then the
value of Startup is set to Manual (and you can set it to Automatic if required).
To change the auto-start setting of an existing queue manager, you must edit the
InstanceData stanza of the qm.ini file to change the setting of Startup to the
required state. You use the setmqini command to change the setting. The following
command enables auto-start:
setmqini -m QM_name -s InstanceData -k Startup -v Automatic
You use URIs to copy the backed-up information from the appliance to safe
storage. You also use URIs to restore backed-up information to a target appliance.
You restore an appliance in the following order.
1. Restore configuration of the IBM MQ Appliance.
2. Restore messaging users and groups.
3. Restore key repository.
4. Restore queue manager configurations and data.
5. Restore IBM MQ Appliance web UI configurations.
You use the write memory command to write the current appliance configuration to
the autoconfig.cfg file. You can then copy the command from a URI on the
appliance to secure storage on another system, if required.
Note that the backup that you take is not secure, so sensitive data, such as
appliance user IDs and passwords is not included. You must re-create these items
manually if you use the backup to restore an appliance.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type the following command to enter configuration mode:
config
4. Type the following command to write the current configuration:
write memory
5. When prompted, confirm that you want to overwrite the current
autoconfig.cfg file.
Overwrite existing autoconfig.cfg? y
6. Optionally, copy the autoconfig.cfg file to a location on another system from
where you can write it to back up storage:
To copy the file by using the command line:
a. Connect to the command line of the appliance as described in “Command
line access” on page 109.
a. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
b. Select Files to open the File Management window.
c. Open the config folder.
d. Click the autoconfig.cfg link to save the file to your local system (the exact
method for saving the file depends on the type of browser that you use).
If you are restoring to the same appliance, it will have the same IP address and the
same name. The first steps are the same as initially configuring the appliance when
you first installed it.
If you are restoring to a different appliance, it must be running the same firmware
level.
You copy a previously saved autoconfig.cfg file to the target IBM MQ Appliance
and then restart the appliance.
Procedure
1. Complete the initial configuration as described in “Setting up the initial
firmware configuration” on page 66.
2. Copy the autoconfig.cfg to the target appliance.
To copy the file by using the command line interface:
a. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
b. Log in as a user in the administrators group.
c. Type the following command to enter configuration mode:
config
d. Copy your saved autoconfig.cfg to the target appliance:
copy scp://username@ipaddress/[/]directorypath config:///autoconfig.cfg
To copy the file by using the IBM MQ Appliance web UI:
a. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
b. Select Files to open the File Management window.
c. Click Actions for the config folder.
d. Select Upload files from the Actions menu.
e. Click Browse, and browse for the location of the file on your local system.
Note: You cannot back up locally defined appliance users. When you restore a
system you must re-create local appliance users and groups manually.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type mqcli to enter IBM MQ configuration mode.
4. Type the following command to back up the messaging users:
userbackup -f user_backup_filename
a. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
b. Select Files to open the File Management window.
c. Open the mqbackup folder.
You copy a file that contains the backed up user accounts to the target appliance.
You then use a command to restore the accounts.
Procedure
1. Copy the file containing the backed up user accounts to the appliance:
To copy the file by using the command line interface:
a. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
b. Log in as a user in the administrators group.
c. Type the following command to enter configuration mode:
config
d. Copy your saved backup file to the target appliance:
copy scp://username@ipaddress/[/]directorypath/filename mqbackup:
e. Type exit to leave config mode.
To copy the file by using the IBM MQ Appliance web UI:
a. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
b. Select Files to open the File Management window.
c. Click Actions for the mqbackup folder.
d. Select Upload files from the Actions menu.
e. Click Browse, and browse for the location of the backup file on your local
system.
f. Click Upload to upload the file to the mqbackup directory on the appliance.
2. If you are not already connected to the appliance command line, connect as
described in “Command line access” on page 109.
3. Type mqcli to enter IBM MQ configuration mode.
4. Type the following command to restore the messaging users:
userrestore -f user_backup_filename
You should follow this procedure for every queue manager on your system.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type mqcli to enter IBM MQ configuration mode.
4. Type the following command to back up the key repository for a queue
manager:
keybackup -m QmanagerName
Where QmanagerName specifies the queue manager that you want to back up
the key repository for.
5. The appliance displays the following warning:
This operation will generate a copy of your queue manager key repository,
which may include private keys. Although encrypted, you should take appropriate security
precautions in handling this file. The password required if you ever need to modify or
restore this file will be displayed after the copy has been created. Do you wish to continue?
[Y/N]
Enter Y to continue.
The command creates a compressed archive (.tar.gz) of the key repository
files. The archive includes the .kdb and .rdb files, and the crl file, if present. It
does not include the password stash file. At completion, the name of the
archive file and the password that was stored in the password stash file is
displayed. The password is needed to restore the key repository.
6. Type exit to leave IBM MQ configuration mode.
7. Type config to enter configuration mode.
8. Copy the file containing the backed-up repository to another system.
To copy the file by using the command line interface:
a. Connect to the command line of the appliance as described in “Command
line access” on page 109.
b. Log in to the appliance as an administrator.
c. Type config to enter configuration mode.
d. Copy the file by typing the following command:
copy mqbackup:///backup_filename scp://username@ipaddress/[/]directorypath
To copy the file by using the IBM MQ Appliance web UI:
a. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
b. Select Files to open the File Management window.
c. Open the mqbackup folder.
d. Click the backup file name link to save the file to your local system (the
exact method for saving the file depends on the type of browser that you
use).
You copy a file that contains the archive of a previously backed-up key repository
to the target appliance. You then use a command to restore it.
Procedure
1. Copy the file containing the backed up key repository to the appliance:
To copy the file by using the command line interface:
a. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
b. Log in as a user in the administrators group.
c. Type the following command to enter configuration mode:
config
d. Copy your saved backup file to the target appliance:
copy scp://username@ipaddress/[/]directorypath/filename mqbackup:
e. Type exit to leave config mode.
To copy the file by using the IBM MQ Appliance web UI:
a. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
b. Select Files to open the File Management window.
c. Click Actions for the mqbackup folder.
d. Select Upload files from the Actions menu.
e. Click Browse, and browse for the location of the backup file on your local
system.
f. Click Upload to upload the file to the mqbackup directory on the appliance.
2. If you are not already connected to the appliance command line, connect as
described in “Command line access” on page 109.
3. Type mqcli to enter IBM MQ configuration mode.
4. Type the following command to restore the key repository to the queue
manager:
keyrestore -m QmanagerName -file filename -password password
Where:
v QmanagerName specifies the queue manager that you want to back up the
key repository for.
v filename is the file that contains the key repository archive.
v password is the password that was returned when the key repository archive
was created.
5. Use the listcert and detailcert commands to verify that the contents of the
key repository are as expected.
You connect to the IBM MQ Appliance by using the command line, and save the
queue manager to a file. The queue manager configuration is saved, together with
log files and queue data.
Before you back up your first queue manager, you must create the target directory
for backup files, and allocate storage for it in the appliance RAID volume.
A backup of a high availability (HA) queue manager does not contain any HA
configuration data, so if you restore the queue manager from a backup file it is
restored as a stand-alone queue manager. Similarly, disaster recovery (DR)
configuration data is not preserved when you back up a DR queue manager.
You can back up any type of queue manager while it is running, but this requires
sufficient unallocated space on the internal disk to contain a temporary snapshot of
the queue manager. This space is not required for a stand-alone queue manager if
it is stopped before the backup is taken. HA and DR queue managers are always
backed up from an internal snapshot, however, and so always require unallocated
space on disk regardless of whether they are running or not.
If you are backing up so that you can use an archive file to migrate the queue
manager, or if you want to be able to restore a queue manager to the state it was
in at a particular time, then you should stop the queue manager before you back it
up.
If the queue manager is running when you run the mqbackup command, a warning
message is displayed.
If a queue manager is stopped before you take a backup, it is locked during the
backup and cannot be started, deleted or otherwise changed while the backup
runs.
Note:
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type mqcli to enter IBM MQ configuration mode.
4. If this is the first time you have backed up any queue manager, type the
following command to allocate storage for your backup:
createbackupfs -s size
Where size is the size of the space that is allocated in GB. A directory that is
named mqbackup:///QMgrs is created and allocated that storage.
5. Type the following command to back up a queue manager:
mqbackup -m QM_name
Where QM_name is the name of the queue manager that you want to back up.
The backup can take some time to run, during which period you cannot use
Ensure that the archive file for the queue manager that you want to restore is
located in the mqbackup:///QMgrs directory on the appliance.
You use the mqrestore command to restore a queue manager, including all its log
files and data, from a previously taken backup. The command cannot run if there
is already a queue manager with the same name on the appliance. The archive file
must be located in the backupfs location, mqbackup:///QMgrs
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type mqcli to enter IBM MQ configuration mode.
4. Type the following command to restore a queue manager from its backup file:
mqrestore -f filename
The IBM MQ Appliance web UI configuration data for each user is automatically
copied to files in a user-accessible area on the appliance. You then copy the files to
a backup store on another system.
You should follow this procedure for every user on your system:
Procedure
v To copy the file to another system by using the command line interface:
1. Connect to the command line of the appliance as described in “Command
line access” on page 109.
2. Log in to the appliance as an administrator.
3. Type config to enter configuration mode.
For example:
copy mqwebui:///com.ibm.mq.webui.persistence/admin.json scp://midtownjj@server00d//safe/store/a
copy mqwebui:///com.ibm.mq.webui.persistence/billg.json scp://midtownjj@server00d//safe/store/b
v To copy the file by using the IBM MQ Appliance web UI:
1. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
2. Select Files to open the File Management window.
3. Open the mqwebui folder.
4. Click the backup file name link to save the file to your local system (the
exact method for saving the file depends on the type of browser that you
use).
The IBM MQ Appliance web UI configuration data for each user is automatically
copied to files in a user-accessible area on the appliance. You can restore these files
to the appliance. Complete this task after you create appliance users, and before
anyone logs on to use the web ui.
You should follow this procedure for every user whose configuration you want to
restore:
Procedure
v To copy the file to the appliance by using the command line interface:
1. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
2. Log in as a user in the administrators group.
3. Type the following command to enter configuration mode:
config
4. Copy your saved user configuration file to the target appliance:
copy scp://yourusername@yourip/[/]yourdirectorypath mqwebui:///com.ibm.mq.webui.persistence
For example:
copy scp://midtownjj@server00d//safe/store/admin.json mqwebui:///com.ibm.mq.webui.persistence
copy scp://midtownjj@server00d//safe/store/billg.json mqwebui:///com.ibm.mq.webui.persistence
5. Type exit to leave config mode.
v To copy the file to the appliance by using the IBM MQ Appliance web UI:
1. Start the IBM MQ Appliance web UI, and click the menu icon in the
title bar.
2. Select Files to open the File Management window.
3. Click Actions for the mqwebui folder.
What to do next
Your users can log in to the IBM MQ Appliance web UI and check that their
layouts are as expected.
Factory reset
A factory reset restores the IBM MQ Appliance to its default state.
Be aware that a factory reset deletes all queue managers and messages that are
hosted on the appliance. The reset forcibly ends all queue managers and detaches
any applications that are connected to them. After the update, you require direct
console access to reinitialize the system.
You reinitialize with a firmware image that you download from IBM Fix Central.
See “Installing a new level of firmware by using the command line” on page 102
for instructions on how to download a firmware image.
Where firmware_image_file specifies the name of the firmware image that is used
to reinitialize the appliance. The file must be in the image: directory.
4. After the reinitialization is complete, you must log in as admin, using the
password admin, and follow the initial setup procedure described in Initializing
the appliance.
When you use the REST management interface for this purpose, you send HTTP
requests to the REST interface port and receive JSON-formatted responses with a
payload and indication of success or failure. You can incorporate requests into
programs and so automate interaction with the appliance.
Before you trigger an operation on the appliance, you must become familiar with
the actionqueue resource of the REST management interface. This resource exposes
To see the actual operations that are available for you to request, enter a request
based on the following example:
GET https://mqhost.com:5554/mgmt/actionqueue/default/operations
The response that is returned from the actionqueue operations URI shows all
supported operations on the appliance in the current firmware release. The
following example shows a partial response payload to this request.
{
"_links": {
"self": {
"href": "/mgmt/actionqueue/default/operations"
},
"AddPasswordMap": {
"schema": {
"href": "/mgmt/actionqueue/{domain}/operations/AddPasswordMap"
},
"metadata": {
"href": "/mgmt/metadata/{domain}/operations/AddPasswordMap"
}
},
"AddTrustedHost": {
"schema": {
"href": "/mgmt/actionqueue/{domain}/operations/AddTrustedHost"
},
"metadata": {
"href": "/mgmt/metadata/{domain}/operations/AddTrustedHost"
}
},"ApplyPatch": {
"schema": {
"href": "/mgmt/actionqueue/{domain}/operations/ApplyPatch"
},
"metadata": {
"href": "/mgmt/metadata/{domain}/operations/ApplyPatch"
}
},
...
}
You can also acquire the metadata for the operation by looking up the appliance
Service-Oriented Management Interface (SOMA) schema for the configuration
object. The SOMA schemas are located in the store:///xml-mgmt.xsd file.
To produce a valid JSON request payload for the REST management interface,
substitute {operation_name} and include all required parameters and their values.
The following example shows a valid payload to trigger the AddPasswordMap
operation.
{
"AddPasswordMap": {
"AliasName": "user",
"Password": "passw0rd"
}
}
To achieve the managed failover, you put the appliance that you want to
temporarily remove from the group into standby mode. You then resume the
appliance after the maintenance is complete.
Note: While you have one appliance in standby mode, your queue managers can
run only on the remaining appliance. You should take care to avoid any outage on
the second appliance.
You use this technique when you update the firmware on the appliances in your
high availability group, for example to apply a fix pack. In this situation, you
suspend the first appliance, update the firmware, and then resume it. You can then
suspend the other appliance, upgrade the firmware, and then resume it.
When you remove an appliance from an HA group, all queue managers that run
on the suspended appliance are failed over to the other appliance. You should not
suspend both appliances in the HA group at the same time.
Procedure
v To suspend an appliance in a high availability group, complete the following
steps:
1. Log in to the appliance as a user in the administrators group.
2. Type the following command to enter IBM MQ administration mode:
mqcli
3. Enter the following command:
sethagrp -s
4. Enter the following command to check the appliance status:
The appliance is shown as being in the online state. When the appliance is
resumed in the HA group, all queue managers with a preference set for the
resumed appliance switch back onto that appliance.
When you remove an appliance from an HA group, all queue managers that run
on the suspended appliance are failed over to the other appliance. You should not
suspend both appliances in the HA group at the same time.
Procedure
1. Start the IBM MQ Appliance web UI and view the MQ Console.
2. To suspend the appliance, select Suspend this appliance from the High
Availability menu in the console title bar.
3. Click Suspend to confirm your action. The status of the appliance changes to
Standby.
4. To resume the appliance after maintenance is finished, select Resume this
appliance from the High Availability menu in the console title bar.
5. Click Resume to confirm your action. The status of the appliance changes to
Online.
When a node in an HA group fails, the queue managers fail over to the remaining
appliance in the group. To restore high availability function after you replace or
repair the failed appliance, you must first deconstruct the HA group by running
Before you create the new group, you must ensure that both appliances are
running the same level of firmware. If your new appliance is running a later
version of the firmware, you must either upgrade your existing appliance, or
downgrade your new appliance.
Procedure
1. On the appliance that did not fail, stop each queue manager by using the
following command:
endmqm QMname
2. If the queue manager is part of a disaster recovery configuration as well as part
of an HA group, you must remove it from the disaster recovery configuration.
Use the following command:
dltdrprimary -m QMname
3. Enter the following command to remove a queue manager from the HA group
and run it as a stand-alone queue manager. The queue manager must be
stopped before you run this command.
sethagrp -e QMname
Where QMname is the name of the queue manager. The queue manager is
removed from the HA group. You can use the strmqm command to restart the
queue manager and run it in a stand alone configuration while you replace the
failed node, if required.
Repeat this command for all HA queue managers.
4. Delete the HA group by entering the following command:
dlthagrp
5. On both the existing appliance and the replacement appliance, create a new HA
group by using the prepareha and crthagrp commands, as described in
“Creating a high availability group” on page 170.
6. On the appliance that did not fail, enter the following command to add a
queue manager back to the HA group. The queue manager must be stopped
before you run this command.
sethagrp -i QMname
Where QMname is the name of the existing queue manager. The queue manager
is added to the group and is started. Repeat for all the queue managers that
were previously part of the HA group.
7. Set the preferred appliance for the queue manager by running the following
command:
sethapreferred QMname
Repeat this command for each queue manager. Run the command on the
appliance that did not fail if you want that appliance to be the preferred
location. Run the command on the replaced or repaired appliance if you want
that appliance to be the preferred location.
8. If you want to restore disaster recovery capability to any of the queue
managers, follow the instructions in “Configuring disaster recovery for a high
availability queue manager” on page 180.
You can specify that a queue manager always runs on a particular appliance in the
HA pair, if that appliance is available. By default, the preferred appliance for a
queue manager is the appliance that the queue manager was created on. You can
use the sethapreferred command to specify a preferred appliance in circumstances
such as replacing a failed node, or specifying the favored appliance when an
existing queue manager is added to an HA group. The sethapreferred is used in
conjunction with the clearhapreferred command. You can also use these
commands from the IBM MQ Console.
In normal circumstances, when both appliances in the group are available and
neither has been suspended, sethapreferred can be used to relocate a queue
manager immediately from one appliance to another, by executing the command
on the target appliance. This might be used to move a queue manager back to its
natural home appliance in a controlled manner following an outage triggered
automatic failover.
When you issue the sethapreferred command, the queue manager immediately
ends on its current host appliance and starts on the appliance where the command
is issued. To revert to manual control of preferred location (leaving the queue
manager running on its new host), issue the clearhapreferred command.
If a failure occurs, and the queue manager fails over to the other appliance in the
pair, it resumes running on its preferred appliance as soon as that appliance is
available. If you have not specified a preferred appliance, in this situation the
queue manager continues to run on the appliance it has failed over to unless you
manually intervene.
Procedure
v To set the current appliance as the preferred appliance for a queue manager:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Specify that the current appliance is the preferred appliance for the named
queue manager:
sethapreferred QMName
v To specify that the current appliance is no longer the preferred appliance for a
queue manager:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
The dsphagrp command returns information about the operational status of each of
the appliances in the HA group. The status can be one of the following statuses:
v Online. The appliance is available.
v Offline. The appliance is unavailable.
v Standby. The appliance has been temporarily removed from the HA group.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the status of the appliances in the HA group by entering the following
command from one of the appliances:
dsphagrp
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
Procedure
1. Start the IBM MQ Appliance web UI and view the MQ Console.
Procedure
v To view the HA status of a queue manager by using the command line interface:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the status of an HA queue manager by entering the following
command from one of the appliances:
status QMgrName
Where:
QMgrName
Specifies the name of the HA queue manager that you want to view
the status of.
3. Exit the IBM MQ administration mode by entering the following command:
exit
v To view the HA status of a queue manager by using the IBM MQ Console:
1. Open the console and find the widget that displays the queue manager.
2. Select the queue manager in the widget and select the properties icon from
the toolbar .
3. In the properties window, click on the High availability status section to
open it.
Procedure
v To regenerate keys by using the command line interface:
1. Enter the IBM MQ administration mode on either of the appliances by
entering the following command:
mqcli
2. View date and time that the keys were last regenerated:
You can configure a high availability (HA) queue manager for disaster recovery
(DR), see “Configuring disaster recovery for a high availability queue manager” on
page 180.
If you can no longer run a queue manager on either appliance in an HA pair (for
example, if there is a power outage in the data center) you can start the disaster
recovery version of the queue manager at the recovery site. Log in to your
recovery appliance, and follow the procedure described in “Switching over to a
recovery appliance” on page 275.
After your disaster is resolved, and presuming that your HA appliance pair have
been restored or re-created, you can switch the queue manager from running on
the recovery appliance back to running on the HA appliance pair. You might have
to follow a slightly different procedure depending on whether your data is
partitioned and, if so, which version of the data you want to retain. Follow the
procedures described in “Switching back to the main appliance” on page 276.
Following the loss of the primary queue manager at the main site, you start the
secondary queue manager at the recovery site. Applications reconnect to the queue
manager at the recovery site and the secondary queue manager processes
application messages.
You can start the secondary queue manager by using the command line or the IBM
MQ Console.
Note: This task assumes that the primary queue manager on the main appliance is
not running. If the queue manager is running, and is not part of a high availability
(HA) configuration, you must stop it by using the endmqm command, or by clicking
the stop icon in the queue manager widget in the IBM MQ Console. If the queue
manager is part of an HA configuration, you must leave it to the HA subsystem to
handle the stopping of the queue manager.
Procedure
v To start the secondary queue manager by using the command line interface:
1. Log in to the recovery appliance as a user in the administrators group.
2. Type the following command to enter IBM MQ administration mode:
mqcli
3. Run the following command:
makedrprimary -m QMname
If the queue manager that you are restoring to the main appliance is a high
availability queue manager, and the data has been partitioned, there are special
steps to take before you follow this procedure. It is possible that you have three
different versions of the data: one on the HA primary, one on the HA secondary,
and another on the recovery appliance in the DR configuration. If this is the case,
you must resolve the partitioning in the HA group, and then follow the procedure
outlined here to resolve the partitioning between the HA group and the DR
recovery appliance. See “Resolving a partitioned problem in a high availability
configuration” on page 442.
Following recovery from loss of the primary queue manager at the main site, you
stop the queue manager at the recovery site and restart it at the main site. The
process for switching back depends on the state of the queue manager data. There
are three possible states:
v No partitioning has occurred. The data on both data managers is the same.
v The data is partitioned, and you want to retain the data from the queue manager
that was running on the recovery appliance.
v The data is partitioned, and you want to retain the data from the original
primary queue manager on the main site.
You should follow the procedures outlined in full, regardless of the current states
of your main and recovery queue managers. (You might find that the partitioning
actually resolves part way through the procedure, depending on the initial state of
your queue managers, but if you try to shorten the procedures, you might find
that partitioning fails to resolve at all).
v Where partitioning has occurred and you want to retain the data from the
recovery appliance:
1. End the queue manager on the recovery appliance:
endmqm QMName
v Where partitioning has occurred and you want to retain the data from the main
appliance:
1. End the queue manager on the recovery appliance:
endmqm QMName
If the queue manager that you are restoring to the main appliance is a high
availability queue manager, and the data has been partitioned, there are special
steps to take before you follow this procedure. It is possible that you have three
different versions of the data: one on the HA primary, one on the HA secondary,
and another on the recovery appliance in the DR configuration. If this is the case,
you must resolve the partitioning in the HA group, and then follow the procedure
outlined here to resolve the partitioning between the HA group and the DR
recovery appliance. See “Resolving a partitioned problem in a high availability
configuration” on page 442.
Following recovery from loss of the primary queue manager at the main site, you
stop the queue manager at the recovery site and restart it at the main site. The
process for switching back depends on the state of the queue manager data. There
are three possible states:
v No partitioning has occurred. The data on both data managers is the same.
v The data is partitioned, and you want to retain the data from the queue manager
that was running on the recovery appliance.
v The data is partitioned, and you want to retain the data from the original
primary queue manager on the main site.
You can detect whether partitioning has occurred by viewing the disaster recovery
section of the queue manager properties.
You should follow the procedures outlined in full, regardless of the current states
of your main and recovery queue managers. (You might find that the partitioning
actually resolves part way through the procedure, depending on the initial state of
your queue managers, but if you try to shorten the procedures, you might find
that partitioning fails to resolve at all).
Procedure
v Where no partitioning has occurred:
1. Start the IBM MQ Appliance web UI on the recovery appliance and view the
MQ Console.
2. In the queue manager widget, end the queue manager on the recovery
.
This sequence is shown in diagrammatic form in Figure 1.
v Where partitioning has occurred and you want to retain the data from the
recovery appliance:
1. In the queue manager widget, end the queue manager on the recovery
.
This sequence is shown in diagrammatic form in Figure 2.
v Where partitioning has occurred and you want to retain the data from the main
appliance:
queue manager): .
This sequence is shown in diagrammatic form in Figure 3.
If a disaster occurs such that the appliance in the main site is beyond repair, you
delete the disaster recovery configuration while your queue manager runs on the
recovery appliance. You then replace the appliance and restore the disaster recover
configuration.
Following the loss of the queue manager on the main site, take the following steps:
1. On the recovery appliance, run the following command:
makedrprimary -m QMname
You have now restored the configuration as it was before the failure at your
main site.
This procedure is shown in diagrammatic form in the following figure:
If a disaster occurs such that the high availability appliances in the main site are
beyond repair, you delete the disaster recovery configuration while your queue
manager runs on the recovery appliance. You then replace the appliances, re-create
the high availability group, and restore the disaster recover configuration.
Following the loss of the high availability queue manager on the main site, take
the following steps:
1. Start running the queue manager on the DR recovery appliance and remove it
from DR control to make it a stand-alone queue manager. At the main site,
re-create the HA group on your replacement appliances:
a. On the recovery appliance, run the following command:
makedrprimary -m QMname
The parameters for crtdrprimary are as described for step 7, with the
addition of the following parameter:
- f floatingIP
The floating IP address is an IPv4 address that is used to replicate
queue manager data from whichever HA appliance the queue
manager is currently running on to the queue manager on the
recovery appliance. The floating IP address must be in the same
subnet group as the static IP address assigned to the replication port
(eth20) on both appliances.
b. On the recovery appliance, re-create the secondary queue manager using
the command that was output by the crtdrprimary command on the
replacement appliance. Synchronization of data from the recovery appliance
to the main appliance begins.
c. On your preferred replacement appliance, start the queue manager:
strmqm QMname
Results
You have now restored the configuration as it was before the failure at your main
site.
You test the recovery appliance by disabling the replication interface between main
and recovery appliances. You make the secondary queue manager into the primary
and remove it from the disaster recovery configuration. You can then test the
stand-alone queue manager. After testing is complete, you restore the replication
interface and delete the queue manager. You then re-create the queue manager as
the secondary queue manager in the disaster recovery configuration.
Procedure
1. Disable the replication link on one or both appliances:
# ethernet eth20
Modify Ethernet Interface configuration
# admin-state disabled
# exit
You can now work on the recovery appliance without affecting the main
appliance.
2. On the recovery appliance, make the queue manager the primary:
makedrprimary -m QMname
When you reverse the roles of your main and recovery appliances, you convert
primary queue managers into secondary queue managers on the original main
appliance. You then convert secondary queue managers into primary queue
managers on the original secondary appliance.
Procedure
1. End the primary queue manager on the main appliance.
endmqm QMname
What to do next
Repeat these steps for each queue manager in your disaster recovery configuration.
Procedure
v To view the DR status of a queue manager by using the command line interface:
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the status of a DR queue manager by entering the following command
from one of the appliances:
status QMgrName
Where:
QMgrName
Specifies the name of the DR queue manager that you want to view
the status of.
3. Exit the IBM MQ administration mode by entering the following command:
exit
To access the file manager, start the IBM MQ Appliance web UI. Click the menu
Copying files
Renaming files
Moving files
To move files from one directory to another directory on the appliance:
1. Locate the directory that contains the files to be moved.
2. Select the check box next to the file name.
3. Scroll to the top or bottom of the panel and click Move.
4. From the New Directory Name list, select the target directory.
5. Optionally select Overwrite Existing Files.
6. Click Confirm Move.
Deleting files
Viewing files
Editing files
You can edit some, but not all, of the files on the appliance. To edit a file:
1. Locate the directory that contains the file.
2. If the file can be edited, there is an edit link on the same row as the file name.
Click Edit.
3. The file opens in preview mode. Click Edit to edit the file.
4. Edit the file as required.
5. Click Submit.
6. Click Close.
To download a file from the appliance to your workstation, you use the download
controls in your browser. So, for example, in Firefox you right-click a file name,
select Save link as and browse for a location on your workstation to save the link
to.
You can use the REST management interface to manipulate files and directories on
the IBM MQ Appliance.
When you use the REST management interface for this purpose, you send HTTP
requests to the REST interface port and receive JSON-formatted responses with a
payload and indication of success or failure. You can incorporate requests into
programs and so automate interaction with the appliance.
To begin retrieving and modifying existing file system resources, you must become
familiar with the filestore resource of the REST management interface that
represents the appliance file system. You can find the format of the filestore
resource by accessing the Uniform Resource Identifier (URI) of the filestore, as
shown by the following example:
GET https://mqhost.com:5554/mgmt/filestore/
The following information is returned, which shows the required URI structure to
manipulate individual files and directories on the appliance:
{
"_links":{
"self":{"href":"/mgmt/filestore/"
},
Directory management
You can perform all directory manipulation operations. These operations include
retrieving the contents of existing directories, creating directories and
sub-directories, and deleting existing directories. As with all other REST requests
on the IBM MQ Appliance, these requests specify the default domain.
Retrieving the contents of a directory
You can retrieve the contents of any appliance directory if you have
appropriate access permissions to that directory. To retrieve the contents of
any directory, construct a URI according to the directory link in the
filestore resource listing. The following request shows an example in
which the local:///test-directory directory is accessed in the default
domain:
GET https://mqhost.com:5554/mgmt/filestore/default/local/test-directory
The response shows that the target directory contains one file, test-file,
and the relevant information for that file.
{
"_links": {
"self": {
"href": "/mgmt/filestore/default/local/test-directory"
},
"doc": {
"href": "/mgmt/docs/filestore"
}
},
"filestore": {
"location": {
"name": "local:/test-directory",
"file": {
"name": "test-file",
"size": 1182,
"modified": "2016-04-07 15:14:17",
"href":"/mgmt/filestore/default/local/test-directory/test-file"
},
"href":"/mgmt/filestore/default/local/test-directory"
}
}
}
Create directories
You can create a directory with a PUT request or a POST request. Both
requests accomplish the same operation, but require a different URI to
complete successfully. You can choose which approach is more convenient
for you. The following POST request shows the URI that is required to
create a subdirectory in the local:/// directory:
POST https://mqhost.com:5554/mgmt/filestore/default/local
The following PUT request shows the URI that is required to create a
test-directory subdirectory within the local:/// directory:
PUT https://mqhost.com:5554/mgmt/filestore/default/local/test-directory
After the directory is deleted, you see a response similar to the following
example:
{
"_links": {
"self": {
"href": "/mgmt/filestore/default/local/test_dir"
},
"doc": {
"href": "/mgmt/docs/filestore"
}
},
"result": "ok",
"script-log": ""
}
File management
You can perform all file manipulation operations by using the REST management
interface. These operations include retrieving and updating the contents of existing
files, creating files, and deleting existing files.
Retrieve file contents
You can retrieve the contents of any file on the appliance provided you
have appropriate access permissions to that file. To retrieve the contents of
any file, construct a URI based on the file part of the filestore resource.
For example, the following request retrieves contents of the test_file.txt
file in the local:///test_dir directory:
GET https://mqhost.com:5554/mgmt/filestore/default/local/test_dir/test_file.txt
Watchdog timer
The IBM MQ Appliance has a baseboard management controller (BMC) that
provides a watchdog timer.
The watchdog timer allows you to detect and recover from a serious malfunction
on the appliance, even if the appliance is at a remote location. When the appliance
is running normally, the appliance firmware informs the BMC that all is well every
few seconds. If the BMC receives no such notification for a specified time (by
default, twenty minutes), it restarts the appliance.
If you want to change the default behavior of the watchdog timer, or implement
some of the other available features, you can configure the BMC.
You use the Intelligent Platform Management Interface (IPMI) to configure the
BMC. Commands that are sent over IPMI are independent of the appliance CPU,
firmware, and operating system. The BMC can still be accessed when the appliance
is powered off (provided that it is plugged into power).
You must meet the following requirements before you can configure the BMC:
v You must use the mgt0 interface on the appliance for your IPMI connection, see
“IPMI LAN channel commands” on page 703.
v You must create a special IPMI user, “IPMI user commands” on page 702.
v You require a remote system, for example a Linux host, running a suitable IPMI
client. (The examples use a Linux command line IPMI client called ipmitool, see
http://linux.die.net/man/1/ipmitool).
Where:
v ipmi_channel_IP is the IP address that you allocated to the appliance when you
configured the IPMI interface on mgt0.
v ipmi_user is the name of the ipmi user that you configured on the appliance.
v ipmi_password is the password for the ipmi user.
Where:
Watchdog Timer Is
Reports the current running state of the watchdog timer.
Watchdog Timer Action
Describes what is done when the timer reaches 0. The default is to restart
the appliance.
Initial Countdown
The total timer wait time.
Present Countdown
The current timer value.
The following command reenables the timer by setting it to its initial state:
ipmitool -L operator -I lanplus -H ipmi_channel_IP -U ipmi_user
-P ipmi_password mc reset warm
You use the dmpmqcfg command on your source system to save the configuration of
a queue manager. Running dmpmqcfg records a series of MQSC commands that you
later run with the runmqsc command. For information about MQSC commands, see
MQSC commands in the IBM MQ documentation. You create a new queue
manager on your target appliance, and create a connection to it on your source
system. You then use the runmqsc command on the source system to configure the
remote queue manager.
As part of moving a queue manager, you must carefully check the details that you
are exporting. If there are features in the export that are not supported on IBM MQ
Appliance, you must take action to remedy this. In particular, note you cannot run
applications or services on the appliance. You must move such functionality to a
client application.
If you move queue managers that are part of a distributed configuration, you must
update channel definitions on other queue managers in the configuration to point
to the new location of the moved queue manager on the appliance.
The following topics contain detailed instructions for moving queue managers
from different types of platform.
Note: These instructions assume that you are moving queue managers from
platforms other than z/OS, but the general principles also apply to migrating from
z/OS.
In these instructions, the source system is the system that you are moving the
queue manager from. The target system is the IBM MQ Appliance.
Procedure
1. Log in to the source system as a user in the IBM MQ administrators (mqm)
group.
2. Save the configuration information of the queue manager that you want to
move by typing the following command:
Where:
v QM_name is the name of the queue manager that you want to move.
v QM_file is the name and path of a local file on the source system that the
configuration information is written to.
3. If the queue manager is part of a distributed configuration, quiesce the queue
manager. Ensure that there are no messages in flight then stop the queue
manager.
4. Create and start a new target queue manager on the IBM MQ Appliance. You
can use the IBM MQ Console to do this action, see “Using the IBM MQ
Console” on page 207, or you can use MQSC commands, with the required
name and attribute values. If you want to use MQSC commands, you must
complete the following steps:
a. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
b. Log in as a user in the administrators group.
c. Type the following command to open the IBM MQ command line
interface:
mqcli
5. Set up any user IDs that are required by the queue manager that you are
moving.
6. Enable a client connection to the target queue manager. You must define and
start a TCP listener, define an SVRCONN channel, and allow administrator
access to the queue manager by using this channel. You can use the IBM MQ
Console to do this action, see “Using the IBM MQ Console” on page 207, or
you can use MQSC commands. If the source IBM MQ system has IBM MQ
Explorer, try using it to add a remote queue manager definition for the target
queue to check that the client connection is working.
7. Ensure that your exported queue manager configuration is compatible with
the target IBM MQ Appliance. Follow the process in “Handling incompatible
features in the queue manager” on page 310. Edit the file that contains the
queue manager configuration information if necessary.
8. Import the source queue manager configuration into the target queue
manager. You run these steps on the source system:
a. Define an environment variable that is named MQSERVER to identify the
channel that connects to the target queue manager. For example, the value
of MQSERVER could be set to:
SYSTEM.ADMIN.SVRCONN/TCP/9.20.233.217(1414)
b. Run the following command to replay on the target queue manager the
commands that were exported from the source queue manager:
runmqsc -c QM_name < QM_file
9. Restore the attributes that were masked in the dmpmqcfg output and that you
identified when you checked the output (as described in “Handling
incompatible features in the queue manager” on page 310). You restore
attributes by using the client connection from the source system. You can
either use IBM MQ Explorer, or start runmqsc interactively in client mode, and
then input MQSC commands:
runmqsc -c QM_name
10. Stop and restart the queue manager on the target IBM MQ Appliance and
ensure that it starts cleanly.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a user in the administrators group.
3. Type the following command to open the IBM MQ command line interface
shell:
mqcli
4. Type the following command to generate a self-signed certificate, and extract it:
mqa(mqcli)# createcert -m qmname -label labelname -dn "CN=Issuer,OU=Certificate Authority,O=organ
For example:
mqa(mqcli)# createcert -m REGA -label ibmwebspheremqrega -dn "CN=Issuer,OU=Certificate Authority,
5. Type exit to exit the IBM MQ command line interface shell, and type the
following command to open the appliance configuration shell:
config
6. Copy the new certificate that you created in step 4 to any queue manager or
client machines that need a TLS connection to the queue manager:
mqa(config)# copy mqpubcert:///certificate_source scp://certificate_destination
For example:
mqa(config)# copy mqpubcert:///REGA_ibmwebspheremqrega scp://myuser@9.20.120.129//build/exported_
7. If the queue manager is part of a distributed configuration, copy certificates
from remote queue managers to the appliance. Enter the following command:
mqa(config)# copy scp:certificate_source mqpubcert:///certificate_destination
For example:
mqa(config)# copy scp://myuser@9.20.120.129//build/exported_certficates/ibmwebspheremqregb.p12 mq
8. Open the IBM MQ CLI shell again, and type the following command to add
certificates that you copied in the previous step to the repository:
mqa(mqcli)# addcert -m qmname -label qmlable -file remoteqm_certificate -format ascii
For example:
mqa(mqcli)# addcert -m REGA -label ibmwebspheremqregb -file ibmwebspheremqregb.p12 -format ascii
For help with planning how to handle incompatible features, consult the following
topics:
v “Differences between administering an IBM MQ Appliance and an IBM MQ
installation” on page 17
v “Moving a queue manager” on page 306
v “Using an IBM MQ client” on page 246
As part of moving the queue manager, you must identify any user IDs and groups
that the queue manager configuration includes and re-create them on the IBM MQ
Appliance. If different user IDs and groups are created on the appliance, then you
must make the appropriate changes to the dmpmqcfg output.
Queue managers on z/OS are likely to have several z/OS-specific attributes that
are not supported on IBM MQ Appliance. You must remove or comment out such
attributes.
These changes do not ensure that the migrated queue manager is functionally
equivalent to the original queue manager on z/OS. You must consider each of the
attributes that are not supported by the new queue manager to decide whether its
value is significant for your applications, and if the behavior of the object in the
new queue manager, without this attribute, is acceptable. In some cases, it might
be necessary to define different objects or to set other values to achieve the same
effect. This consideration also applies to differences in the default value of some
attributes. For example, queues on z/OS default to non-shared so there might be
several statements that replace queues, including default system queues, with
non-shared versions. This action might be the right thing to do if your applications
rely on this characteristic, or it might be the wrong thing to do because you want
to preserve the default behavior of the appliance queue manager.
Examine the qm.ini file and make a note of any settings that cannot be made by
running the commands in the dmpmqcfg output. These settings might include, for
example, log file settings. Particularly note any exit information in the
configuration. IBM MQ Appliance does not support exits, so this functionality
must be substituted. For example, channel exits can be replaced by channel auth
Applications
Applications cannot be run on the IBM MQ Appliance. You must plan to migrate
any applications that are local to the queue manager to a client system. Such
applications need to be rebuilt so that they can connect to the queue manager from
another machine by using client connections. If any applications are run as
triggered processes, they must also be converted to run on a client machine. In that
case, it is necessary to run the trigger monitor in client mode and to alter the
queue manager's process definitions accordingly. For help, see runmqtmc and
Managing objects for triggering in the IBM MQ documentation.
See “Adding a value to the configuration file” on page 311 for details of using
the setmqini command to edit the qm.ini file on the appliance.
The dmpmqcfg command that you run on your source platform produces a series of
MQSC commands that you run to re-create the queue manager on the target IBM
MQ Appliance. Certain features are incompatible with the appliance, and you must
check the dmpmqcfg output, and amend it if necessary, to deal with incompatible
features.
The output from the dmpmqcfg command contains lines that are commented out by
the asterisk (*) character. Many of these values are read-only values that are set
when the queue manager is created. They cannot be affected by the commands in
the dmpmqcfg output.
The output from the dmpmqcfg command might include one or more masked
values. If these values were replayed in commands, they would not correctly
re-create the objects configuration. The values are masked to prevent sensitive data,
such as passwords, from being included in clear text in the configuration dump.
Before you replay the configuration, first check the output for masked parameters
such as SSLCRYP, PASSWORD, or LDAPPWD that are commented. You must use
additional commands to substitute valid values.
Ensure that any user IDs specified in the commands are correctly defined on the
IBM MQ Appliance. On Windows source systems, the user and group names
might be in the form name@domain. This format is not supported on the appliance,
so any such user IDs must be mapped to new user IDs on the appliance.
The SSLKEYR queue manager attribute is managed by the appliance, and should
not be overwritten when you replay the commands to create the queue manager
configuration.
Where you are moving a queue manager from a source Windows system, you
must remove any definitions for NETBIOS, SPX, and LU62 listeners from the
dmpmqcfg output.
You can use the setmqini command to add values to the qm.ini file, which is used
for general queue manager configuration, or the mqat.ini file, which is used to
control application activity trace. The stanza that you specify as an argument to
setmqini determines which file the value is written to.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Add or modify the value to the qm.ini file by entering the following command:
setmqini -m QMgrName -s Stanza -k KeyName -v Value
Where:
QMgrName
Specifies that the configuration file that is associated with the specified
queue manager is to be modified.
Stanza
Specifies which stanza the value is to be added to.
The following values for Stanza modify the qm.ini file:
v Log
v TCP
v Channels
v InstanceData
v TuningParameters
v SSL
v Security
v Subpool
The following value for Stanza modifies the mqat.ini file.
v AllActivityTrace
Do not edit the qm.ini file to control the number of channels. Instead,
use the MAXINST and MAXINSTC values on your SVRCONN channels. For
more information, see “Queue manager configuration on the IBM MQ
Appliance” on page 23.
KeyName
Specifies which key to add or modify.
Ensure that the value of KeyName is correct before you use the
command to add a key and value from the stanza. The value of
KeyName is not validated. If incorrect values are specified in the qm.ini
file, a subsequent attempt to start the queue manager might fail.
See Configuring trace levels for details of keys that you can add or
modify to the mqat.ini file.
Value Specifies the value to add for the specified key name.
If Value is a string that contains spaces, it must be enclosed in double
quotation marks. Any double quotation marks that are used in the
Value must be escaped by using a backslash ( \ ).
Example
The following example shows the key TraceLevel being set to HIGH in the
mqat.ini file.
setmqini -m QM1 -s AllActivityTrace -k TraceLevel -v HIGH
You cannot delete an entire stanza from the qm.ini in a single command. To delete
an entire stanza, you must delete each key individually from the stanza.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Delete the value from the qm.ini file by entering the following command:
setmqini -m QMgrName -s Stanza -k KeyName -d
Where:
QMgrName
Specifies that the qm.ini file that is associated with the specified queue
manager is to be modified.
Stanza
Specifies which stanza the value is to be removed from.
Valid values for Stanza are the following values:
v Log
v TCP
v Channels
v InstanceData
v TuningParameters
v SSL
v Security
v Subpool
KeyName
Specifies which key and associated value to delete.
Example
The following example shows the deletion of the key name and associated value of
RemoteQueueAccessControl in the Security stanza of the qm.ini file of queue
manager QM1:
setmqini -m QM1 -s Security -k RemoteQueueAccessControl -d
You can use the dspmqini command to view stanzas in the qm.ini file, which is
used for general queue manager configuration, or the mqat.ini file, which is used
to control application activity trace. The stanza that you specify as an argument to
dspmqini determines which file you view.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the contents of the configuration file by entering one of the following
commands:
v To view the contents of the entire qm.ini file, enter the following command:
dspmqini -m QMgrName
v To view the contents of a single stanza of a qm.ini file, or of the mqat.inifile,
enter the following command:
dspmqini -m QMgrName -s Stanza
v To view the contents of a single key of the qm.ini or mqat.ini file, enter the
following command:
dspmqini -m QMgrName -s Stanza -k KeyName
Where:
QMgrName
Specifies that the file that is associated with the specified queue
manager is to be viewed.
Stanza
Specifies the stanza that you want to view.
The following values are valid for viewing stanzas in the qm.ini file:
v Log
v TCP
v Channels
Example
v The following example shows viewing the Channels stanza in the qm.ini file for
queue manager QM1:
dspmqini -m QM1 -s Channels
v The following example shows viewing the value of the key name
ClusterQueueAccessControl in the Security stanza of the qm.ini file of queue
manager QM1:
dspmqini -m QM1 -s Security -k ClusterQueueAccessControl
v The following example shows viewing the value of the key name ActivityCount
in the AllActivityTrace stanza of the mqat.ini file of queue manager QM1:
dspmqini -m QM1 -s AllActivityTrace -k ActivityCount
You can back up a queue manager, including log files and data, to an archive file
stored in the mqbackup:///QMgrs directory on the appliance. You can move the file
to another appliance and then restore the queue manager to the new appliance.
Follow the instructions in “Backing up a queue manager” on page 259 and
“Restoring a queue manager” on page 261.
To prepare the new appliance, you connect it to the old appliance and give the
new appliance a temporary configuration for ports ETH20 and MGT0. When you
have transferred all your queue managers, the new appliance will be reconfigured
with the old appliance port details, and the old appliance is then retired.
Procedure
1. Power up the new appliance and attach the supplied serial console cable to the
console port.
2. Configure the ETH20 port. This is the port over which you will migrate the
queue manager data. If you are going to directly connect the two appliances,
configure a temporary IP address and leave the gateway unconfigured. If you
are connect to a 10 Gb network, specify an IP (CIDR) and a gateway for the
connection. See “Configuring Ethernet interfaces by using the command line”
on page 121 for help with configuring the Ethernet ports.
3. Configure the MGT0 port. Connect the port to a 1 Gb network, specifying an IP
(CIDR) and a gateway for the connection.
4. Connect the ETH20 port on the new appliance to the ETH20 port on the old
appliance using the supplied cable. (If the two appliances are not located near
each other, ensure both are connected to a 10 Gb network.)
5. Check that you can communicate with the new appliance by pinging the IP
address that was assigned to ETH20 on the existing appliance.
6. Ensure the MGT0 port on both appliances are connected to a 1 Gb network
(this connection enables you to send commands to the appliance from a remote
workstation).
To prepare the old appliance, you connect it to the new appliance and ensure that
the two appliances can communicate.
Procedure
1. If it is not already configured, configure the ETH20 port. This is the port over
which you will migrate the queue manager data. If you are going to directly
connect the two appliances, configure a an IP address and leave the gateway
unconfigured. If you are connect to a 10 Gb network, specify an IP (CIDR) and
a gateway for the connection. See “Configuring Ethernet interfaces by using the
command line” on page 121 for help with configuring the Ethernet ports.
2. Ensure that the ETH20 port on the existing appliance is connected to the
ETH20 port on the new appliance using the supplied cable. (If the two
appliances are not located near each other, ensure both are connected to a 10
Gb network.)
3. Check that you can communicate with the new appliance by pinging the IP
address that was assigned to ETH20 on the new appliance.
You use the commands that are normally used to set up a disaster recovery
solution to transfer data between the two appliances.
On the existing appliance, you use a command that specifies that the queue
manager to be transferred is the primary version of the queue manager. When you
run this command, it outputs another command that you run on the new
appliance to create a new, secondary version of the queue manager. After you run
the command to create a secondary version of the queue manager, synchronization
begins and transfers the queue manager data across the ETH20 link.
You repeat this procedure for each queue manager on your existing appliance.
Procedure
1. On the existing appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Stop the queue manager that you want to transfer:
endmqm queue_manager
c. Enter the following command:
crtdrprimary -m queue_manager -r new_appliance_name -i new_appliance_IP
-p port
On successful completion, the command outputs a crtdrsecondary
command.
d. Restart the queue manager:
strmqm queue_manager
2. On the new appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Enter the crtdrsecondary command, exactly as output in step 1c.
Synchronization of data from the old appliance to the new appliance begins.
3. On either appliance, check the progress of the synchronization by using the
status command.
status queue_manager
Your first step is to use more disaster recovery commands to remove the pairing
between the two machines. You then disconnect your old appliance from the
network. Finally, you reconfigure the new appliance so that it uses the same IP
addresses as the old appliance.
The main appliance now has no active queue managers, you can disconnect it and
power it down.
Procedure
1. On the main appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Stop the queue manager that you want to work with:
endmqm queue_manager
2. On your recovery appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Make the queue manager the primary instance:
makedrprimary queue_manager
c. Start the queue manager:
strmqm queue_manager
d. Remove the queue manager from the disaster recovery configuration:
dltdrprimary -m queue_manager
e. Repeat these steps for each queue manager.
3. After you have transferred all your queue managers from the main appliance,
you can disconnect it from the network and power it down.
To prepare the new appliance you power up the appliance and configure the
Ethernet ports as they were configured for the original main appliance.
Procedure
1. Power up the new main appliance and attach the supplied serial console cable
to the console port.
2. Configure the ETH20 port. This is the port over which you will migrate the
queue manager data. Configure it with the same details that the appliance you
After following the procedure to this point, your queue managers are currently
running on your recovery appliance, and are not part of a disaster recovery
configuration. You now use a command for each queue manager to designate that
it is the primary instances on the recovery appliance. A command is output at the
successful completion of this command that you run on the new main appliance to
create a secondary instance of the queue manager there and synchronize it with
the primary instance across the ETH20 link.
You repeat this procedure for each queue manager on your recovery appliance.
Procedure
1. On the recovery appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Stop the queue manager that you want to transfer:
endmqm queue_manager
c. Enter the following command:
crtdrprimary -m queue_manager -r new_appliance_name -i new_appliance_IP
-p port
On successful completion, the command outputs a crtdrsecondary
command.
d. Restart the queue manager:
strmqm queue_manager
2. On the new mains appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Enter the crtdrsecondary command, exactly as output in step 1c.
Synchronization of data from the old appliance to the new appliance begins.
3. On either appliance, check the progress of the synchronization by using the
status command.
status queue_manager
To prepare the new recovery appliance you power up the new appliance and
configure the Ethernet ports as they were configured for the original recovery
appliance.
You then work on the main appliance to create the queue managers as primary
instances in the new disaster recovery configuration. You run the commands
produced by that procedure on the recovery appliance to create secondary
instances of the queue managers and synchronize them with the primary instance.
Procedure
1. Remove the existing recovery appliance from the network and power it down.
2. Power up the new recovery appliance and attach the supplied serial console
cable to the console port.
3. Configure the ETH20 port. This is the port over which you will connect to the
main appliance. See “Configuring Ethernet interfaces by using the command
line” on page 121 for help with configuring the Ethernet ports.
4. Configure the MGT0 port with the same details that the appliance you are
replacing was configured. (This connection enables you to send commands to
the appliance from a remote workstation.)
5. Configure the remaining Ethernet ports as they were originally configured for
the recovery appliance.
6. Connect the ETH20 port to the 10 Gb network that the ETH20 port of the
recovery appliance is connected to.
7. Connect the MGT0 port to the 1 Gb network that the MGT0 port of the
recovery port is connect to.
8. Ping the main appliance to check the connections.
9. Make other network connections as required to replicate the configuration of
the original recovery appliance.
10. On the main appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Enter the following command:
crtdrprimary -m queue_manager -r new_appliance_name -i new_appliance_IP
-p port
The first part of the operation to transfer queue managers to a new, replacement
appliance, is to run the queue managers on appliance HA2, and then deconstruct
the HA group.
The appliance HA1 then has no active queue managers, you can disconnect the
appliance and power it down.
Procedure
1. On appliance HA1, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Clear the preferred appliance setting from the queue manager that you
want to work with:
clearhapreferred queue_manager
To prepare the new appliance you power up the appliance and configure the
Ethernet ports as they were configured for the original HA1 appliance.
Procedure
1. Power up the new HA1 appliance and attach the supplied serial console cable
to the console port.
326 IBM MQ Appliance
2. Configure the new appliance and set up ETH13, ETH17, and ETH21 to have
the same configuration as the HA1 appliance that you are replacing. See
“Configuring Ethernet interfaces by using the command line” on page 121 for
help with configuring the Ethernet ports.
3. Configure the MGT0 port. Connect the port to a 1 Gb network, and configure it
with the same details that the appliance you are replacing was configured.
(This connection enables you to send commands to the appliance from a remote
workstation.)
4. Configure the remaining Ethernet ports as they were originally configured for
the main appliance.
5. Connect the new HA1 appliance to the existing HA2 appliance, as specified in
the following table:
After following the procedure to this point, your queue managers are currently
located on appliance HA2, and are not part of an HA group. You now use HA
commands to create a new HA group and replicate each queue manager to the
new HA1 appliance.
Procedure
1. On the HA2 appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Enter the following command:
prepareha -s secret_text -p IPaddress
Where:
v secret_text specifies a string that is used to generate a short-lived
password. The password is used to set up the unique key for the two
appliances.
v IPaddress specifies the IP address that you have assigned to ETH13 on the
new HA1 appliance.
2. On the new HA1 appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Enter the following command:
crthagrp -s secret_text -p IPaddress
Where:
Adding the queue manager to the HA group copies it to the HA1 appliance
and restarts it running on the HA2 appliance.
If you have followed the procedure to this point, you have a high availability pair
comprising a new HA1 appliance and the original HA2 appliance. Queue
managers are currently running on the HA2 appliance.
You now take steps to make the queue manager fail over to appliance HA1. Then
you remove all the queue managers from the HA configuration, and delete the HA
group.
The appliance HA2 now has no active queue managers, you can disconnect it and
power it down.
Procedure
1. On appliance HA2, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Stop the first of the queue managers that you want to work with:
endmqm queue_manager
c. Clear the preferred appliance setting from the queue manager:
clearhapreferred queue_manager
To prepare the new appliance you power up the appliance and configure the
Ethernet ports as they were configured for the original HA2 appliance.
Procedure
1. Power up the new HA2 appliance and attach the supplied serial console cable
to the console port.
2. Configure the new appliance and set up ETH13, ETH17, and ETH21 to have
the same configuration as the HA2 appliance that you are replacing. See
“Configuring Ethernet interfaces by using the command line” on page 121 for
help with configuring the Ethernet ports.
3. Configure the MGT0 port. Connect the port to a 1 Gb network, and configure it
with the same details that the appliance you are replacing was configured.
(This connection enables you to send commands to the appliance from a remote
workstation.)
4. Configure the remaining Ethernet ports as they were originally configured for
the main appliance.
5. Connect the new HA2 appliance to the HA1 appliance, as specified in the
following table:
After following the procedure to this point, your queue managers are currently
located on appliance HA1, and are not part of an HA group. You now use HA
commands to create a new HA group and replicate each queue manager to the
new HA2 appliance.
Procedure
1. On the HA1 appliance, complete the following steps:
a. Enter MQ administration mode by typing mqcli on the command line.
b. Enter the following command:
prepareha -s secret_text -p IPaddress
Where:
Where:
v secret_text specifies the same string that you used with the prepareha
command on the HA1 appliance.
v IPaddress specifies the IP address of ETH13 on the HA1 appliance.
3. On the HA1 appliance, add the queue managers back to the HA group. For
each queue manager, ensure that it is stopped and enter the following
command:
sethagrp –i queue_manager
Adding the queue manager to the HA group copies it to the HA2 appliance
and restarts it running on the HA1 appliance.
Appliance users
Where you have locally defined users, RBM can specify password polices and
account policies for them. These policies define the rules governing password
(such as minimum length, character types, and expiration periods) and those rules
governing when accounts are locked out after failed log in attempts.
Messaging users
Messaging users can connect to queue managers remotely to send and receive
messages. They can be authorized to remotely manage some aspects of queue
managers by using client connections such as the IBM MQ Explorer. Messaging
users are created by using user administration commands.
Messaging users can be stored in the internal user store, or in an external LDAP
repository. (The internal user store is separate to the store used for appliance
users.) The scalability of the internal store is limited, so in situations where many
messaging users exist, an external LDAP repository provides better performance.
See “Administering messaging users” on page 245 for guidance on working with
messaging users and messaging user groups.
The credential mapping part of role based management authorizes appliance users
to use different features on the IBM MQ Appliance.
When you define credential mapping under role based management, you specify
which resources appliance users have access to. Credential mapping provides a
high degree of granularity in which resources can be excluded or included. For
example, you can specify that a user can be mapped onto a set of credentials that
allow modification of network settings, but prohibit changing user settings.
Access that appliance users have to resources is controlled by an access profile. The
access profile defines the set of privileges for one or more resources on the
appliance. Privileges for a resource can be one or more of the following
permissions:
v Read
v Write
v Add
v Delete
v Execute
A bundle of access rights (also termed access policies) constitutes an access profile.
An access profile can originate from either of the following credential mapping
sources:
Local user group
Locally configured user group.
XML file
A file that defines access profiles.
After an appliance user is authenticated and the access profile is evaluated, the
appliance enforces the established access profile. The IBM MQ Appliance web UI
displays only resources that the user has access to, and the command line
recognizes only commands for resources that the user has access to. For commands
that users do not have access to, the command line displays the following message.
Unknown command or macro (command)
Access policies
You use access policies to control which appliance resources users can access.
Access policies are strings that identify a particular resource and grant access to it.
A number of access policies form an access profile, which can be applied to a
particular user either through credential mapping using a local user group, or an
XML file.
The access policy for the IBM MQ Appliance has the following format:
*/*/resource?Access=privileges
Where:
v resource is a URI that identifies the resource.
v privileges define the access given to the resource. Specify one or more of the
following privileges, optionally separated by the plus (+) character:
– r - read
– w - write
– x - execute
– a - add
– d - delete
You can also enter NONE to explicitly exclude users from a resource.
The following strings are examples of access policies:
*/*/*?Access=r+w
*/*/access/change-password?Access=x
A user with the access profile defined by these policies has read and write access
to all appliance resources, plus they have execute permission on the
access/change-password resource, which enables them to change their own
password on the appliance.
There can be multiple matches when resolving access policies, and some of these
might conflict with each other. In such cases, the more resource-specific policies are
granted greater weight and override the more general policies. For example, a user
group might have the following policies defined:
*/*/*?Access=rwadx
*/*/mgmt/rest-mgmt?Access=NONE
Policies applying to the same users and resource that have the same weight are
additive. So, for example, if a policy provides a user group with read access on a
resource, and another policy provides write access on that resource, then users in
that group have both read and write permissions on that resource.
When defining an access policy for a local user group, you can enter the profile
strings manually using the access-policy command, or in the IBM MQ Appliance
web UI. You can also use the policy builder in the web UI to specify access
policies.
The appliance resources are listed in the following tables. The tables provide the
following information for each resource:
v Resource category. The category the resource is listed under in the IBM MQ
Appliance web UI.
v Resource. The name of the resource.
v Resource profile URI. The URI that you specify in an access policy giving access
to this resource.
v CLI command. If you grant access to this resource, then users have access to this
CLI command.
v REST URI. If you grant access to this resource, then users can use this REST
URI (provided that they have access to the REST management interface).
Status resources
The status resources control access to status reporting for various aspects of
appliance operation. Giving a user read access to a status resource enables them to
use the show CLI command for that resource, or to use a REST query to recover
the status of that resource.
Table 27. Status resources
Resource Resource profile CLI
category Resource URI command REST URI
Main Active services status/active- show /mgmt/status/default/ServicesStatus
services services
Main Active Users status/active-users show users /mgmt/status/default/ActiveUsers
Main Date and Time status/date-time show time /mgmt/status/default/DateTimeStatus
Main Logging Targets status/logging- show /mgmt/status/default/LogTargetStatus
target logging
status
Main Services Memory status/memory- show /mgmt/status/default/ServicesMemoryStatus2
Usage services services-
memory
Configuration Domain Status status/domain- show /mgmt/status/default/DomainStatus
status domains
System Failure status/failure- show /mgmt/status/default/
Notification notification failure- FailureNotificationStatus2
notification-
status
Configuration resources
The configuration resources give access to those resources that are used to
configure the appliance. Giving a user permissions (read, write, add, and delete as
required) to a configuration resource enables them to work with configuration
objects, using the web UI, or the CLI commands or REST URIs as listed in the
following table.
Table 28. Configuration resources
Resource
category Resource Resource profile URI CLI command REST URI
Network Settings DNS Settings network/dns config/dns /mgmt/config/default/
DNSNameService
Network Settings Host Alias network/host-alias config/host-alias /mgmt/config/default/
HostAlias
Network Settings Ethernet network/interface config/ethernet /mgmt/config/default/
Interface EthernetInterface
Network Settings Link Aggregation network/link- config/link- /mgmt/config/default/
Interface aggregation aggregation LinkAggregation
Network Settings Load Balancer network/loadbalancer- config/ /mgmt/config/default/
Group group loadbalancer- LoadBalancerGroup
group
Network Settings Network Settings network/network config/network /mgmt/config/default/
NetworkSettings
config/ntp
[deprecated]
Network Settings VLAN Interface network/vlan config/vlan /mgmt/config/default/
VLANInterface
Service License Agent services/ilmt-agent config/ilmt-agent /mgmt/config/default/
Configuration ILMTAgent
Crypto Crypto crypto/cert config/crypto/ /mgmt/config/default/
Configuration Certificate certificate CryptoCertificate
Crypto Crypto crypto/cert-monitor config/crypto/ /mgmt/config/default/
Configuration Certificate cert-monitor CertMonitor
Monitor
Crypto CRL Retrieval crypto/crl config/crypto/crl /mgmt/config/default/
Configuration CRLFetch
Crypto Crypto crypto/idcred config/crypto/ /mgmt/config/default/
Configuration Identification idcred CryptoIdentCred
Credentials
Crypto Crypto Key crypto/key config/crypto/ /mgmt/config/default/
Configuration key CryptoKey
Crypto SSH Server crypto/sshserverprofile config/crypto/ /mgmt/config/default/
Configuration Profile sshserverprofile SSHServerProfile
Crypto Crypto Shared crypto/sskey config/crypto/ /mgmt/config/default/
Configuration Secret Key sskey CryptoSSKey
Crypto SSL Client Profile crypto/ssl-client config/crypto/ /mgmt/config/default/
Configuration ssl-client SSLClientProfile
Crypto SSL Server crypto/ssl-server config/crypto/ /mgmt/config/default/
Configuration Profile ssl-server SSLServerProfile
Crypto SSL Host Name crypto/ssl-sni-mapping config/crypto/ /mgmt/config/default/
Configuration Mapping ssl-sni-mapping SSLSNIMapping
Crypto SSL SNI Server crypto/ssl-sni-server config/crypto/ /mgmt/config/default/
Configuration Profile ssl-sni-server SSLSNIServerProfile
Crypto Test Password crypto/test-password- config/crypto/ /mgmt/config/default/
Configuration Map map test TestPasswordMap
password-map
Crypto Crypto crypto/valcred config/crypto/ /mgmt/config/default/
Configuration Validation valcred CryptoValCred
Credentials
Device IPMI LAN mgmt/ipmi-lan-channel config/ipmi-lan- /mgmt/config/default/
Management Channel channel IPMILanChannel
Device IPMI User mgmt/ipmi-user config/ipmi-user /mgmt/config/default/
Management IPMIUser
Action resources
The action resources control access to the resources used to perform actions on the
appliance. Give users execute permission on a resource to enable the corresponding
action. Users can perform the action by using the corresponding CLI command or
The resources listed in the following table are only visible to, and usable by, the
admin user. You cannot alter access to these resources.
Table 30. Admin only resources
Resource Resource profile URI CLI command
Diagnostics Only available to admin user diagnostics
Trace Route Only available to admin user traceroute
Clear Intrusion Detected Only available to admin user clear intrusion-detected
Watchdog Only available to admin user config/watchdog
Startup Configuration Only available to admin user config/startup
Reinitialize Only available to admin user config/flash/reinitialize
Service Nagle Only available to admin user config/service nagle
Log Size Only available to admin user config/logsize
System Log Only available to admin user config/syslog
Other resources
The following CLI commands are always available to all users who can connect to
the command line:
v echo
v exit
v help
Appliance users and their permissions are controlled by role based management.
You can configure role based management by using the IBM MQ Appliance web
UI or by using the command line interface.
If you use external LDAP servers for user authentication, be aware that these
servers might potentially be a weakness in your security setup. You must take the
necessary steps to ensure that the LDAP servers are themselves secure.
User authentication
You can configure role based management to authenticate users in one of the
following ways:
LDAP The appliance authenticates users remotely by using an LDAP server. You
can also define local users to fall back to if the LDAP server is not
available.
Local user
When authentication is local, authentication is performed by the appliance
by using user name and password.
XML file
User names and passwords can be specified in an XML file. You can store
the XML file on the appliance or on a remote server. You can use the RBM
builder on the appliance to define users. You can use the same XML file to
define access policies.
User authorization
You can configure role based management to authorize users to use appliance
resources by selecting one of the following credential mapping methods:
Local user group
Specify access profiles in the local user groups on the appliance. You can
map user groups or individual users looked up on an LDAP server onto
local user groups, which allows a user to belong to multiple role-based
groups.
XML file
Specify access policies in an XML file. You can store the XML file on the
appliance or on a remote server. You can use the RBM builder on the
appliance to define access profiles. You can map user groups or individual
users looked up on an LDAP server onto policies that are defined in an
XML file.
User authorization enforces access privileges for one or more resources on the
appliance. These privileges can be quite broad or very specific. The privileges are
combined together to form an access profile. See “User authorization, credential
mapping, and access profiles” on page 332 for detailed information.
You must take care when you configure role based management (RBM) that you
do not make it possible for all users to be locked out of the appliance.
If your user authentication depends on one or more external LDAP servers, for
example, then you must take steps to ensure that log in is still possible for one or
more users if you lose connection to the external severs. You do this by configuring
one or more fallback users. Fallback users are local users who are authenticated by
the appliance.
The RBM settings that you configure apply to users that are accessing the
appliance both by the web UI and by the CLI. (If you do lock yourself out, you
can attach a terminal directly to the physical appliance and log in as user admin.)
When you configure user authentication by using the web UI, changes take effect
as soon as you click Apply. Be careful that you do not lock yourself out before you
have defined fallback users, and ensure that your authentication server is available
and appropriately configured.
You can use the following steps to double-check your changes (you might require
physical access to your appliance in order to restart it):
1. Complete the required RBM modifications, including the definition of one or
more fallback users (and an LDAP load balancer group, if you are using one).
2. Click Apply to enforce the changes, but do not click Save Config.
3. Verify that one of your fallback users can log in to the appliance.
4. Verify that one of your externally verified users can log in to the appliance.
5. If your externally verified user cannot log in, make the necessary changes as
the fallback user, apply your changes, and try again.
6. If your fallback user cannot log in, then physically restart the appliance (by
using the power button) to roll back to the previously saved configuration.
You can configure the IBM MQ Appliance to authenticate users by using an LDAP
server.
You have a number of options when you are using an LDAP server:
Using credentials directly
You can use your users' credentials directly to bind to the LDAP server. In
For example, your user might log in with the user name “Robin
Dalemain”, which is the CN part of their DN. You have configured the
suffix to be“ dc=appliance203, dc=com”. When Robin attempts to log in to
the appliance, the distinguished name “cn=Robin Dalemain,
dc=appliance203, dc=com”, together with Robin's password are used to
connect to the LDAP server. If Robin's credentials successfully bind to the
LDAP server, then Robin is authenticated and can access the appliance.
Looking up users in LDAP
You can configure the appliance so that users enter a user name that is not
part of their DN. You specify search parameters so that this user name can
be passed to the LDAP server and used to look up the user's distinguished
name, which is then used with the entered password to authenticate the
user. To look up a user's distinguished name the appliance can either bind
to the LDAP server anonymously, or you can specify a bind ID and
password alias it must use.
For example, Robin Dalemain might have the user name “RWD123”. When
Robin attempts to log in to the appliance, Robin's user name is sent to the
LDAP server and the distinguished name for Robin's entry is returned.
Robin is authenticated using his distinguished name and password to
determine if he can access the appliance.
Using TLS (SSL)
You can specify that the appliance acts as an SSL client when connecting to
the LDAP server. If you use this option, user credentials are encrypted
when sent to the LDAP server, so user passwords are never sent across the
network in plain text.
Using load balancing
You can specify that the appliance uses a pool of LDAP servers rather than
a single server, and configure how the load is balanced between the LDAP
servers in the pool.
Specifying fallback users
It is important that you specify one or more fallback users. These are local
users who can log in to the appliance if you lose the connection with your
LDAP server.
After you have configured how users are authenticated using LDAP, you must go
on to specify how authenticated users are authorized to use the appliance
resources. You do this by configuring credential mapping.
Configure the appliance to pass user credentials to the LDAP server and use them
as the bind credentials.
You can use the IBM MQ Appliance web UI to configure role based management
such that the appliance uses user credentials directly to bind the LDAP server. If
the bind is successful, the user who is attempting to log in to the appliance is
successfully authenticated. See “User authentication with LDAP” on page 346 for a
description of this method of authentication.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Authentication to view the authentication options.
4. Select an Authentication method of LDAP.
5. Specify the Server host and the Server port for connecting to the LDAP server
(server port is usually 389, or 636 for an SSL connection), and select the LDAP
version (the version is usually v3).
6. If you have configured a load balancer group for LDAP access and created a
profile, specify it in the Load balancer group field. Alternatively, click the plus
icon to open the Load Balancer Group dialog to specify a profile for your
load balancer group (see “Creating a load balancer group profile by using the
web UI” on page 358). You can leave this field blank if you are using a single
LDAP server.
7. Specify the LDAP prefix that the appliance prefixes the user name with when
it is constructing a DN to pass to the LDAP server. The prefix is cn= by
default.
8. Specify the LDAP suffix that the appliance appends to the user name when it
is constructing a DN to pass to the LDAP server. For example,“
dc=appliance123, dc=com”.
9. Specify an LDAP read timeout. The timeout is the time that the appliance will
attempt to connect to the LDAP server before closing the connection. The
default is 60 seconds. Specify 0 to never timeout.
10. If you want to use an SSL (TLS) connection to the LDAP server, select an SSL
client type of Client profile. If you have already defined a profile, select the
profile name from the SSL client profile list. Alternatively, click the plus icon
to open the SSL Client Profile dialog and create a new SSL client profile
(see “Creating an SSL client profile by using the web UI” on page 355.)
11. To define fallback users, you can choose All users from the Local accounts for
fallback list to have all local users able to log in to the appliance if LDAP is
unavailable. Alternatively, select Specific users and select one or more local
users.
12. Optionally, change the default cache settings. Cache settings determine how
long user details are held on the appliance before authentication is referred to
the LDAP server again. By default, the appliance retains details for an
absolute period of 600 seconds. You can change the cache mode or the cache
lifetime, or both. You can also disable caching altogether.
13. Click Apply to apply your changes.
After you specify the user authentication method, you must next configure
credential mapping.
Use the command line to configure the appliance to pass user credentials to the
LDAP server and use them as the bind credentials.
You can use commands to configure role based management such that the
appliance uses user credentials directly to bind the LDAP server. If the bind is
successful, the user who is attempting to log in to the appliance is successfully
authenticated. See “User authentication with LDAP” on page 346 for a description
of this method of authentication.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Enter the following command to specify the LDAP authentication method:
au-method ldap
5. Specify the host name of the LDAP server (you can use a host alias if you
have defined one):
au-server-host host
6. Specify the port to use when connecting to the LDAP server:
au-server-port port
The usual port for an LDAP server is 389, or 636 for an SSL connection.
7. Specify the LDAP version that is used to access the LDAP server for RBM
authentication:
ldap-version version
Alternatively, you can specify one or more particular users by entering the
following commands:
fallback-login restricted
fallback-user localuser1
fallback-user localuser2
...
fallback-user localuserN
14. Alter the default LDAP cache settings, if required. By default, the appliance
caches results of authentication attempts for 600 seconds, but you can change
the mode of caching, and the caching duration by entering the following
commands:
au-cache-mode mode
au-cache-ttl seconds
Example
The following example configures the appliance to use an LDAP server that is
identified by the host alias “ldap_host” for user authentication. If a user attempts
to log in with the user name “Robin Dalemain”, the string “cn=Robin Dalemain,
dc=appliance123, dc=com” is passed to the LDAP server and used as the bind ID.
Robin's password is used as the bind password. If the LDAP server is unavailable,
any local appliance user can log in to the appliance.
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
Configure the appliance to look up user details on the LDAP server. To look up
users, the appliance binds to the LDAP server by using credentials.
You can use the IBM MQ Appliance web UI to configure role based management
such that the appliance looks up user details in the LDAP server by using defined
search parameters. To look up users, the appliance binds to the LDAP server by
using credentials that you define as part of the RBM configuration, or you can use
an anonymous bind to access the LDAP server. See “User authentication with
LDAP” on page 346 for a description of this method of authentication.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Authentication to view the authentication options.
4. Select an Authentication method of LDAP.
5. Specify the Server host and the Server port for connecting to the LDAP server
(server port is usually 389, or 636 for an SSL connection), and select the LDAP
version (the version is usually v3).
6. If you have configured a load balancer group for LDAP access and created a
profile, specify it in the Load balancer group field. Alternatively, click the plus
icon to open the Load Balancer Group dialog to specify a profile for your
load balancer group (see “Creating a load balancer group profile by using the
web UI” on page 358). You can leave this field blank if you are using a single
LDAP server.
7. Select Search LDAP for DN.
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
Use the command line to configure the appliance to look up user details on an
LDAP server. To look up users, the appliance binds to the LDAP server by using
credentials.
You can use commands to configure role based management such that the
appliance looks up user details in the LDAP server by using defined search
parameters. To look up users, the appliance binds to the LDAP server by using
credentials that you define as part of the RBM configuration, or you can use an
anonymous bind to access the LDAP server. See “User authentication with LDAP”
on page 346 for a description of this method of authentication.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
The usual port for an LDAP server is 389, or 636 for an SSL connection.
7. Specify the LDAP version that is used to access the LDAP server for RBM
authentication:
ldap-version version
Alternatively, you can specify one or more particular users by entering the
following commands:
fallback-login restricted
fallback-user localuser1
fallback-user localuser2
...
fallback-user localuserN
16. Alter the default LDAP cache settings, if required. By default, the appliance
caches results of authentication attempts for 600 seconds, but you can change
the mode of caching, and the caching duration by entering the following
commands:
au-cache-mode mode
au-cache-ttl seconds
Example
The following example configures the appliance to use an LDAP server that is
identified by the host alias ldap_host for user authentication. If a user logged in
with the user name “RobinWD”, the name is passed to the LDAP server and used
to look up Robin's distinguished name (as specified in the search parameters). If
the LDAP server is unavailable, any local appliance user can log in to the
appliance.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
If you want to configure a secure SSL (TLS) connection with an LDAP server, then
you must configure a client profile.
You can configure an SSL client profile by using the IBM MQ Appliance web UI.
You can do this by opening a dialog while you configure role based management
(RBM), or as a separate operation before you configure RBM.
Procedure
1. Open the SSL Client Profile window. You can do this in one of two ways:
Before you configure RBM:
b. Click the plus icon next to the SSL client profile field to open the SSL
Client Profile window.
2. In the SSL Client Profile window, enter a name for your profile.
3. Ensure that Enable administrative state is enabled, and optionally enter
comments.
4. Select which SSL and TLS protocols your profile supports.
5. Specify which cipher suites your profile supports.
6. Select from the following options:
Use SNI
Allows the client to send the Server Name Indication (SNI) extension
in the ClientHello message to the server that the client attempts to
connect to.
Permit connections to insecure SSL servers
Allows connections to SSL servers that do not support RFC 5746.
Enable compression
If you want to configure a secure SSL (TLS) connection with an LDAP server, then
you must configure a client profile.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type crypto to enter crypto configuration mode.
4. Type the following command to configure an SSL client profile:
ssl-client name
Where option-string Specifies the SSL and TLS protocol versions to support.
When you enable support for multiple protocol versions, use a plus sign (+)
character to separate the versions. The following values are valid. The default
value is TLSv1d0+TLSv1d1+TLSv1d2.
v SSLv3 - Enables SSL version 3.
v TLSv1d0 - Enables TLS version 1.0.
v TLSv1d1 - Enables TLS version 1.1.
v TLSv1d2 - Enables TLS version 1.2.
Where cipher-string specifies the supported cipher. You must repeat this
command for each cipher that you support. See “ciphers” on page 827 for a
list of available ciphers.
7. Optionally specify which elliptic curves your client supports:
curves name
Where name specifies the supported curve. You must repeat this command for
each cipher that you support. See “curves” on page 828 for a list of available
curves.
8. Specify options for your client profile:
ssl-client-features feature
Separate multiple features with the plus sign (+) character. The default value
is use-sni. The following features are available:
use-sni
Allows the client to send the Server Name Indication (SNI) extension
in the ClientHello message to the server that the client attempts to
connect to.
permit-insecure-servers
Allows connections to SSL servers that do not support RFC 5746.
compression
Enables SSL compression. Compression in HTTPS is dangerous
because the HTTPS connection becomes vulnerable to the CRIME
(Compression Ratio Info-leak Made Easy) attack.
9. Specify the identification credentials for your client. These credentials are
supplied to requesting SSL servers.
idcred name
Example
The following example configures an SSL client profile named “myclient”. The
profile uses the default protocols and ciphers, and the default feature of enabling
SNI. It uses the identity credentials set named “myclientcred”, and enables server
You can create a profile describing a load balancer group of LDAP servers.
You can configure a load balancer group profile by using the IBM MQ Appliance
web UI. You can do this by opening a dialog while you configure role based
management (RBM).
Procedure
1. Open the Load Balancer Group profile window. In the Authenticate section (if
you have selected the LDAP method) or Credential Mapping section (if you
have selected Search LDAP for group name). Click the plus icon next to
the Load balancer group field.
2. Enter a name for your load balancer group profile.
3. Ensure that Enable administrative state is selected and optionally enter some
comments.
4. Select the algorithm for choosing between the LDAP servers in your load
balancer group. The following options are available:
First Alive
Uses the concept of a primary server and backup servers. When the
health state of the primary server is up, all connections are forwarded
to this server. When the health state of the primary server is softdown
or down, connections are forwarded to back up servers. The primary
server is the first server in the members list.
Hash
Uses the IP address of the client as the basis for server selection.
With the hash algorithm, the same client is served by the same server.
Use this algorithm only when clients access applications that require
the storage of server-side state information, such as cookies. Hashing
algorithms cannot ensure even distribution.
Least Connections
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type loadbalancer-group name to create a load balancer group profile.
4. Select the algorithm that is used to select which member of the group to
connect to:
algorithm selected-algorithm
For the options available and more information, see “health-check” on page
723
10. Specify the LDAP servers that belong to the load balancer group:
server address [weight] [mapped-port] [health-port]
address
The name or IP address of the server.
weight
For weighted algorithms, specifies the relative weight (preference).
Enter a value in the range 1 - 65000. The default value is 1.
mapped-port
Specifies the port on the real server. If nonzero, the associated real
server is contacted on this port. Normally the real server is contacted
on the same port number as the one for the virtual server. In this case,
retain the default value of 0. If services run on different ports for
different members of the group, define this value.
health-port
Specifies the port to test. Retain the default value of 0 to use the port
that is defined for this load balancer group.
You can configure the IBM MQ Appliance to authenticate users by using an XML
file.
You create an XML file that contains user authentication details. You can use an
XML file builder that is provided on the appliance to create the file.
After you have configured how users are authenticated by using an XML file, you
must go on to specify how authenticated users are authorized to use the appliance
resources. You do this by configuring credential mapping. You can use the same
XML file for both authentication and credential mapping. Alternatively, you can
perform credential mapping by using credentials that are defined for the group
that the user belongs to.
You can use the RBM builder in the IBM MQ Appliance web UI to create the XML
file. If you want to create the file manually, an example file, store:///RBMInfo.xml,
is provided to guide you. The final RBM file must conform to the
store:///AAAInfo.xsd schema.
You can use the IBM MQ Appliance web UI to configure role based management
such that the appliance uses user credentials that are defined in an XML file.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings.
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Authentication to view the authentication options.
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
Use the command line to configure the appliance to authenticate the users defined
in an XML file.
You can use commands to configure role based management such that the
appliance uses user credentials that are defined in an XML file. You must have
already created the XML file (see “User authentication with XML file” on page 362)
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Enter the following command to specify the XML file authentication method:
au-method xmlfile
5. Specify the URL of the XML you want to use.
au-info-url URL
6. Optionally specify fallback users who can log in to the appliance if the XML
file is not available. Fallback users must already have been added as local users
to the appliance. You can specify that all local users are fallback users by
entering the following command:
fallback-login local
Alternatively, you can specify one or more particular users by entering the
following commands:
Example
The following example configures the appliance to use the authentication details
defined in the file store:///RBMInfo.xml.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
You can use the RBM builder in the IBM MQ Appliance web UI to define an XML
file. You can use the file for user authentication or credential mapping, or for both.
Procedure
You can configure the IBM MQ Appliance to authenticate users who are locally
configured on the appliance.
Appliance users are created by using the appliance user commands or the
Appliance section of the IBM MQ Appliance web UI
Local users can belong to locally defined user groups. User privileges are then
defined according to the group that they belong to.
Configure the appliance to authenticate the local users defined on the appliance.
You can use the IBM MQ Appliance web UI to configure role based management
such that the appliance uses local definitions. You define the local users in a
separate procedure, see “Configuring user authentication with local users by using
the web UI.”
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Authentication to view the authentication options.
4. Select an Authentication method of Local user.
5. Optionally, change the default cache settings. Cache settings determine how
long user details are valid before authentication is performed again. By default,
the appliance retains details for an absolute period of 600 seconds. You can
change the cache mode or the cache lifetime, or both. You can also disable
caching altogether.
6. Click Apply to apply your changes.
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
Use the command line to configure the appliance to authenticate local users
defined on the appliance.
You can use commands to configure role based management such that the
appliance uses local user definitions. You create the users in a separate procedure,
see “Configuring local users by using the command line” on page 381.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Enter the following command to specify the XML file authentication method:
au-method local
Example
The following example configures the appliance to use local user definitions.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
What to do next
After you specify the user authentication method, you must next configure
credential mapping.
You can configure the IBM MQ Appliance to map user names onto access policies
that are defined in an XML file.
You create an XML file that contains policy details. You can use an XML file
builder that is provided on the appliance to create the file. The same file can
contain user authentication details.
You can use the RBM builder in the IBM MQ Appliance web UI to create the XML
file. If you want to create the file manually, an example file, store:///RBMInfo.xml,
is provided to guide you. The final RBM file must conform to the
store:///AAAInfo.xsd schema.
You can, if required, configure an LDAP search to retrieve user groups from LDAP
directories for XML file or local authenticated users. Returned user groups can then
be mapped onto access policies defined in the XML file. In these cases you must
configure the LDAP search so that the XML file or local user name is used as the
input credential to the LDAP query. You might then need, for example, to append
a common suffix to the user name to build an LDAP user distinguished name
when querying the user's group membership.
Configure the appliance to authorize users by using access policies that are defined
in an XML file.
You can use the IBM MQ Appliance web UI to configure role based management
such that the appliance uses access policies that are defined in an XML file.
You can specify that an LDAP directory is searched for groups that the
authenticated user belongs to, then the returned groups are mapped onto access
policies in the XML file. The LDAP query should search for groups that the user
belongs to. Do not configure a search that looks for users in a particular group; if
the search returns users you will be attempting to map groups onto users, rather
than users onto groups.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Credential-mapping to view the authentication options.
4. Select an Credential-mapping method of XML file.
5. If you already defined an XML file, enter its path in XML file URL.
Alternatively you can edit an existing file, or create a new file, by using the
What to do next
After you specify the credential mapping method, you can next configure the
password policy for your local users (password policy does not apply to other user
types).
Use the command line to configure the appliance to authorize users by using
access policies that are defined in an XML file.
You can use commands to configure role based management such that the
appliance uses access policies that are defined in an XML file. You must have
already created the XML file (see “Credential mapping with an XML file” on page
367)
You can specify that an LDAP directory is searched for groups that the
authenticated user belongs to, then the returned groups are mapped onto access
policies in the XML file. The LDAP query should search for groups that the user
belongs to. Do not configure a search that looks for users in a particular group; if
the search returns users you will be attempting to map groups onto users, rather
than users onto groups.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Enter the following command to specify the XML file authorization method:
mc-method local
5. Specify the URL of the XML file that you want to use.
mc-info-url URL
6. If you have defined a user authentication method of LDAP, you can look up an
attribute (usually the distinguished name) of each group the user belongs to.
These attributes are then used as the input credential to the XML file.
Otherwise, the distinguished name of the user is used as the input credential. If
you want to perform an LDAP search, you must then supply the details for
connecting to the LDAP server:
a. Specify that you want to perform an LDAP search:
mc-ldap-search on
b. Specify the server and password for connecting to the LDAP server:
mc-server-host host
mc-server-port port
Where host is the IP address or domain name of the LDAP server and port
is usually 389, or 636 for an SSL connection.
c. If you have configured a load balancer group for LDAP access and created a
profile, specify the profile by using the following command:
mc-loadbalancer-group name
Where client_profile is the name of a client profile that you have previously
created.
Example
The following example configures the appliance to use the authorization details
defined in the file store:///RBMInfo.xml.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
The following commands configure the appliance to use the authorization details
defined in the file store:///RBMInfo.xml, performing an LDAP search to retrieve
user group names from an LDAP repository:
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
After you specify the credential mapping method, you can next configure the
password policy for your local users (password policy does not apply to other user
types).
You can configure the IBM MQ Appliance to use local user groups for user
authorization.
You create user groups locally on the appliance, and define what access members
of that group have to appliance resources. This access is known as user
authorization. A user name is mapped onto a user group according to the user
authentication method:
v If users are authenticated by using LDAP, then the user's distinguished name is
used to perform a further LDAP query (in the same directory or a different one).
The second query retrieves the user group or groups for that distinguished
name, and these groups are in turn mapped onto local user groups. If, as a
result of this process, multiple local user groups apply to the user, then the
access profiles for the groups are combined so the user has the superset of the
authority they grant. If a local group is not found for a particular LDAP group
then the group is ignored. If no LDAP groups are returned for the user, or no
matching local user groups are found, then the user has no authority and access
is denied.
v If users are authenticated by using an XML file, then the user credential profiles
specified for the user in the file is mapped onto local user groups.
v If you use local user definitions, then the local groups defined for that user are
used for authorization.
You can, if required, configure an LDAP search to retrieve user groups from LDAP
directories for XML file or local authenticated users. Returned user groups can then
be mapped onto local user groups. In these cases you must configure the LDAP
search so that the XML file or local user name is used as the input credential to the
LDAP query. You might then need, for example, to append a common suffix to the
user name to build an LDAP user distinguished name when querying the user's
group membership.
Configure the appliance to authorize users by using local user group definitions.
You can use the IBM MQ Appliance web UI to configure role based management
such that the appliance uses local user groups for user authorization. You define
the local users in a separate procedure, see “Configuring local user groups by
using the web UI” on page 383.
You can specify that an LDAP directory is searched for groups that the
authenticated user belongs to, then the returned groups are mapped onto local
user groups. The LDAP query should search for groups that the user belongs to.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Credential-mapping to view the authentication options.
4. Select an Credential-mapping method of Local user group.
5. If you have defined a user authentication method of LDAP, then you must
selectSearch LDAP for group name. You must then supply the details for
connecting to the LDAP server:
a. Specify the Server host and the Server port for connecting to the LDAP
server (server port is usually 389, or 636 for an SSL connection).
b. If you have configured a load balancer group for LDAP access and created
a profile, specify it in the Load balancer group field. Alternatively, click the
plus icon to open the Load Balancer Group dialog to specify a profile
for your load balancer group.
c. Specify the DN that the appliance uses to bind to the LDAP server to
perform the search in the LDAP bind DN field. Specify the password alias
in the LDAP bind password alias field. Click the plus icon to create a
password alias if you have not already created one. (Leave these fields
blank if you are using an anonymous bind to access the LDAP server.)
d. Specify the LDAP search parameters. You can enter these directly, or you
can click the plus icon to open the LDAP Search Parameters dialog. Your
search must look for the user group or groups that the authenticated user
belongs to, and return one or more user group names.
e. Specify an LDAP read timeout. This is the time that the appliance will
attempt to connect to the LDAP server before closing the connection. The
default is 60 seconds. Specify 0 to never timeout.
f. If you want to use an SSL (TLS) connection to the LDAP server, select an
SSL client type of Client profile. If you have already defined a profile,
select the profile name from the SSL client profile list. Alternatively, click
the plus icon to open the SSL Client Profile dialog and create a new SSL
client profile.
6. Click Apply to apply your changes.
What to do next
After specifying the credential mapping method, you can next configure the
password policy for your local users (password policy does not apply to other user
types).
Use the command line to configure the appliance to authorize users by using local
user group definitions.
You can use commands to configure role based management such that the
appliance uses local user groups for user authorization. You must create user
groups as a separate operation.
You can specify that an LDAP directory is searched for groups that the
authenticated user belongs to, then the returned groups are mapped onto local
user groups. The LDAP query should search for groups that the user belongs to.
Do not configure a search that looks for users in a particular group; if the search
returns users you will be attempting to map groups onto users, rather than users
onto groups.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Enter the following command to specify the local user group authorization
method:
mc-method local
5. If you are using local user groups to authorize LDAP users, define an LDAP
search to retrieve the user group for the authenticated user, that can in turn be
mapped onto a local user group. Enter the following commands:
a. Specify that you want to perform an LDAP search:
mc-ldap-search on
b. Specify the server and password for connecting to the LDAP server:
mc-server-host host
mc-server-port port
Where host is the IP address or domain name of the LDAP server and port
is usually 389, or 636 for an SSL connection.
c. If you have configured a load balancer group for LDAP access and created a
profile, specify the profile by using the following command:
mc-loadbalancer-group name
Where client_profile is the name of a client profile that you have previously
created.
6. Save your configuration and exit.
Example
The following example configures the appliance to use the authorization details
defined by local user groups.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
The following commands configure the appliance to use the authorization details
defined by local user groups, performing an LDAP search to retrieve user group
names from an LDAP repository:
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
What to do next
After specifying the credential mapping method, you can next configure the
password policy for your local users (password policy does not apply to other user
types).
The password policy applies only to locally defined users. It does not apply to
users who are defined externally or in an XML file.
The password policy enables you to dictate the requirements for a password, such
as minimum length, whether it must contain some numbers, some
non-alphanumeric characters, some mixed-case characters and so on. You can also
specify how often the password must be changed.
You can use the IBM MQ Appliance web UI to configure the password policy for
users defined locally on the appliance. The policy does not apply to users defined
in other ways.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
3. Ensure that Enable administrative state is selected (it is selected by default)
and click Password policy.
4. Define the policy by specifying the following options:
a. In the Minimum length field, enter the minimum number of characters in a
password.
b. Define characteristics for passwords:
v Set the Require mixed case property to require mixed case passwords.
v Set the Require non-alphanumeric property to require nonalphanumeric
characters in passwords.
v Set the Require number property to require numeric characters in
passwords.
v Set the Disallow user name substring property to indicate whether to
allow the user name string in the password. If the user is george, the
property controls whether to allow george1! or passgeorgeword as the
password.
c. Set the Enable aging property to control password-aging. If enabled, define
the maximum password age in the Maximum age field.
d. Set the Control reuse property to control the reuse of previous passwords.
If enabled, define the reuse history by entering the number of past
passwords to compare against for reuse in the Reuse history field.
e. From the Password hash algorithm list, select the algorithm that is used to
hash passwords before they are stored.
5. Click Apply to apply your changes.
After you specify a password policy, you can next configure an account policy.
Use the command line to configure a password policy for local users.
You can use commands to configure the password policy for users defined locally
on the appliance. The policy does not apply to users defined in other ways.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Use the following commands, as required, to configure your password policy:
v Enter the following command to specify the minimum length of the
password:
pwd-minimum-length length
v Enter the following command to specify that passwords must contain both
uppercase and lowercase characters:
pwd-mixed-case on
v Enter the following command to specify that the password must contain
non-alphanumeric characters in addition to alphanumeric characters:
pwd-nonalphanumeric on
v Enter the following command to specify that the password must contain
numbers:
pwd-digit on
v Enter the following command to indicate whether to allow the user name
string in the password:
pwd-username on
v Enter the following commands to specify password aging in the policy:
pwd-aging on
pwd-max-age days
Example
The following example configures a password policy that requires user passwords
are 8 characters long, must contain a number, and expires after three months.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
What to do next
After you specify a password policy, you can next configure an account policy.
Account policy
The account policy applies only to locally defined users. It does not apply to users
who are defined externally or in an XML file.
The account policy enables you to specify how many failed log in attempts can
occur before you lock out that connection, and how long the lock out remains in
force. You can also specify how long a CLI session can be idle before it times out.
You can also restrict the admin account so it can access the appliance only by using
the serial interface.
You can use the IBM MQ Appliance web UI to configure the account policy for
users defined locally on the appliance. The policy does not apply to users defined
in other ways.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > RBM Settings
Use the command line to configure an account policy for local users.
You can use commands to configure the account policy for users defined locally on
the appliance. The policy does not apply to users defined in other ways.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure role based management:
rbm
4. Use the following commands, as required, to configure your account policy:
v Specify that you want to restrict the admin account to connect only by using
the serial port by entering the following command:
restrict-admin on
v Specify the maximum number of login attempts that can occur before an
account is locked out:
max-login-failure count
v Specify the duration to lock out accounts for after the specified number of
failed logins:
lockout-duration minutes
v Enter the following command to specify a CLI timeout:
cli-timeout seconds
Example
The following example configures an account policy that specifies a user can have
three attempts to log in before they are locked out for an hour. CLI sessions
timeout if they are inactive for twenty minutes.
mqa# config
Global configuration mode
mqa(config)# rbm
Modify RBM Settings configuration
You can define local users and local user groups on your appliance
You can configure role based management so that user authentication is set up for
local users. You can also specify that local users are used as fall back when a
remote authentication platform is unavailable (ensuring that someone can always
log on to the appliance). You can separately specify that local user groups are used
for credential mapping. You can use this setting for local user authentication, or
any of the other authentication methods available.
Appliance users are created by using the appliance user commands or the
Appliance section of the IBM MQ Appliance web UI
Local users can belong to locally defined user groups. User privileges are then
defined according to the group that they belong to.
You can configure local users by using the IBM MQ Appliance web UI.
Note: If you use messaging users and groups on the appliance for authentication
records in an HA queue manager, you must set up the same messaging users and
groups on all appliances in the HA group. The users and groups are not
automatically replicated between the appliances.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > User Account.
3. Click New to add a user.
4. Specify the name of the user that you are configuring. This is the name that the
local user uses to log in to the appliance. The name can contain a maximum of
128 characters. The following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name that consists of a single period, or including two
periods together, is not permitted)
5. Optionally enter a comment.
To configure an appliance user from the command line, you enter user
configuration mode, specifying the name of the user that you want to configure,
and enter the required user configuration commands.
Note: If you use messaging users and groups on the appliance for authentication
records in an HA queue manager, you must set up the same messaging users and
groups on all appliances in the HA group. The users and groups are not
automatically replicated between the appliances.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure a local user:
user name
Where name identifies the user that you want to configure. If you are creating a
new user, name can contain up to 128 characters. The following characters are
valid:
v a through z
Where:
engine-ID
This ID is set to 0 to identify the local engine.
authentication-protocol
Specify none to use no authentication key, md5 to use HMAC-MD5-96
as the authentication protocol, or sha to use HMAC-SHA-96 as the
authentication protocol.
authentication-secret-type
Enter password to specify that the authentication secret is a password
that is converted to an intermediate key with a standardized algorithm.
Enter key to specify a fully localized key. This parameter is not required
if you have set authentication-protocol to none.
authentication-secret
Specifies the secret, or key, for authentication for this account.
v If a password, specify a plaintext password that is at least 8
characters long.
v If a key and HMAC-MD5 are the authentication protocol, specify the
hex representation of a 16-byte key.
v If a key and HMAC-SHA-96 are the authentication protocol, specify
the hex representation of a 20-byte key.
This parameter is not required if you have set authentication-protocol to
none.
privacy-protocol
Identifies which privacy (encryption) protocol to use. Set to none to not
encrypt data. Set to des to use CBC-DES (this setting is the default). Set
to aes to use CFB128-AES-128.
privacy-secret-type
Enter password to specify that the privacy secret is a password that is
converted to an intermediate key with a standardized algorithm. Enter
key to specify a fully localized key.
You can configure local user groups by using the IBM MQ Appliance web UI.
Note: If you use messaging users and groups on the appliance for authentication
records in an HA queue manager, you must set up the same messaging users and
groups on all appliances in the HA group. The users and groups are not
automatically replicated between the appliances.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > User Group.
3. Click New to add a user group.
4. Specify the name of the user group that you are configuring. The name can
contain a maximum of 128 characters. The following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name that comprises a single period, or including two
periods together, is not permitted)
5. Optionally enter a comment.
6. Specify an access profile for the group. You can click Build to open the access
policy. You can add several policies, if required.
7. Click Apply to save the new user configuration.
You can configure local user groups by using the command line interface.
To configure a local user group from the command line, you enter user group
configuration mode, specifying the name of the user group that you want to
configure, and enter the required user group configuration commands. You define
the local users in a separate procedure, see “Configuring local user groups by
using the command line” on page 383
Note: If you use messaging users and groups on the appliance for authentication
records in an HA queue manager, you must set up the same messaging users and
groups on all appliances in the HA group. The users and groups are not
automatically replicated between the appliances.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109. Log in as an administrative user.
2. Type config to enter global configuration mode.
3. Type the following command to configure a local user group:
usergroup name
Where name identifies the user group that you want to configure. If you are
creating a new user group, name can contain up to 128 characters. The
following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name that comprises a single period, or including two
periods together, is not permitted)
4. Set the access policy for the user group:
access-policy statement
Where statement defines the access policy that applies to users who belong to
this group. A policy statement takes the form:
address/domain/resource?[Name=name]&Access=permission [&field=value]
address
An IP address or host alias for a local interface (Ethernet or VLAN) on
the appliance. The special value * matches all appliance addresses.
domain
Enter * to match all domains.
resource
The resource type to which this policy applies. The special value *
matches all resource types.
Name=name
Optionally Identifies by name an instance of the specified resource
type. You can use a PCRE; for example, foo.* to specify all resources
that start with foo.
Some routine tasks are completed by administrative users on behalf of users, while
actions such as changing passwords can be completed by appliance users
themselves.
You must belong to a group that has the password change permission, or be a
privileged user.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Main > System Control. Provided that you have permission to change
your own password, the Change User Password fields are displayed.
3. Enter your existing password in the Old Password field.
4. Enter your new password in the New Password field and enter it again in the
Confirm Password field.
5. Click Change User Password.
You must belong to a group that has the password change permission, or be a
privileged user.
You can change your own password by using the password command.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in using your existing password.
3. Type config to enter global configuration mode.
4. Type the following command:
user-password
5. The appliance prompts you to enter the old password, and then to enter and
confirm your new password.
You must belong to a group that has the reset password permission, or be a
privileged user.
You use the user account dialog to reset the password for a particular user.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > User Account.
3. Click on the name of the user whose password you want to reset to open the
user account window for that user.
4. From the Actions menu, select Reset password.
5. Enter the new password in the New Password field and then confirm it by
typing it again.
6. Click Reset password.
You must belong to a group that has the reset password permission, or be a
privileged user.
Where user is the username of the user whose password you are resetting, and
new_password is the new password.
You must belong to a group that has the force password change permission, or be
a privileged user.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > User Account.
3. Click on the name of the user whose password you want to reset to open the
user account window for that user.
4. From the Actions menu, select Force password change.
5. Confirm that you want to force a password change.
You must belong to a group that has the force password change permission, or be
a privileged user.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a privileged user.
Where user is the username of the user for whom you are forcing a password
change.
You must belong to a group that has the reset failed login counter permission, or
be a privileged user.
You need to reset the failed log in count for a user if they exceed the permitted
number of failed login attempts and are locked out of the appliance. You use the
user account dialog to reset the count.
Procedure
1. Start the IBM MQ Appliance web UI and click the Administration icon .
2. Select Access > User Account.
3. Click on the name of the user whose failed login count you want to reset.
4. From the Actions menu, select Reset failed login.
5. Confirm that you want to reset the login count.
You must belong to a group that has the reset failed login counter permission, or
be a privileged user.
You need to reset the failed log in count for a user if they exceed the permitted
number of failed login attempts and are locked out of the appliance. You use the
reset failed-login command to reset the count.
Procedure
1. Connect to the IBM MQ Appliance as described in “Command line access” on
page 109.
2. Log in as a privileged user.
3. Type config to enter global configuration mode.
4. Enter the following command:
reset failed-login user
The IBM MQ Appliance supports the same levels of TLS as IBM MQ. However, on
the IBM MQ Appliance you do not set up a key repository. When a queue
manager is created on the appliance, a key repository is automatically created for
that queue manager. The key repository is deleted when the queue manager is
deleted. Each of the commands that are available for working with certificates
require you to specify which queue manager the command is applied to, so that
the correct key repository is used.
For self-signed certificates, you exchange copies of the public part of each
certificate in order to establish the trust relationship between the end-points. The
public part of the certificate is held in a file that you move between the end-points.
For more information about TLS, see Cryptographic security protocols in the IBM
MQ documentation. For more information about TLS in IBM MQ, see SSL and TLS
security protocols in the IBM MQ documentation.
You can create a self-signed certificate by using the createcert command. The
public part of the certificate data is extracted to a file. This public part of the
certificate must be exchanged with any communicating partners, for example, IBM
MQ clients or other queue managers. Exchanging the public part of the certificate
establishes a trust relationship between the queue manager and the partner.
For more information about certificates in IBM MQ, see Digital certificates.
A self-signed certificate can be used for testing a system while you are waiting for
the officially signed certificate to be returned from the certificate authority (CA).
The self-signed certificate is generated by the queue manager. As it is signed by the
queue manager, and it certifies the identity of the queue manager, it is not suitable
for use in a production system.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Create a self-signed certificate by entering the following command:
createcert -m QMgrName -dn DistinguishedName -label LabelName
Where:
QMgrName
Specifies the name of the queue manager that you want to create a
certificate for.
DistinguishedName
Specifies the X.500 distinguished name that uniquely identifies the
certificate.
DistinguishedName is a string that is enclosed in double quotation
marks. For example, “CN=John Smith,O=IBM,OU=Test,C=GB”. The CN, O,
and C attributes are required.
LabelName
Specifies the name of the label that is associated with the certificate.
If you do not specify a label name, a label is automatically generated.
This label has the name ibmwebspheremq<QMgrName>, where QMgrName
is the name of the queue manager in lowercase.
Note: You can specify a number of optional parameters when you create a
self-signed certificate. For more information, see “createcert” on page 509.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
What to do next
After the self-signed certificate is generated, the public part of the certificate is
extracted to a file that is placed in mqpubcert://.
Add the public part of the certificate to the key repository of any communicating
partners. For example, you can add the public part of the certificate to IBM MQ
clients or to other queue managers. To add the public part of the certificate to
If you want to copy the certificate to another system to add it to the key repository
of a communicating partner, you can use the copy command. For more
information, see “Downloading certificates from the appliance” on page 399.
The certificate file that you want to add to the key repository must be on the
appliance in the following location: mqpubcert://. You can upload a file to this
location by using the copy command. For more information, see “Uploading
certificates to the appliance” on page 400.
You must add the public part of the certificate to the key repositories of any
partners that communicate with the queue manager for which the certificate was
created. For example, the partners might be IBM MQ clients, or other queue
managers. If the partner queue manager is running on the IBM MQ Appliance, use
the addcert command to add the public part of the certificate to the key repository
of the queue manager.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Add the public part of the self-signed certificate by entering the following
command:
addcert -m QMgrName -label Label -file FileName
Where:
QMgrName
Specifies the name of the queue manager that you want to add the
public part of a certificate to.
Label Specifies the label that is associated with the certificate.
FileName
Specifies the file that contains the public part of the certificate.
The file must be available on the appliance. The file must be located in
mqpubcert://
Note: You can specify a number of optional parameters when you add the
public part of a certificate. For more information, see “addcert” on page 508.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
When you work with CA-signed certificates, there are two types of certificate that
you use:
CA-signed certificate
The CA-signed certificate is the certificate that is digitally signed by the
certificate authority. This certificate identifies the queue manager.
CA certificate
The CA certificate is the certificate that identifies the certificate authority
that issued the CA-signed certificate.
If you do not have a CA-signed certificate, you can generate a certificate request by
using the createcertrequest command. This command creates a new
public-private key pair and a certificate request in the key repository. The
certificate request is extracted to a file, which can then be sent to a certificate
authority to be signed.
After you receive the signed certificate from the certificate authority, you must add
the certificate to the key repository of the queue manager for which it was signed.
You can add the CA-signed certificate to the key repository by using the
receivecert command.
You must also add the CA certificate to the key repository of any communicating
partners, for example, IBM MQ clients or other queue managers. To add the
certificate to other queue managers on an IBM MQ Appliance, you can use the
addcert command. If you are using a certificate chain, you must add each CA
certificate in the chain to the key repository.
If the queue manager you are communicating with is not running on an appliance,
you can add the certificate by following the instructions in the IBM MQ
documentation. For more information, see Working with SSL or TLS.
When the CA-signed certificate expires, you can create a new request to send to
the certificate authority by using the recreatecertrequest command.
For more information about certificate authorities and CA-signed certificates, see
Digital certificates in the IBM MQ documentation.
If you do not have a CA-signed certificate, you can generate a certificate request by
using the createcertrequest command. This command creates a new
public-private key pair and a certificate request in the key repository. The
certificate request is extracted to a file, which can then be sent to a certificate
authority to be signed.
392 IBM MQ Appliance
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Create the certificate request by entering the following command:
createcertrequest -m QMgrName -dn DistinguishedName -label
LabelName
Where:
QMgrName
Specifies the name of the queue manager that you want to create a
certificate request for.
DistinguishedName
Specifies the X.500 distinguished name that uniquely identifies the
certificate.
DistinguishedName is a string that is enclosed in double quotation
marks. For example, “CN=John Smith,O=IBM,OU=Test,C=GB”. The CN, O,
and C attributes are required.
LabelName
Specifies the name of the label that is associated with the certificate.
If you do not specify a label name, a label is automatically generated.
This label has the name ibmwebspheremq<QMgrName>, where QMgrName
is the name of the queue manager in lowercase.
Note: You can specify a number of optional parameters when you create a
certificate request. For more information, see “createcertrequest” on page 511.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
What to do next
You must send the certificate request file to the certificate authority to be signed.
To copy the certificate to another system, you can use the copy command. For more
information, see “Downloading certificates from the appliance” on page 399.
When you receive the signed certificate, you must add it to the key repository of
the queue manager for which the request was created. See, “Receiving a CA-signed
certificate.”
The certificate file that you want to receive must be on the appliance in the
following location: mqpubcert://. You can upload a file to this location by using
the copy command. For more information, see “Uploading certificates to the
appliance” on page 400.
After you receive the signed certificate from the certificate authority, you must add
the certificate to the key repository of the queue manager for which it was signed.
You can add the certificate to the key repository by using the receivecert
command.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Receive the certificate by entering the following command:
receivecert -m QMgrName -file FileName
Where:
QMgrName
Specifies the name of the queue manager for which you want to receive
the certificate.
FileName
Specifies the name of the file that contains the certificate.
The file must be available on the appliance. The file must be located in
mqpubcert://
Note: You can specify a number of optional parameters when you receive a
certificate. For more information, see “receivecert” on page 520.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
What to do next
After the certificate is received, you must add the CA certificate that signed the
CA-signed certificate to the key repository of any communicating partners. For
example, you can add the public part of the certificate to IBM MQ clients or to
other queue managers. You can add the CA certificate to other queue managers on
the IBM MQ Appliance by using the addcert command. For more information, see
“Adding a CA certificate” on page 396.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. List the certificate requests by entering the following command:
listcertrequest -m QMgrName
Where:
QMgrName
Specifies the name of the queue manager that you want to list the
certificate requests for.
What to do next
v You can view the details of each outstanding certificate request by using the
detailcertrequest command. For more information, see “Viewing a certificate
request for a queue manager.”
v After the certificate authority sends you the CA-signed certificate, you must
receive the CA-signed certificate to the key repository. For more information, see
“Receiving a CA-signed certificate” on page 393.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the details of the certificate request by entering the following command:
detailcertrequest -m QMgrName -label Label
Where:
QMgrName
Specifies the name of the queue manager for which the certificate
request details are shown.
Label Specifies the label that is associated with the certificate request for
which detailed information is shown.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Delete the certificate request by entering the following command:
deletecertrequest -m QMgrName -label Label
Where:
QMgrName
Specifies the name of the queue manager that you want to delete the
certificate request from.
Label Specifies the label that is associated with the certificate request.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
You can delete any associated certificate request files from mqpubcert:// by using
the delete command. For more information, see “Deleting certificates from the
appliance” on page 402.
Adding a CA certificate
You can add a CA certificate to a queue manager by using the addcert command
on the command line.
The certificate file that you want to add to the key repository must be on the
appliance in the following location: mqpubcert://. You can upload a file to this
location by using the copy command. For more information, see “Uploading
certificates to the appliance” on page 400.
Any partners that communicate with the queue managers must have a copy of the
CA certificate of the CA that signed the certificate of the queue manager. For
example, the partners might be IBM MQ clients, or other queue managers. If the
partner queue manager is running on the IBM MQ Appliance, use the addcert
command to add the public part of the certificate to the key repository of the
queue manager.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Add the CA certificate by entering the following command:
addcert -m QMgrName -label Label -file FileName
Where:
QMgrName
Specifies the name of the queue manager that you want to add the
certificate to.
Label Specifies the label that is associated with the certificate.
For more information about valid syntax for the certificate label, see
http://www.ibm.com/support/knowledgecenter/SSFKSJ_9.0.0/
com.ibm.mq.sec.doc/q014340_.htm in the IBM MQ documentation.
FileName
Specifies the file that contains the certificate.
The file must be available on the appliance. The file must be located in
mqpubcert://
Note: You can specify a number of optional parameters when you add the
certificate. For more information, see “addcert” on page 508.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
When a CA-signed certificate expires, you can create a renewal request to send to
the certificate authority. The certificate request is extracted to a file, which can then
be sent to a certificate authority.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Create the certificate renewal request by entering the following command:
recreatecertrequest -m QMgrName -dn DistinguishedName
Where:
QMgrName
Specifies the name of the queue manager that you want to renew a
certificate request for.
DistinguishedName
Specifies the X.500 distinguished name that uniquely identifies the
certificate.
DistinguishedName is a string that is enclosed in double quotation
marks. For example, “CN=John Smith,O=IBM,OU=Test,C=GB”. The CN, O,
and C attributes are required.
Note: You can specify a number of optional parameters when you renew a
certificate request. For more information, see “recreatecertrequest” on page 521.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
What to do next
You must send the file to the certificate authority to be renewed. To copy the file to
another system, you can use the copy command. For more information, see
“Downloading certificates from the appliance” on page 399.
When you receive the new CA-signed certificate, you must add it to the key
repository of the queue manager for which the request was created. See,
“Receiving a CA-signed certificate” on page 393.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View the details of the certificate by entering the following command:
detailcer“Viewing a certificate for a queue manager”t -m QMgrName -label
Label
Where:
QMgrName
Specifies the name of the queue manager for which the certificate
details are shown.
Label Specifies the label that is associated with the certificate for which
detailed information is shown.
Deleting a certificate
You can delete a certificate from the key repository of a queue manager by using
the deletecert command on the command line.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Delete the certificate by entering the following command:
deletecert -m QMgrName -label Label
Where:
QMgrName
Specifies the name of the queue manager that you want to delete the
certificate from.
Label Specifies the label that is associated with the certificate.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
What to do next
You can delete any associated certificate files from mqpubcert:// by using the
delete command. For more information, see “Deleting certificates from the
appliance” on page 402.
You can back up and restore the key repository by using the keybackup and
keyrestore commands. For more information, see “Backing up a key repository”
on page 257, and “Restoring a key repository” on page 259.
In this task, the files are downloaded by using the SCP protocol. However, you can
download the files by using HTTP, HTTPS, SCP, or SFTP. For more information
about using the copy command with these protocols, see “copy” on page 664.
Procedure
v To download a file by using the command line interface:
Where:
certFileName
Specifies the name of the certificate file or certificate request file that
you want to download.
username
Specifies the user name to log on to the remote system where the file
is downloaded to.
ipaddress
The IP address and port of the remote system where the file is
downloaded to.
path The file path on the remote system where the file is downloaded to.
v To download a file to your local system by using the IBM MQ Appliance web
UI:
1. Start the IBM MQ Appliance web UI, and click the File Management tab.
2. Open the mqpubcert folder.
3. Click the certificate file name link to save the file to your local system (the
exact method for saving the file depends on the type of browser that you
use).
Example
The following example shows the download of the certificate for the queue
manager QM1. The certificate has the default label ibmwebspheremqqm1. The file is
downloaded to the home directory on the remote system 192.0.2.2:22:
copy mqpubcert:ibmwebspheremqqm1 scp://user@192.0.2.2:22//home/
What to do next
If you want to delete the file at any time later on, you can delete the file from
mqpubcert:// by using the delete command. For more information, see “Deleting
certificates from the appliance” on page 402.
In this task, the files are uploaded by using the SCP protocol. However, you can
upload the files by using HTTP, HTTPS, SCP, or SFTP. For more information about
using the copy command with these protocols, see “copy” on page 664.
Procedure
v To upload a certificate file by using the command line interface:
1. Connect to the IBM MQ Appliance as described in “Command line access”
on page 109.
2. Log in as a user in the administrators group.
3. Type the following command to enter configuration mode:
config
4. Copy the certificate file to the target appliance:
copy scp://username@ipaddress:port//path/ mqpubcert:///certFileName
Where:
username
Specifies the user name to log on to the remote system where the file
is uploaded from.
ipaddress
The IP address and port of the remote system from where the file is
uploaded
path The file path on the remote system where the file is uploaded from.
certFileName
Specifies the name of the certificate file that you want to upload.
5. Type exit to leave config mode.
v To upload a certificate file from your local system by using the IBM MQ
Appliance web UI:
1. Start the IBM MQ Appliance web UI, and click the File Management tab.
2. Click Actions for the mqpubcert folder.
3. Select Upload files from the Actions menu.
4. Click Browse, and browse for the location of the certificate file on your local
system.
5. Click Upload to upload the certificate file to the mqpubcert directory on the
appliance.
Example
The following example shows the upload of the certificate for the queue manager
QM2. The certificate has the default label ibmwebspheremqqm2. The file is uploaded
from the home directory on the remote system 192.0.2.2:22:
copy scp://user@192.0.2.2:22//home/ mqpubcert:///ibmwebspheremqqm2
What to do next
You can delete the file from mqpubcert: by using the delete command. For more
information, see “Deleting certificates from the appliance” on page 402.
Procedure
Example
You use the appliance command line interface to configure the IBM MQ Appliance
web UI to use your certificates.
If you want to configure client validation, you import the certificates of the clients
that are going to be allowed to connect. You then create definition objects for the
certificates, which are used when you create a validation credential (valcred) object.
The valcred object is in turn used when you configure the SSL server profile.
The example in this topic assumes that you have a signed certificate for the
appliance. When making certificate requests for an appliance, the CN part of the
distinguished name must be the URL that you type to reach the web UI. For
example, myappliance1.ourcompany.com. If you want to set up the profile to
validate connecting clients, you also require the relevant client certificates.
By default the web management service listens on all of the appliance ports (local
address set to 0.0.0.0). You can, however, configure the service so that it listens on
an IP address or host alias of a specific port (and so limit access to the web UI -
see “Changing the IBM MQ Appliance web UI IP address and port” on page 112).
Procedure
v To upload certificates to your appliance:
1. Ensure that you have the following items:
– A private key to access the appliance certificate.
For example:
key WebUiKey01 cert:///myappliance1key.pem
3. Create a crypto certificate definition for the appliance:
certificate cert_alias cert:///certfile
For example:
certificate WebUiCert01 cert:///myappliance1.cer
4. Create a crypto credential definition for the appliance:
idcred credential_name key_alias cert_alias
For example:
idcred WebUiCred01 WebUiKey01 WebUiCert01
v To create a crypto valcred definition for validating clients (this is optional):
1. From the crypto configuration mode, create a certificate definition object for
each of the client certificates that you have imported:
certificate cert_alias cert:///certfile
For example:
certificate WebUiClientCert01 cert:///client1.cer
certificate WebUiClientCert02 cert:///client2.cer
certificate WebUiClientCert03 cert:///client3.cer
2. Create a crypto valcred definition, specifying the certificate definitions for the
client certificates:
valcred valcred_name
certificate cert_alias
For example:
ssl-server myappliance1
admin-state enabled
idcred WebUiCred01
protocols TLSv1d2
valcred WebUIvalcred01
request-client-auth on
require-client-auth on
send-client-auth-ca-list on
v To save all the changes you have made in crypto configuration mode:
1. Type exit to leave crypto configuration mode.
2. Type write mem to save your configuration changes.
v To associate the SSL server profile with the web UI:
1. From configuration mode, type web-mgmt to enter web management
configuration mode.
2. Enter the following command:
ssl-server SSL_Svr_Profile_name
For example:
ssl-server myappliance1
v To save your web management configuration:
1. Type exit to leave web-mgmt configuration mode.
2. Type write mem to save your configuration changes.
3. Type exit again to leave configuration mode.
FIPS compliance
Gives a guide to FIPS 140-2 level 1 compliance on the IBM MQ Appliance.
Note: You cannot ensure that all encryption on the appliance is performed using
FIPS compliant code paths.
While you can ensure that individual components of the IBM MQ Appliance use
FIPS compliant libraries for cryptographic applications, as described in the
following sections, there is currently no global way to ensure the system as a
whole performs all encryption using only compliant code paths.
The appliance has various interfaces that can be used to administer the appliance:
SSH, web UI, and REST API. Use the command crypto-mode-set fips-140-2-11 to
tell the appliance administrative process to perform the encryption on these
interfaces using a cryptographic software module that is validated to FIPS 140-2
Level 1 (see “crypto-mode-set” on page 610).
For FIPS compliance and administration interfaces that use MQ Channels (for
example, PCF or remote MQSC), see the following section, IBM MQ Channels.
IBM MQ channels
Appliance queue managers can be instructed to use a library that has been tested
for FIPS 140-2-l1 compliance for cryptography on all MQ channels. The library is
named IBM Crypto for C (ICC). The versions of the library embedded in the IBM
MQ Appliance can be displayed using the command dspmqver -p 64 -v (see
“dspmqver (display version information)” on page 474).
See Federal Information Processing Standards (FIPS) for UNIX, Linux, and
Windows in the IBM MQ documentation for more information about IBM MQ
channels and FIPS compliance.
IBM MQ clients
For client connections to the appliance, you must ensure that your client is
configured for FIPS compliance, see Specifying that only FIPS-certified CipherSpecs
are used at run time on the MQI client in the IBM MQ documentation.
You can use the status command to view the following information about the
system resources on the appliance:
v The size and usage of the system memory
v The CPU usage of the system
v CPU average load (in 1, 5, and 15 minute averages)
v The size and usage of the internal disk
v The size and usage of the system volume
v The number of FDCs and the disk space used
v The disk space used by trace
You can use the status command to view the following information about the
system resources that are used by a queue manager:
v The queue manager name
v The queue manager status
v An estimate of the CPU usage of the queue manager
v An estimate of the memory usage of the queue manager.
v The amount of the queue manager file system used by the queue manager
For a high availability queue manager, the following additional information can be
viewed:
v The file system size for the queue manager
v The replication status of the queue manager
v The preferred appliance for the queue manager
v Whether a partitioned situation has been detected, and if it has, the amount of
'out-of-sync' data held.
For a disaster recovery queue manager, the following additional information can be
viewed:
v The disaster recovery role (primary or secondary)
v The disaster recovery status
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. View either the resource usage for the entire appliance, or for a specific queue
manager:
v To view the resource usage for the entire appliance, enter the following
command:
status
v To view the resource usage for a specific queue manager on the appliance,
enter the following command:
status qMgrNameWhere:
qMgrName
Specifies the name of the queue manager that you want to view the
resource statistics for.
3. Optional: Exit the IBM MQ administration mode by entering the following
command:
exit
Example
The following example shows the command to view the resource usage for a
queue manager QM1:
status QM1
The amqsrua command reports metadata that is published by queue managers. This
data can include information about the CPU, memory, and disk usage. You can
also see data equivalent to the STATMQI PCF statistics data. The data is published
every 10 seconds and is reported while the command runs.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Query the meta data by entering the following command:
Example
The following example shows the result of using amqsrua to view CPU
performance data for the running queue manager over a 20-second period:
mqa(mqcli)# amqsrua -n 2 -m ASH
CPU : Platform central processing units
DISK : Platform persistent data stores
STATMQI : API usage statistics
STATQ : API per-queue usage statistics
Enter Class selection
==> CPU
SystemSummary : CPU performance - platform wide
QMgrSummary : CPU performance - running queue manager
Enter Type selection
==> QMgrSummary
Publication received PutDate:20151014 PutTime:09175398
User CPU time - percentage estimate for queue manager 0.02%
System CPU time - percentage estimate for queue manager 0.04%
RAM total bytes - estimate for queue manager 200MB
mqa(mqcli)#
You use the Charts widget in the IBM MQ Console to view monitoring data for
queue managers.
You add a Charts widget to your dashboard and then configure it to monitor a
particular aspect of resource usage. You can create many instances of the Charts
widget to display different data. The data is displayed in a chart format.
Data is collected at 10-second intervals. The X-axis of the chart displays a timeline.
The Y-axis displays units appropriate to the resource that you are viewing. The
Y-axis is dynamically resized to accommodate the data that is returned.
You must have at least one running queue manager before you can configure a
chart widget.
Procedure
1. Add a Charts widget to your dashboard:
a. Click the configure icon in the title bar of the Charts widget.
b. Optional: Enter a Widget title. This title is shown in the title bar of the
widget.
c. Select the Resource class to monitor:
Platform central processing units
Monitor the usage of the CPUs.
Platform persistent data stores
Monitor the use of disk resource.
API usage statistics
Monitor API calls.
API per-queue usage statistics
Monitor API calls by individual queues. When you choose this class,
you specify the queue name to monitor in the Object field.
d. Select the Resource type to monitor. The resource types that are available to
select depend on the resource class that is selected. The following table
shows the resource types:
Table 33. Resource types
Class Type Description
Platform central CPU performance – platform Select this type to view performance
processing units wide data for the CPUs and memory.
CPU performance – running Select this type to view performance
queue manager data for the CPUs and memory that is
related to the queue managers that you
are monitoring. A queue manager must
be running for you to monitor it. If you
are monitoring results from more than
one queue manager, different colors are
used to distinguish the performance
data in the chart.
e. Select the Resource element to monitor: The resource elements that are
available to select depend on the resource class and resource type that are
selected. The following tables show the resource elements:
Results
After you configure the widget, there is a short delay before data is displayed in
the chart. Data is displayed along a time axis. Each data point represents the end
of the 10-second period over which the data is collected. You can hover over data
points in the chart to see detailed information as shown in the following example:
You can use the show command to view information about how an aspect of the
appliance is configured or to monitor aspects of the appliance operation. The
argument specifies which information you view. The show command is available at
login, and in most configuration modes.
Procedure
v Enter the command:
show status_provider
Command Description
“show clock” on page 758 Displays the current time and appliance uptime.
“show file” on page 760 Displays a specified printable file.
“show firmware-version” on page Displays the current firmware version, without image type and installation
761 date.
“show firmware” on page 760 Displays the current firmware version, with image type and installation date.
“show ipaddress” on page 762 Provides IP address information about interfaces.
“show Lists members in link aggregation interfaces.
link-aggregation-member-status”
on page 763
“show link-aggregation-status” Provides statistics for aggregate interfaces.
on page 763
“show link” on page 764 Provides status about all interfaces on the appliance.
“show load” on page 765 Displays task level system usage.
“show log” on page 766 Displays the appliance default log.
“show logging” on page 766 Displays a specified appliance log.
Each queue manager publishes resource usage data to topics. This data is
consumed by subscribers to those topics. When a queue manager starts, the queue
manager publishes a set of messages on meta-topics. These messages describe
which resource usage topics are supported by the queue manager, and the content
of the messages published to those topics. Administrative tools can subscribe to the
meta data to discover what resource usage information is available, and on what
topics, and then subscribe to the advertised topics.
For a list of possible classes and types, see “Monitoring system resource usage by
using the amqsrua command” on page 408.
The source code for the amqsrua program is provided as an IBM MQ sample. You
can use this program as a guide for creating your own monitoring program. You
can retrieve the source for the sample from an IBM MQ client installation. The
source file is named amqsruaa.c and is located in the samples directory:
v On Linux and UNIX platforms, MQ_INSTALLATION_PATH/samp/
v On Windows platforms, MQ_INSTALLATION_PATH\tools\c\Samples\
The amqsrua program subscribes to MQ resource usage topics and formats the
resulting published PCF data. The program source provides a basic example of
how to request and consume this type of administrative data. The amqsrua
program completes the following tasks:
v Creates a non-durable subscription to the topics identified by the input
parameters.
v Calls MQGET repeatedly to get messages from the topics, and writes to stdout.
v Writes a message for each MQI reason (other than MQRC_NONE).
v Stops if there is a MQI completion code of MQCC_FAILED, or when the
requested number of resource usage publications have been consumed.
When your program is ready, you must run it on an IBM MQ client that connects
to the queue manager you are monitoring. See “Setting up a queue manager to
accept client connections” on page 247.
In addition to writing trace data to the system queue, the IBM MQ Appliance
introduces a new method of subscribing to activity trace data written to special
IBM MQ system topics. This method is described in the following topics.
Note that the IBM MQ Appliance does not support the use of exits. If you have
previously used exits to trace application activity, you must switch to using
application activity trace.
You subscribe to a special IBM MQ system topic string that represents the activity
to trace. Subscribing automatically generates activity trace data messages and
publishes them to the subscription destination queue. If you delete the
subscription, the generation of activity trace data stops for that subscription.
You can create multiple subscriptions, with different, or the same topic strings.
Where you create multiple subscriptions with the same system activity trace topic
strings, each subscription receives a copy of the activity trace data, and this might
have adverse performance implications.
Enabling any level of activity trace might have adverse performance effects. The
more subscriptions, or the more resources subscribed to, the greater the potential
performance overhead. To minimize the overhead of collecting activity trace, the
data is written to messages and delivered to the subscriptions asynchronously from
the application activity itself. Often, multiple operations are written to a single
activity trace data message. The asynchronous operation can introduce a delay
between the application operation and the receipt of the trace data that records the
operation.
Where:
v qmgr_name specifies the queue manager that the traced application is connected
to. qmgr_name is the name of the queue manager with all trailing blank
characters removed and any forward slash (/) characters replaced by an
ampersand (&) character.
v resource_type specifies the type of resource data is being collected for, and is one
of the following strings:
– ApplName to specify an application. The request subscribes to all IBM MQ
connections that have an application name that matches the one specified by
the resource_identifier.
– ChannelName to specify an IBM MQ channel.
– ConnectionId to specify an IBM MQ connection.
Examples
The following example shows a topic string for an application that is named
amqsput running on a Windows system:
$SYS/MQ/INFO/QMGR/QMGR1/ActivityTrace/ApplName/amqsputc.exe
The following example shows a topic string that creates a subscription to trace
data for all channels on queue manager QMGR1:
$SYS/MQ/INFO/QMGR/QMGR1/ActivityTrace/ChannelName/#
The amqsact program is an IBM MQ sample. To use this sample with the IBM MQ
Appliance, you must use the client-connected executable file, amqsactc. The
executable file is located in the samples directory:
v On Linux and UNIX platforms, MQ_INSTALLATION_PATH/samp/bin64
v On Windows platforms, MQ_INSTALLATION_PATH\tools\c\Samples\Bin64
Display mode
For example, the following command displays activity trace messages that are held
on SYSTEM.ADMIN.TRACE.ACTIVITY.QUEUE, and deletes the messages after
display:
amqsact –m QMGR1
The following command displays activity trace messages on the specified queue,
SUB.QUEUE, and deletes the messages after display. Messages continue to be
displayed until a period of 30 seconds with no new messages elapses. This
command can, for example, be used with a subscription to an activity trace system
topic string.
amqact –m QMGR1 –q SUB.QUEUE.1 –w 30
The following command displays in verbose format any activity trace data that is
currently held on the SYSTEM.ADMIN.TRACE.ACTIVITY.QUEUE that occurred in
the 20-minute period specified. Messages will remain on the queue after display.
amqsact –m QMGR1 –b -v –s 2014-12-31 23.50.00 –e 2015-01-01 00.10.00
Dynamic mode
For example, the following command generates and displays activity trace
messages for any connections that are made by applications that are named
“amqsget.exe”. After 30 seconds of inactivity, the amqsact program ends, and no
new activity trace data is generated.
amqsactc -m QMGR1 -w 30 -a amqsget.exe
The following command generates and displays activity trace messages for any
connections that are made by applications that start with the text “amqs”. After 30
seconds of inactivity, the amqsact program ends, and no new activity trace data is
generated.
amqsactc -m QMGR1 -w 30 -a amqs*
The following command generates and displays activity trace messages for any
activity on the QMGR1.TO.QMGR2 channel. After 10 seconds of inactivity, the
amqsact program ends, and no new activity trace data is generated.
amqsactc -m QMGR1 -w 10 -c QMGR1.TO.QMGR2
The following command generates and displays activity trace messages for any
activity on any channels. After 10 seconds of inactivity, the amqsact program ends,
and no new activity trace data is generated.
amqsactc -m QMGR1 -w 10 -c #
The following command generates and displays verbose activity trace messages for
any activity on the existing IBM MQ connection that has a CONN of
"6B576B5420000701", and an EXTCONN of "414D5143514D47523120202020202020".
After a minute of inactivity, the amqsact program ends, and no new activity trace
data is generated.
amqsactc -m QMGR1 -w 60 -i 414D5143514D475231202020202020206B576B5420000701 -v
You use the setmqini command to set values in the mqat.ini file for the queue
manager. See “Adding a value to the configuration file” on page 311 for details of
how to use the setmqini command.
You can set the following values for the AllActivityTrace stanza:
ActivityInterval
Time interval in seconds between trace messages. Activity trace does not
use a timer thread, so the trace message is not written at the exact instant
that the time elapses, it is written when the first MQI operation is executed
after the time interval elapses. If this value is 0, the trace message is
written when the connection disconnects (or when the activity count is
reached). Defaults to 1.
ActivityCount
Number of MQI operations between trace messages. If this value is 0, the
trace message is written when the connection disconnects (or when the
activity interval elapses). Defaults to 100.
Each queue manager’s topic tree contains the $SYS/MQ branch. The queue
manager publishes to topic strings in this branch. An authorized user can subscribe
to these topic strings to receive information on the queue manager and the activity
on it. These system topics are used for both monitoring resources on the IBM MQ
Appliance and for application activity trace. For more information on topic trees,
see Topic Trees in the IBM MQ documentation.
All topic strings that start with $SYS/MQ are reserved for use by IBM MQ. These
topic strings have the following restrictions:
v You cannot enable multicast from the $SYS/MQ branch of the topic tree.
v Clustering is not supported for the $SYS/MQ branch.
v The proxy subscription mechanism cannot be set to “force”.
v Applications cannot publish to a $SYS/MQ topic string.
v Publication and subscription scope defaults to the local queue manager only.
v The use of wildcard characters within subscription topic strings is restricted. No
wildcard characters can be used at the following points:
– $SYS/MQ/
– $SYS/MQ/INFO
– $SYS/MQ/INFO/QMGR
– $SYS/MQ/INFO/QMGR/queue_manager_name
– $SYS/MQ/INFO/QMGR/queue_manager_name/ActivityTrace
Attempts to use wildcard characters at these points causes a subscription failure
with the reason MQRC_ADMIN_TOPIC_STRING_ERROR.
You can use the REST management interface to monitor the status of the IBM MQ
Appliance.
When you use the REST management interface for this purpose, you send HTTP
requests to the REST interface port and receive JSON-formatted responses with a
payload and indication of success or failure. You can incorporate requests into
programs and so automate interaction with the appliance.
You must be a local user to use the REST management interface. If you have
configured role based management to use LDAP or XML file user authentication,
then configure a fallback user to access the REST interface (see “Role based
management” on page 344).
The appliance has a number of 'status providers'. You can retrieve complete status
provider data for all existing status provider classes and retrieve individual
property values of each status provider. The following topic provides an example
of retrieving status by using the REST interface. For a reference guide to the REST
management interface, see “REST management interface” on page 865.
There are a number of major steps involved in retrieving status from the IBM MQ
Appliance by using the REST management interface.
To begin retrieving the required status provider data from the appliance, first
identify the specific status provider class that you need. To identify the required
status class name, access the REST management interface root URI by using a GET
request to identify the status root URI:
GET https://mqhost.com:5554/mgmt/
You can identify the status root URI in the received response as /mgmt/status/.
Then, to retrieve a list of all available status provider classes on the appliance,
make the following request:
GET https://mqhost.com:5554/mgmt/status/
To identify the exact formatting of the status provider class name, you search the
received response payload. The following listing shows some fragments of the
received response:
{
"_links": {
"self": {
"href": "/mgmt/status/"
},
"ActiveUsers": {
"href": "/mgmt/status/{domain}/ActiveUsers"
},
"Battery": {
"href": "/mgmt/status/{domain}/Battery"
},
"ConnectionsAccepted": {
"href": "/mgmt/status/{domain}/ConnectionsAccepted"
},
...
"LogTargetStatus":{
After you identify the required status provider class name, you can retrieve the
associated status data. To retrieve the data, you construct a URI of the form
/mgmt/status/domain/class_name, replacing domain with the string “default” and
class_name with the desired status provider class. The following request shows a
URI to retrieve information from the MQSystemResources status provider within the
default domain:
https://mqhost.com:5554/mgmt/status/default/MQSystemResources
You can also retrieve the value of a specific status provider property, instead of
retrieving the status provider output in its entirety. To retrieve the value, you
construct a URI of the form /mgmt/status/domain/class_name/property_name. You
replace domain with the string “default”, class_name with the required status
provider class, and property_name with the specific property name as it appears in
the complete status provider response. For example, you could enter the following
URI to retrieve just the up time from the datetime status provider:
https://mqhost.com:5554/mgmt/status/default/DateTimeStatus/uptime2
You can configure SNMP to monitor the appliance. The appliance supports SNMP
versions 1, 2c, and 3.
When you configure SNMP on the appliance, you enable one or more SNMP
managers to interrogate the appliance to retrieve information about its current
state. The appliance objects that can be interrogated are defined in three MIB files.
You can view the MIB files by using the web UI (see “Viewing MIBs by using the
web UI” on page 132).
The appliance can also respond to events by generating traps (v1 and v2c) or
notifications (v3). These traps or notifications can be sent to SNMP managers to
inform them that the event has occurred.
You can configure SNMP on the appliance either by using the web UI or the
command line interface. See “SNMP Settings” on page 130.
There are a number of diagnostic tools that you can use to help you resolve
problems:
v You can list or view the system error logs, queue manager error logs, and first
failure data captures (FDCs) by using the dspmqerr command.
v You can start and stop trace, and you can download the generated trace files by
using the strmqtrc and endmqtrc commands.
v You can start and stop trace, and you can download the generated trace files by
using the IBM MQ Console.
v You can view information about return codes by using the mqrc command.
v You can gather diagnostic information to send to IBM support by using the
runmqras command.
v You can configure, generate, and put a trace-route message into a queue
manager network by using the dspmqrte command. For more information, see
dspmqrte in the IBM MQ documentation.
Error logs
There are several types of error logs generated by the IBM MQ Appliance,
including system error logs, queue manager error logs, and first failure data
captures (FDCs).
The system error logs contain information about errors that occur where a queue
manager name is not known. For example, if there are problems in a listener or a
TLS handshake, the information is logged in the system error log. These files have
a file type of LOG.
The queue manager error logs contain information about errors that occur on a
particular queue manager. This information includes messages that are related to
channels that belong to the queue manager, unless the queue manager is
unavailable, or the queue manager name is unknown. In this case, channel related
messages are recorded in the system error log. These files have a file type of LOG.
For more information about FDCs, see First Failure Support Technology (FFST) in
the IBM MQ documentation.
You use the dspmqerr command to view all types of error logs. See the child topics
for details of how to use the command for each log type. The command is based
on the UNIX less command. You can take the following actions:
v Use the arrows keys to scroll up and down the logs.
v Use the page, space, or return keys for simple scrolling.
v Enter q to exit at any time
v Enter h to display full help while you view a log. The help lists further
commands, for example, for searching for strings or jumping a set number of
lines.
Note: Some controls (for example, those controls that manipulate file names) are
disabled for security reasons. If you try to use these controls, you get the message
Command not available.
The command is based on the UNIX less command. The less command provides
controls for navigating the contents of a file, and you can use these controls when
you view system error logs.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Choose which system error log file to view:
v To display the most recent system error log file, enter the following
command:
dspmqerr -s
v To list system error log files, enter the following command:
dspmqerr -s -l
v To display a specific system error log file, enter the following command:
dspmqerr -s Filename
Where:
Filename
Specifies the name of the system error log file to display.
Example
The following example displays the system error log file AMQERR02.LOG:
dspmqerr -s AMQERR02.LOG
The command is based on the UNIX less command. The less command provides
controls for navigating the contents of a file, and you can use these controls when
you view system error logs.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Choose which queue manager error log file to view:
v To display the most recent log file for a queue manager, enter the following
command:
dspmqerr -m QMgrName
Where:
QMgrName
Specifies the name of the queue manager that the log file is
associated with.
v To list error log files for a queue manager, enter the following command:
dspmqerr -l -m QMgrName
Where:
QMgrName
Specifies the name of the queue manager that the log files are
associated with.
v To display a specific log file for a queue manager, enter the following
command:
dspmqerr -m QMgrName Filename
Where:
QMgrName
Specifies the name of the queue manager that the log file is
associated with.
Example
The following command lists all the error logs for the queue manager QM1:
dspmqerr -l -m QM1
You can view the log file in your browser, and save it to your local computer from
your browser, if required.
Procedure
1. Start the IBM MQ Appliance web UI, and click the menu icon in the title
bar.
2. Select Files to open the File Management window.
3. Open the mqerr/qmgrs folder.
4. Select the log file you want to view. You can view the file, or save it to your
local disk, depending on the options offered by your web browser.
The command is based on the UNIX less command. The less command provides
controls for navigating the contents of a file, and you can use these controls when
you view system error logs.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Choose which FDC to view:
v To list all the FDCs that are available to view on the appliance, enter the
following command:
dspmqerr -f -l
v To display a specific FDC, enter the following command:
dspmqerr -f Filename
Where:
Example
The following command displays the FDC AMQ12345.FDC:
dspmqerr -f AMQ12345.FDC
You use the dltmqras command to delete log files. You can delete all log files, or
specify the type of log files to delete.
For each file deleted, a message in the form File deleted: filename is written to
MQSystem.log. You can view MQSystem.log by using the dspmqerr command
without parameters.
Procedure
1. Enter the IBM MQ administration mode by entering the following command:
mqcli
2. Specify what types of file you want to delete:
v dltmqras -a to delete all log files apart from queue manager log files
v dltmqras -d to delete general diagnostics files
v dltmqras -e to delete older error logs. The current error log (MQSystem.log) is
not deleted.
v dltmqras -f to delete FDC files
v dltmqras -h to delete HA log files
v dltmqras -m qmname to delete service tool output for the specified queue
managers
v dltmqras -p to delete files in the mqtemporary: location
v dltmqras -t to delete trace files
v dltmqras -w to delete console log files
3. Optionally specify -y so that you are not prompted to confirm deletion. For
example:
dltmqras -a -y
Directory structures on the appliance are accessible in the form of URIs. There is a
dedicated URI, mqerr, for accessing IBM MQ logs. Use this URI to access queue
manager logs, FDC files, and the system log.
You can also view the URIs and view, delete, and download log files by using the
IBM MQ Appliance web UI.
To list the contents of the log directory by using the command line, enter the
following command:
dir mqerr:
To list the contents of the log directory by using the IBM MQ Appliance web UI:
1. Start the IBM MQ Appliance web UI, and click the File Management tab.
2. Open the mqerr folder.
3. Select the log file that you want to view.
To delete a log file by using the command line, enter the following command:
delete mqerr:///logfile
For example:
delete mqerr:///MQSystem.log
To download a log file from the appliance to your local system by using the
command line, enter the following command:
copy mqerr:///logfile scp://username@ipaddress/[/]directory/
For example:
copy mqerr:///MQSystem.log scp://me@mycomputer//logfiles/
Reason codes
IBM MQ Appliance has some new error reason codes in addition to the error codes
listed in the IBM MQ documentation.
Event logs
Log targets capture messages that are posted by the various objects and services
that are running on the appliance. These are appliance-specific objects and services,
IBM MQ logging is separate.
Log targets capture events that occur because of some internal process or hardware
status change.
Different types of log targets might include one or more of the following
capabilities:
v Archive files through rotation or upload
v Forward messages to remote servers
Messages in log targets can be restricted by object filters, event category, and event
priority. By default, a log target cannot accept messages until it is subscribed to
one or more events.
After you have created and configured a logging target, you can add further
features by using the global configuration commands that are described in the
following topics.
Procedure
Using trace
You can use the strmqtrc and endmqtrc commands on the command line to start
and end tracing.
The strmqtrc command has optional parameters to enable you to customize the
trace file that is generated. You can trace one or more queue managers. You can
trace one or more processes. You can trace specific threads within applications. You
The endmqtrc command has optional parameters to enable you to control which
entities the trace is ended for. For more information about these parameters, see
“endmqtrc” on page 478.
After you generate the trace files, you can download them from the appliance.
To generate and retrieve trace files from the appliance, complete the following
steps:
1. Use the strmqtrc command to specify details about the trace information that
you want to collect.
2. Use the endmqtrc command to end the trace.
3. Use the command runmqras -section trace to export the trace information to
a file. The command output gives you the file details.
4. Use the copy command to download the trace file from the mqtrace: URI on
the appliance to your local system.
The trace is not formatted on the appliance, but you can format it after you
download it, if required, by using the dspmqtrc command, see dspmqrtc in the
IBM MQ documentation.
2. In the Diagnostics window, click Enable for IBM MQ Console browser trace.
3. Click OK.
You can then re-create the problem that you are trying to troubleshoot and capture
the results in the trace. You then disable trace once more.
1. Click the help icon in the IBM MQ Console title bar and select Diagnostics
from the menu.
2. In the Diagnostics window, click Disable for IBM MQ Console browser trace.
3. Click Save.
Capture save the trace in a file by using the runmqras -section trace command
from the command line (see “Using trace” on page 440). You can download the
trace file from the File Management window of the IBM MQ Appliance web UI
(see “Managing files by using the IBM MQ Appliance web UI” on page 297). The
trace files is stored in the mqdiag:// directory.
If the two appliances in your high availability configuration lose both primary and
secondary interface connections, then replication no longer occurs between the two
appliances. After the connection is restored, the data replication system detects that
there have been independent changes to the same resources on both appliances.
This situation is described as a partitioned situation, because the two appliances
have two different views of the current state of the queue manager (it is sometimes
called a 'split-brain' situation). The queue manager continues to run on the
primary, but is stopped on the secondary appliance.
To resolve the situation, you must decide which of the two appliances has the data
that you want to retain, you then issue a command that identifies this appliance as
the “winner”. Data on the other appliance is discarded. The queue manager is then
started on the preferred appliance.
You identify the winner by running the following commands on the chosen
appliance:
1. Connect to the IBM® MQ Appliance as described in Command line access.
2. Log in as a user in the administrators group.
3. Type the following command to enter IBM MQ mode:
mqcli
4. Type the following command on the appliance that you determined to be the
“winner”:
makehaprimary HAQMName
Where HAQMName is the name of the queue manager. The queue manager
then runs on that appliance as it is now the primary.
You can also perform this operation from the IBM MQ Console:
1. Start the IBM MQ Appliance web UI on the appliance that you determined to
be the winner and click MQ Console.
2. In the queue manager widget, select the queue manager whose data is
partitioned and select More > High Availability (HA) > Resolve partitioned
data.
3. Confirm that you want the current appliance to become the primary data
source for the queue manager.
If the two appliances lose the replication interface, the HA status is reported as
Remote appliance(s) unavailable. The running queue manager might accumulate
out-of-sync data. The other queue manager remains in standby with no out-of-sync
data. When the connection is remade, replication is resumed.
If your HA queue manager is configured for disaster recovery, and failed over to
the recovery appliance when your HA group went out of service, then you might
have to resolve data partitioning between the HA group and the recovery
appliance. After you have restored your HA group, and resolved data partitioning
between the primary and secondary appliances, you must follow the procedure
described in “Switching back to the main appliance” on page 276.
A partitioned problem can arise when the replication link between the two
appliances has been lost. It might be the case that a disaster has occurred, and the
secondary queue manager has been started on the recovery appliance. When the
main site is restored, the queue manager on the appliance there will be out of step
with the queue manager on the recovery appliance.
Depending on how the partitioning occurred, your two appliances could show any
of the statuses listed in the following table (this is the status when the previously
disconnected connection is restored, but the queue manager is running on the
recovery appliance):
In a partitioned situation you must decide whether to keep the data from the
original queue manager, and copy this to the recovery queue manager, or keep the
data from the recovery queue manager and copy this to the original queue
manager. You use the makedrprimary and makedrsecondary commands to achieve
the required outcome.
v To keep the data from the queue manager on the recovery appliance:
1. Ensure the queue managers are stopped.
2. Specify that the queue manager on the main appliance is the secondary, for
example:
makedrsecondary -m myqueuemanager
3. Specify that the queue manager on the recovery appliance is the primary, for
example:
makedrprimary -m myqueuemanager
Synchronization begins, with the data from the recovery appliance being
copied to the main appliance.
4. When the synchronization is complete, run the makedrsecondary command
on the queue manager on the recovery appliance, for example:
makedrsecondary -m myqueuemanager
5. Specify that the queue manager on the main appliance is now the primary,
for example:
makedrprimary -m myqueuemanager
6. Start the queue manager on the main appliance, for example:
strmqm myqueuemanager
v To keep the data from the queue manager on the main appliance:
1. Ensure the queue managers are stopped
2. Specify that the queue manager on the recovery appliance is the secondary,
for example:
makedrsecondary -m myqueuemanager
3. Specify that the queue manager on the main appliance is the primary, for
example:
makedrprimary -m myqueuemanager
Synchronization begins, with the data from the main appliance being copied
to the recovery appliance.
4. When synchronization is complete, start the queue manager on the main
appliance, for example:
strmqm myqueuemanager
You can resolve this situation by using one of the following methods (the 'local'
appliance is the one where you issued the commands that were interrupted).
First, recover the HA status of the queue manager from both appliances by using
the status QMName command.
v If the queue manager on the local appliance is in a non-HA state and the remote
appliance is in a HA state, then complete the following steps:
1. On the remote appliance, enter the following command:
dltmqm QMName
2. On the local appliance, enter the following command:
sethagrp -i QMName
The queue manager will be added to the HA group and run on the local
appliance.
v If the queue manager on the local appliance is in an indeterminate HA state and
the remote appliance is in an HA state, then complete the following steps:
1. On the remote appliance, enter the following command:
dltmqm QMName
copy to
v Ensure that the appliance is correctly configured with an IP address. You can do
this by typing the show ipaddress command.
v Ensure that you can ping the server that you are copying a file to or from.
v Ensure that there is an SSH daemon running on the server that you are copying
a file to or from.
v Examine the sshd_config file on the server that you are copying a file to or
from, and ensure that it contains the line PasswordAuthentication yes.
If the network connections have not been correctly configured, you might see
messages including the information “non-management traffic will be blocked”.
This can cause file copy to fail. You can check configurations by using the IBM MQ
Appliance web UI. Select Manage Appliance > Network > Ethernet Interface. If
any of the interfaces have the status down, you must investigate the configuration,
and resolve the problem by using one of the following methods:
v Fix the configuration problem, and check that the status changes to up.
v Disable the Block nonmanagement traffic for invalid interface configuration:
1. Select Manage Appliance > Network > Network Settings.
2. Deselect Block nonmanagement traffic for invalid interface configuration.
You should also remove cached information for the host that you are copying the
file from or to interface on the appliance:
Where IP_address is the IP address of the host that you are copying the file from
or to.
If you have configured a queue manager to use SAN storage (rather than local
appliance storage), you will encounter problems if you lose connection to the SAN
fabric.
In all cases it is recommended that you use multipath connections to SAN, and
enable multipath in your SAN configurations on the appliance. This reduces the
likelihood of losing access to the remote storage.
If you do lose connectivity across all paths, you might see errors in your
application (for example, reporting object damaged), and first failure data captures
(FDCs) might be recorded on the appliance. Additionally, the Fibre-Channel-
Volume object transitions to Op-State Down (you can view the operational state of
the object by using the show fibre-channel-volume-status command). The state
transition causes the queue manager that is using that Fibre-Channel-Volume to
transition from a status such as Running or Ending to Status Not Available.
After the routes to the SAN storage are restored, the Fibre-Channel-Volume must
be disabled then re-enabled to transition from Op-State Down to Op-State Up. This
transition causes the queue manager status to change to Ended Unexpectedly. You
should then be able to start the queue manager to resume normal operations.
If you can restore SAN connectivity but the primary appliance that was previously
running the queue manager on SAN cannot be recovered, you can recreate the
queue manager on a different appliance. The SAN Volume containing the queue
manager data must be made available to the other appliance.
You should create the Fibre-Channel-Volume using the same attributes as the
original volume. Create the volume in the disabled state, because the
newly-created volume uses the same LUID as the original, which will still have the
primary appliance's locks on that volume. You must issue the fibre-channel-
unlock-volume volume_name to clear the primary appliance's locks.
Having cleared the locks, the next step is to enable the volume for use. To recover
the queue manager you must run the addmqm -fc volume_name -m
queue_manager_name command from the mqcli prompt. Running this command
restores the queue manager on the new appliance. The queue manager has the
ended state.
You might require to unlock a volume, for example, if it has been left locked by an
appliance that stopped abruptly while having the volume enabled. You can unlock
the volume from another appliance to take over the work from the failed
appliance.
The appliance that unlocks a volume must be zoned such that it can see the
volume.
When a volume is locked, any other appliance should be able to clear the locks
whether the volume was defined as multipath or non-multipath. If, however, the
locks are cleared on a non-multipath volume by the appliance on which the
volume became locked, the volume must remain defined as non-multipath.
Otherwise a registration conflict occurs.
You might encounter a problem where you have used the setmqsize command to
increase the size of a queue manager's file system, but the size has not actually
increased.
The setmqsize command uses a two-stage operation when increasing the file
system size. If the operation is interrupted before both stages have completed (for
example, by a power failure) your queue manager can be left in the situation
where it reports having a file system of the new size, but actually still has the old
file system size.
To remedy this situation, re-run the setmqsize command, specifying the desired
file system size.
You should use runmqras command only when instructed by IBM support. When
so instructed, proceed as follows:
1. From the command line, run the runmqras as instructed by IBM support (see
“runmqras” on page 483 for more information about the command).
2. Retrieve the file that runmqras created from the appliance. The file is located
under the mqdiag:// URI, and has a name of the form
runmqras_timestamp.zip.You can retrieve the file by using the appliance
command line, or by using the IBM MQ Console.
v From the command line, enter the following commands:
config
copy mqdiag://runmqras_YYMMDD_HHmmss.zip scp://user@host//home/user
v In the IBM MQ Console, use the File Manager to navigate to the mqdiag://
URI and save the runmqras_YYMMDD_HHmmss.zip file to your local computer.
3. Send the file to IBM Support.
If you detect a hardware failure, for example, indicated by the test hardware
command (see “test hardware command” on page 74), contact IBM support for
assistance. However, in some cases and depending on availability of spare
components, there may be local actions you can take to quickly restore your
appliance queue managers to operation.
The following topics describe scenarios that might occur and give step by step
instructions to recover from them.
If you have a spare appliance, you can swap your two disks into the spare, and
restart running your queue managers with the minimum of disruption.
In the data returned by the command, the state field should contain the
following text:
If you have a spare appliance, you can insert your one good disk into the spare
appliance and replicate its contents to another good disk to make a RAID pair. You
can then restart and run your queue managers with the minimum of disruption.
This scenario assumes that the spare appliance has no disks of its own. First you
install the good disk from which you want to recover the data, and configure that.
After you have ensured that the disk is OK, you install a new, second disk and
configure that.
Enter the following command to check that the disk has been activated:
mqa (config)# show raid-physical-drive
Where size specifies the size of the reserved storage in GB (for example,
createbackupfs -s 1 specifies 1 GB of storage).
b. Back up each of your queue managers:
mqbackup -m queuemanager
c. Copy the backups for each of your queue managers to an external location,
for example:
mqa(mqcli)# exit
mqa# config
Global configuration mode
mqa(config)# copy mqbackup:/QMgrs/queuemanager.bak scp://user@machine//home/MQ/DISKSWAP.ba
mqa(config)# exit
mqa#
13. Shut down the appliance:
mqa# shutdown halt
Now you can add a second disk to your appliance to fully populate the disk
RAID:
1. Insert the new disk into the empty disk slot of the appliance. See “Replacing a
solid state disk drive module - M2001 appliances” on page 88 for instructions.
2. Power up the appliance.
3. Check the status of the drives:
mqa# config
mqa(config)# show raid-logical-drive
As only one disk is configured, the appliance returns the state of the logical
drive as degraded, check the physical status of the drives:
mqa(config)# show raid-physical-drive
Follow this procedure to replace a failed disk. You can use a good disk from
another appliance or a new, replacement disk. The RAID system replicates the
contents of the existing disk to the new disk.
1. Shut down the appliance by using the following command:
mqa# shutdown halt
If you are taking a disk from another appliance, you must shut down the
donor appliance too.
2. Power off the appliance or appliances.
3. Remove the failed disk from your first appliance. Follow the instructions in
“Replacing a solid state disk drive module - M2001 appliances” on page 88.
4. If you are reusing a disk from another appliance, remove that disk.
5. Insert the good disk in the appliance to replace your failed disk.
6. Power up the appliance that you have replaced the disk in.
7. Log in to the appliance and enter the following command to enter global
configuration mode:
mqa# config
8. Check the status of the disks by entering the following command:
mqa(config)# show raid-physical-drive
9. The original disk should have the state online, while the replacement disk
should have the state rebuild.
Where size specifies the size of the reserved storage in GB (for example,
createbackupfs -s 1 specifies 1 GB of storage).
b. Back up each of your queue managers:
mqbackup -m queuemanager
c. Copy the backups for each of your queue managers to an external location,
for example:
mqa(mqcli)# exit
mqa# config
Global configuration mode
mqa(config)# copy mqbackup:/QMgrs/queuemanager.bak scp://user@machine//home/MQ/DISKSWAP.ba
mqa(config)# exit
mqa#
Command reference
The command line is the accessible interface for the IBM MQ Appliance. The
commands include methods to configure the appliance itself. The commands also
include methods to manage IBM MQ objects.
IBM MQ commands
Use the IBM MQ commands to work with messaging features.
Using commands
Command help
The supported IBM MQ commands can be viewed on the command line. These
commands are divided into categories, including administration commands,
diagnosis commands, user commands, and certificate commands. To view a list of
the available categories, enter the following command from the IBM MQ
administration mode:
help
To view the commands that are in a specific category, enter the following
command from the IBM MQ administration mode:
help category
To view detailed help about a particular command, enter one of the following
commands from the IBM MQ administration mode:
v help commandName
v ? commandName
where commandName is the name of the command that you want to view the help
for.
The command descriptions in the following topics use railroad diagrams for
command syntax. for an explanation of how to use these diagrams, see How to
read railroad diagrams in the IBM MQ documentation.
The commands, including the command name itself, the flags, and any arguments,
are case-sensitive. For example:
crtmqm -u SYSTEM.DEAD.LETTER.QUEUE QM1
v The command name must be crtmqm, not CRTMQM
v The flag must be -u, not -U
v The dead-letter queue is called SYSTEM.DEAD.LETTER.QUEUE
v The argument is specified as QM1, which is different from qm1
crtmqm:
Purpose
Syntax
►► crtmqm ►
-c Text -d DefaultTransmissionQueue
► ►
-fs FileSystemSize -h MaximumHandleLimit
► ►
-lf LogFilePages -lp LogPrimaryFiles
► ►
-ls LogSecondaryFiles -p PortNumber -sx
-sa
► ►
-t IntervalValue -u DeadLetterQueue
► QMgrName ►◄
-x MaximumUncommittedMessages -fc SANvolume
Parameters
QMgrName
Specifies the name of the queue manager that you want to create.
The queue manager name must be the last parameter that is specified in the
command.
The name can contain up to 48 characters. The following characters can be
used:
0-9 A-Z a-z . / _ %
Note: After a queue manager is created you cannot resize the file system;
ensure the value that is specified here is sufficient for the current and any
future workload.
-h MaximumHandleLimit
Specifies the maximum number of handles that an application can open at the
same time.
Specify a value in the range 1 - 999999999.
The default value is 256.
-lf LogFilePages
Specifies the number of log file pages to use for the log files.
The log data is held in a series of files called log files. The log file size is
specified in units of 4 KB pages.
The default number of log file pages is 4096, giving a log file size of 16 MB.
The minimum number of log file pages is 64 and the maximum is 65535.
-lp LogPrimaryFiles
Specifies the log files that are allocated when the queue manager is created.
The minimum number of primary log files you can have is 2 and the
maximum is 510. The default is 3. The total number of primary and secondary
log files must not exceed 511 and must not be less than 3.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v After you create the queue manager, you can use the strmqm command to start
the queue manager. A high availability queue manager is started automatically
after creation, so you do not need to start it by using strmqm.
v When a queue manager is created, the default and system objects are also
created. These objects are listed in System and default objects in the IBM MQ
documentation.
v For more information about this command in IBM MQ, see ctrmqm in the IBM
MQ documentation.
Examples
v The following command creates a queue manager that is called QM1, with a
description of example queue manager, and creates the system and default
objects:
crtmqm -c "example queue manager" QM1
v The following command creates a queue manager that is called QM2. It creates
the system and default objects, sets the trigger interval to 5000 milliseconds (5
seconds), and specifies SYSTEM.DEAD.LETTER.QUEUE as its dead-letter queue.
crtmqm -t 5000 -u SYSTEM.DEAD.LETTER.QUEUE QM2
Related commands
v strmqm (Start queue manager)
v endmqm (End queue manager)
v dltmqm (Delete queue manager)
dltmqm:
Purpose
Syntax
►► dltmqm QMgrName ►◄
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Before you delete the queue manager, you must end the queue manager by
using the endmqm command.
v For more information about this command in IBM MQ, see dltmqm in the IBM
MQ documentation.
Examples
v The following command deletes the queue manager QM1.
dltmqm QM1
Related commands
v crtmqm (Create queue manager)
v strmqm (Start queue manager)
v endmqm (Delete queue manager)
dmpmqcfg:
Purpose
You can use the dmpmqcfg command to dump the configuration of a queue
manager.
Syntax
►► dmpmqcfg ►
-c String -x filter -a -s SeqNumber
► ►
-z -u userID -n objectNames -t objectType
► ►
-o outputType SYSTEM.DEFAULT.MODEL.QUEUE
-q
ReplyQueueName
► ►◄
-r RmtQMgr -m QMgrName
Parameters
-c string
Specifies that a client mode connection is used to connect to the queue
manager.
460 IBM MQ Appliance
string can take one of the following values:
default
Specifies that the default client connection process is used.
"DEFINE CHANNEL(chlname) CHLTYPE(CLNTCONN)
CONNAME('connname')"
Specifies that the specific client channel specified by chlname is used to
connect to the queue manager at connname.
connname specifies the location of the queue manager in the following
format host(portnumber)
If -c is omitted, the command connects to the queue manager by using server
bindings. If that connection fails, client bindings are used.
-x filter
Specifies that the procedure is filtered.
filter can be one of the following values:
object
authority records
channel authentication
subscriptions
all
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v If any object is not at the default value, the -a option must be used if the
dumped configuration is used to restore the configuration.
v The dmpmqcfg command dumps only subscriptions of type
MQSUBTYPE_ADMIN, that is, only subscriptions that are created by using the
Examples
v The following command dumps the queue manager configuration for a queue
manager QM1:
dmpmqcfg -m QM1
dspmq:
Purpose
You can use the dspmq command to display the names and details of the queue
managers on the IBM MQ Appliance.
Syntax
-s
►► dspmq ►◄
-m QMgrName -o all -n -a
-o ha
-o dr
-o fs
▼
-o default
-o status
Parameters
-a Specifies that information about only the active queue managers is displayed.
A queue manager is active one or more of the following statements are true:
v The queue manager is running
v A listener for the queue manager is running
v A process is connected to the queue manager
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The queue manager can be in any of the following states:
– Starting
– Running
– Running as standby
– Running elsewhere
– Quiescing
– Ending immediately
– Ending pre-emptively
– Ended normally
– Ended immediately
– Ended unexpectedly
– Ended pre-emptively
– Status not available
v For more information about this command in IBM MQ, see dspmq in the IBM
MQ documentation.
dspmqrte:
Determine the route that a message has taken through a queue manager network.
Purpose
You can use the dspmqrte to generate a trace-route message and put it into a queue
manager network. As the trace-route message travels through the queue manager
network, activity information is recorded. When the trace-route message reaches its
target queue, the activity information is collected and displayed.
Generation options
►► dspmqrte ►
-c -i CorrelId Display options
► -q TargetQName ►◄
-m QMgrName
Generation options:
►
-ac -d Deliver -f Forward
-ar
► ►
-l Persistence -o -p Priority
► ►
-qm TargetQMgrName ,
-ro ▼ ReportOption
► ►
-rq ReplyToQ -s Activities
-rqm ReplyToQMgr
► ►
-t Detail -ts TopicString -u UserID
Display options
►
-xp PassExpiry -xs Expiry -n
Display options:
-v summary
►
-b -v all
none
outline
,
▼ DisplayOption
►
-w WaitTime
The following parameters are used when the command is used to put a trace-route
message into a queue manager network. That is, the parameters are the generation
options:
-ac
Specifies that activity information is to be accumulated within the trace-route
message.
If you do not specify this parameter, activity information is not accumulated
within the trace-route message.
-ar
Specifies that a trace-route reply message containing all accumulated activity
information is generated in the following circumstances:
v The trace-route message is discarded by a queue manager.
v The trace-route message is put to a local queue (target queue or dead-letter
queue) by a queue manager.
v The number of activities performed on the trace-route message exceeds the
value of specified in -s Activities.
If you do not specify this parameter, a trace-route reply message is not
requested.
-d Deliver
Specifies whether the trace-route message is to be delivered to the target queue
on arrival.
Deliver can be one of the following values:
The following parameters are used when the command is used to display collected
activity information. That is, the parameters are the display options:
-b Specifies that the command only browses activity reports or a trace-route reply
message related to a message.
This parameter allows activity information to be displayed again at a later
time.
If you do not specify this parameter, the command gets activity reports or a
trace-route reply message related to a message, and deletes them.
-v summary | all | none | outline DisplayOption
The values can be the following values:
summary
The queues that the trace-route message was routed through are
displayed.
all All available information is displayed.
none No information is displayed.
outline DisplayOption
Specifies display options for the trace-route message.
DisplayOption can be one or more of the following values, using a
comma as a separator:
activity
All non-PCF group parameters in Activity PCF groups are
displayed.
identifiers
Values with parameter identifiers MQBACF_MSG_ID or
MQBACF_CORREL_ID are displayed.
This value overrides msgdelta.
message
All non-PCF group parameters in Message PCF groups are
displayed.
When this value is specified, you cannot specify msgdelta.
msgdelta
All non-PCF group parameters in Message PCF groups, that
have changed since the last operation, are displayed.
When this value is specified, you cannot specify message.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v For more information about this command in IBM MQ, see dspmqrte in the IBM
MQ documentation.
Examples
v The following command puts a trace-route message into a queue manager
network with the target queue specified as TARGET.Q. Providing queue managers
on route are enabled for activity recording, activity reports are generated.
Depending on the queue manager attribute, ACTIVREC, activity reports are
either delivered to the reply-to queue ACT.REPORT.REPLY.Q, or are delivered to a
system queue. The trace-route message is discarded on arrival at the target
queue.
dspmqrte -q TARGET.Q -rq ACT.REPORT.REPLY.Q
Providing one or more activity reports are delivered to the reply-to queue,
ACT.REPORT.REPLY.Q, the command orders and displays the activity information.
v The following command puts a trace-route message into a queue manager
network with the target queue specified as TARGET.Q. Activity information is
accumulated within the trace-route message, but activity reports are not
generated. On arrival at the target queue, the trace-route message is discarded.
Depending on the value of the target queue manager attribute, ROUTEREC, a
trace-route reply message can be generated and delivered to either the reply-to
queue, TRR.REPLY.TO.Q, or to a system queue.
dspmqrte -ac -ar -ro discard -rq TRR.REPLY.TO.Q -q TARGET.Q
dspmqtrn:
You can use the dspmqtrn command to display details of transactions. The
transactions that can be displayed include transactions that are coordinated by
both the IBM MQ Appliance and external transaction managers.
Syntax
►► dspmqtrn ►
-e -h -i -a -q
► ►◄
-m QMgrName
Parameters
-e Specifies that details of externally coordinated, in-doubt transactions are
displayed.
These transactions are transactions for which the IBM MQ Appliance has been
asked to prepare to commit, but has not yet been informed of the transaction
outcome.
-h Specifies that details of externally coordinated, heuristically completed
transactions are displayed.
These transactions are transactions that are resolved by the rsvmqtrn command,
but that the external transaction coordinator has yet to acknowledge with an
xa-forget command.
-i Specifies that details of internally coordinated, in-doubt transactions are
displayed.
These transactions are transactions for which each resource manager has been
asked to prepare to commit, but the IBM MQ Appliance has yet to inform the
resource managers of the transaction outcome.
-a Specifies that a list of all transactions known to the queue manager are
displayed.
The returned data includes transaction details for all transactions known to the
queue manager. If a transaction is currently associated with an IBM MQ
Appliance application connection, information related to that application
connection is also returned.
-q Specifies that all the data from the -a parameter and a list of up to 100 unique
objects updated within the transaction are displayed.
If more than 100 objects are updated in the same transaction, only the first 100
distinct objects are listed for each transaction.
Specifying this parameter on its own is the same as specifying -a -q.
-m QMgrName
Specifies the name of the queue manager for which to display transactions.
The default value is the default queue manager.
Examples
v The following command shows externally coordinated, in-doubt transactions for
the queue manager QM1:
dspmqtrn -e -m QM1
Related commands
v rsvmqtrn
Purpose
You can use the dspmqver command to display version and build information for
the IBM MQ Appliance.
Syntax
►► dspmqver ►
► ►◄
-a -p components -f fields -b -v
Parameters
-a Specifies that information about all fields and components is displayed.
-p Components
Specifies that only information about the components that are specified is
displayed.
Multiple components can be specified as a sum of the values of the required
components. The components have the following values:
1 IBM MQ Appliance
64 GSKit
128 IBM MQ Advanced Message Security
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v For more information about this command in IBM MQ, see dspmqver in the
IBM MQ documentation.
Examples
v The following command displays verbose version and build information:
dspmqver -v
Display information about the configuration of the mqweb server. The mqweb
server is used to support the IBM MQ Console and administrative REST API.
Purpose
Use the dspmqweb properties command to view details of the configuration of the
mqweb server.
-u -t
►► dspmqweb properties -a -c ►◄
-l
Optional parameters
properties
Displays information about the configurable properties of the mqweb server.
That is, which properties are configurable by the user and those that have been
modified.
-u Displays only the configurable properties that have been modified by the
user.
-a Displays all available configurable properties, including those which have
been modified by the user.
-t Formats the output as text name-value pairs.
-c Formats the output as command text which can be used as input to the
corresponding setmqweb properties command.
-l Enable verbose logging. Diagnostic information is written to a mqweb server
log-file.
Return codes
Return
code Description
0 Command successful
>0 Command not successful.
endmqm:
Purpose
You can use the endmqm command to stop a queue manager. This command stops a
queue manager in one of three modes:
v Controlled or quiesced shutdown
v Immediate shutdown
v Preemptive shutdown
-c
►► endmqm QMgrName ►◄
-w
-i
-p
-r
Parameters
QMgrName
Specifies the name of the message queue manager that you want to stop.
This parameter is required.
-c Specifies that the queue manager ends in a controlled (or quiesced) shutdown.
In a controlled shutdown, the queue manager stops after all applications are
disconnected. Any MQI calls currently being processed are completed. Control
is returned to you immediately and you are not notified of when the queue
manager is stopped.
This parameter is the default.
-i Specifies that the queue manager ends in an immediate shutdown.
In an immediate shutdown, the queue manager stops after it all the MQI calls
currently being processed are completed. Any MQI requests made after the
command starts fail. Any incomplete units of work are rolled back when the
queue manager is next started. Control is returned after the queue manager
ends.
-p Specifies that the queue manager ends in a preemptive shutdown.
In a preemptive shutdown, the queue manager might stop without waiting for
applications to disconnect or for MQI calls to complete. This behavior can give
unpredictable results for your applications. Therefore, use this type of
shutdown only after other endmqm commands fail to stop the queue manager.
-r Specifies that client connectivity can be re-established with other queue
managers in their queue manager group.
The client might not reconnect to the same queue manager. Depending on the
MQCONNX reconnect option the client uses, and the definition of the queue
manager group in the client connection table, the client might reconnect to a
different queue manager. You can configure the client to force it to reconnect to
the same queue manager.
-w Specifies that the queue manager ends in a wait shutdown.
In a wait shutdown, the queue manager stops after all applications are
disconnected. Any MQI calls currently being processed are completed. Control
is returned to you after the queue manager stops.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
Examples
v The following command ends the queue manager that is named QM1 in a
controlled way:
endmqm QM1
v The following command ends the queue manager that is named QM2
immediately:
endmqm -i QM2
Related commands
v crtmqm (Create queue manager)
v strmqm (Start queue manager)
v dltmqm (Delete queue manager)
endmqtrc:
End trace for some or all of the entities that are being traced.
Purpose
You can use the endmqtrc command to end tracing for a specified entity, or for all
entities.
Syntax
►► endmqtrc ►
-m QMgrName -i PidTids -p Apps
► ►◄
-e -a -w
Parameters
-m QMgrName
Specifies the name of the queue manager for which to end tracing.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Specifying endmqtrc with no parameters has the same effect as specifying
endmqtrc -e.
v For more information about this command in IBM MQ, see endmqtrc in the IBM
MQ documentation.
Examples
v The following command ends tracing of data for a queue manager called QM1:
endmqtrc -m QM1
v The following command ends tracing for queue manager QM2 only. Any other
traces that are running are not affected:
endmqtrc -m QM2
Related commands
v “strmqtrc” on page 492
mqrc:
You can use the mqrc command to display information about symbols, return
codes, and AMQ messages. You can specify a range of return codes or AMQ
messages, or you can specify specific return codes or AMQ messages.
Syntax
►► mqrc returnCode ►◄
-a -b -r returnCode
AMQmessage
-m AMQmessage
-R
-f first -l last
-M -f first -l last
symbol
-s
Parameters
returnCode
Specifies the return code to display.
AMQmessage
Specifies the AMQ message to display.
symbol
Specifies the symbol to display.
-a Specifies that all severities are tried to find message text.
-b Specifies that messages are displayed without extended information.
-m AMQmessage
Specifies the AMQ message to display.
-M -f first -l last
Specifies that AMQ messages in a range are displayed from the first value to
the last value.
-r returnCode
Specifies the return code to display
-R Specifies that all return codes are displayed.
-R -f first -l last
Specifies that return codes in a range are displayed from the first value to the
last value.
-s symbol
Specifies the symbol to display
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Numeric arguments are interpreted as decimal if they start with a digit 1 - 9, or
hex if prefixed with 0x.
Examples
v This command displays AMQ message 5005:
mqrc AMQ5005
v This command displays return codes in the range 2505 - 2530:
mqrc -R -f 2505 -l 2530
rcrmqobj:
Create a client channel definition table (CCDT) file and place it in a downloadable
location.
Syntax
►► rcrmqobj -t ObjectType ►◄
-m QMgrName -z
Required parameters
-t ObjectType
The types of object to re-create. The object type for this command when used
on the appliance is always clchltab.
Optional parameters
-m QMgrName
The name of the queue manager for which to re-create objects. If omitted, the
command operates on the default queue manager.
-z Suppresses error messages.
rsvmqtrn:
Purpose
You can use the rsvmqtrn command to resolve two different transaction states. You
can resolve internal or external in-doubt transactions, and external heuristically
completed transactions. Heuristically completed transactions are transactions that
are manually resolved by a resource manager but are unacknowledged by the
transaction manager.
►► rsvmqtrn -m QMgrName +- -a ►◄
-b Transaction
-c
-f
-r RMID
Parameters
-m QMgrName
Specifies the name of the queue manager to resolve transactions for.
This parameter is required.
-a Specifies that the queue manager resolves all internally coordinated, in-doubt
transactions. That is, all global units of work.
-b Transaction
Specifies that the named transaction is backed out.
Transaction specifies the number of the transaction to back out.
This flag is valid for externally coordinated transactions only. That is, for
external units of work only.
-c Transaction
Specifies that the transaction is committed.
Transaction specifies the number of the transaction to commit.
This flag is valid for externally coordinated transactions only. That is, external
units of work only.
-f
Specifies that the named heuristically completed transaction is forgotten.
This flag is valid only for externally coordinated transactions that are resolved,
but unacknowledged by the transaction coordinator. That is, external units of
work that are resolved, but unacknowledged by the transaction coordinator.
Use this parameter only if the external transaction coordinator is never going
to be able to acknowledge the heuristically completed transaction. For example,
if the transaction coordinator was deleted.
-r RMID Transaction
Specifies that the participation of the resource manager in the in-doubt
transaction can be ignored.
The queue manager does not call the resource manager. Instead, it marks the
participation of the resource manager in the transaction as being complete.
RMID specifies the ID of the resource manager. Transaction specifies the
number of the transaction.
This flag is valid for internally coordinated transactions only, and for resource
managers that had their resource manager configuration entries removed from
the queue manager configuration information.
Examples
v The following command shows all internally coordinated, in-doubt transactions
being resolved for queue manager QM1:
rsvmqtrn -m QM1 -a
Related commands
v “dspmqtrn” on page 472
runmqras:
Purpose
You can use the runmqras command to gather diagnostic information from the
appliance into a single archive. You can use this command to gather information
about an application or appliance failure, possibly for submission into IBM when
you report a problem.
By default, the command gathers information such as the FDC files, error logs,
product version, and status information. The command does not gather user
information that is contained in messages on queues when you use the default
setting. However, if you request sections other than default, the data collected
might contain user information.
The zip file written to the appliance URI mqdiag://, You can retrieve it by using
the copy command (see “copy” on page 664), or by using the IBM MQ Appliance
web UI (see “Managing files by using the IBM MQ Appliance web UI” on page
297). You can also use the ftp custom option of the runmqras command to copy the
trace directly to an FTP server.
►► runmqras ►◄
section Sections
qmlist QMGRs
timeout secs
demo
v
ftp IBM
ftp custom
ftpserver server
ftpusername userid
ftppassword password
ftpdirectory path
pmrno pmr_number
Parameters
section Sections
Specifies the optional sections about which to gather more specific information.
By default, a generic section of documentation is collected. Running without
requesting more sections is intended as a starting point for general problem
diagnosis, but more specific information can be gathered for a specific problem
type. You can specify multiple values for Sections in a comma-separated list.
IBM support generally supplies you with the sections to use. Example values
for Sections are the following values:
all Gathers all possible information, including all trace files, and
diagnostics for many different types of problems.
This option results in the generation of a very large file, so you must
check that the mqdiag:// directory does not currently contain trace
information. If mqdiag:// does already contain information, you should
copy the files off of the appliance, or send them to IBM support, before
running runmqras with the all section.
cluster
Gather information specific for clustering
defs Gather the queue manager definitions and status
nodefault
Prevents the default collections from occurring, but other explicitly
requested sections are still collected.
trace Gather all the trace file information plus the default information.
This option results in the generation of a very large file, so you must
check that the mqdiag:// directory does not currently contain trace
information. If mqdiag:// does already contain information, you should
copy the files off of the appliance, or send them to IBM support, before
running runmqras with the trace section.
webui A diagnostics test is run on the IBM MQ Console, and the results
written to the archive.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v For more information about this command in IBM MQ, see runmqras in the IBM
MQ documentation.
Examples
v The following command gathers the default documentation from the installation,
and all queue managers on the system:
runmqsc:
Purpose
You can use the runmqsc command to start the runmqsc prompt for a queue
manager. From the runmqsc prompt you can directly enter MQSC commands to
perform administration tasks. For example, you can define, alter, or delete a local
queue.
Syntax
►► runmqsc ►
-e -v -u UserID
► ►◄
-w WaitTime QMgrName
-x -m LocalQMgrName
Parameters
-e Specifies that the source text of the MQSC commands is not copied into a
report.
This parameter is useful when you enter commands interactively.
-v Specifies that the commands entered are to be verified without performing the
action.
You cannot use this parameter with a remote queue manager. That is, the -w
and -x parameters are ignored if specified at the same time as -v.
-u UserID
Specifies the user ID that the queue manager is accessed with. You are
prompted for a matching password.
-w WaitTime
Specifies that the MQSC commands are to be run on a remote queue manager.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v To stop the runmqsc command, use the end command. You can also use the exit
or the quit command.
v For a full list of MQSC commands and their syntax, see The MQSC commands
in the IBM MQ documentation.
v The runmqsc command takes its input from stdin. You can enter MQSC
commands interactively by taking stdin from the keyboard. Alternatively, you
can enter MQSC commands in a file, and run a sequence of frequently used
commands by redirecting the input from the file.
v When the commands are processed, the results and a summary are put into a
report that is sent to stdout. Therefore, you can redirect the output report to a
file.
Examples
v The following command starts the runmqsc prompt for the default queue
manager:
runmqsc
v The following command starts the runmqsc prompt for the queue manager QM1:
runmqsc QM1
From the runmqsc prompt you can directly enter MQSC commands.
Purpose
You can use the runswchl to switch or query cluster transmission queues that are
associated with cluster-sender channels.
The command switches all the stopped or inactive cluster-sender channels that
match the -c parameter, require switching, and can be switched. The command
reports back on the channels that are switched, the channels that do not require
switching, and the channels it cannot switch because they are not stopped or
inactive.
Syntax
Parameters
-m QmgrName
Specifies the queue manager to run the command against.
The queue manager must be started.
This parameter is required.
-c ChannelName
Specifies the cluster-sender channels to run the command against.
The ChannelName can specify a single channel, or multiple channels if you use
a wildcard in the value. You can use an asterisk (*) as a wildcard to match zero
or more characters. You can use an asterisk (*) to specify all cluster-sender
channels.
This parameter is required.
-q Specifies that the state of the channels is displayed.
If you specify this parameter, no switching occurs. Instead, channels that
would be switched are listed.
-n Specifies that when transmission queues are switched, messages are not
transferred from the old queue to the new transmission queue.
Messages on the old transmission queue are not transferred unless you
associate the transmission queue with another cluster-sender channel.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v For more information about this command in IBM MQ, see runswchl in the IBM
MQ documentation.
Purpose
You can use the setmqweb properties command to configure the mqweb server.
The mqweb server is used to support the IBM MQ Console and administrative
REST API.
Syntax
►► setmqweb properties -r ►◄
-k name -d -l
-v value
Parameters
-r Reset to default values. This parameter removes all user-modified
configuration properties .
-k name
The name of the configuration property to add, update or remove. The
following list shows the valid values for name on the appliance:
v mqRestRequestTimeout
v traceSpec
v maxTraceFileSize
v maxTraceFiles
v ltpaExpiration
v mqRestCorsAllowedOrigins
v mqRestCorsMaxAgeInSeconds
-d Deletes the specified configuration property.
-v value
The value of the configuration property to add to or update. Any existing
Return codes
Return
code Description
0 Command successful
>0 Command not successful.
strmqm:
Purpose
You can use the strmqm command to start a queue manager in the primary role in
a disaster recovery configuration. If you use the command to try to start a queue
manager in the secondary role, you receive an error message.
Syntax
►► strmqm ►
-c -f -d Information
-e CMDLEVEL= Level
► ►◄
-ns QMgrName
Required parameters
None.
Optional parameters
-c For an HA queue manager, this option only has an effect if it is used with the
-ns option.
Specifies that the queue manager default and system objects are to be reset.
490 IBM MQ Appliance
Any non-default values for the queue manager default and system objects are
replaced with the default values.
The queue manager is stopped after the default and system objects are reset.
After you have reset the default and system objects for the queue manager,
you must use the strmqm command again to start the queue manager.
If you run mq strmqm -c on a queue manager that is being used as a IBM MQ
Managed File Transfer coordination queue manager, you must rerun the MQSC
script that defines the coordination queue manager objects. This script is in a
file called queue_manager_name.mqsc, which is in the IBM MQ Managed File
Transfer configuration directory.
-d Information
For an HA queue manager, this option only has an effect if it is used with the
-ns option.
Specifies whether information messages are displayed.
You can specify one of the following values for Information:
all All information messages are displayed.
minimal
The minimal number of information messages are displayed
none No information messages are displayed.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The strmqm command is not required to start a newly-created queue manager.
An HA queue manager is started automatically on creation.
v The strmqm command is required to restart a stopped HA queue manager. In this
case, the queue manager is started on the appliance that is the preferred location
for the queue manager, regardless of which appliance the command is issued on.
If the HA preferred location is not set, the queue manager starts on the same
appliance that it stopped on.
v For more information about creating and activating a backup queue manager,
see Backing up and restoring WebSphere MQ queue manager data in the IBM
MQ documentation.
v For more information about this command in IBM MQ, see strmqm in the IBM
MQ documentation.
Examples
v The following command starts the queue manager QM1:
strmqm QM1
Related commands
v crtmqm (Create queue manager)
v endmqm (Start queue manager)
v dltmqm (Delete queue manager)
strmqtrc:
Start trace at a specified level of detail, or report the level of tracing in effect.
Purpose
You can use the strmqtrc command to enable tracing. You can specify the tracing
that you want:
v You can trace one or more queue managers.
v You can trace one or more processes. The processes can be either part of the
product or customer applications that use the IBM MQ API.
v You can trace specific threads within customer applications, either by thread
number or by operating system thread number.
Syntax
►► strmqtrc ►
-m QMgrName -e
► ▼ ►
-t TraceType -t TraceLevel -x TraceType
► ►
-l MaxSize -d 0 -i PidTids
-1
NumOfBytes
► ►
-p Apps -s -b StartTrigger -c StopTrigger
► -w ►◄
Parameters
-m QMgrName
Specifies the name of the queue manager to trace.
You can use an asterisk (*) as a wildcard to replace zero or more characters.
You can use a question mark (?) as a wildcard to replace any single character.
-e Specifies that any process that belongs to any component of any queue
manager traces its early processing.
You can use this flag to trace the creation or startup of a queue manager.
You cannot use the -e flag with the -m flag, -i flag, the -p flag, the -c flag, or
the -b flag.
The default is not to perform early tracing.
-t TraceType -t TraceLevel
Specifies the points to trace and the amount of trace detail to record.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following command enables tracing of processing flow from common
services and the local queue manager for a queue manager called exampleQM.
Trace data is generated at the default level of detail.
strmqtrc -m exampleQM -t csflows -t lqmflows -t parms
v The following command disables tracing of SSL activity on a queue manager
called exampleQM. Other trace data is generated at the parms level of detail.
strmqtrc -m exampleQM -x ssl -t parms
v The following command enables high-detail tracing of the processing flow for all
components:
strmqtrc -t all -t detail
v The following command enables tracing when FDC KN34650 occurs, and stops
tracing when FDC KN346080 occurs. In both cases the FDC must occur on a
process that is using queue manager exampleQM:
strmqtrc -m exampleQM -b FDC=KN346050 -c FDC=KN346080
The next examples use the -p and -m flags to show how a combination of
parameters on an individual invocation of the command are interpreted as having
a logical AND between them. The examples also show how multiple invocations of
the command, without an intervening mq enqmqtrc command, are interpreted as
having a logical OR between them:
1. The following command enables tracing for all threads that result from any
executing process that is called amqxxx.exe:
strmqtrc -p amqxxx.exe
2.
v If you start the following command after the command in step 1, without an
intervening endmqtrc command, then tracing is limited to all threads that
result from any running process that is called amqxxx.exe and that are using
queue manager exampleQM2:
strmqtrc -p amqxxx.exe -m exampleQM2
v If you start the following command after the command in step 1, without an
intervening endmqtrc command, then tracing is limited to all processes and
threads that result from running amqxxx.exe or that are using queue manager
exampleQM2:
strmqtrc -m exampleQM2
Related commands
v “endmqtrc” on page 478
The queue manager certificate commands can be run from the command line
interface in MQ command mode. To enter MQ command mode, type mqcli.
dspmqini:
Display attributes from the qm.ini or mqat.ini file of a specified queue manager.
Purpose
You can use the dspmqini command to display the qm.ini or mqat.ini file for a
queue manager.
Syntax
►► dspmqini -m QMgrName ►◄
-s Stanza
--k KeyName
Parameters
-m QMgrName
Specifies that the configuration file that is associated with the specified queue
manager is displayed.
If you do not specify any further parameters, the command displays all of the
stanzas and values for the queue manager.
-s Stanza
Specifies which stanza of the file is displayed.
Valid values for Stanza are the following values for the qm.ini file:
v Log
v TCP
v Channels
v InstanceData
v TuningParameters
v SSL
v Security
v Subpool
Valid values for Stanza are the following values for the mqat.ini file:
v AllActivityTrace
If you do not specify any further parameters, the command displays the values
for the stanza specified.
-k KeyName
Specifies which key name of the file is displayed.
Examples
v The following command displays the key names and values in the Log stanza of
the qm.ini file of queue manager QM1:
dspmqini -m QM1 -s Log
v The following command displays the value of the key name
ClusterQueueAccessControl in the Security stanza of the qm.ini file of queue
manager QM1:
dspmqini -m QM1 -s Security -k ClusterQueueAccessControl
Related commands
v setmqini
dspmqvar:
Purpose
You can use the dspmqvar command to display the environment variables that are
set for a specified queue manager.
Syntax
►► dspmqvar ►◄
-m QMgrName --k Name
Parameters
-m QMgrName
Specifies the queue manager to display the environment variables for.
If you do not specify this parameter, the global environment variables are
displayed.
If you do not specify any further parameters, the command displays all of the
environment variables for the queue manager.
-k Name
Specifies which environment variable is displayed.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Related commands
v setmqvar
setmqini:
Add or remove an attribute from the qm.ini file of a specified queue manager. Set
a value for an attribute in the mqat.ini file.
Purpose
You can use the setmqini command to configure a queue manager by editing the
qm.ini file for that queue manager. You can also use the command to configure
trace levels in the mqat.ini file. Changes to the values in the mqat.ini file do not
take effect until the next time the queue manager is started.
Syntax
Parameters
-m QMgrName
Specifies that the qm.ini file that is associated with the specified queue
manager is to be modified.
-s Stanza
Specifies which stanza of the configuration file is to be added to, or deleted
from. The stanza that is specified determines whether the qm.ini or mqat.ini
file is changed.
The following values for Stanza modify the qm.ini file:
v Log
v TCP
v Channels
v InstanceData
v TuningParameters
v SSL
v Security
v Subpool
The following value for Stanza modifies the mqat.ini file.
v AllActivityTrace
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Do not edit the qm.ini file to control the number of channels. Instead, use the
MAXINST and MAXINSTC values on your SVRCONN channels. For more information,
see “Queue manager configuration on the IBM MQ Appliance” on page 23.
v For more information about changing the qm.ini file, see Changing queue
manager configuration information in the IBM MQ documentation.
v For more information about the mqat.ini file, see Configuring activity trace
behavior using mqat.ini in the IBM MQ documentation.
Examples
v The following command adds the value Xmitq to the key name
RemoteQueueAccessControl in the Security stanza of the qm.ini file of queue
manager QM1:
setmqini -m QM1 -s Security -k RemoteQueueAccessControl -v Xmitq
v The following command deletes the key name and associated value of
RemoteQueueAccessControl in the Security stanza of the qm.ini file of queue
manager QM1:
setmqini -m QM1 -s Security -k RemoteQueueAccessControl -d
Related commands
v dspmqini
setmqvar:
Add or remove an environment variable for the appliance or for a specified queue
manager.
You can use the setmqvar command to configure environment variables for the
appliance or for a specified queue manager.
When you set a specific queue manager variable, the changes take effect the next
time that the queue manager is started.
When you set a global environment variable, the changes take effect immediately.
Syntax
Parameters
-m QMgrName
Specifies the queue manager for which the environment variable is modified.
If this parameter is omitted, the global environment variable is modified.
-k Name
Specifies the name of the environment variable to add or remove.
Ensure that the value of Name is correct before you use the command to add or
remove an environment variable. The value of Name is not validated.
-v Value
Specifies the value to add for the specified environment variable.
If Value is a string that contains spaces, it must be enclosed in double quotation
marks. Any double quotation marks that are used in the Value must be escaped
by using a backslash ( \ ).
Ensure that the value of Value is correct before you use the command to add or
remove an environment variable. The value of Value is not validated.
-d Specifies that the environment variable specified by the -k parameter is
deleted.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following command adds an environment variable AMQ_SERVICE_DEBUG_REPOS
with the value of TRUE to the queue manager QM1:
setmqvar -m QM1 -k AMQ_SERVICE_DEBUG_REPOS -v TRUE
v The following command deletes the global environment variable DEBUG_MODE:
setmqvar -k DEBUG_MODE -d
The appliance reserves the following user IDs for its own use:
v hacluster
v mqm
v mqsystem
v root
v sshd
You cannot create user IDs with these names, or delete, modify, or list these user
IDs.
The appliance reserves the following groups for its own use:
v haclient
v root
v sshd
v utmp
You cannot create groups with these names, or delete or list these groups.
The appliance also provides the standard IBM MQ mqm group. You cannot delete
this group, but you can add users to it.
usercreate:
Syntax
>>-usercreate---- -u--username--+---------------+--+-------------------------+------->
’- -p--password-’ | |
| .------,------. |
| V | |
’- -g- ----+-------+---+--’
| |
’-group-’
>-------+------------------+---><
’- -d--description-’
Parameters
-u username
Specifies the user ID to be created.
Examples
v The following command creates a new user ID, myid, with the password, pword,
belonging to the admin group:
usercreate -u myid -p pword -g MQadmin
userdelete:
Syntax
►► userdelete -u username ►◄
Parameters
-u username
Specifies the user ID to be deleted.
Examples
v The following command deletes the user ID yourid:
userdelete -u yourid
usermodify:
Syntax
>>-usermodify---- -u--username--+---------------+--+-------------------------+------->
’- -p--password-’ | |
| .------,------. |
| V | |
’- -g- ----+-------+---+--’
| |
’-group-’
>-------+------------------+---><
’- -d--description-’
Parameters
-u username
Specifies the user ID to be modified.
-p password
Optionally specifies a password when modifying a user ID.
Examples
v The following command modifies the user, myid, changes the password to be
newpword, and replaces the groups to which the user belongs to adminUK and
adminUS:
usermodify -u myid -p newpword -g MQadminUK, MQadminUS
userlist:
Syntax
►► userlist ►◄
-u username
Parameters
-u username
If you specify a user ID, then the details of that user are listed.
Examples
v The following command lists the current user IDs:
userlist
groupcreate:
Purpose
You can use the groupcreate command to work with user groups for the
messaging users on the IBM MQ Appliance.
By default, all users belong to the group users. You cannot remove users from the
users group, but you can add them to other groups if required.
Syntax
►► groupcreate -g group ►◄
Parameters
-g group
Specifies the user group to be created.
groupdelete:
Purpose
You can use the groupdelete command to work with user groups for the
messaging users on the IBM MQ Appliance.
Syntax
►► groupdelete -g ►◄
group
Parameters
-g group
Specifies the user group to be deleted.
Examples
v The following command deletes the user group, MQ0grp:
groupdelete -g MQ0grp
grouplist:
Purpose
You can use the grouplist command to work with user groups for the messaging
users on the IBM MQ Appliance.
Syntax
►► grouplist ►◄
Examples
v The following command lists the user groups on the appliance:
grouplist
userbackup:
Purpose
You can use the userbackup command to create a back up file containing the
details for messaging users and groups that have been defined on the IBM MQ
Appliance.
►► userbackup ►◄
-f file
Parameters
-f filename
Specifies the file that the messaging users and groups are backed up to. The
file is written to the mqbackup: location on the IBM MQ Appliance. If you do
not specify a file name, the back up is written to a file named
userbackup-date-time, for example, userbackup-20150219-132655.
Examples
v The following command backs up users and groups to the file backup_15115:
userbackup -f backup_15115
userrestore:
Restores messaging users and groups on the IBM MQ Appliance from a file to
which they were previously backed up.
Purpose
You can use the userrestore command to restore messaging users and groups
from back up file containing the details for messaging users and groups.
Syntax
►► userrestore -f file ►◄
Parameters
-f filename
Specifies the file containing the users and groups to restore. The file must be
located in the mqbackup: location on the IBM MQ Appliance.
Examples
v The following command restores users from the file backup_15115:
userrestore -f backup_15115
The queue manager security commands can be run from the command line
interface in MQ command mode. To enter MQ command mode, type mqcli.
Add the public part of a certificate to the keystore of a specific queue manager.
Purpose
You can use the addcert command to add the public part of a certificate to the key
repository of a specified queue manager.
Syntax
► ►◄
-format ascii|binary
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate is added.
The queue manager must exist.
-label Label
Specifies the label that is associated with the certificate.
For more information about valid syntax for the certificate label, see Digital
certificate labels, understanding the requirements in the IBM MQ
documentation.
-file FileName
Specifies the file that contains the certificate.
This file must be available on the appliance. The file must be located in
mqpubcert://.
-format ascii|binary
Specifies the format of the certificate.
The default value is ascii.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command adds a CA certificate from file CA.pem, with a label of
CACert to the key repository for the queue manager QM1:
addcert -m QM1 -file CA.pem -label CACert
Related commands
v “createcert” on page 509
v “deletecert” on page 513
createcert:
Purpose
You can use the createcert command to create a self-signed certificate and add it
to the key repository of a specified queue manager. The certificate data is extracted
from the newly created certificate and placed in a file.
Syntax
► ►
-sig_alg HashAlgorithm -size KeySize -expire Days
► ►
-format ascii|binary -ku Usage -eku Usage
► ►◄
-san_dnsname DNSNames -san_ipaddr IPAddresses
Parameters
-m QMgrName
Specifies the name of the queue manager for which the self-signed certificate is
created.
The queue manager must exist.
-dn DistinguishedName
Specifies the X.500 distinguished name that uniquely identifies the certificate.
DistinguishedName is a string that is enclosed in double quotation marks. For
example, “CN=John Smith,O=IBM,OU=Test,C=GB”. The CN, O, and C attributes
are required.
-label Label
Specifies the label that is associated with the certificate.
The default value is ibmwebspheremq<QMgrName>, where QMgrName is the
name of the queue manager in lowercase.
-sig_alg HashAlgorithm
Specifies the signing algorithm that is used to create the signature that is
associated with the new self-signed certificate.
HashAlgorithm can be one of the following values:
md5, MD5_WITH_RSA, MD5WithRSA, SHA_WITH_DSA, SHA_WITH_RSA, sha1, SHA1WithDSA,
SHA1WithECDSA, SHA1WithRSA, sha224, SHA224_WITH_RSA, SHA224WithDSA,
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
v The target file name is generated based on the label that is specified in the
command. The file name is displayed when the command completes.
Examples
v The following command creates a certificate for queue manager QM1, with a
distinguished name of “CN=John Smith,O=IBM,OU=Test,C=GB”:
createcert -m QM1 -dn "CN=John Smith,O=IBM,OU=Test,C=GB"
createcertrequest:
Purpose
You can use the createcertrequest command to create a certificate request for a
specified queue manager.
Syntax
► ►
-label Label -sig_alg HashAlgorithm -size KeySize
► ►
-ku Usage -eku Usage -san_dnsname DNSNames
► ►◄
-san_ipaddr IPAddresses
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate request is
created.
The queue manager must exist.
-dn DistinguishedName
Specifies the X.500 distinguished name that uniquely identifies the certificate.
DistinguishedName is a string that is enclosed in double quotation marks. For
example, “CN=John Smith,O=IBM,OU=Test,C=GB”. The CN, O, and C attributes
are required.
-label Label
Specifies the label that is associated with the certificate request.
The default value is ibmwebspheremq<QMgrName>, where QMgrName is the
name of the queue manager in lowercase.
-sig_alg HashAlgorithm
Specifies the signing algorithm that is used to create the signature that is
associated with the new certificate.
HashAlgorithm can be one of the following values:
md5, MD5_WITH_RSA, MD5WithRSA, SHA_WITH_DSA, SHA_WITH_RSA, sha1, SHA1WithDSA,
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
v The certificate request file name is generated based on the label that is specified
in the command. The file name is displayed when the command completes.
Examples
v The following command creates a certificate request for queue manager QM2,
with a distinguished name of “CN=Jane Smith,O=IBM,OU=Test,C=US”:
createcertrequest -m QM2 -dn "CN=Jane Smith,O=IBM,OU=Test,C=US"
Related commands
v “deletecertrequest” on page 513
v “detailcertrequest” on page 515
v “listcertrequest” on page 520
v “recreatecertrequest” on page 521
Purpose
You can use the deletecert command to remove a certificate from the key
repository of a specified queue manager.
Syntax
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate is deleted.
The queue manager must exist.
-label Label
Specifies the label that is associated with the certificate.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command deletes a certificate file certificate.pem, with a label of
cert1 for the queue manager QM1:
deletecert -m QM1 -file certificate.pem -label cert1
Related commands
v “addcert” on page 508
v “createcert” on page 509
v “detailcert” on page 514
v “listcert” on page 519
v “receivecert” on page 520
deletecertrequest:
Delete a certificate request that was previously issued from a specific queue
manager.
Purpose
You can use the deletecertrequest command to delete a certificate request that
was previously issued from a specified queue manager.
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate request is
deleted.
The queue manager must exist.
-label Label
Specifies the label that is associated with the certificate request.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command deletes a certificate request with a label of cert1 for the
queue manager QM1 :
deletecert -m QM1 -label cert1
Related commands
v “createcertrequest” on page 511
v “detailcertrequest” on page 515
v “listcertrequest” on page 520
v “recreatecertrequest” on page 521
detailcert:
Purpose
You can use the detailcert command to show detailed information about a
specific certificate, or about the queue manager default certificate
Syntax
►► detailcert -m QMgrName ►◄
-label Label
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command shows the details of the certificate ibmwebspheremqqm1
for the queue manager QM1 :
detailcert -m QM1 -label ibmwebspheremqqm1
Related commands
v “addcert” on page 508
v “createcert” on page 509
v “deletecert” on page 513
v “listcert” on page 519
v “receivecert” on page 520
detailcertrequest:
Show detailed information about a certificate request for a specific queue manager.
Purpose
You can use the detailcertrequest command to show detailed information about
a certificate request for a specified queue manager.
Syntax
►► detailcertrequest -m QMgrName ►◄
-label Label
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate request
details are shown.
The queue manager must exist.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command shows the details of the certificate request request1 for
the queue manager QM1 :
detailcertrequest -m QM1 -label request1
Related commands
v “createcertrequest” on page 511
v “deletecertrequest” on page 513
v “listcertrequest” on page 520
v “recreatecertrequest” on page 521
dspamschl:
Purpose
You can use the dspamschl command to display information about which queue
managers have MCA interceptions set on one or more channels.
Syntax
►► dspamschl -m QMgrName ►◄
-n channel_name
Parameters
-m QMgrName
Specifies the name of the queue manager which you want to display MCA
interception information for.
-n channel_name
Optionally specify a channel whose MCA interception status you are interested
in.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
keybackup:
Purpose
You can use the keybackup command to write a copy of the queue manager key
repository to a file. You can then copy the file to another system, and restore it
when required.
The command creates a compressed archive (.tar.gz) of the key repository files This
includes the .kdb and .rdb files, and the crl file, if present. It does not include the
password stash file. At completion the name of the archive file, and the password
that was stored in the password stash file is displayed. The password is needed to
restore the key repository.
Syntax
►► keybackup -m QMgrName ►◄
-force
Parameters
-m QMgrName
Specifies the name of the queue manager for which the key repository is
backed up.
The queue manager must exist.
-force
Forces the back up, without displaying a warning about the security issues
raised by backing up the key repsotory.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
v The operation could be regarded as insecure as it places a copy of the queue
manager Key Repository into the user accessible file area on the appliance.
Unless you specify the -force parameter, the appliance prompts you to confirm
that you want to continue with the back up:
This operation will generate a copy of your queue manager key repository,
which may include private keys. Although encrypted, you should take appropriate security
precautions in handling this file. The password required if you ever need to modify or
restore this file will be displayed after the copy has been created. Do you wish to contin
[Y/N]
Related commands
v “keyrestore”
v “copy” on page 664
keyrestore:
You can use the keyrestore command to restore to a queue manager a key
repository that you have previously backed up.
This command will prompt for password unless one is provided, and then replace
the .kdb, .rdb, and .crl (if present) files for this queue manager with the content of
the archive file provided. It will then generate a new password stash file.
Syntax
► -password password ►◄
Parameters
-m QMgrName
Specifies the name of the queue manager for which the key repository is
backed up.
The queue manager must exist.
-file filename
Specifies the name of the archive file containing the key repository that you are
restoring.
-defer
By default, the key repository is restored to the queue manager immediately. If
you specify the -defer parameter, the action is suppressed until an
administrator has manually stopped SSL/TLS channels on that queue manager,
and issued a MQSC REFRESH SECURITY TYPE(SSL) command.
-password password
When running the keyrestore command, you must specify the password that
was displayed when the archive was created using the keybackup command.
You must enclose the password in double quotes if it includes special
characters. You must also escape any backslash or double quote characters that
are part of the password with a backslash character. For example. if the
keybackup command returned pass"word\, then you should supply the
password to the keyrestore command as shown:
"pass\"word\\"
Examples
v The following command restores the key repository for the queue manager QM1:
keyrestore -m QM1 -file QM1keystore.tar.gz
Related commands
v “keybackup” on page 517
v “copy” on page 664
listcert:
List the certificates that are held in the keystore of a specific queue manager.
Purpose
You can use the listcert command to list the certificates that are held in the key
repository of a queue manager.
Syntax
►► listcert -m QMgrName ►◄
-expiry
Days
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificates are listed.
The queue manager must exist.
-expiry Days
Specifies that the valid-from and valid-to dates are displayed.
Days is an optional numeric value that specifies that the valid-from and
valid-to dates are displayed for certificates that expire within that number of
days.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command lists the certificates for the queue manager QM1:
listcert -m QM1
listcertrequest:
List the certificate requests that are outstanding in the keystore of a specific queue
manager.
Purpose
You can use the listcertrequest command to list the certificate requests that are
outstanding in the key repository of a specified queue manager.
Syntax
►► listcertrequest -m QMgrName ►◄
Parameters
-m QMgrName
Specifies the name of the queue manager for which the oustanding certificate
requests are listed.
The queue manager must exist.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command lists the outstanding certificate requests for the queue
manager QM1 :
listcertrequest -m QM1
Related commands
v “createcertrequest” on page 511
v “deletecertrequest” on page 513
v “detailcertrequest” on page 515
v “recreatecertrequest” on page 521
receivecert:
You can use the receivecert command to accept a certificate that has been signed
by a CA.
Syntax
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate is accepted.
The queue manager must exist.
-file FileName
Specifies the file that contains the certificate.
This file must be available on the appliance. The file must be located in
mqpubcert://.
-format ascii|binary
Specifies the format of the certificate.
The default value is ascii.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command accepts a certificate file certificate.pem for the queue
manager QM1 :
receivecert -m QM1 -file certificate.pem
Related commands
v “addcert” on page 508
v “createcert” on page 509
v “deletecert” on page 513
v “detailcert” on page 514
v “listcert” on page 519
recreatecertrequest:
Syntax
►► recreatecertrequest -m QMgrName ►
-label Label
► ►
-sig_alg HashAlgorithm -ku Usage -eku Usage
► ►◄
-san_dnsname DNSNames -san_ipaddr IPAddresses
Parameters
-m QMgrName
Specifies the name of the queue manager for which the certificate request is
re-created.
The queue manager must exist.
-label Label
Specifies the label that is associated with the certificate request.
The default value is ibmwebspheremq<QMgrName>, where QMgrName is the
name of the queue manager in lowercase.
-sig_alg HashAlgorithm
Specifies the signing algorithm that is used to create the signature that is
associated with the new certificate.
HashAlgorithm can be one of the following values:
md5, MD5_WITH_RSA, MD5WithRSA, SHA_WITH_DSA, SHA_WITH_RSA, sha1, SHA1WithDSA,
SHA1WithECDSA, SHA1WithRSA, sha224, SHA224_WITH_RSA, SHA224WithDSA,
SHA224WithECDSA, SHA224WithRSA, sha256, SHA256_WITH_RSA, SHA256WithDSA,
SHA256WithECDSA, SHA256WithRSA, SHA2WithRSA, sha384, SHA384_WITH_RSA,
SHA384WithECDSA, SHA384WithRSA, sha512, SHA512_WITH_RSA, SHA512WithECDSA,
SHA512WithRSA, SHAWithDSA, SHAWithRSA , EC_ecdsa_with_SHA1,
EC_ecdsa_with_SHA224, EC_ecdsa_with_SHA256, EC_ecdsa_with_SHA384, or
EC_ecdsa_with_SHA512.
The default value is SHA256WithRSA.
-ku Usage
Specifies a list of valid uses for the certificate.
To specify more than one use, enter each value in a comma-separated list.
-eku Usage
Specifies a list of valid uses for the certificate.
To specify more than one use, enter each value in a comma-separated list.
-san_dnsname DNSNames
Specifies the Subject Alternative Name (SAN) DNS names for the certificate
that is created.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command re-creates a certificate request for the queue manager
QM1 :
recreatecertrequest -m QM1
Related commands
v “createcertrequest” on page 511
v “deletecertrequest” on page 513
v “detailcertrequest” on page 515
v “listcertrequest” on page 520
setamschl:
Purpose
You can use the setamschl command to set up MCA interception on a particular
server-connection channel on a specified queue manager. You can also use
setamschl to delete existing MCA interceptions.
Syntax
► ►◄
-d
Parameters
-m QMgrName
Specifies the name of the queue manager for which the MCA interception is
required.
The queue manager must exist.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mq. To enter
the IBM MQ administration mode, enter mqcli on the command line. To exit the
IBM MQ administration mode, enter exit on the command line.
Examples
v The following command creates an MCA interception for the server-connection
channel SC1 on queue manager QM1:
setamschl -m QM1 -n SC1 -c cert1
The queue manager commands can be run from the command line interface in MQ
command mode. To enter MQ command mode, type mqcli.
See “Differences between queue managers that are running on the IBM MQ
Appliance and an IBM MQ installation” on page 22 for specific information about
using commands on the appliance.
addmqm:
Purpose
You can use the addmqm command to re-create queue manager and reattach it to its
SAN storage. You are most likely to need this command where the queue manager
was previously running on an appliance that has failed.
Syntax
Parameters
-fc SANvolume
Specifies the volume object that identifies the LUN that this queue manager
uses.
This parameter is required.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following command re-creates the queue manager QM1 using the volume
SAN_QM1.
addmqm -fc SAN_QM1 -m QM1
Related commands
v crtmqm (Create queue manager)
crtmqm:
Purpose
Syntax
►► crtmqm ►
-c Text -d DefaultTransmissionQueue
► ►
-fs FileSystemSize -h MaximumHandleLimit
► ►
-lf LogFilePages -lp LogPrimaryFiles
► ►
-ls LogSecondaryFiles -p PortNumber -sx
-sa
► ►
-t IntervalValue -u DeadLetterQueue
► QMgrName ►◄
-x MaximumUncommittedMessages -fc SANvolume
Parameters
QMgrName
Specifies the name of the queue manager that you want to create.
Note: After a queue manager is created you cannot resize the file system;
ensure the value that is specified here is sufficient for the current and any
future workload.
-h MaximumHandleLimit
Specifies the maximum number of handles that an application can open at the
same time.
Specify a value in the range 1 - 999999999.
The default value is 256.
-lf LogFilePages
Specifies the number of log file pages to use for the log files.
The log data is held in a series of files called log files. The log file size is
specified in units of 4 KB pages.
The default number of log file pages is 4096, giving a log file size of 16 MB.
The minimum number of log file pages is 64 and the maximum is 65535.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v After you create the queue manager, you can use the strmqm command to start
the queue manager. A high availability queue manager is started automatically
after creation, so you do not need to start it by using strmqm.
v When a queue manager is created, the default and system objects are also
created. These objects are listed in System and default objects in the IBM MQ
documentation.
v For more information about this command in IBM MQ, see ctrmqm in the IBM
MQ documentation.
Examples
v The following command creates a queue manager that is called QM1, with a
description of example queue manager, and creates the system and default
objects:
crtmqm -c "example queue manager" QM1
v The following command creates a queue manager that is called QM2. It creates
the system and default objects, sets the trigger interval to 5000 milliseconds (5
seconds), and specifies SYSTEM.DEAD.LETTER.QUEUE as its dead-letter queue.
crtmqm -t 5000 -u SYSTEM.DEAD.LETTER.QUEUE QM2
Related commands
v strmqm (Start queue manager)
v endmqm (End queue manager)
v dltmqm (Delete queue manager)
dltmqm:
Purpose
►► dltmqm QMgrName ►◄
Parameters
QMgrName
Specifies the name of the queue manager that you want to delete.
This parameter is required.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Before you delete the queue manager, you must end the queue manager by
using the endmqm command.
v For more information about this command in IBM MQ, see dltmqm in the IBM
MQ documentation.
Examples
v The following command deletes the queue manager QM1.
dltmqm QM1
Related commands
v crtmqm (Create queue manager)
v strmqm (Start queue manager)
v endmqm (Delete queue manager)
dmpmqcfg:
Purpose
You can use the dmpmqcfg command to dump the configuration of a queue
manager.
Syntax
►► dmpmqcfg ►
-c String -x filter -a -s SeqNumber
► ►
-z -u userID -n objectNames -t objectType
► ►◄
-r RmtQMgr -m QMgrName
Parameters
-c string
Specifies that a client mode connection is used to connect to the queue
manager.
string can take one of the following values:
default
Specifies that the default client connection process is used.
"DEFINE CHANNEL(chlname) CHLTYPE(CLNTCONN)
CONNAME('connname')"
Specifies that the specific client channel specified by chlname is used to
connect to the queue manager at connname.
connname specifies the location of the queue manager in the following
format host(portnumber)
If -c is omitted, the command connects to the queue manager by using server
bindings. If that connection fails, client bindings are used.
-x filter
Specifies that the procedure is filtered.
filter can be one of the following values:
object
authority records
channel authentication
subscriptions
all
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v If any object is not at the default value, the -a option must be used if the
dumped configuration is used to restore the configuration.
v The dmpmqcfg command dumps only subscriptions of type
MQSUBTYPE_ADMIN, that is, only subscriptions that are created by using the
MQSC command DEFINE SUB or its PCF equivalent. The output from dmpmqcfg is
a runmqsc command to enable the administration subscription to be re-created.
Subscriptions that are created by applications by using the MQSUB MQI call of
type MQSUBTYPE_API are not part of the queue manager configuration, even if
durable, and so are not dumped by dmpmqcfg.
v The user must have MQZAO_OUTPUT (+put) authority to access the command
input queue (SYSTEM.ADMIN.COMMAND.QUEUE) and MQZAO_DISPLAY
(+dsp) authority to access the default model queue
(SYSTEM.DEFAULT.MODEL.QUEUE), to be able to create a temporary dynamic
queue if the default reply queue is used. The user must also have
MQZAO_CONNECT (+connect) and MQZAO_INQUIRE (+inq) authority for the
queue manager, and MQZAO_DISPLAY (+dsp) authority for every object that is
requested.
v For more information about this command in IBM MQ, see dmpmqcfg in the
IBM MQ documentation.
Examples
v The following command dumps the queue manager configuration for a queue
manager QM1:
dmpmqcfg -m QM1
dspmq:
Purpose
You can use the dspmq command to display the names and details of the queue
managers on the IBM MQ Appliance.
-s
►► dspmq ►◄
-m QMgrName -o all -n -a
-o ha
-o dr
-o fs
▼
-o default
-o status
Parameters
-a Specifies that information about only the active queue managers is displayed.
A queue manager is active one or more of the following statements are true:
v The queue manager is running
v A listener for the queue manager is running
v A process is connected to the queue manager
-m QMgrName
Specifies which queue manager to display the details for.
If no queue manager name is specified, all queue managers are displayed.
-n Specifies that the translation of output strings is suppressed.
-s
Specifies that the operational status of the queue managers is displayed.
This parameter is the default status setting. It is equivalent to -o status.
-o all
Specifies that the operational status of the queue managers is displayed.
-o default
Specifies that the default queue manager status is displayed.
-o ha
Specifies that the HA type is displayed.
-o dr
Specifies that disaster recovery information is displayed. Displays the port that
the data replication listener on both appliances uses and the IP address used
by the remote appliance.
-o fs
Specifies that information about the queue manager file system is displayed.
For a queue manager that uses SAN storage, it gives the volume label of the
associated device.
-o status
Specifies that the operational status of the queue managers is displayed.
Examples
v The following command displays queue managers on the appliance:
dspmq -o all
endmqm:
Purpose
You can use the endmqm command to stop a queue manager. This command stops a
queue manager in one of three modes:
v Controlled or quiesced shutdown
v Immediate shutdown
v Preemptive shutdown
Syntax
-c
►► endmqm QMgrName ►◄
-w
-i
-p
-r
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v This command does not affect the attributes of the queue manager.
v The endmqm command affects any client application that is connected to the
queue manager by a server-connection channel. The effect is equivalent to a
STOP CHANNEL command in one of the following modes:
– If the -c, or -w parameters are used, the mode is QUIESCE.
– If the -i parameter is used, the mode is FORCE.
– If the -p parameter is used, the mode is TERMINATE.
Examples
v The following command ends the queue manager that is named QM1 in a
controlled way:
endmqm QM1
v The following command ends the queue manager that is named QM2
immediately:
endmqm -i QM2
Related commands
v crtmqm (Create queue manager)
v strmqm (Start queue manager)
v dltmqm (Delete queue manager)
runmqsc:
Purpose
You can use the runmqsc command to start the runmqsc prompt for a queue
manager. From the runmqsc prompt you can directly enter MQSC commands to
perform administration tasks. For example, you can define, alter, or delete a local
queue.
Syntax
►► runmqsc ►
-e -v -u UserID
► ►◄
-w WaitTime QMgrName
-x -m LocalQMgrName
Parameters
-e Specifies that the source text of the MQSC commands is not copied into a
report.
This parameter is useful when you enter commands interactively.
-v Specifies that the commands entered are to be verified without performing the
action.
You cannot use this parameter with a remote queue manager. That is, the -w
and -x parameters are ignored if specified at the same time as -v.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v To stop the runmqsc command, use the end command. You can also use the exit
or the quit command.
v For a full list of MQSC commands and their syntax, see The MQSC commands
in the IBM MQ documentation.
v The runmqsc command takes its input from stdin. You can enter MQSC
commands interactively by taking stdin from the keyboard. Alternatively, you
can enter MQSC commands in a file, and run a sequence of frequently used
commands by redirecting the input from the file.
v When the commands are processed, the results and a summary are put into a
report that is sent to stdout. Therefore, you can redirect the output report to a
file.
Examples
v The following command starts the runmqsc prompt for the default queue
manager:
From the runmqsc prompt you can directly enter MQSC commands.
rmvmqinf:
Purpose
You can use the rmvmqinf command to remove a queue manager that uses SAN
storage
Syntax
►► rmvmqinf QMname ►◄
Parameters
QMName
Specifies the name of the queue manager that you want to remove.
This parameter is required.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Use this command to remove a queue manager that uses SAN storage. Do not
use it to remove a queue manager that uses local SAN storage.
Examples
v The following command removes the queue manager QM1.
rmvmqinf QM1
Related commands
v “addmqm” on page 524
setmqsize:
Purpose
Parameters
-m QMName
Specifies the name of the queue manager that you want to expand the file
system for.
This parameter is required.
-s size
Specifies the new size of the file system. Specify a positive integer with an
optional M or G suffix to indicate megabytes or gigabytes. The value is taken
as gigabytes if you do not specify otherwise.
This parameter is required.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v This command cannot be run on a queue manager that uses SAN storage.
v This command cannot be run on a queue manager that belongs to a high
availability (HA) or disaster recovery (DR) configuration. If you require to
expand the file system of an HA or DR queue manager, you must remove it
from the HA or DR configuration, expand the file system size, then re-add it to
the HA or DR configuration.
v The queue manager must be stopped before the command is run.
v The new size of the file system must be greater than or equal to the current file
system size.
v Resizing file space for a queue manager does involve some I/O, and might
degrade the performance of other queue managers while the resize is in
progress.
Examples
v The following command expands the file storage for the queue manager QM1 to
128 GB.
setmqsize -m QM1 -s 128G
Related commands
v crtmqm (Create queue manager)
strmqm:
Purpose
You can use the strmqm command to start a queue manager in the primary role in
a disaster recovery configuration. If you use the command to try to start a queue
manager in the secondary role, you receive an error message.
Syntax
►► strmqm ►
-c -f -d Information
-e CMDLEVEL= Level
► ►◄
-ns QMgrName
Required parameters
None.
Optional parameters
-c For an HA queue manager, this option only has an effect if it is used with the
-ns option.
Specifies that the queue manager default and system objects are to be reset.
Any non-default values for the queue manager default and system objects are
replaced with the default values.
The queue manager is stopped after the default and system objects are reset.
After you have reset the default and system objects for the queue manager,
you must use the strmqm command again to start the queue manager.
If you run mq strmqm -c on a queue manager that is being used as a IBM MQ
Managed File Transfer coordination queue manager, you must rerun the MQSC
script that defines the coordination queue manager objects. This script is in a
file called queue_manager_name.mqsc, which is in the IBM MQ Managed File
Transfer configuration directory.
-d Information
For an HA queue manager, this option only has an effect if it is used with the
-ns option.
Specifies whether information messages are displayed.
You can specify one of the following values for Information:
all All information messages are displayed.
minimal
The minimal number of information messages are displayed
none No information messages are displayed.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The strmqm command is not required to start a newly-created queue manager.
An HA queue manager is started automatically on creation.
v The strmqm command is required to restart a stopped HA queue manager. In this
case, the queue manager is started on the appliance that is the preferred location
for the queue manager, regardless of which appliance the command is issued on.
If the HA preferred location is not set, the queue manager starts on the same
appliance that it stopped on.
Examples
v The following command starts the queue manager QM1:
strmqm QM1
Related commands
v crtmqm (Create queue manager)
v endmqm (Start queue manager)
v dltmqm (Delete queue manager)
status:
Reports disk usage, CPU usage, and memory usage across the appliance or for a
specific queue manager. Also reports additional information for a queue manager
running in a high availability configuration, or a disaster recovery configuration.
Purpose
You can use the status command to get information about the disk usage, CPU
usage, and memory usage for the appliance or for a specific queue manager.
This command must be run from the IBM MQ administration mode. If the system
is in the IBM MQ administration mode the prompt includes mqcli#. To enter the
IBM MQ administration mode, enter mqcli on the command line. To exit the IBM
MQ administration mode, enter exit on the command line.
Syntax
►► status ►◄
QMgrName
Parameters
QMgrName
Specifies the name of the queue manager for which the status summary is
returned.
If this parameter is omitted, a summary of all disk and memory usage on the
appliance is returned.
You can use the IBM MQback up and restore commands to back up queue
managers, together with their log files and data.
The commands can be run from the command line interface in MQ command
mode. To enter MQ command mode, type mqcli.
Purpose
The createbackupfs command allocates space for queue manager back ups on the
Appliance RAID volume. The storage is visible in the directory mqbackup:///QMgrs.
Syntax
►► createbackupfs -s size ►◄
Parameters
-s size
Specifies the size of the back up allocation in GB. You can specify a value in
MB by entering the value followed by the character M. For example, to specify
a size of 3 GB, enter 3. To specify a size of 1024 MB, enter 1024M.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v You must run this command before you back up any queue managers.
Examples
v The following command allocates 4 GB of storage in the mqbackup:///QMgrs
directory.
createbackupfs -s 4
Related commands
v “deletebackupfs: clear previously allocated back up space” on page 547
v “mqbackup: back up queue manager” on page 547
Free the space that was previously allocated for back up archive files on the
appliance.
Purpose
The deletebackupfs command clears the storage on the appliance RAID volume
previously allocated for back ups.
Syntax
►► deletebackupfs ►◄
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The directory mqbackup:///QMgrs must be empty. If it contains any files, the
command will fail. You can use the delete command to delete files, see “delete”
on page 666.
Related commands
v “createbackupfs:create appliance storage location for back up” on page 546
v “mqbackup: back up queue manager”
v “mqrestore: restore queue manager from back up” on page 548
Purpose
You can use the mqbackup command to back up a queue manager, including all its
log files and data. The command creates an archive and writes it to a location in
the appliance file store. You must run the createbackupfs command to assign
space for them, before you run the mqbackup command.
You can use the mqbackup when a queue manager is stopped, or when it is
running. If you are backing up so that you can use an archive file to migrate the
queue manager, or if you want to be able to restore a queue manager to the state it
was in at a particular time, then you should stop the queue manager before you
back it up. Taking a back up of a running queue manager requires more free disk
space than backing up a stopped queue manager, see “Usage notes” on page 548.
If the queue manager is running when you issue the mqbackup command, a
warning message is displayed.
►► mqbackup -m QMgrName ►◄
-o outfile
Parameters
-m QMgrName
Specifies the name of the queue manager that you want to back up.
This parameter is required.
-o outfile
Optionally specifies the name of the back up file. If no name is specified, the
filename QMgrName.bak is used. If the file already exists, no back up is made
and an error is reported.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v You can back up a queue manager while it is running, but this requires sufficient
unallocated space on the disk to contain a temporary snapshot of the queue
manager. This space is not required if the queue manager is stopped before the
back up is taken.
v If a queue manager is stopped before taking a back up, it is locked for the
duration of the back up and cannot be started, deleted or otherwise changed
while the back up is running.
v The back up can take some time to run, during which period your CLI session
will be suspended. Interrupting the CLI session will terminate the backup
process.
v You can run the back up command on the primary instance of a queue manager
on the main appliance in a disaster recovery configuration, or on the secondary
instance on the recovery appliance. However, if synchronization is in progress
when you try to back up a secondary instance, or if the data has become
inconsistent on the secondary instance, the back up will fail.
Examples
v The following command backs up the queue manager QM1 to the file
safeandsound.bak.
mqbackup -m QM1 -o safeandsound.bak
Related commands
v “createbackupfs:create appliance storage location for back up” on page 546
v “deletebackupfs: clear previously allocated back up space” on page 547
v “mqrestore: restore queue manager from back up”
You can use the mqrestore command to restore a queue manager, including all its
log files and data, from a previously taken back up. The command cannot run if
there is already a queue manager with the same name on the appliance. The
archive file must be located in the backupfs location on the appliance that was
specified by the createbackupfs command.
Syntax
►► mqrestore -f filename ►◄
Parameters
-f filename
Specifies the name of the queue manager that you want to restore.
This parameter is required.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v After restoration, the queue manager has the same name, configuration, and
data as the original queue manager had when the archive was created. But any
high availability or disaster recovery configuration is lost, the queue manager is
restored as a stand-alone queue manager.
v Only one queue manager can be restored at a time.
Examples
v The following command restores the queue manager QM1 from the file
safeandsound.bak.
mqrestore -f safeandsound.bak
Related commands
v “createbackupfs:create appliance storage location for back up” on page 546
v “deletebackupfs: clear previously allocated back up space” on page 547
v “mqbackup: back up queue manager” on page 547
Purpose
You can use the crthagrp command to create an HA group of two appliances. The
prepareha command must be run on the other appliance before you run crthagrp.
Parameters
-a IPAddress
Specifies the IP address of the HA group primary interface on other
appliance in the group. You must specify the IP address using ip v4 dotted
decimal notation (for example, “192.0.2.8”).
The IP address specified must be that of the appliance that the command is
not run on.
-s SecretText
This argument is used when generating a unique key to be used by the
appliances to communicate with one another. Specifies a string that is used
to generate a short-lived password. The password is used to set up the
unique key for the two appliances. The command prepareha must be run
first on the other appliance in the HA group, specifying the same -s
SecretText argument.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The appliances must be connected to each other with cables inserted in the
correct ports. For more information about configuring the appliance hardware
for HA, see Configuring the hardware for high availability.
Examples
v The following example shows the creation of an HA group for appliances appl1
and appl2 where a new, unique key is generated for communication between the
appliances. The HA group primary interface of appl2 has the IP address
192.0.2.8, the HA group primary interface of appl1 has the IP address
192.0.2.7.
The following command is run from appl1:
prepareha -s AGEW1823510HH -a 192.0.2.8
The following command is run from appl2:
crthagrp -s AGEW1823510HH -a 192.0.2.7
crthakeys:
Regenerate SSH public and private keys and exchange public keys between
appliances in an HA pair.
Purpose
Good security practise requires that the secret keys used to secure communications
between appliances in an HA pair are periodically regenerated and exchanged. Use
Syntax
►► crthakeys ►◄
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v You can run the crthakeys command at any time on either appliance in the HA
pair, provided that no other HA command is running. The command does not
have any operational or performance impact.
dsphagrp:
Displays the status of the appliances in the high availability (HA) group.
Purpose
You can use the dsphagrp command to display the status of each appliance in an
HA group. The status returned can be Online, Offline, or Standby. The status is
Online when the appliance is operating normally, Offline when some fault has
occurred, or Standby when the appliance has been suspended by using the
sethagrp -s command.
Syntax
►► dsphagrp ►◄
Parameters
None.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following command displays information about the high availability group:
dsphagrp
Display information about the SSH keys used for secure communication between
an HA pair.
Purpose
Good security practise requires that the secret keys used to secure communications
between appliances in an HA pair are periodically regenerated and exchanged. Use
the dsphakeys command to see when the keys used by the HA configuration were
last generated.
Syntax
►► dsphakeys ►◄
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v If you run dsphakeys on an appliance on which HA was configured before the
upgrade to Version 9.0.2, an error occurs. To correct the error, regenerate the
keys by using the crthakeys command.
v You can run the dsphakeys command at any time on either appliance in the HA
pair. The command does not have any operational or performance impact.
v The command displays the date and time that the keys were last generated in
UTC time (UTC+00:00).
dlthagrp:
Purpose
Syntax
►► dlthagrp ►◄
Parameters
None.
Examples
v The following command deletes the HA group that the appliance belongs to:
dlthagrp
makehaprimary:
Purpose
Syntax
►► makehaprimary QMname ►◄
Parameters
QMname
Specifies the name of the queue manager for which the partitioned
situation occurred.
The command is run only on the appliance to be identified as the winner.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following example shows the command being run for queue manager QM1.
The following command is run from the appliance considered to be the winner:
makehaprimary QM1
Purpose
Syntax
Parameters
-a IPAddress
Specifies the IP address of the HA group primary interface on other
appliance in the group. You must specify the IP address using ip v4 dotted
decimal notation (for example, “192.0.2.8”).
The command is run on only one appliance. The IP address specified must
be that of the appliance that the command is not run on.
-s SecretText
Specifies a string that is used to generate a short-lived password. The
password is used to set up the unique key for the two appliances. After
prepareha is run, crthagrp must be run first on the other appliance in the
HA group, specifying the same -s SecretText argument.
-t timeout
Specifies the time period in seconds that you have to run the crthagrp
command on the other appliance in the group. It defaults to 600 (that is,
ten minutes).
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The appliances must be connected to each other with cables inserted in the
correct ports. For more information about configuring the appliance hardware
for HA, see “Configuring the hardware for high availability” on page 167.
Examples
v The following example shows the creation of an HA group for appliances appl1
and appl2 where a new, unique key is generated for communication between the
appliances. The HA group primary interface of appl2 has the IP address
192.0.2.8, the HA group primary interface of appl1 has the IP address
192.0.2.7.
The following command is run from appl1:
sethagrp:
Purpose
You use the sethagrp command to pause the high availability (HA) group on an
appliance. Any queue managers running on that appliance fail over to the other
appliance in the group. You can then use sethagrp to resume a previously paused
HA group on the appliance.
You can also use the sethagrp command to add a standalone queue manager to an
HA group, or to remove a queue manager from an HA group and run it as a
stand-alone queue manager.
Syntax
►► sethagrp -s ►◄
-r
-i QMname
-e QMname
Parameters
-s Suspend the HA group on the appliance into standby mode.
-r Resume the HA group on the appliance from standby mode.
-i QMname
Add an existing queue manager to the HA group. The queue manager
must not already be under HA control and must be currently stopped. The
queue manager is started automatically after the command is completed.
You cannot use this command on a queue manager that is already part of a
DR configuration.
-e QMname
Remove a queue manager from the HA group. The queue manager must
be under HA control and be currently stopped. You must run the
command on the appliance that the queue manager was running on when
it was stopped. You can discover where the queue manager is running
before you stop it by using the dspmq command or the status qmanager
command. Either command will report the status as Running for the
current appliance, or Running elsewhere for the other appliance in the HA
group.
Chapter 11. Reference 555
You cannot use this option if the queue manager is also part of a DR
configuration.
Use the strmqm command to restart the queue manager after the command
is completed.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
sethaint:
Specify a floating IP address for a high availability (HA) queue manager, or delete
an existing floating IP address.
Purpose
You use the sethaint command to specify a floating IP address that can be used
by applications to connect to an HA queue manager, regardless of which appliance
in an HA group it is actually running on. You also use sethaint to delete an
existing floating IP address.
Syntax
Parameters
-m QueueManager
Identifies the HA queue manager that you are creating or deleting the
floating IP address for.
-a Specifies that you are adding the address specified by the -f and -l options.
-d Specifies that you are deleting the floating IP address for the specified
queue manager.
-f floatingIP
Specifies the floating IP address. You must specify the IP address using ip
v4 dotted decimal notation (for example, “192.0.2.8”).
-l LocalInterface
Specifies the name of the local interface that is used to connect to the
queue manager on the two appliances in the HA group. For example,
eth22.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Example
The following example shows the floating IP address 192.0.2.15 being allocated for
queue manager QM1 and associated with the local interface eth22:
sethaint -m QM1 -a -f 192.0.2.15 - l eth22
sethapreferred:
Sets a preferred appliance in the high availability (HA) group for a queue manager
to run on.
Purpose
By default, the preferred appliance for a queue manager is the appliance that the
queue manager was created on. You can use the sethapreferred command in
circumstances such as replacing a failed node, or specifying the favored appliance
when an existing queue manager is added to an HA group. The sethapreferred is
used in conjunction with the clearhapreferred command.
You run the command on the appliance that you want to be the preferred
appliance, specifying the queue manager name. If the queue manager is currently
running on the other appliance, it will fail over to this appliance, provided that is
possible (for example, data replication between the two appliances must be up to
date).
Syntax
►► sethapreferred QMname ►◄
Parameters
QMname
Specify the queue manager that you are setting the preferred appliance for.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Clears the preferred appliance for a queue manager in a high availability (HA)
group.
Purpose
You use the clearhapreferred command to clear the preferred appliance setting for
a queue manager.
By default, the preferred appliance for a queue manager is the appliance that the
queue manager was created on. You can use the clearhapreferred command to
specify that the queue manager has no preferred appliance. You can also use the
command when replacing a failed node. The clearhapreferred is used in
conjunction with the sethapreferred command.
Syntax
►► clearhapreferred QMname ►◄
Parameters
QMname
Specify the queue manager that you are clearing the preferred appliance
for. The queue manager must be part of an HA group.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Purpose
Parameters
-m QMName
Specifies the queue manager that you are preparing for participation in a
disaster recovery configuration. The queue manager must be stopped when
you run the command, unless it is a high availability queue manager (in
which case you must leave it to the underlying HA system to handle the
stopping of the queue manager).
-r RecoveryName
Specifies the name of the IBM MQ Appliance that is the recovery
appliance.
-i RecoveryIP
Specifies the IP address of the recovery appliance.
-p port
Specifies the port that the data replication listener on each appliance uses.
The port number must be between 1025 and 9999, and must be the same
on each appliance (do not use port 2222, it is reserved by the appliance).
Each listener is active only on the replication interface (eth20), but you
must ensure that the listener does not conflict with any services configured
to listen on all appliance interfaces (for example, MQ listeners, or SSH and
WebUI services, where these have not been restricted to particular local IP
addresses). The data replication listener must also not be blocked by any
routing or firewalls between the appliances on the replication network.
-f floatingIP
This parameter is required if you are configuring disaster recovery for a
high availability pair. The queue manager specified by -m QMName must
already belong to an HA pair if you use the -f option. The floating IP
address is an IPv4 address that is used to replicate queue manager data
from whichever HA appliance the queue manager is currently running on
to the queue manager on the recovery appliance. The floating IP address
must be in the same subnet group as the static IP address assigned to the
replication port (eth20) on both appliances.
You do not have to physically configure an Ethernet port with this address.
Select a free IP address in the same subnet as the replication ports on the
two appliances.
Used with this option, the crtdrprimary command configures the queue
manager on both appliances in the HA pair, and reserves storage for the
data snapshot on both appliances.
Usage Notes
v The queue manager must be stopped before you run crtdrprimary. You can use
the endmqm command to stop the queue manager.
v On successful completion, the command outputs the crtdrsecondary command
that you must run on the recovery appliance to configure the queue manager on
there.
Examples
The following example shows the existing queue manager QM1 being prepared for
running on a disaster recovery configuration, with the appliance that you run the
command on as the live system, and the appliance named mydrapp1 as the
recovery.
crtdrprimary –m QM1 –r mydrappl –i 198.51.100.0 –p 2015
The following example shows the high availability queue manager QM3 being
prepared for running on a disaster recovery configuration, with the appliance that
you run the command on as the live system, and the appliance named myliveapp3
as the recovery. In this example the eth20 port on the HA appliance currently
running QM3 has the static IP address 198.51.100.20 (which is not used in the
command) and the floating IP address 198.51.100.10. The DR appliance has the IP
address 198.51.100.124.
crtdrprimary –m QM3 –r mydrapp3 –i 198.51.100.124 –p 2015 -f 198.51.100.10
crtdrsecondary:
Purpose
All parameters are supplied by the equivalent crtdrprimary command and should
be entered exactly as shown in the output from that command.
After this command is run, synchronization of data from the main to the recovery
appliance begins. The queue manager status is shown as stopped, and initial
synchronization progress can be followed by using the status command.
makedrprimary:
Switches a disaster recovery queue manager to have the primary role in the
disaster recovery configuration.
You should always check the disaster recovery status of a queue manager before
you issue the makedrprimary command on that queue manager.
If you run makedrprimary when the queue manager is in the partitioned state (that
is, each appliance has a different version of the queue manager data) the version of
the queue manager and associated data on this appliance are identified as the
definitive version.
If you run makedrprimary on the recovery appliance when the secondary queue
manager is inconsistent (that is, replication has not completed successfully and the
queue manager would be unable to start), then the command reverts the queue
manager to the data snapshot taken before the queue manager became
inconsistent. The command then makes the queue manager the primary version in
the disaster recovery configuration.
If you run makedrprimary on the recovery appliance when the secondary queue
manager is inconsistent (that is, replication has not completed successfully and the
queue manager would be unable to start), then the command starts the process of
reverting the queue manager to the data snapshot taken before the queue manager
became inconsistent. You can monitor the progress of the reversion by using the
status command, see “status” on page 751. If the reversion is interrupted for any
reason, it will resume and complete. After it has reverted to the snapshot, the
queue manager becomes the primary version in the disaster recovery
configuration.
Syntax
►► makedrprimary -m QMName ►◄
Parameters
-m QMName
Specifies the queue manager that you are identifying as the primary queue
manager in a disaster recovery configuration.
makedrsecondary:
Syntax
►► makedrsecondary -m QMName ►◄
Parameters
-m QMName
Specifies the queue manager that you are identifying as the secondary
queue manager in a disaster recovery configuration.
dltdrprimary:
Purpose
You use the dltdrprimary command to remove a queue manager from the disaster
recovery configuration on the appliance. The queue manager is in the primary role.
The queue manager must have the stopped status on the appliance. You receive an
error if you run the command on a queue manager that is running, or a queue
manager that is in the secondary role.
After you run dltdrprimary, the queue manager is left as a stand-alone queue
manager and can be started or deleted as required.
Syntax
►► dltdrprimary -m QMName ►◄
dltdrsecondary:
Remove a queue manager currently in the secondary role from DR control and
delete it.
Purpose
You use the dltdrsecondary command to remove a queue manager from the
disaster recovery configuration on the appliance. The queue manager is in the
secondary role. The queue manager must have the stopped status on the appliance.
You receive an error if you run the command on a queue manager that is running,
or a queue manager that is in the primary role.
After you run dltdrsecondary, the queue manager is completely removed from the
appliance.
Syntax
►► dltdrsecondary -m QMName ►◄
Parameters
-m QMName
Specifies the queue manager that you are removing from the disaster
recovery configuration.
Troubleshooting commands
dltmqras:
Purpose
You can use the dltmqras command to periodically purge IBM MQ log files.
For each file deleted, a message in the form File deleted: filename is
written to MQSystem.log. You can view MQSystem.log by using the dspmqerr
command without parameters.
►► dltmqras ►◄
-a -y
-d
-e
-f
-h
-m QMgrName
-p
-t
-w
Parameters
-a Specifies that all files of all types apart from queue manager logs are deleted.
-d Specifies that general diagnostics files are deleted.
-e Specifies that older error logs are deleted. The current error log (MQSystem.log)
is not deleted.
-f Specifies that FDC files are deleted.
-h Specifies that HA files are deleted.
-m QMgrName
Specifies that service tool output for the specified queue manager are deleted.
-p Specifies that the files in the mqtemporary: location are deleted.
-t Specifies that trace files are deleted.
-w Specifies that console log files are deleted.
-y Specifies that the specified files are deleted without asking for confirmation.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following command purges all types of log files without asking you for
confirmation:
dltmqras -a -y
v The following command purges FDC files:
dltmqras -f
v The following command purges all the service tool output for queue manager
qm1:
dltmqras -m qm1
dspmqerr:
You can use the dspmqerr command to view or list the IBM MQ error log files.
You can view a list of the files available, then repeat the command specifying a file
name to view a specific file. If you specify neither the list argument nor a file
name, you can view the default file of the specified type.
The command is based on the UNIX less command. The less command provides
controls for navigating the contents of a file, and you can use these controls when
viewing system error logs.
Syntax
-s
►► dspmqerr ►◄
-f -l
-m QMgrName Filename
-w
Parameters
-f Specifies that the file type to return is FDC.
-s Specifies that the file type to return is system-wide error log.
-m QMgrName
Specifies that the file type to return is the log or logs for the specified queue
manager
-w Specifies that the file type to return is an IBM MQ Console log.
-l Lists the files available.
filename
Specifies the particular file to view.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following commands all display the system error log:
dspmqerr
dspmqerr -s
dspmqerr MQSystem.log
v The following command lists all the error logs on the appliance (but not FDC
files):
dspmqerr -l
v The following command lists all the FDC files:
dspmqerr -f -l
v The following command lists all the IBM MQ Console files:
dspmqrte:
Determine the route that a message has taken through a queue manager network.
Purpose
You can use the dspmqrte to generate a trace-route message and put it into a queue
manager network. As the trace-route message travels through the queue manager
network, activity information is recorded. When the trace-route message reaches its
target queue, the activity information is collected and displayed.
Generation options
►► dspmqrte ►
-c -i CorrelId Display options
► -q TargetQName ►◄
-m QMgrName
Generation options:
►
-ac -d Deliver -f Forward
-ar
► ►
-l Persistence -o -p Priority
► ►
-qm TargetQMgrName ,
-ro ▼ ReportOption
► ►
-rq ReplyToQ -s Activities
-rqm ReplyToQMgr
► ►
-t Detail -ts TopicString -u UserID
Display options
►
-xp PassExpiry -xs Expiry -n
Display options:
-v summary
►
-b -v all
none
outline
,
▼ DisplayOption
►
-w WaitTime
The following parameters are used when the command is used to put a trace-route
message into a queue manager network. That is, the parameters are the generation
options:
-ac
Specifies that activity information is to be accumulated within the trace-route
message.
If you do not specify this parameter, activity information is not accumulated
within the trace-route message.
-ar
Specifies that a trace-route reply message containing all accumulated activity
information is generated in the following circumstances:
v The trace-route message is discarded by a queue manager.
v The trace-route message is put to a local queue (target queue or dead-letter
queue) by a queue manager.
v The number of activities performed on the trace-route message exceeds the
value of specified in -s Activities.
If you do not specify this parameter, a trace-route reply message is not
requested.
-d Deliver
Specifies whether the trace-route message is to be delivered to the target queue
on arrival.
Deliver can be one of the following values:
The following parameters are used when the command is used to display collected
activity information. That is, the parameters are the display options:
-b Specifies that the command only browses activity reports or a trace-route reply
message related to a message.
This parameter allows activity information to be displayed again at a later
time.
If you do not specify this parameter, the command gets activity reports or a
trace-route reply message related to a message, and deletes them.
-v summary | all | none | outline DisplayOption
The values can be the following values:
summary
The queues that the trace-route message was routed through are
displayed.
all All available information is displayed.
none No information is displayed.
outline DisplayOption
Specifies display options for the trace-route message.
DisplayOption can be one or more of the following values, using a
comma as a separator:
activity
All non-PCF group parameters in Activity PCF groups are
displayed.
identifiers
Values with parameter identifiers MQBACF_MSG_ID or
MQBACF_CORREL_ID are displayed.
This value overrides msgdelta.
message
All non-PCF group parameters in Message PCF groups are
displayed.
When this value is specified, you cannot specify msgdelta.
msgdelta
All non-PCF group parameters in Message PCF groups, that
have changed since the last operation, are displayed.
When this value is specified, you cannot specify message.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v For more information about this command in IBM MQ, see dspmqrte in the IBM
MQ documentation.
Examples
v The following command puts a trace-route message into a queue manager
network with the target queue specified as TARGET.Q. Providing queue managers
on route are enabled for activity recording, activity reports are generated.
Depending on the queue manager attribute, ACTIVREC, activity reports are
either delivered to the reply-to queue ACT.REPORT.REPLY.Q, or are delivered to a
system queue. The trace-route message is discarded on arrival at the target
queue.
dspmqrte -q TARGET.Q -rq ACT.REPORT.REPLY.Q
Providing one or more activity reports are delivered to the reply-to queue,
ACT.REPORT.REPLY.Q, the command orders and displays the activity information.
v The following command puts a trace-route message into a queue manager
network with the target queue specified as TARGET.Q. Activity information is
accumulated within the trace-route message, but activity reports are not
generated. On arrival at the target queue, the trace-route message is discarded.
Depending on the value of the target queue manager attribute, ROUTEREC, a
trace-route reply message can be generated and delivered to either the reply-to
queue, TRR.REPLY.TO.Q, or to a system queue.
dspmqrte -ac -ar -ro discard -rq TRR.REPLY.TO.Q -q TARGET.Q
endmqtrc:
End trace for some or all of the entities that are being traced.
You can use the endmqtrc command to end tracing for a specified entity, or for all
entities.
Syntax
►► endmqtrc ►
-m QMgrName -i PidTids -p Apps
► ►◄
-e -a -w
Parameters
-m QMgrName
Specifies the name of the queue manager for which to end tracing.
The QMgrName supplied must match exactly the QMgrName supplied on the
strmqtrc command. If the strmqtrc command used wildcard characters, the
endmqtrc command must use the same wildcard characters.
A maximum of one -m flag can be supplied on the command.
-i PidTids
Specifies the process identifier (PID) and thread identifier (TID) for which to
end tracing.
You cannot use the -i flag with the -e flag.
This parameter must be used only under the guidance of IBM Service
personnel.
-p Apps
Specifies the processes for which to end tracing.
Specify Apps as a comma-separated list, with each name in the list specified
exactly as the program name would be displayed in the "Program Name" FDC
header. You can use an asterisk (*) as a wildcard to match zero or more
characters. You can use a question mark (?) to match a single character.
You cannot use the -p flag with the -e flag.
-e Specifies that early tracing of all processes ends.
You cannot use the -e flag with the -m flag, the -i flag, or the -p flag.
-a Ends all tracing.
This flag must be specified alone.
-w Restrict triggering of trace to applications run by an IBM MQ Appliance
administrator.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
Examples
v The following command ends tracing of data for a queue manager called QM1:
endmqtrc -m QM1
v The following command ends tracing for queue manager QM2 only. Any other
traces that are running are not affected:
endmqtrc -m QM2
Related commands
v “strmqtrc” on page 492
mqrc:
Purpose
You can use the mqrc command to display information about symbols, return
codes, and AMQ messages. You can specify a range of return codes or AMQ
messages, or you can specify specific return codes or AMQ messages.
Syntax
►► mqrc returnCode ►◄
-a -b -r returnCode
AMQmessage
-m AMQmessage
-R
-f first -l last
-M -f first -l last
symbol
-s
Parameters
returnCode
Specifies the return code to display.
AMQmessage
Specifies the AMQ message to display.
symbol
Specifies the symbol to display.
-a Specifies that all severities are tried to find message text.
-b Specifies that messages are displayed without extended information.
-m AMQmessage
Specifies the AMQ message to display.
-M -f first -l last
Specifies that AMQ messages in a range are displayed from the first value to
the last value.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Numeric arguments are interpreted as decimal if they start with a digit 1 - 9, or
hex if prefixed with 0x.
v If there is a problem with a message within a range, an indication is displayed
before the message text. ? is displayed if there are no matching return codes for
the message. ! is displayed if the message severity is not the same as the return
code severity.
v For more information about this command in IBM MQ, see mqrc in the IBM MQ
documentation.
Examples
v This command displays AMQ message 5005:
mqrc AMQ5005
v This command displays return codes in the range 2505 - 2530:
mqrc -R -f 2505 -l 2530
runmqras:
Purpose
You can use the runmqras command to gather diagnostic information from the
appliance into a single archive. You can use this command to gather information
about an application or appliance failure, possibly for submission into IBM when
you report a problem.
By default, the command gathers information such as the FDC files, error logs,
product version, and status information. The command does not gather user
information that is contained in messages on queues when you use the default
setting. However, if you request sections other than default, the data collected
might contain user information.
The zip file written to the appliance URI mqdiag://, You can retrieve it by using
the copy command (see “copy” on page 664), or by using the IBM MQ Appliance
web UI (see “Managing files by using the IBM MQ Appliance web UI” on page
297
576 IBM MQ Appliance
297). You can also use the ftp custom option of the runmqras command to copy the
trace directly to an FTP server.
Syntax
►► runmqras ►◄
section Sections
qmlist QMGRs
timeout secs
demo
v
ftp IBM
ftp custom
ftpserver server
ftpusername userid
ftppassword password
ftpdirectory path
pmrno pmr_number
Parameters
section Sections
Specifies the optional sections about which to gather more specific information.
By default, a generic section of documentation is collected. Running without
requesting more sections is intended as a starting point for general problem
diagnosis, but more specific information can be gathered for a specific problem
type. You can specify multiple values for Sections in a comma-separated list.
IBM support generally supplies you with the sections to use. Example values
for Sections are the following values:
all Gathers all possible information, including all trace files, and
diagnostics for many different types of problems.
This option results in the generation of a very large file, so you must
check that the mqdiag:// directory does not currently contain trace
information. If mqdiag:// does already contain information, you should
copy the files off of the appliance, or send them to IBM support, before
running runmqras with the all section.
cluster
Gather information specific for clustering
defs Gather the queue manager definitions and status
nodefault
Prevents the default collections from occurring, but other explicitly
requested sections are still collected.
trace Gather all the trace file information plus the default information.
This option results in the generation of a very large file, so you must
check that the mqdiag:// directory does not currently contain trace
information. If mqdiag:// does already contain information, you should
copy the files off of the appliance, or send them to IBM support, before
running runmqras with the trace section.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v For more information about this command in IBM MQ, see runmqras in the IBM
MQ documentation.
strmqtrc:
Start trace at a specified level of detail, or report the level of tracing in effect.
Purpose
You can use the strmqtrc command to enable tracing. You can specify the tracing
that you want:
v You can trace one or more queue managers.
v You can trace one or more processes. The processes can be either part of the
product or customer applications that use the IBM MQ API.
v You can trace specific threads within customer applications, either by thread
number or by operating system thread number.
v You can trace events. These events can be either the entry or exit from internal
functions or the occurrence of a first failure data capture (FDC).
v You can choose from different levels of trace detail.
Trace files are written to the appliance URI mqtrace://, You can retrieve them by
using the copy command (see “copy” on page 664), or by using the IBM MQ
Appliance web UI (see “Managing files by using the IBM MQ Appliance web UI”
on page 297)
►► strmqtrc ►
-m QMgrName -e
► ▼ ►
-t TraceType -t TraceLevel -x TraceType
► ►
-l MaxSize -d 0 -i PidTids
-1
NumOfBytes
► ►
-p Apps -s -b StartTrigger -c StopTrigger
► -w ►◄
Parameters
-m QMgrName
Specifies the name of the queue manager to trace.
You can use an asterisk (*) as a wildcard to replace zero or more characters.
You can use a question mark (?) as a wildcard to replace any single character.
-e Specifies that any process that belongs to any component of any queue
manager traces its early processing.
You can use this flag to trace the creation or startup of a queue manager.
You cannot use the -e flag with the -m flag, -i flag, the -p flag, the -c flag, or
the -b flag.
The default is not to perform early tracing.
-t TraceType -t TraceLevel
Specifies the points to trace and the amount of trace detail to record.
To specify multiple points to trace, specify multiple -t TraceType -t
TraceLevel parameters in sequence.
Each TraceType can be one of the following values for the points to trace:
all Output data for every trace point in the system. This parameter
activates tracing at default detail level.
api Output data for trace points that are associated with the MQI and
major queue manager components.
Usage notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v Each combination of parameters on an individual invocation of the command
are interpreted as having a logical AND between them. You can start the
command multiple times, regardless of whether tracing is already enabled. If
tracing is already enabled, the trace options that are in effect are modified to
those options specified on the most recent invocation of the command.
v Multiple invocations of the command, without an intervening enqmqtrc
command, are interpreted as having a logical OR between them. The maximum
number of concurrent strmqtrc commands that can be in effect at one time is 16.
Examples
v The following command enables tracing of processing flow from common
services and the local queue manager for a queue manager called exampleQM.
Trace data is generated at the default level of detail.
strmqtrc -m exampleQM -t csflows -t lqmflows -t parms
v The following command disables tracing of SSL activity on a queue manager
called exampleQM. Other trace data is generated at the parms level of detail.
strmqtrc -m exampleQM -x ssl -t parms
v The following command enables high-detail tracing of the processing flow for all
components:
strmqtrc -t all -t detail
v The following command enables tracing when FDC KN34650 occurs, and stops
tracing when FDC KN346080 occurs. In both cases the FDC must occur on a
process that is using queue manager exampleQM:
strmqtrc -m exampleQM -b FDC=KN346050 -c FDC=KN346080
The next examples use the -p and -m flags to show how a combination of
parameters on an individual invocation of the command are interpreted as having
a logical AND between them. The examples also show how multiple invocations of
the command, without an intervening mq enqmqtrc command, are interpreted as
having a logical OR between them:
1. The following command enables tracing for all threads that result from any
executing process that is called amqxxx.exe:
strmqtrc -p amqxxx.exe
2.
v If you start the following command after the command in step 1, without an
intervening endmqtrc command, then tracing is limited to all threads that
result from any running process that is called amqxxx.exe and that are using
queue manager exampleQM2:
strmqtrc -p amqxxx.exe -m exampleQM2
v If you start the following command after the command in step 1, without an
intervening endmqtrc command, then tracing is limited to all processes and
threads that result from running amqxxx.exe or that are using queue manager
exampleQM2:
strmqtrc -m exampleQM2
Related commands
v “endmqtrc” on page 478
Appliance commands
Use the appliance commands to work with features of the appliance.
Appliance commands
Some of the appliance commands are available at initial log in, before you enter a
configuration mode. The other appliance commands are available in most
configuration modes.
Command Description
“clear Clears the detected intrusion when the appliance is in
intrusion-detected” on Fail-Safe mode.
page 587
“clock” on page 587 Sets the date or time.
“configure terminal” on Enters configuration mode.
page 588
“diagnostics” on page 588 Enters Diagnostics mode. Use this command only at the
explicit direction of IBM Support.
“disconnect” on page 588 Closes the session for an active user.
“echo” on page 589 Echoes text to the console.
“exec” on page 589 Calls and runs a configuration script.
“exit” on page 590 Applies configuration changes to the running configuration
and returns to the parent mode.
“help” on page 591 Displays online help.
“login” on page 591 Logs a specific account on to the appliance.
“ntp” on page 591 Identifies an NTP server.
“ping” on page 592 Determines whether the network can reach a remote target.
“show” on page 593 Displays configuration or status information
“shutdown” on page 593 Restarts or shuts down the appliance.
“test tcp-connection” on Tests the TCP connection to a remote target.
page 595
Command Description
“admin-state” on page 586 Sets the administrative state for the configuration.
“cancel” on page 586 Exits this configuration mode without saving changes to the
running configuration.
“disconnect” on page 588 Closes the session for an active user.
“echo” on page 589 Echoes text to the console
“exit” on page 590 Applies configuration changes to the running configuration
and returns to the parent mode.
“help” on page 591 Displays online help
“ping” on page 592 Determines whether the network can reach a remote target.
“reset” on page 593 Restores the default values to the configuration.
admin-state:
Syntax
Enable the configuration
admin-state enabled
Disable the configuration
admin-state disabled
Parameters
disabled
Sets the configuration to the inactive state.
enabled
Sets the configuration to the active state.
Guidelines
The admin-state command sets the administrative state for the configuration.
Administrative states are not equivalent to operational states.
v When the administrative state is enabled, the operational state can be up, down,
or pending.
v When the administrative state is disabled, the operational state is always down.
Example
cancel:
This command exits this configuration mode without saving changes to the
running configuration.
Syntax
cancel
Guidelines
The cancel command exits this configuration mode without saving changes to the
running configuration and returns to its parent mode.
This command clears the detected intrusion when the appliance is in Fail-Safe
mode.
Availability
All users, unless your environment enforces RBM on the command line. When
RBM enforcement applies to the command line, as defined by the RBM apply-cli
command, this command is available to only the admin account (dp-admin account
on XI50z).
Syntax
clear intrusion-detected
Guidelines
Example
clock:
Syntax
Set the date.
clock yyyy-mm-dd
Set the time.
clock hh:mm:ss
Parameters
yyyy-mm-dd
Specifies the date in four-digit year, two-digit month, and two-digit day
format. When you set the date, separate each value with a hyphen (-).
hh:mm:ss
Specifies the time in two-digit hour, two-digit minute, and two-digit
second format. When you set the time, separate each value with a colon (:).
Guidelines
The clock command sets the date or time for the appliance. This command is also
available in Global mode.
configure terminal:
Syntax
configure terminal
Guidelines
The configure terminal command enters Global mode. In this mode, you can
create system-wide resources for various system service, configure global
behaviors, and enter specialized configuration modes.
diagnostics:
This command enters Diagnostics mode. Use this command only at the explicit
direction of IBM Support.
Syntax
diagnostics
Guidelines
The diagnostics command enters Diagnostics mode. For details about the
available commands, see the online help.
Attention: Use this command only at the explicit direction of IBM Support.
disconnect:
Syntax
disconnect session
Parameters
session
Specifies the session ID.
The disconnect command closes a user session. To list the active user sessions, use
the show users command.
On XI50z, the dp-admin account cannot disconnect a session that belongs to any
other administrative account.
Examples
List the active users and closes the session for the user that is associated with
session ID 36.
# show users
Session ID Name ...
...
36 egsmith2 ...
...
# disconnnect 36
Session 36 closed
echo:
Syntax
echo text
Parameters
text Specifies the text to echo to the console.
Guidelines
exec:
Syntax
exec URL
Parameters
URL Identifies the location of the configuration file.
v When the file is on the appliance, this parameter takes the
directory:///file format.
Where:
directory
Identifies a local directory. Generally, the directory is config or
local.
file Identifies the file in the directory.
v When the file is remote and the transport protocol is HTTP or HTTPS,
this parameter takes one of the following formats.
Guidelines
The exec command enables modularity of configuration scripts. For example, you
can include all service configuration commands in a script called services.cfg and
all certificates configuration commands in the cert.cfg script.
Example
exit:
Syntax
exit
Guidelines
The exit command exits the current configuration and applies all changes to the
running configuration. To save these changes to the startup configuration, use the
write memory command.
When you enter the exit command from user or privileged mode, this command
closes the CLI connection. In all other modes, the command returns to its parent
mode. When issued from the top most parent, the command closes the CLI
connection.
Example
Apply all changes made to the valcred-1 validation credentials configuration . Exit
Validation Credentials mode, and returns to Crypto mode. Exit Crypto mode, and
returns to Global mode. Persist all configuration changes to the startup
configuration. Close the CLI connection.
(config valcred valcrec-1)# exit
(config-crypto)# exit
(config)# write memory
(config)# exit
# exit
Goodbye
Syntax
help [command]
Parameters
command
Specifies the command name.
Guidelines
The help command list the available commands or provides information about a
specific command.
v Without arguments, list the commands that are available in the current mode.
v With an argument, displays information about the specific command when that
command is available in the current mode.
login:
Syntax
login
Guidelines
After you enter the login command, the CLI prompts you for an account name
and password.
v The admin account, the dp-admin account on XI50z, privileged accounts, and
group-specific accounts log on to Privileged Mode. The prompt for this mode is
the hash (#) character.
v User accounts log on to User Mode. The prompt for this mode is the greater
than (>) character.
After an initial login, the CLI prompts you to change the password for the account.
ntp:
Syntax
no ntp
Parameters
server Specifies the IP address or host name.
Guidelines
The ntp command identifies the NTP (Network Time Protocol) server. After you
identify an NTP server, the appliance functions as a Simple Network Time Protocol
(SNTP) client as described in RFC 2030.
From the CLI, the appliance supports the configuration of only one NTP server.
Although the CLI supports only one NTP server, you can use a web management
interface to identify multiple NTP servers. When more than one NTP server is
identified, the appliance contacts the first NTP server in the list. If this server does
not respond, the appliance contacts the next server in the list. If you used a web
management interface to identify more than one NTP server, do not use the CLI to
modify the NTP service.
Attention: The ntp command replaces the entire list with the one identified NTP
server.
ping:
This command determines whether the network can reach a remote target.
Syntax
ping address
Parameters
address
Specifies the IP address of the target.
host Specifies the host name of the target.
IP-version
Optional: Identifies the IP version to use when resolving an ambiguous
host name to an IP address. An ambiguous host name occurs when the
DNS publishes an IPv4 address and an IPv6 address. If not specified,
resolves to the preferred IP version as defined by the ip-preference
command in DNS Settings mode.
-4 Identifies the target as an IPv4 host.
-6 Identifies the target as an IPv6 host.
This parameter applies to ambiguous host names only. Although you
specify -6, the output will show IPv4 output if the DNS published an IPv4
address only. Conversely, if you specify -4 and the DNS publishes an IPv6
address only, the output will show IPv6 output.
The ping command sends 6 Internet Control Message Protocol (ICMP) echo-request
messages to the specified host with a one second interval between each message
and reports the results.
reset:
Syntax
reset
Guidelines
This command has no effect on properties that are specific to MQCLI mode.
Default values that are assigned by the reset command are not applied until you
use the exit command to save changes and exit the mode.
Example
Restore default values to the configuration and returns to the parent mode.
# reset
# exit
#
show:
Syntax
show [argument]
Parameters
argument
Specifies the specific configuration or status provider.
Guidelines
shutdown:
shutdown
Parameters
reboot Shuts down and restarts the appliance.
halt Shuts down the appliance without restarting. The power to the appliance
remains on. This keyword is deprecated. Use poweroff instead.
poweroff
Stops the appliance and turns off the power.
seconds
Specifies the number of seconds before the appliance starts the shutdown
operation. Enter a value in the range 0 - 65535. The default value is 10.
Guidelines
The shutdown command shuts down, or shuts down and restarts the appliance.
Without parameters, the command restarts the appliance after waiting ten seconds.
The appliance restarts with the startup configuration that is specified by the boot
config command and the startup firmware image that is specified by the boot
image command. Without a designated startup configuration or firmware image,
the appliance restarts with the configuration and firmware image that were active
when you issued the shutdown command.
Examples
v Wait 10 seconds to shut down and restart the appliance.
# shutdown reboot
Reboot in 10 second(s).
#
v Wait 1 minute to shut down and turn off the appliance.
# shutdown poweroff 60
Shutdown in 60 second(s).
#
summary:
Syntax
summary “string”
Parameters
string Specifies the descriptive summary.
The summary command specifies the descriptive summary for the configuration.
Enclose the summary in double quotation marks.
Example
template:
Syntax
template URL
Parameters
URL Specifies the fully qualified location of the interactive command-line script.
Guidelines
The template command specifies the URL of the interactive command-line script.
The script is an XML file that can be local or remote to the appliance. The script
must conform to the store:///schemas/dp-cli-template.xsd schema.
Example
test tcp-connection:
Syntax
Test the connection with an IP address.
test tcp-connection address port [seconds]
Test the connection with a host name.
test tcp-connection host port [seconds] [IP-version]
Parameters
address
Specifies the IP address of the target.
host Specifies the host name of the target.
IP-version
Optional: Identifies the IP version to use when resolving an ambiguous
host name to an IP address. An ambiguous host name occurs when the
DNS publishes an IPv4 address and an IPv6 address. If not specified,
resolves to the preferred IP version as defined by the ip-preference
command in DNS Settings mode.
Guidelines
The test tcp-connection command verifies TCP connectivity from the appliance
to a specific target.
Examples
v Test the TCP connection to the specified host on port 80 with the default timeout
value of 10 seconds.
# test tcp-connection ragnarok 80
TCP connection successful
#
v Test the TCP connection to the specified IP address on port 21. The timeout
value is 5 seconds.
# test tcp-connection 192.168.77.27 21 5
TCP connection successful
#
traceroute:
Syntax
Trace the path by IP address.
traceroute address
Trace the path by host name.
traceroute host [IP-version]
Parameters
address
Specifies the IP address of the target.
host Specifies the host name of the target.
IP-version
Optional: Identifies the IP version to use when resolving an ambiguous
host name to an IP address. An ambiguous host name occurs when the
DNS publishes an IPv4 address and an IPv6 address. If not specified,
resolves to the preferred IP version as defined by the ip-preference
command in DNS Settings mode.
-4 Identifies the target as an IPv4 host.
-6 Identifies the target as an IPv6 host.
Guidelines
The traceroute command traces the route that packets actually take to their target
host. The output shows the IP address of the hops (for example, gateway or
routers) and the round trip time.
While the ping command confirms IP network reachability, you cannot pinpoint
and improve some isolated problems. Consider the following situation:
v When there are many hops (for example, gateways or routers) between the
appliance and the target host, and there seems to be a problem somewhere along
the path. The target host could have a problem, but you need to know where a
packet is actually lost.
v The ping command hangs up and provides no reason for a lost packet.
The traceroute command can inform you where the packet is located and why the
route is lost. If your packets must pass through routers and links, which belong to
and are managed by other organizations or companies, it is difficult to check
related routers. The traceroute command provides a supplemental role to the ping
command.
Example
The appliance user commands can be run from the command line interface in user
configuration mode. To enter user configuration mode, complete the following
steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter user configuration mode:
user name
Where name identifies the user that you want to configure. If you are creating a
new user, name can contain up to 128 characters. The following characters are
valid:
v a through z
v A through Z
access-level:
Syntax
Parameters
group-defined
Specifies that the user is granted access privileges as defined by a specific
User Group. The user must later be assigned to this group with the group
command.
privileged
Assigns executive access to the account. A privileged account has virtually
the same access levels as the admin account. It differs only in that a
privileged account cannot delete the admin account.
user Deprecated - The user keyword is deprecated. Instead, assign the user
account to a group-defined account type and define access restrictions
through the group.
Guidelines
By default, newly created accounts are assigned the user access level.
group:
Syntax
group name
Parameters
name Specifies the name of a user group.
Guidelines
password:
password password
Parameters
password
Specifies the password for the account. A password can contain only
printable characters and must be 5 - 20 characters in length.
Guidelines
snmp-cred:
Syntax
Parameters
engine-ID
Specifies the engine ID of the SNMP V3 engine for which this account is
being defined. A value of 0 is the shorthand representation of the engine
ID of the local SNMP V3 engine on the appliance. For any other engine ID,
the value is a hex string that represents the 5 - 32-byte value.
authentication-protocol
Identifies which authentication protocol to use. The default value is sha.
none The account has no authentication key.
md5 The account uses HMAC-MD5-96 as the authentication protocol.
sha The account uses HMAC-SHA-96 as the authentication protocol.
authentication-secret-type
Indicates whether the authentication secret is a password or a fully
localized key. This parameter is required when the authentication protocol
is md5 or sha. The default value is password.
password
The authentication secret is a password that is converted to an
intermediate key with a standardized algorithm, and then localized
against the engine ID value.
key The authentication secret is a fully localized key. Specifying a fully
localized key is useful when the key was initially created on
another system.
authentication-secret
Specifies the secret, or key, for authentication for this account. This
parameter is required when the authentication protocol is md5 or sha.
Guidelines
The snmp-cred command adds SNMP V3 credentials for this account. Each account
can have multiple SNMP V3 credentials, one for each SNMP V3 engine that is
identified by an engine-ID parameter.
Note: The current implementation supports an SNMP V3 credential for the local
engine ID only. Therefore, there can be only one SNMP V3 credential for each
account.
The secret for authentication and privacy can be defined either as a password
(passphrase) or as a localized hex key. If a password, it is hashed and localized
with the engine ID.
suppress-password-change:
This command control whether the password for this account must be changed
after the initial login by the account owner.
Syntax
Account owner does not need to change the account passwords after initial
login. suppress-password-change on
Forces account owner to change the account passwords after initial login.
suppress-password-changeoff
Parameters
on
Indicates that the account owner does not need to change the account
passwords after initial login.
off
Forces the account owner must change the account passwords after initial
login. This setting is the default behavior.
Guidelines
Note: The property is available during only initial creation and is unavailable
when you edit this configuration.
Where name identifies the user group that you want to configure. If you are
creating a new user group, name can contain up to 128 characters. The
following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name comprising a single period, or including two
periods together, is not permitted)
3. Type exit to save your changes and leave user group configuration mode, then
type exit again to leave global configuration mode.
access-policy:
Syntax
access-policy “statement”
Parameters
statement
Specifies the policy statement to add. A policy statement takes the
following form:
address/domain/resource?[Name=name]&Access=permission [&field=value]
address An IP address or host alias for a local interface (Ethernet or VLAN)
on the appliance. The special value * matches all appliance
addresses.
domain The name of an application domain. This policy applies to only
resources in the identified domain.
v The special value * matches all domains.
v A PCRE can match select domains.
resource
The resource type to which this policy applies. The special value *
matches all resource types.
Name=name
Optional: Identifies by name an instance of the specified resource
type. You can use a PCRE; for example, foo.* to specify all
resources that start with foo.
Access=permission
The permission string assigns permissions. The string is cumulative
Guidelines
The access-policy command assigns one or more access policy statements to the
user group. If there are more than one statement, the statements are cumulative. If
more than one statement applies to the same resource, the most specific statement
applies. For example, given the following two statements any member of this user
group can read all objects but has complete access privileges to the web
management interface:
*/*/*?Access=r
*/*/mgmt/web-mgmt?Access=r+w+a+d+x
It is not possible to remove a specific access policy from the CLI. If you run the no
access-policy command, all access policies are removed. To remove a specific
access policy from a user group, use the GUI.
Examples
v Add full access privileges to all resources and read only access for GUI login
and network interface resources to members of the appdev user group.
# usergroup appdev
User group configuration mode
# access-policy "*/*/*?Access=r+w+a+d"
# access-policy "*/*/login/web-mgmt?Access=r"
# access-policy "*/*/network/interface?Access=r"
# exit
Usergroup update successful
#
rotate:
Syntax
rotate rotations
Parameters
rotations
Sets the number of rotations of audit log files. Enter a value in the range 1
- 100. The default value is 3.
Guidelines
The rotate command sets the number of rotations of audit log files.
Example
Set the appliance for 5 rotations of audit log files at 5000 KB each. In this case, the
appliance can maintain up to 30,000 KB of audit records, which are the audit-log
file and its five rotations.
# size 5000
# rotation 5
size:
Syntax
size KB
Parameters
KB Sets the size for audit log files in KB. Enter a value in the range 250 -
500000. The default is 1000.
Guidelines
Example
Set the appliance for 5 rotations of audit log files at 5000 KB each. In this case, the
appliance can maintain up to 30,000 KB of audit records, which are the audit-log
file and its five rotations.
# size 5000
# rotation 5
Crypto commands
You can use the crypto commands to manage certificates on the IBM MQ
Appliance.
The crypto commands can be run from the command line interface in crypto
configuration mode. To enter crypto configuration mode, type crypto.
cert-monitor:
Syntax
cert-monitor
Guidelines
certificate:
Syntax
no certificate alias
Parameters
alias Specifies the alias for the certificate.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
To use the password-alias keyword, you must have created an alias. Use
the password-map command to create the password alias.
Use the certificate command with the key and idcred commands to create
identification credentials. Identification credentials consist of a certificate, which
contains a public key, and the corresponding private key.
Use the certificate command with the valcred command to create validation
credentials. Validation credentials can be used, but are not required, during the SSL
handshake to authenticate the certificate from the remote SSL peer.
Use the no certificate command to delete only the alias for the certificate. The
file that contains the certificate material remains on the appliance.
Examples
v Create the bob alias for the bob.pem X.509 certificate. Store the target certificate in
the public cryptographic area.
# certificate
bob pubcert:bob.pem
Creating certificate ’bob’
v Create the bob alias for the bob.pem certificate. Store the target certificate in the
public cryptographic area. Allow the certificate to be accessed with the
pikesville plaintext password.
# certificate bob pubcert:bob.pem
password pikesville
Creating certificate ’bob’
v Create the bob alias for the bob.pem certificate. Store the target certificate in the
public cryptographic area. Allow the certificate to be accessed with the dundaulk
encrypted password alias.
# certificate bob pubcert:bob.pem
password-alias dundaulk
Creating certificate ’bob’
convert-certificate:
This command converts a certificate alias to a specific output format and writes it
to a file.
Syntax
Parameters
alias Specifies the name of the certificate alias.
file Specifies the output file name. Use the temporary:///mycert.pub format.
format
Specifies the format for the output file. The supported format is
openssh-pubkey.
Guidelines
convert-key:
This command converts a private key alias to a specific output format and writes it
to a file.
Syntax
Parameters
alias Specifies the name of the key alias.
file Specifies the output file name. Use the temporary:///mykey.pub format.
format
Specifies the format for the output file. The supported format is
openssh-pubkey.
Guidelines
crl:
This command enters CRL mode to create or modify a CRL update policy.
Syntax
no crl name
Parameters
name Specifies the name of the CRL update policy.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
The crl command enters CRL mode to create or modify a CRL (certificate
revocation list) update policy.
v Use the fetch-url and refresh commands to define an HTTP-enabled CRL
update policy
v Use the bind-dn, bind-pass, read-dn, refresh, and remote-address commands to
define an LDAP-enabled CRL update policy.
Examples
v Create the HTTP30 HTTP-enabled CRL update policy.
# crl HTTP30 http
Entering CRL mode for ’HTTP30’
v Create the LDAP1440 LDAP-enabled CRL update policy.
# crl LDAP1440 ldap
Entering CRL mode for ’LDAP1440’
v Delete the LDAP1440 LDAP-enabled CRL update policy.
# no crl LDAP1440
Syntax
Exports a certificate
crypto-export cert name output file
Parameters
cert name
Identifies the name of the certificate.
output file
Identifies the name and location to store the export.
Guidelines
Example
Create the exportBob.xml export package in the temporary: directory. The package
contains the bob certificate.
# crypto-export cert bob output temporary:///exportBob.xml
crypto-import:
Syntax
Imports a certificate
crypto-import cert alias input file
Parameters
cert name
Identifies the name of the certificate.
input file
Identifies the name and location of the stored export package.
password password
Optional: Specifies the password that was used to encrypt the input file.
This parameter is mutually exclusive to the password-alias parameter.
password-alias alias
Optional: Specifies the password that was used to encrypt the input file.
This parameter is mutually exclusive to the password parameter.
Examples
v Import the exportBob.xml export package from the temporary directory. The
package contains the bob certificate.
# crypto-import cert bob input temporary:///exportBob.xml
This command sets the appliance-wide cryptographic mode for the next firmware
reload.
Syntax
crypto-mode-set mode
Parameters
mode Indicates which cryptographic mode to enable. The following keywords are
available to indicate the modes to enable:
permissive
Runs the firmware in permissive mode.
fips-140-2-l1
Runs the firmware in FIPS 140-2 Level 1 mode.
Guidelines
The crypto-mode-set command sets the cryptographic mode for the appliance.
This setting affects only the encryption used for system management aspects of the
appliance. For example, the encryption of administrative user passwords, CLI, and
Web UI connections to your MQ Appliance. It does not affect the encryption used
for your MQ channel traffic, which is configured on a per-queue manager basis.
Changes made using crypto-mode-set take effect at the next firmware reload. The
specified mode remains effective until the command is called with a different
mode and the firmware is reloaded. If you never set the cryptographic mode with
this command, the appliance runs in permissive mode.
v Use FIPS 140-2 Level 1 mode when you must comply with FIPS requirements.
v Use permissive mode to switch back to normal operations.
When you set the mode to FIPS 140-2 Level 1 mode, you must understand the
following:
v FIPS 140-2 Level 1 mode removes support in the firmware's main task for MD2,
MD4, MD5, RIPEMD160, single DES, RC2, RC4, Blowfish, and CAST because
these algorithms are prohibited by the corresponding specification. These
algorithms are only available in the firmware's main task in permissive mode.
v FIPS 140-2 Level 1 mode prohibits the use of public keys smaller than 1024 bits.
v FIPS 140-2 Level 1 mode makes the firmware's main task use a pseudorandom
number generator that is compliant with NIST SP800-131a and FIPS 140-2.
Use the show crypto-mode command to display the status of cryptographic modes.
Examples
v Enable FIPS 140-2 Level 1 mode at the next reload of the firmware.
# crypto-mode-set fips-140-2-l1
v Change the cryptographic mode back to permissive mode at the next reload of
the firmware.
# crypto-mode-set permissive
Syntax
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
The idcred command creates identification credentials. An SSL proxy profile uses
identification credentials to authenticate itself to a remote peer.
The SSL standard requires an SSL server to authenticate itself to a remote SSL
client. An SSL proxy profile operating as an SSL server (in either reverse or
two-way mode) must be assigned identification credentials with which to
authenticate itself to a remote SSL client.
The SSL standard allows an SSL server to authenticate the remote client peer. An
SSL proxy profile operating as an SSL client (in either forward or two-way mode)
can be assigned a set of identification credentials if the remote SSL server requires
authentication. While SSL servers typically do not require client identification,
certain highly secure websites can impose such a requirement.
Before you create identification credentials, you must use the following procedure.
1. Use the key command to create an alias for the private key.
2. Use the certificate command to create an alias for the certificate.
Examples
v Create the bob identification credentials that consist of the private key that is
aliased by bob and the X.509 certificate aliased by bob.
# idcred bob bob bob
Creating identification credentials ’bob’
v Create the bob identification credentials that consist of the private key that is
aliased by bob and the X.509 certificates aliased by bob and bob-intermediate.
# idcred bob bob bob ca bob-intermediate
Creating identification credentials ’bob’
v Delete the identification credentials alias bob.
# no idcred bob
Identification Credentials ’bob’ deleted
key:
Syntax
no key alias
Parameters
alias Specifies the alias for the private key.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Note: Do not store private key files in the pubcert: directory. This
directory is intended for the storage of public certificate files.
Guidelines
To use the password-alias keyword, you must have created an alias. Use
the password-map command to create the password alias.
Use the key command with the certificate and idcred commands to create
identification credentials that consist of a certificate, which contains a public key
and the corresponding private key.
Use the no key command to delete only the alias for the private key. The file that
contains the key material remains on the appliance.
Examples
v Create the bob alias for the K2.pem private key. The target key is in the private
cryptographic storage area.
# key bob K2.pem
Creating key ’bob’
v Create the bob alias for the K2.der private key. The target key is in the private
cryptographic area and is accessed with the annapolis plaintext password.
# key bob K2.der password annapolis
Creating key ’bob’
v Create the bob alias for the K2.der private key. The target key is in the private
cryptographic area and is accessed with the towson encrypted password alias.
# key bob K2.der password-alias towson
Creating key ’bob’
v Create the zCert_key alias for the z/OS CERT private key. Use the nssclient NSS
client to connect to and retrieve the target key. Cache the target key on the
appliance.
# key zCert_key saf-key://nssclient/CERT
Creating certificate ’zCert_key’
v Create the zicsfCert2_key alias for the z/OS ICSFCERT2 private key. Use the
nssclient NSS client to connect to and access the ICSFCERT2 private key but
does not retrieve or store the z/OS private key on the appliance.
# key zicsfCert2_key saf-remote-key://nssclient/ICSFCERT2
Creating certificate ’zicsfCert2_key’
v Delete the bob private key alias.
keygen:
This command generates a public-private key pair and a CSR (certificate signing
request) for a server.
Syntax
Generates a key pair
keygen [{C | countryName} iso-code] [{L | localityName} locality] [{ST |
stateOrProvinceName} state] [{O | organizationName} org] [{OU |
organizationalUnitName} unit-name] {CN | commonName} server-name rsa
{1024 | 2048 | 4096} [gen-object] [object-name name] [gen-sscert] [days
number-days] [file-name name] [export-key] [export-sscert] [password
plaintext] [password-alias alias] [using-key name]
Parameters
{C | countryName} ISO-code
Optionally specifies the ISO two-character country identifier for the CSR.
{L | localityName} locality
Optionally specifies the city or town name for the CSR. Use a text string
up to 64 characters in length. If the string contains spaces, enclose in
double quotation marks.
{ST | stateOrProvinceName} state
Optionally specifies the unabbreviated state or province name for the CSR.
Use a text string up to 64 characters in length. If the string contains spaces,
enclose in double quotation marks.
{O | organizationName} organization
Optionally specifies the organization name for the CSR. Use a text string
up to 64 characters in length. If the string contains spaces, enclose in
double quotation marks.
{OU | organizationalUnitName} unit-name
Optionally specifies the organizational unit name for the CSR. Use a text
string up to 64 characters in length. If the string contains spaces, enclose in
double quotation marks.
{CN | commonName} server-name
Specifies the fully qualified domain name of the server for the CSR. Use a
text string up to 64 characters in length.
rsa {1024 | 2048 | 4096}
Indicates the length of the generated RSA key. The default value is 1024.
The generation of a 4096-bit key can take up to 30 seconds.
gen-object
Creates a key management object. To create a certificate management object
use the gen-sscert property.
object-name name
Optionally specifies the names for the objects that are created by the
gen-object property. If not specified, the value for the commonName property
is used.
Guidelines
CA policies can vary with regard to the amount of information that is required in
the CSR. Check with the CA before generating the CSR to ensure that you provide
sufficient information.
To use the password-alias keyword, you must have created an alias. Use the
password-map command to create the password alias.
Examples
v Generate a private key and CSR for the specified server. Default conditions
apply as follows.
– The private key (1024 bits in length) is saved as cert:sample-privkey.pem.
– The CSR is saved as temporary:sample.csr.
– The private key file is not password protected
# keygen C au L "South Melbourne" ST Victoria
O "DataPower Australia, Ltd." OU "Customer
Support" CN www.bob.datapower.com.au
v Generate a private key and CSR for the specified server with the following
options.
password-map:
Syntax
Interactively add an entry to the password map file.
password-map
Delete an entry from the password map file.
delete password-map alias
Delete the password map file.
no password-map
Parameters
alias The alias is the reference to a password.
Guidelines
The password map and the locally generated key are saved to separate files on the
appliance. Plaintext passwords are not saved on the appliance. Password maps are
typically used to protect key and certificate files.
Deletion of the password map and host key file has no immediate effect on keys
and certificates that are in memory. At restart, however, key and certificate
commands that contain references to aliases in the deleted password map fail
unless a new password map was created with the same aliases.
Use the no password-map command to delete the password map and host key files.
Examples
v Create a password map and generate the host key to encrypt the two plaintext
passwords.
# password-map
Please enter alias-name and plaintext password pairs
- Enter a blank alias name to finish
Alias-name: towson
Plaintext password: ********
Re-enter plaintext password: ********
Alias-name: dundaulk
Plaintext password: ********
Re-enter plaintext password: ********
Alias-name:
Password-map saved (2 entries)
v Confirm the creation of the password map.
profile (deprecated):
This command creates a cryptographic profile that specifies an SSL service level.
Syntax
no profile name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
The cipher string consists of one or more cipher keywords that are
separated by colons. Commas or spaces are acceptable separators, but
colons are the norm.
The cipher string can take different forms.
v A single cipher suite, such as RC4-SHA.
v A list of cipher suites that contains a certain algorithm, or cipher suites
of a certain type. For example, SHA1 represents all ciphers suites that use
the SHA-1 digest algorithm.
v A combination of single cipher string that uses the + character, which is
used as a logical AND operation. For example, SHA1+DES represents all
cipher suites that contain the SHA-1 and the DES algorithms.
Optionally, each cipher keyword can be preceded by the following
characters:
! Permanently deletes the cipher from the list. Even if you explicitly
add the cipher to the list, it can never reappear in the list.
- Deletes the cipher from the list. You can add this cipher again.
+ Moves the cipher to the end of the list. The + character moves
existing ciphers. It does not add them.
If none of these characters is present, the string is interpreted as a list of
ciphers to be appended to the current list. If the list includes a cipher that
is already in the list, that cipher is ignored. That is, existing ciphers are not
moved to the end of the list.
Additionally, the cipher string can contain the @STRENGTH keyword at any
point to sort the cipher list in order of encryption algorithm key length.
option-string options-mask
Optional: Enables various SSL options for the cryptographic profile. Use
the string that identifies specific supported SSL options.Table 41 lists the
available options.
Table 41. SSL options as string
String value Description
OpenSSL-default The default value.
1
Disable-SSLv2 Disallows the use of SSL version 2.
Disable-SSLv3 Disallows the use of SSL version 3.
Disable-TLSv1 Disallows the use of TLS version 1.0.
Enable-Legacy-Renegotiation Allows SSL and TLS renegotiation, which is
vulnerable to a man-in-the-middle (MITM)
attack that is documented in CVE-2009-3555.
When you use the string value, use a + character to join values. For
example, to disallow both SSL version 3 and TLS version 1.0, enter
Disable-SSLv3+Disable-TLSv1.
clientcalist {on | off}
Indicates whether to enable the transmission of a client CA List during the
SSL handshake. Transmission of a client CA List is meaningful only when
this profile supports a reverse (or server) proxy and when this profile has
validation credentials. The default value is off.
on Enables the transmission of a client CA List during the SSL
handshake.
off Disables the transmission of a client CA List during the SSL
handshake.
Guidelines
A cryptographic profile defines a level of SSL service. When you create an SSL
proxy profile with the sslproxy command, you assign a cryptographic profile to
the SSL proxy profile.
Before you create a cryptographic profile to use with an SSL server, use the
certificate command with the key and idcred commands to create identification
credentials. This set of credentials consists of a certificate, which contains a public
key, and the corresponding private key.
The no profile command deletes only the specified cryptographic profile. The
alias names that create the original cryptographic profile are available for use as
are the files that contain the certificate and key material that implement the
cryptographic profile.
Examples
v Create the Low cryptographic profile that uses the XSSL-1 identification
credentials (certificate and private key) to identify the SSL proxy profile. The
cryptographic profile specifies no validation of received peer certificates and
supports the default cipher list.
# profile Low XSSL-1
Creating new crypto profile ’Low’
v Create the Low cryptographic profile that uses the XSSL-1 identification
credentials to identify the SSL proxy profile. The cryptographic profile specifies
no peer validation, supports the default cipher list, and disables SSL Version 2.
# profile Low XSSL-1
option-string Disable-SSLv2
Creating new crypto profile ’Low’
v Create the Low cryptographic profile that uses the XSSL-1 identification
credentials to identify the SSL proxy profile. The cryptographic profile specifies
no peer validation, supports the default cipher list, and disables SSL Version 2
and TLS Version 1.0.
# profile Low XSSL-1
option-string Disable-SSLv2+Disable-TLSv1
Creating new crypto profile ’Low’
v Create the High cryptographic profile that uses the XSSL-2 identification
credentials to identify the SSL proxy profile. The cryptographic profile validates
the SSL peer with the TSC-1 validation credentials, and supports symmetric
encryption algorithms that include AES and 3DES cipher suites.
# profile High XSSL-2
ssl TSC-1 ciphers HIGH
Creating new crypto profile ’High’
v Delete the High cryptographic profile.
# no profile High
Crypto Profile ’High’ deleted
sshserverprofile:
Syntax
sshserverprofile
Guidelines
The sshserverprofile command enters SSH server profile mode to modify the
ciphers for the SSH server profile.
sskey:
no sskey alias
Parameters
alias Specifies an alias for the stored shared secret key.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
Use the sskey command with the certificate and idcred commands to create
identification credentials that consist of a certificate, which contains a public key,
and the corresponding private key.
The no sskey command deletes only the alias for the stored shared secret key. The
file that contains the actual shared secret key remains on the appliance.
Examples
v Create an alias, alice, for the specified shared secret key.
# sskey alice cert:///alicekey
Creating key ’alice’
v Delete the alice alias.
# no sskey alice
Key ’alice’ deleted
ssl-client:
Syntax
ssl-client name
no ssl-client name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 128 characters. The following
characters are valid:
Guidelines
The ssl-client command enters SSL Client Profile mode to create or modify an
SSL client profile. An SSL client profile secures connections between the appliance
and its targets.
ssl-server:
Syntax
ssl-servername name
no ssl-servername name
Parameters
name
Specifies the name of the configuration.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
The ssl-server command enters SSL Server Profile mode to create or modify an
SSL server profile. An SSL server profile secures connections between clients and
the appliance.
This command tests the association between an encrypted password alias and a
file.
Syntax
Parameters
alias Specifies the name of the candidate alias.
type Identifies the file type. Use the value key or cert.
URL Specifies a local URL that identifies the file that contains the certificate or
key.
v If stored in the public cryptographic area, takes the pubcert:file form.
v If stored in the private cryptographic area, takes the file form.
Guidelines
Assuming syntactical correctness, testing a key or certificate file that does not
require a password succeeds in all cases.
Examples
v Indicates that towson does not reference the encrypted password that protects
the dpSupplied.der certificate file.
# test password-map towson cert pubcert:dpSupplied.der
Alias ’towson’ with file ’pubcert:dpSupplied.der’ --> FAIL
v Indicates that dundaulk references the encrypted password that protects the
dpSupplied.der certificate file.
# test password-map dundaulk cert pubcert:dpSupplied.der
Alias ’dundaulk’ with file ’pubcert:dpSupplied.der’ --> OK
v Indicates that columbia does not reference the encrypted password that protects
the K2.der key file.
# test password-map columbia key K2.der
Alias ’columbia’ with file ’K2.der’ --> FAIL
v Indicates that towson references the encrypted password that protects the K2.der
key file.
# test password-map towson key K2.der
Alias ’towson’ with file ’K2.der’ --> OK
valcred:
valcred name
no valcred name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 32 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
If you want the SSL service to validate received certificates, complete the following
procedure.
1. Use the valcred command to create the validation credentials.
2. Use the certificate command to add certificate alias to the validation
credentials.
3. Assign the validation credentials to the cryptographic profile.
Use the no valcred command to delete the validation credentials. The certificate
aliases for the validation credentials remain available for use as do as the files that
contain the actual certificates.
Included are commands for configuring the appliance to work with an NTP server.
To work with date, time, and locale configuration:
custom:
Syntax
custom name
Parameters
name Specifies the symbolic name of the custom time zone.
Guidelines
The custom command specifies the symbolic name of a custom time zone. This
name is appended to local times. The name must be three or more alphabetic
characters. If you use any other characters, the time zone becomes Coordinated
Universal Time.
daylight-name:
This command specifies the name of the time zone when in daylight saving time.
This name is appended to the time.
Syntax
daylight-name name
Parameters
name Specifies the name of the timezone when in daylight saving time.
Guidelines
The daylight-name command specifies the name of the time zone when in daylight
saving time. This name is appended to the time. The name must be three or more
alphabetic characters. If you use any other characters, the time zone becomes
Coordinated Universal Time.
This command is meaningful for custom time zones where daylight saving time
rules apply.
This command sets the offset, in hours, for daylight saving time.
Syntax
daylight-offset hours
Parameters
hours Specifies the offset (difference) in hours between daylight saving time and
regular time.
Guidelines
The daylight-offset command sets the offset, in hours, for daylight saving time.
Generally, the difference is 1 hour. A value of 1 means that the clock moves
forward or back 1 hour when the time boundary is crossed.
This command is meaningful for custom time zones where daylight saving time
rules apply.
daylight-start-day:
This command specifies the day of the week when daylight saving time starts.
Syntax
daylight-start-day day
Parameters
day Specifies the day of the week when daylight saving time starts. The default
value is Sunday.
v Monday
v Tuesday
v Wednesday
v Thursday
v Friday
v Saturday
v Sunday
Guidelines
The daylight-start-day command specifies the day of the week when daylight
saving time starts.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time starts, you must also define the time
and date with the daylight-start-hours, daylight-start-minutes,
daylight-start-month, and daylight-start-week commands.
Set the second Sunday in March at 2:30 AM as the start of daylight saving time.
# daylight-start-month March
# daylight-start-week 2
# daylight-start-day Sunday
# daylight-start-hours 2
# daylight-start- minutes 30
daylight-start-hours:
This command specifies the hour in the day when daylight saving time starts.
Syntax
daylight-start-hours hour
Parameters
hour Specifies the hour in the day when daylight saving time starts. Enter an
value in the range 0 - 23.
Guidelines
The daylight-start-hours command specifies the hour in the day when daylight
saving time starts. The value uses the 24 hour clock. A setting of 2 is 2 AM; and a
setting of 14 is 2 PM.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time starts, you must also define the time
and date with the daylight-start-day, daylight-start-minutes,
daylight-start-month, and daylight-start-week commands.
Example
Set the second Sunday in March at 2:30 AM as the start of daylight saving time.
# daylight-start-month March
# daylight-start-week 2
# daylight-start-day Sunday
# daylight-start-hours 2
# daylight-start- minutes 30
daylight-start-minutes:
This command specifies the minute in the hour when daylight saving time starts.
Syntax
daylight-start-minutes minute
Parameters
minute
Specifies the minute in the hour when daylight saving time starts. Enter a
value in the range 0 - 59.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time starts, you must also define the time
and date with the daylight-start-hours, daylight-start-day,
daylight-start-month, and daylight-start-week commands.
Example
Set the second Sunday in March at 2:30 AM as the start of daylight saving time.
# daylight-start-month March
# daylight-start-week 2
# daylight-start-day Sunday
# daylight-start-hours 2
# daylight-start- minutes 30
daylight-start-month:
This command specifies the month of the year when daylight saving time starts.
Syntax
daylight-start-month month
Parameters
month Specifies the month of the year when daylight saving time starts. The
default value is March.
v January
v February
v March
v April
v May
v June
v July
v August
v September
v October
v November
v December
Guidelines
This command is meaningful for custom time zones where daylight saving time
rules apply.
Example
Set the second Sunday in March at 2:30 AM as the start of daylight saving time.
# daylight-start-month March
# daylight-start-week 2
# daylight-start-day Sunday
# daylight-start-hours 2
# daylight-start- minutes 30
daylight-start-week:
This command specifies the instance of the day in the month when daylight saving
time starts.
Syntax
daylight-start-week instance
Parameters
instance
Specifies the instance of the day in the month when daylight saving time
starts. Enter a value in the range 1 - 5.
Guidelines
The daylight-start-week command specifies the instance of the day in the month
when daylight saving time starts.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time starts, you must also define the time
and date with the daylight-start-hours, daylight-start-minutes,
daylight-start-day, and daylight-start-month commands.
Example
Set the second Sunday in March at 2:30 AM as the start of daylight saving time.
# daylight-start-month March
# daylight-start-week 2
# daylight-start-day Sunday
# daylight-start-hours 2
# daylight-start- minutes 30
daylight-stop-day:
This command specifies the day of the week when daylight saving time stops.
Syntax
daylight-stop-day day
Guidelines
The daylight-stop-day command specifies the day of the week when daylight
saving time ends.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time ends, you must also define the time
and date with the daylight-stop-hours, daylight-stop-minutes,
daylight-stop-month, and daylight-stop-week commands.
Example
Set the second Sunday in November at 2:30 AM as the end of daylight saving time.
# daylight-stop-month November
# daylight-stop-week 2
# daylight-stop-day Sunday
# daylight-stop-hours 2
# daylight-stop- minutes 30
daylight-stop-hours:
This command specifies the hour in the day when daylight saving time ends.
Syntax
daylight-stop-hours hour
Parameters
hour Specifies the hour in the day when daylight saving time ends. Enter a
value in the range 0 and 23.
Guidelines
The daylight-stop-hours command specifies the hour in the day when daylight
saving time ends. The value uses the 24 hour clock. A setting of 2 is 2 AM; and a
setting of 14 is 2 PM.
This command is meaningful for custom time zones where daylight saving time
rules apply.
Example
Set the second Sunday in November at 2:30 AM as the end of daylight saving time.
# daylight-stop-month November
# daylight-stop-week 2
# daylight-stop-day Sunday
# daylight-stop-hours 2
# daylight-stop- minutes 30
daylight-stop-minutes:
This command specifies the minute in the hour when daylight saving time ends.
Syntax
daylight-stop-minutes minute
Parameters
minutes
Specifies the minutes of the hour when daylight saving time ends. Enter a
value in the range 0 - 59.
Guidelines
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time ends, you must also define the time
and date with the daylight-stop-hours, daylight-stop-day, daylight-stop-month,
and daylight-stop-week commands.
Example
Set the second Sunday in November at 2:30 AM as the end of daylight saving time.
# daylight-stop-month November
# daylight-stop-week 2
# daylight-stop-day Sunday
# daylight-stop-hours 2
# daylight-stop- minutes 30
daylight-stop-month:
This command specifies the month of the year when daylight saving time ends.
Syntax
daylight-stop-month month
Guidelines
The daylight-stop-month command specifies the month of the year when daylight
saving time ends.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time ends, you must also define the time
and date with the daylight-stop-hours, daylight-stop-minutes,
daylight-stop-day, and daylight-stop-week commands.
Example
Set the second Sunday in November at 2:30 AM as the end of daylight saving time.
# daylight-stop-month November
# daylight-stop-week 2
# daylight-stop-day Sunday
# daylight-stop-hours 2
# daylight-stop- minutes 30
daylight-stop-week:
This command specifies the instance of the day in the month when daylight saving
time ends.
Syntax
daylight-stop-week instance
Parameters
instance
Specifies the instance of the day in the month when daylight saving time
ends. Enter a value in the range 1 - 5.
The daylight-stop-week command specifies the instance of the day in the month
when daylight saving time ends.
This command is meaningful for custom time zones where daylight saving time
rules apply.
When you define when daylight saving time ends, you must also define the time
and date with the daylight-stop-hours, daylight-stop-minutes,
daylight-stop-day, and daylight-stop-month commands.
Example
Set the second Sunday in November at 2:30 AM as the end of daylight saving time.
# daylight-stop-month November
# daylight-stop-week 2
# daylight-stop-day Sunday
# daylight-stop-hours 2
# daylight-stop- minutes 30
direction:
Syntax
Parameters
East The direction is east of Coordinated Universal Time. Asia is east.
West The direction is west of Coordinated Universal Time. North America is
west. This setting is the default value.
Guidelines
Example
This command sets the name of the time zone. This name is appended to the time.
Syntax
name value
Parameters
value Specifies the name of the local time zone. The default value is EST-5EDT.
The appliance provides predefined values and the ability to define a
custom time zone.
Guidelines
The name command sets the name of the time zone. This name is appended to the
time.
v Enter a predefined time zone names to set the time zone and its corresponding
DST or summer time, values.
v Enter Custom to define a custom time zone with or without DST.
Example
Sets the local time zone to IST-5:30 (India, 5:30 hours east of UTC, no DST).
# name IST-5:30
offset-hours:
This command specifies the offset in hours, relative to Coordinated Universal Time,
of the time zone.
Syntax
offset-hours hours
Parameters
hours Specifies the offset in hours, relative to Coordinated Universal Time, of the
time zone. Enter a value in the range 0 - 12.
Guidelines
Example
offset-minutes:
offset-minutes minutes
Parameters
minutes
Specifies the offset in minutes, relative to Coordinated Universal Time, of
the time zone. Enter a value in the range 0 - 59.
Guidelines
Example
refresh-interval:
Syntax
refresh-interval seconds
Parameters
seconds
Specifies the number of seconds between clock synchronizations. Enter a
value in the range 60 - 86400. The default value is 900.
Guidelines
Examples
Identify the NTP server and set the clock synchronization interval of 5 minutes.
# ntp-service
NTP Service configuration
# remote-server Chronos-1
# refresh-interval 300
remote-server:
remote-server host
no remote-server
Parameters
host Identifies the NTP server by host name or IP address.
Guidelines
From the CLI, the appliance supports one NTP server at a time. To designate a
new NTP server, use the no ntp-service command to delete the current server.
The GUI supports the specification of multiple NTP servers. If you run the no
ntp-service command, all defined NTP servers are deleted. To delete just one NTP
server, use the GUI.
Example
DNS commands
You can use the DNS commands to configure the DNS settings on the IBM MQ
Appliance.
The DNS commands can be run from the command line interface in DNS
configuration mode. To enter DNS configuration mode, complete the following
steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter DNS configuration mode:
dns
3. Type exit to save your changes and leave DNS configuration mode, then type
exit again to leave global configuration mode.
force-ip-preference:
This command sets whether to restrict DNS queries to the preferred IP version.
Syntax
force-ip-preference { on | off }
Parameters
on
Sends DNS queries to only the preferred IP version: A (IPv4) or AAAA
(IPv6) record. This setting avoids latency with unneeded IPv6 queries in
IPv4-only environments and vice versa.
Guidelines
ip-preference:
This command sets the preferred IP version when the DNS provider publishes
both versions of addresses.
Syntax
ip-preference { 4 | 6 }
Parameters
4 Sets the IP version preference to 4. This setting is the default setting.
6 Sets the IP version preference to 6.
Guidelines
The ip-preference command sets the preferred IP version that the appliance uses
when the DNS provider publishes both supported versions of addresses. If the
DNS resolves the host name for a remote destination to both a version 4 address
and a version 6 address, this property determines which version of the addresses
the appliance uses to attempt the connection to the remote destination. The
appliance supports version 4, commonly known as IPv4, and version 6, commonly
known as IPv6.
load-balance:
This command sets the load-balancing algorithm that the appliance uses to resolve
host names.
Syntax
Parameters
first-alive
Uses the concept of a primary server and one or more backup servers.
When the health state of the primary server is up, all connections are
forwarded to this server. When the health state of the primary server is
softdown or down, connections are forwarded to back up servers. The
primary server is the first server in the members list.
Guidelines
The load-balance command sets the load balancing algorithm. For a request to
resolve a host name, a server with a health state of up is selected from the pool
according to the algorithm. The algorithm provides a method to select which
server with a health status of up receives an incoming client request.
name-server:
Syntax
name-server address
no name-server address
no name-server *
Parameters
address
Specifies the IP address or host name of the DNS server.
* Indicates all DNS servers.
Guidelines
The name-server command manages the list of DNS servers. Use this command to
create a list of one or more name servers that the appliance contacts to resolve host
names. Each use of the command adds a server to the list.
Note: Unless explicitly instructed, do not change the settings for DNS name
servers.
The following syntax is deprecated. For details about this usage, see the online
help.
Examples
v Add the DNS server at 10.10.10.240 with the default port.
# ip name-server 10.10.10.240
v Delete the specified DNS provider.
# no name-server 10.10.10.240
v Delete all DNS providers.
# no name-server *
This command sets the number of times that the appliance attempts a failed query.
Syntax
retries attempts
Parameters
attempts
The number of times that the appliance attempts a failed query. If the
query fails, the appliance attempts the query to a different DNS server that
is determined by the load balance algorithm. Enter a value in the range 0 -
4294967295. The default value is 2.
Guidelines
The retries command sets the number of times that the appliance attempts a
failed query before an error is returned. This command is used when the load
balancing algorithm is first-alive. Any value set with the retries command is
ignored when the load balancing algorithm is round-robin.
With the timeout command, the retries command specifies the number of
attempts that the appliance makes to resolve DNS server queries after the initial
attempt.
search-domain:
Syntax
search-domain domain
no search-domain domain
Parameters
domain
Specifies a base domain name to which a host name can be prefixed.
Guidelines
The appliance attempts to resolve a host name with any domains that are defined
with this command. The host name is resolved as soon as a match is found.
Use the no search-domain command to delete an entry from the search table.
static-host:
Syntax
no static-host host
no static-host *
Parameters
host Specifies the host name.
address
Specifies the IP address of the host.
* Specifies all hosts.
Guidelines
Examples
v Map host loki-v4 to address 10.10.10.168.
# static-host loki-v4 10.10.10.168
v Map host loki-v6 to address FEDC:BA98:7654:3210:C:BA98:7654:3210.
# static-host loki-v6 FEDC:BA98:7654:3210:C:BA98:7654:3210
v Delete the map for host loki-v4.
timeout:
This command sets the time to wait before the next query attempt.
Syntax
timeout seconds
Parameters
seconds
Specifies the number of seconds to wait for a response from a remote DNS
server. If the query fails, the appliance attempts the query to a different
DNS server that is determined by the load balance algorithm. The default
value is 5.
Guidelines
The timeout command sets the time to wait before the next query attempt. Use this
command only when the load-balancing algorithm is first-alive. Any value set with
the timeout command is ignored when the load balancing algorithm is
round-robin.
With the retries command, the timeout command specifies the amount of time
that the appliance attempts to resolve DNS server queries.
Ethernet commands
You can use the Ethernet commands to configure the Ethernet interfaces on the
IBM MQ Appliance.
The Ethernet commands can be run from the command line interface in Ethernet
configuration mode. To enter Ethernet configuration mode, complete the following
steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter Ethernet configuration mode:
ethernet name
where name is the name of the Ethernet port that you want to configure.
3. Type exit to leave the configuration mode and save your changes, then type
exit again to leave global configuration mode.
You cannot aggregate Ethernet links that are used in high availability or disaster
recovery configurations.
If you change the IP addresses of Ethernet links that are used in high availability
or disaster recovery configurations, the configuration will cease to function. See
“Changing IP addresses in high availability configurations” on page 169 and
“Changing IP addresses in disaster recovery configurations” on page 187
This command sets the flow control mode of the Ethernet interface.
Syntax
Parameters
auto For interfaces that support autonegotiation, performs standard IEEE 802.3
autonegotiation for flow control. This setting is the default value.
disabled
Disables flow control. The interface does not send flow control PAUSE
frames and ignores received PAUSE frames.
Note: Do not select this option unless you are working with IBM Support.
tx Enables transmit mode. The interface transmits flow control PAUSE frames
but ignores the received PAUSE frames.
rx Enables receive mode. The interface honors received flow control PAUSE
frames but does not transmit PAUSE frames.
full Enables full flow control. The interface transmits flow control PAUSE frames
and honors the received PAUSE frames.
Guidelines
The flow-control command specifies the flow control mode of the Ethernet
interface. Disable flow control only at the direction of IBM Support.
Example
force-mode:
Syntax
force-mode { on | off }
Parameters
on
Force the physical mode set by the mode command.
off
Use autonegotiation. This setting is the default value.
The command is not meaningful when the mode set with the mode command is
Auto.
disable-ethernet-hardware-offload:
Syntax
disable-ethernet-hardware-offload
Guidelines
Example
hardware-offload:
Syntax
Parameters
on Enables the hardware offload of TCP/IP packet processing. This setting is
the default value.
off Disables the hardware offload of TCP/IP packet processing.
Guidelines
If you disable the hardware offload and then re-enable offloading, you must restart
the appliance for the change to take effect. To modify the operational behavior
temporarily, use the disable-hardware-offload command.
Example
ip-address:
This command assigns the primary network address for the Ethernet interface.
Syntax
ip-address address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Guidelines
The ip-address command assigns the primary network address to the interface.
The network address is an IP address with its subnet mask.
Examples
v Assign an IP address in version 4 format.
# ip-address 192.168.7.6/27
v Assign an IP address in version 6 format.
# ip-address 2001:0db8:3c4d:0015::abcd:ef12/34
ip-config-mode:
This command identifies the configuration mode for the Ethernet interface.
Parameters
static Indicates a static, manual configuration. This setting is the default value.
dhcp Indicates IPv4 autoconfiguration with DHCP.
slaac Indicates IPv6 autoconfiguration with SLAAC.
Guidelines
This command is meaningful only when you do not use the link-aggregation-
mode command to make interface part of an aggregate interface.
Examples
v Change the configuration mode to IPv4 autoconfiguration with DHCP.
# ip-config-mode dhcp
v Change the configuration mode to manual configuration.
# ip-config-mode static
ip-route:
This command manages static routes in the routing table for the Ethernet interface.
Syntax
Add a static route
ip-route address next-hop-address [metric]
Delete a static route
no ip-route address next-hop-address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Guidelines
The ip-route command manages static routes in the routing table. Issue this
command for each static route to add to the routing table.
To delete a static route, use the no ip-route command. Issue this command for
each static route to delete from the routing table.
Examples
v Add a static route to the routing table (subnet 10.10.10.224 via next-hop router
192.168.1.100). The metric for the route is 0, the default value for IPv4, which is
the most preferred route.
# ip-route 10.10.10.0/27 192.168.1.100
v Delete a static route from the routing table (subnet 10.10.10.224 via next-hop
router 192.168.1.100).
# no ip-route 10.10.10.0/27 192.168.1.100
ip-secondary-address:
This command manages secondary network addresses for the Ethernet interface.
Syntax
Add a secondary address
ip-secondary-address address
Remove a secondary address
no ip-secondary-address address
Remove all secondary addresses
no ip-secondary-address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Examples
v Add 192.168.7.6/27 as a secondary IP address to the interface.
# ip-secondary-address 192.168.7.6/27
v Remove 192.168.7.6/27 as a secondary IP address.
# no ip-secondary-address 192.168.7.6/27
v Remove all secondary IP addresses.
# no ip-secondary-address
ipv4-default-gateway:
This command designates the default IPv4 gateway for the Ethernet interface.
Syntax
Designates the default IPv4 gateway
ipv4-default-gateway address
Deletes the default IPv4 gateway
no ipv4-default-gateway
Parameters
address
Specifies the IP address of the default IPv4 gateway.
Guidelines
The ipv4-default-gateway command designates the default IPv4 gateway that the
interface can reach. If the interface supports both IP families, use the
ipv6-default-gateway command to designate the default IPv6 gateway.
This command sets the number of IPv6 duplication address detection attempts for
the Ethernet interface.
Syntax
ipv6-dadtransmits attempts
Parameters
attempts
Specifies the number of attempts. The default value is 1.
Guidelines
If you specify more than one attempt, use the ipv6-nd-retransmit-timer command
to set the interval between attempts.
ipv6-default-gateway:
This command designates the default IPv6 gateway for the Ethernet interface.
Syntax
Designate the default IPv6 gateway
ipv6-default-gateway address
Delete the default IPv6 gateway
no ipv6-default-gateway
Parameters
address
Specifies the IP address of the default IPv6 gateway.
Guidelines
The ipv6-default-gateway command designates the default IPv6 gateway that the
interface can reach. Define a default IPv6 gateway if you defined IPv6 IP
addresses.
ipv6-nd-retransmit-timer:
This command sets the interval between IPv6 neighbor discovery attempts for the
Ethernet interface.
Syntax
ipv6-nd-retransmit-timer milliseconds
Parameters
milliseconds
Specifies the interval between attempts in milliseconds. The default value
is 1000.
Guidelines
link-aggegation-mode:
Syntax
link-aggregation-mode { on | off }
Parameters
on
Sets the interface as part of an aggregate interface.
off
Does not set the interface as part of an aggregate interface. This setting is
the default value.
Guidelines
Examples
This command changes the MAC address for the Ethernet interface.
Syntax
mac-address address
Parameters
address
Specifies the 48-bit MAC address in hex.
Guidelines
The mac-address command changes the MAC address of the Ethernet interface. By
default, the appliance uses “burned-in” MAC addresses from the network interface
controller.
Example
mode:
Syntax
Parameters
Auto For interfaces that do autonegotiation, the appliance uses standard IEEE
802.3 autonegotiation for interface speed and direction. Preference is given
to the highest speed. Preference is for full-duplex over half-duplex. This
setting is the default value.
10baseT-FD
Advertises 10BASE-T PHY (10 Mbps) in full-duplex mode.
10baseT-HD
Advertises 10BASE-T PHY (10 Mbps) in half-duplex mode.
100baseTx-FD
Advertises 100BASE-TX PHY (100 Mbps) in full-duplex mode.
100baseTx-HD
Advertises 100BASE-TX PHY (100 Mbps) in half-duplex mode.
1000baseTx-FD
Advertises 1000BASE-T PHY (1 Gbps) in full-duplex mode.
10000baseTx-FD
Advertises 10000BASE-T PHY (10 Gbps) in full-duplex mode.
The mode command specifies the operational mode for the interface. The
operational mode is the interface speed and direction. Generally you can retain the
default value.
On some appliances, you cannot use this command to modify the operational
mode. Because some network equipment might not negotiate properly, you can use
this command to set speed and direction explicitly. If you manually configure one
end of the link, you must manually configure the other end of the link to the same
setting.
On physical appliances, you cannot modify the operational mode for Ethernet
interfaces that use 10-gigabit ports. On blades, you cannot modify the operational
mode on any Ethernet interface.
mtu:
This command sets the maximum transmission unit of the Ethernet interface.
Syntax
mtu bytes
Parameters
bytes Specifies the maximum size in bytes. Enter a value in the range 576 -
16128. The default value is 1500.
Guidelines
The mtu command sets the maximum transmission unit (MTU) for the Ethernet
interface. The MTU is determined regardless of the length of the layer 2
encapsulation.
v When the Ethernet interface is part of a VLAN interface, the MTU of the VLAN
interface cannot be greater than the MTU for the Ethernet interface.
v When the Ethernet interface is part of an aggregate interface, the MTU of the
aggregate interface overrides the MTU of the Ethernet interface.
Example
packet-capture:
Syntax
Start a packet-capture session
packet-capture file seconds KB ["expression"]
Stop a packet-capture session
no packet-capture file
Guidelines
Examples
v Start a timed packet-capture session that writes data to the temporary:///
capture-1 file. The session completes either after 30 minutes or when the file
contains 2500 KB, whichever occurs first.
# packet-capture temporary:///capture-1 1800 2500
Trace begun.
#
v Start a timed packet-capture session that writes data to the temporary:///
capture-2 file. The session records only packets where 53 is the destination port.
The session completes either after 30 minutes or when the file contains 2500 KB,
whichever occurs first.
# packet-capture temporary:///capture-2 1800 2500 "dst port 53"
Trace begun.
#
v Start a continuous packet-capture session that writes data to the
temporary:///capture-3 file. The session completes either when it contains
50000 KB or when you stop it.
# packet-capture temporary:///capture-3 -1 50000
Trace begun.
#
v Stop the packet-capture session that writes data to the temporary:///capture-3
file.
# packet-capture temporary:///capture-3
Continuous packet capture to temporary:///capture-3 on interface stopped.
#
always-on-shutdown:
Syntax
always-on-shutdown { on off }
on Generate the report. This setting is the default value.
off Does not generate the report.
Guidelines
always-on-startup:
Syntax
always-on-startup { on | off }
on Sends the report.
off Does not automatically send the report on startup. This setting is the
default value.
Guidelines
email-address:
This command specifies the email address to which to send error reports.
email-address address
Parameters
address
Specifies the full email address of the message recipient.
Function
The email-address command specifies the email address to which to send error
reports.
Example
email-sender-address:
This command specifies the email address of the sender of the error report.
Syntax
email-sender-address address
Parameters
address
Specifies the full email address of the message sender.
Guidelines
Examples
ffdc event-log:
Syntax
Parameters
on Includes the event log.
off Does not include the event log. This setting is the default value.
ffdc memory-trace:
Syntax
Parameters
on Includes the memory leak.
off Does not include the memory leak. This setting is the default value.
Guidelines
The ffdc memory-trace command indicates whether to run a memory leak capture
if the system memory usage is too low or too high. This option enables
background leak detection, capturing all allocation call sites when the system
detects a memory leak trend. This information is formatted into an error report
when a first failure data capture (FFDC) event is triggered. Enable this feature to
help resolve problems.
ffdc packet-capture:
Syntax
Parameters
on Includes the packet capture.
off Does not include the packet capture. This setting is the default value.
Guidelines
This command indicates the path on the FTP server to upload the report.
Syntax
ftp-path filepath
filepath
The file path on the FTP server where the error report is written.
ftp-server:
This command indicates the remote FTP server to upload the error report.
Syntax
ftp-server host
Parameters
host The host name or IP address of the FTP server.
ftp-user-agent:
This command indicates the user agent that describes how to connect to remote
FTP servers.
Syntax
ftp-server user-agent
Parameters
user-agent
The name of the user agent.
Guidelines
The ftp-server command indicates the user agent that describes how to connect to
remote FTP servers. In addition to the FTP policy to define the connection, ensure
that the user agent defines the basic authentication policy (user name and
password) to connect to the FTP server.
internal-state:
Syntax
internal-state { on | off }
Parameters
on Includes the snapshot.
off Does not include the snapshot. This setting is the default value.
location-id:
Syntax
location-id string
Parameters
string Specifies descriptive text.
Guidelines
The location-id command specifies the subject line of the email message. If the
message contains spaces, wrap the value in double quotation marks.
Examples
nfs-mount:
This command specifies the NFS mount point to upload the error report.
Syntax
nfs-mount mount
Parameters
mount The NFS mount point.
nfs-path:
This command specifies the NFS path location to upload the error report.
Syntax
nfs-path path
Parameters
path The file path on the NFS server to which to upload the error report.
protocol:
This command indicates the protocol to use to upload the error report.
protocol protocol
Parameters
protocol
Sets the protocol scheme to upload the error report.
ftp Uses FTP to upload the error report to a remote server.
nfs Uploads the error report to a specified location on an NFS mount.
raid Uploads the error report to a specified location on a RAID volume.
smtp Sends the error report to a specified email address.
temporary
Uploads the error report to a temporary local location.
Guidelines
The protocol command indicates the protocol to use to upload the error report.
v If the protocol is ftp, use the ftp-server, ftp-path, and ftp-user-agent
commands to define the location and connection information to the FTP server.
v If the protocol is nfs, use the nfs-mount and nfs-path commands to define the
NFS mount point and file path to upload the error report.
v If the protocol is raid, use the raid-path and raid-volume commands to define
the RAID volume and location to upload the error report.
raid-path:
This command specifies the directory on the RAID volume to upload the error
report.
Syntax
raid-path path
Parameters
path The file path on the RAID volume to upload the error report to.
raid-volume:
This command specifies the RAID volume to upload the error report.
Syntax
raid-volume volume
Parameters
volume
The RAID volume to upload the error report to.
remote-address:
This command identifies the remote SMTP server to send the failure notification.
remote-address host
Parameters
host Identifies the remote SMTP server by host name or IP address.
Guidelines
The remote-address command identifies remote SMTP server to send the failure
notification.
report-history:
Syntax
report-history number
Parameters
number
Identifies the number of error reports to keep. Enter a value in the range 2
- 10. The default value is 5.
Guidelines
Locally stored error reports overwrite the oldest report when the entered number
is exceeded. Remotely stored error reports cannot be overwritten and are kept until
manually removed.
upload-report:
Syntax
upload-report { on | off }
Parameters
on Uploads the error report to a specified location.
off Does not upload the error report. This setting is the default value.
use-smtp:
This command indicates whether to use SMTP to send the error report as an email
message.
Syntax
use-smtp { on | off }
Parameters
on Sends the error report to a specified email address.
You can use the fibre channel volume commands to configure fibre channel
volumes on the IBM MQ Appliance.
The fibre channel volume commands can be run from the command line interface
in fibre channel volume configuration mode. To enter fibre channel volume
configuration mode, complete the following steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter fibre channel volume configuration
mode:
fibre-channel-volume name
where name is the name of the volume that you want to configure.
3. Type exit to leave the configuration mode and save your changes, then type
exit again to leave global configuration mode.
lun-uid:
This command specifies the lun-uid (LUID) used to identify the SAN storage
device corresponding to the volume.
Syntax
lun-uidlun-uid
Parameters
lun-uid
The globally unique type 3 (FC Name_Identifier) or type 2 (IEEE EUI-64)
LUID that should be used to locate the storage device. Provide the 128-bit
or 64-bit value as a hexadecimal string.
Guidelines
You can discover the LUIDs that are available to the appliance by typing the
following command:
show fibre-channel-luns
use-multipath:
This command indicates whether multipath connections are enabled for a volume
connecting to a SAN.
Syntax
Guidelines
Typically, SAN infrastructures have multiple routes configured in the SAN fabric to
each SAN host. Using multipath combines these routes to appear as a single route
to the queue manager, but with the underlying advantages of reliability and
performance offered by multiple routes. The multipath option is selected by default
for a volume. If you know that you do not have multiple physical routes
configured, select off.
Example
File commands
You can use the file commands to move files on and off the IBM MQ Appliance
and list the contents of directories.
The file commands can be run from the command line interface in configuration
mode. To enter configuration mode, type config.
copy:
Syntax
Parameters
-f Overwrites an existing file when one with the same name exists. When
omitted, an attempt to save a file with the same name as an existing file
results in a confirmation prompt.
source
destination
Specifies the locations as a URL that identifies the source file and target
destination.
v When the source or destination is the appliance, use the
directory:///file format.
v If the source file or target destination is remote and the transport
protocol is SCP or SFTP, use a format that is RFC 1738 compliant.
To use an absolute path.
scp://user@host:port//file_path
sftp://user@host:port//file_path
To use a path that is relative to the user's home directory.
scp://user@host:port/file_path
sftp://user@host:port/file_path
Guidelines
The copy command transfers files to or from the DataPower® appliance. You must
issue this command from the appliance.
v The optional -f parameter forces an unconditional copy. When provided, the
command does not warn of possible file overwrites.
v The optional manager parameter defines the basic authentication configuration to
use. When provided, the command uses the user agent for this XML manager
instead of the default XML manager.
When the source file or target destination is remote to the appliance, this command
supports only the following protocols:
v HTTP
v HTTPS
v Secure Copy (SCP)
v Secured File Transfer Protocol (SFTP)
Note: If you use SCP or SFTP to copy multiple files at the same time, a system
error might occur. The appliance supports only one SCP or SFTP connection at a
time. Issue the command again if you encounter a system error.
To send a file from the appliance as an email, use the global send file command.
Restriction: When you use the copy command, be aware of the following
restrictions.
v You cannot copy files from the cert: directory.
v You cannot copy files to the audit:, logstore:, or logtemp: directory.
Examples
v Use HTTP to copy a file from the specified location to the image: directory.
(config)# copy http://host/image.crypt image:///image.crypt
File copy success (1534897 bytes transferred)
v Use HTTP over SSL to copy a file from the specified location to the image:
directory.
(config)# copy https://host/image.crypt image:///image.crypt
File copy success (1534897 bytes transferred)
v Use HTTP to copy a file from the specified location to the local: directory with
the basic authentication credentials in the sec XML manager.
(config)# copy http://host/sec/stock.wsdl local:///stock.wsdl sec
File copy success (2022 bytes copied)
delete:
Syntax
delete URL
Parameters
URL
Specifies the location as a URL of the file to delete in the
directory:///file format.
Guidelines
The delete command deletes a file on the DataPower appliance. The deletion of a
file is permanent. After you delete a file, it cannot be recovered.
Examples
v Delete the startup-config-deprecated file from the store: directory.
(config)# delete store:///startup-config-deprecated
v Delete the betaImage file from the image: directory.
(config)# delete image:///betaImage
dir:
dir directory
Parameters
directory
Specifies a directory on the appliance.
Examples
v List the contents of the config: directory.
(config)# dir config:
move:
Syntax
Parameters
-f Overwrites an existing file when one with the same name exists. When
omitted, an attempt to save a file with the same name as an existing file
results in a confirmation prompt.
source
destination
Specifies the locations as a URL that identifies the source file and target
destination in the directory:///file format.
Guidelines
You can use the move command to transfer a file to or from a directory.
Restriction: You cannot use the move command to copy a file from the private
cryptographic area, such as the cert: directory.
acl:
Syntax
Creates or edits a service-specific ACL.
acl name
Edits the ACL for the SSH service.
acl ssh
Edits the ACL for the web management interface.
acl web-mgmt
Edits the ACL for the XML management interface.
acl xml-mgmt
Deletes a service-specific ACL.
no acl name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
The acl command enters Access Control List mode. In this mode, you can
configure an ACL for a specific service.
An ACL contains one or more clauses. Each clause consists of an IP address range
that is defined by an IP address and netmask and a Boolean value (allow or deny).
IP addresses are evaluated against each clause in the order in which they are in the
list. A candidate address is denied or granted access to the service with the first
matching clause. Therefore, the order of clauses is important.
Examples
v Create the ACL-1 ACL.
# acl ACL-1
v Delete the ACL-1 ACL.
# no acl ACL-1
v Edit the ACL for the SSH service.
# acl ssh
v Edit the ACL for the web management interface.
# acl web-mgmt
v Edit the ACL for the XML management interface.
# acl xml-mgmt
audit-log-settings:
Syntax
Enter Audit Log Settings mode
audit-log-settings
Guidelines
The audit-log-settings command enters Audit Log Settings mode. In this mode,
you can set the size and the number of rotations of the audit log.
clear dns-cache:
Syntax
clear dns-cache
Examples
Syntax
Examples
crypto:
Syntax
crypto
Guidelines
Use the exit command to exit Crypto mode and return to Global mode.
dns:
Syntax
dns
no dns
Context
Guidelines
The dns command enters DNS Settings mode to define DNS settings.
Examples
v Enter DNS Settings mode.
# dns
DNS Settings mode
v Disable DNS.
# no dns
Before you configure an interface, obtain the essential network data from your
network team.
Syntax
Accesses the configuration of an Ethernet interface
ethernet name
Deletes the configuration for an Ethernet interface
no ethernet name
Parameters
name Specifies the name of the configuration. The show link command lists the
supported Ethernet interfaces.
Guidelines
The ethernet command enters Ethernet mode for a specific Ethernet interface.
If you use a name for an Ethernet interface that your appliance type does not
support, you create that configuration. However, this configuration is not
associated with the appliance and cannot be used for traffic. When you import a
configuration from another appliance type, the import operation can create these
unsupported Ethernet interface configurations.
v If you accidentally create a configuration, use the no ethernet command to
delete it.
v When the configuration is created from an import operation, you might need the
configuration details.
– If you need these details, modify the configuration for supported Ethernet
interfaces. After you modify the configurations, use the no ethernet
command to delete the configuration for unsupported Ethernet interfaces.
– If you do not need these details, use the no ethernet command to delete the
configuration for unsupported Ethernet interfaces.
The no ethernet command deletes the configuration for an Ethernet interface. You
can delete the configuration for supported interfaces. If you delete the
configuration for a supported interface, you can use a following approach to have
a supported interface that can be used for traffic.
v You can create the configuration again.
v Restart the appliance to re-re-create the interface.
Examples
v Enter Interface mode for the eth10 Ethernet interface.
# ethernet eth10
Modify Ethernet Interface configuration
v Disable the eth10 Ethernet interface.
failure-notification:
Syntax
failure-notification
no failure-notification
Guidelines
flash:
Syntax
flash
Guidelines
The flash command enters Flash mode. In Flash mode, use the available command
to manage firmware images and the files on the appliance.
To exit Flash mode and return to Global mode, use the exit command.
fibre-channel-fs-init:
This command initializes the file space for the specified volume.
Syntax
fibre-channel-fs-init volume_name
Parameters
volume_name
The volume to initialize the file space for.
Guidelines
You must only initialize the volume file system once, after you create it and before
you attempt to use it. Initializing after you have used the volume erases all the
contents of the volume.
This command repairs the file space for the specified volume.
Syntax
fibre-channel-fs-repair volume_name
Parameters
volume_name
The volume to repair the file space for.
fibre-channel-unlock-volume:
Syntax
fibre-channel-unlock-volume volume_name
Parameters
volume_name
The volume to unlock.
Guidance
You might require to unlock a volume, for example, if it has been left locked by an
appliance that stopped abruptly while having the volume enabled. You can unlock
the volume from another appliance to take over the work from the failed
appliance.
The appliance that unlocks a volume must be zoned such that it can see the
volume.
Attention: You should not use this command other than in fault situations. If you
unlock a volume currently in use by another appliance with no fault, you will
cause the queue manager to crash.
fibre-channel-volume:
This command creates a volume used to connect to a SAN using the appliance
fibre channel.
Syntax
Creates or modifies a volume.
fibre-channel-volume volume
Deletes a volume.
no fibre-channel-volume volume
Availability
Guidelines
host-alias:
Syntax
host-alias alias
no host-alias alias
Parameters
alias Specifies the alias to assign to the specified IP address.
Guidelines
ipmi-lan-channel:
Syntax
Defines the LAN channel.
ipmi-lan-channel mgt0
Deletes the LAN channel.
no ipmi-lan-channel mgt0
Availability
Guidelines
The ipmi-lan-channel command enters IPMI LAN Channel mode for the mgt0
interface. While in the mode, define the LAN channel. The Intelligent Platform
Management Interface (IPMI) LAN channel must be on the mgt0 interface, which is
accessible over only the mgt0 physical interface on the appliance.
ipmi-user:
Syntax
Creates or modifies an IPMI user.
ipmi-user name
Deletes an IPMI user.
no ipmi-user name
Availability
Parameters
name Specifies the name of the IPMI user. The name must be 16 characters or
less.
Guidelines
The ipmi-user command enters IPMI User mode. While in the mode, define an
Intelligent Platform Management Interface (IPMI) user.
An IPMI user can create, change, or destroy user authentication records in the
Baseboard Management Controller (BMC). Authentication records allow users to
communicate with IPMI protocols over external channels, such as an IPMI LAN
channel. On the IBM MQ Appliance, there can be eight IPMI users.
known-host:
Syntax
no known-host host
Parameters
host Specifies the fully-qualified host name or IP address for the peer. For
example:
ragnarok.datapower.com
10.97.111.108
ssh-rsa
Identifies RSA as the key type.
key Specifies the host public key for the peer. For example:
AAAAB3NzaC1yc2EAAAABIwAAAIEA1J/99rRvdZmVvkaKvcG2a+PeCm25
p8OJl87SA6mtFxudA2ME6n3lcXEakpQ8KFTpPbBXt+yDKNFR9gNHIfRl
UDho1HAN/a0gEsvrnDY5wKrTcRHrqDc/x0buPzbsEmXi0lud5Pl7+BXQ
VpPbyVujoHINCrx0k/z7Qpkozb4qZd8==
Guidelines
Examples
v Add ragnarok.datapower.com by host name as an SSH known host.
# known-host ragnarok.datapower.com ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEA1J/99rRvdZmVvkaKvcG2a+PeCm25
p8OJl87SA6mtFxudA2ME6n3lcXEakpQ8KFTpPbBXt+yDKNFR9gNHIfRl
UDho1HAN/a0gEsvrnDY5wKrTcRHrqDc/x0buPzbsEmXi0lud5Pl7+BXQ
VpPbyVujoHINCrx0k/z7Qpkozb4qZd8==
#
v Add ragnarok.datapower.com by IP address as an SSH known host.
# known-host 10.97.111.108 ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAIEA1J/99rRvdZmVvkaKvcG2a+PeCm25
p8OJl87SA6mtFxudA2ME6n3lcXEakpQ8KFTpPbBXt+yDKNFR9gNHIfRl
UDho1HAN/a0gEsvrnDY5wKrTcRHrqDc/x0buPzbsEmXi0lud5Pl7+BXQ
VpPbyVujoHINCrx0k/z7Qpkozb4qZd8==
#
v Remove ragnarok.datapower.com by IP address as an SSH known host.
# no known-host 10.97.111.108
#
This command enters the Language mode to set the administrative state of a
language.
Syntax
language locale
Parameters
locale Specifies the operating language.
de German.
en English.
es Spanish.
fr French.
it Italian.
ja Japanese.
ko Korean.
pt_BR Brazilian Portuguese.
ru Russian.
zh_CN Simplified Chinese.
zh_TW Chinese (Taiwan).
Guidelines
The language command enters Language mode for the specified language.
While in this mode, use the admin-state command to enable or disable the
language. The admin-state command is the only command available in this mode.
v When a language has an administrative state of enabled, its operational state is
up.
v When a language has an administrative state of disabled, its operational state is
down.
Examples
v Enable a locale.
# language fr
Modify Language configuration
# admin-state enabled
v Disable a locale.
# language de
Modify Language configuration
# admin-state disabled
Syntax
ldap-search-parameters name
no ldap-search-parameters name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
link-aggregation:
Before you configure an interface, obtain the essential network data from your
network team.
Syntax
Enters the mode to create or modify an aggregate interface configuration
link-aggregation name
Deletes an aggregate interface configuration
no link-aggregation name
Parameters
name Specifies the name for the configuration.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
Guidelines
Before you can add an Ethernet interface, you must use the link-aggregation-mode
command in Interface mode to set the Ethernet interface as part of an aggregate
interface. While an Ethernet interface is part of the aggregate interface, you cannot
change its administrative state.
loadbalancer-group:
Syntax
loadbalancer-group name
no loadbalancer-group name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
The loadbalancer-group command enters Load Balancer Group mode. After you
complete the configuration of a load balancer group, assign it to an XML manager.
The assignment of the load balancer group to an XML manager makes the group
available to DataPower services that this XML manager supports.
Syntax
Parameters
name The name of the configuration. The name can have a maximum of 128
characters. The following characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name that consists of a single period, or including
two periods together, is not permitted)
Guidelines
After you enter Logging mode, you must use the type command to identify the
log type. More configuration depends on the log type.
logsize:
Syntax
logsize KB
Parameters
KB Specifies the size in KB of the log. The default value is 200.
Guidelines
Without an argument, the logsize command displays the size of the log file in KB.
Note:
Use the loglevel, logsize, and syslog commands to configure the basic logging
system.
Use the logging target command to enter Logging mode. From this mode, define
more precise control over log formats and contents.
mkdir:
Syntax
mkdir local:///subdirectory
Parameters
local:///subdirectory
The subdirectory to create in the local: directory.
Guidelines
Examples
v Create the stylesheets subdirectory of the local: directory.
# mkdir local:///stylesheets
Directory ’local:///stylesheets’ successfully created.
#
v Create the C-1 subdirectory in the stylesheets subdirectory of the local:
directory.
# mkdir local:///stylesheets/C-1
Directory ’local:///stylesheets/C-1’ successfully created.
#
network:
Syntax
Enters Network Settings mode
network
Resets network settings
no network
Guidelines
The network command enters Network Settings mode. While in this mode, you can
define network settings that include the following functions:
packet-capture-advanced:
Syntax
Starts a packet-capture session
packet-capture-advanced name file seconds KB packet-size ["expression"]
Stops a packet-capture session
no packet-capture-advanced name file
Parameters
name Specifies the name of the interface for the packet capture. There are two
special keywords.
lo Captures internal traffic on the loopback interface.
all Captures traffic from all Ethernet interfaces.
file Specifies the file name for the packet capture. You can simultaneously
capture packets on multiple interfaces by specifying a different file name
for each capture session or with the special all keyword.
seconds
Specifies the maximum duration of the packet-capture session in seconds.
Enter a value in the range 5 - 86400. The special value of -1 indicates that
the packet capture is continuous and stops after you enter the no
packet-capture-advanced command.
KB Specifies the maximum size of the file in KB. Enter a value in the range 10
- 500000.
packet-size
Optionally specifies the maximum size of each captured packet of data in
bytes. Enter a value in the range 20 - 9000. The special value -1 sets the
length to the default value of 9000 bytes, which is the maximum
transmission unit (MTU) for Ethernet interfaces. The default value ensures
that the entire packet is captured.
expression
Optionally specifies the expression that filters the packet capture. Enclose
the expression in double quotation marks.
Guidelines
Examples
v Start a timed packet-capture session on the eth10 interface that writes data to
the temporary:///capture-1 file. Each packet in the capture is limited to the
default size of 9000 bytes. The session completes either after 30 minutes or when
the file contains 2500 KB, whichever occurs first.
# packet-capture-advanced eth10 temporary:///capture-1 1800 2500 -1
Trace begun.
#
v Start a timed packet-capture session on all interfaces that writes data to the
temporary:///capture-2 file. The session records only packets where 53 is the
destination port. Each packet in the capture is limited to 9000 bytes. The session
completes either after 30 minutes or when the file contains 2500 KB, whichever
occurs first.
# packet-capture-advanced all temporary:///capture-2 1800 2500 9000 "dst port 53"
Trace begun.
#
v Start a continuous packet-capture session on the eth11 interface that writes data
to the temporary:///capture-3 file. Each packet in the capture is limited to 500
bytes. The session completes only when you stop it with the no
packet-capture-advanced command. When the file reaches its maximum size, a
new file is created with capture-3 as the base file name; for example,
capture-3.002 for the second file that is created.
# packet-capture-advanced eth11 temporary:///capture-3 -1 50000 500
Trace begun.
#
v Stop the packet-capture session on the eth11 interface that writes data to the
temporary:///capture-3 file.
# no packet-capture-advanced eth11 temporary:///capture-3
Continuous packet capture to temporary:///capture-3 on eth11 stopped.
#
raid-activate:
Syntax
raid-activate name
Parameters
name Specifies the name of the array volume. The name is raid0.
Guidelines
Activate the RAID volume in the disks as the active RAID volume.
# raid-activate raid0
raid-delete:
Syntax
raid-delete name
Parameters
name Specifies the name of the array volume. The name is raid0.
Guidelines
The raid-delete command makes the disks that are presently an array volume on
the appliance no longer an array volume, removing all metadata. This action
destroys the content of the array volume.
Example
raid-initialize:
Syntax
raid-initialize name
Parameters
name Specifies the name of the array volume. The name is raid0.
Guidelines
The raid-initialize command makes the two disks into an array volume. This
action destroys any prior content of the array volume.
Example
raid-learn-battery:
Syntax
raid-learn-battery
The raid-learn-battery command request the battery backup unit (BBU) to start
the learning cycle. This action takes approximately 6 hours to complete. During the
learning cycle, the write cache is disabled. During this period, write performance is
slower.
Examples
raid-make-hot-spare:
Syntax
raid-make-hot-spare name
Parameters
name Specifies the name of the RAID volume. The name is raid0.
Guidelines
The raid-make-hot-spare command makes any connected disk that it not part of
the RAID volume into a hot spare. A hot spare is the replacement for a failed disk
in the RAID volume. Use this command after you replace a failed disk with a new
disk.
Example
raid-rebuild:
Syntax
raid-rebuild name
Parameters
name Specifies the name of the RAID volume. The name is raid0.
Guidelines
Example
Syntax
raid-volume name
Parameters
name Specifies the name of the array volume. The name is raid0.
Guidelines
The raid-volume command enters RAID Array mode for the raid0 RAID volume.
rbm:
Syntax
rbm
no rbm
Guidelines
Use the no rbm command to disable RBM service. Note that this command can
disable GUI access.
reset failed-login:
This command resets the failed login for a user so they can attempt to log in again.
Syntax
Parameters
account
Specifies the name of the user account to reset the failed login count for.
Guidelines
Example
Syntax
Parameters
account
Specifies the name of the user account to reset.
password
Specifies the new, temporary password for the account.
Guidelines
After an administrator reenables the account, the administrator needs to send the
owner of the account the new password. The next time the owner of the account
logs in, the interface prompts for a new password. This password must comply
with the corporate password policy.
Example
Reenable the suehill account by changing the password for the account. The
administrator does not set the password.
# configure terminal
(config)# reset username suehill
Enter new password: ********
Re-enter new password: ********
Password for user ’suehill’ is reset.
rest-mgmt:
Guidelines
The rest-mgmt command enters REST Management Interface mode to configure the
REST management interface. The REST management interface monitors REST
management traffic. When enabled, You can send requests to the REST
management interface to supported service protocols to manage the appliance. The
REST management interface runs SSL and uses HTTP Basic Authentication (user
name and password).
Examples
rmdir:
Syntax
rmdir local:///subdirectory
Parameters
local:///subdirectory
The subdirectory to remove from the local: directory.
Guidelines
Example
Deletes the stylesheets subdirectory and all its contents from the local: directory.
# rmdir local:///stylesheets
Removing ’local:///stylesheets’ will delete all files including subdirectories!
Do you want to continue? [y/n]:y
Directory ’local:///stylesheets’ successfully deleted.
#
snmp:
Syntax
snmp
no snmp
Guidelines
Examples
v Enter SNMP Settings mode to manage the SNMP log target.
# snmp
SNMP Settings mode
#
ssh:
Syntax
no ssh [address]
Parameters
address
Specifies the IP address of a local interface.
port Identifies the port of a local interface that services SSH traffic. The default
value is 22.
Guidelines
SSH is disabled by default. You can use the optional arguments to explicitly bind
SSH to a specified interface. If you explicitly bind SSH to an interface, you must
have previously configured that interface.
In the absence of an explicit address assignment, SSH first attempts to bind to the
management port. If the appliance does not have a management port configured,
SSH binds to all configured interfaces.
If the Ethernet for the local address supports IPv6 addresses, modify the ssh access
control list to include an allow clauses for specific or all IPv6 addresses.
Examples
v Enable SSH on port 22 (the default port) of the specified interface.
# ssh 10.10.13.4
SSH service listener enabled
v Enable SSH on port 2200 of the specified interface.
# ssh 10.10.13.4 2200
SSH service listener enabled
v Disable SSH on all interfaces, which restores the default state.
# no ssh
SSH service listener disabled
system:
Syntax
system
Syntax
timezone
Guidelines
While in Timezone mode, configure the time zone settings for the appliance. The
time zone alters the display of time to the user.
top:
Syntax
top
Guidelines
Regardless of the current location in the configuration modes, the top command
immediately returns you to your initial login mode.
For custom accounts, this command returns you the your user group-specific login
mode.
Examples
undo:
Syntax
Parameters
type Specifies the type of configuration. For a complete list, use the show
command.
name Specifies the name of the configuration.
Guidelines
The undo command reverts a modified configuration to its last persisted state. The
persisted state is the configuration in the startup configuration. You use the write
memory command to save configuration changes to the startup configuration.
For a new configuration that in not saved to the startup configuration, you receive
the following message.
For a configuration that is not modified, you receive the following message.
Invalid class
user:
Syntax
user name
no user name
Parameters
name Specifies the name of the user.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
The user command is available in Global mode. The user command enters User
mode. While in User mode, you can create or modify User objects.
Syntax
usergroup name
no usergroup name
Parameters
name Specifies the name of the user group.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
A user group consists of a set of access privileges that are subsequently assigned to
individual user accounts.
user-expire-password:
This command forces a user to change the account password at the next log on.
Syntax
user-expire-password account
Parameters
account
Identifies the target account.
Example
Force a password change for the josephb account on the next log on.
# user-expire-password josephb
Expire password for user ’josephb’ succeeded
vlan:
Syntax
Enters the mode to create or modifies a VLAN interface configuration
vlan name
Deletes a VLAN interface configuration
no vlan name
Parameters
name Specifies the name of the configuration.
The name can contain a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.)
Guidelines
The vlan command enters VLAN mode to manage the configuration of VLAN
interfaces. You can create multiple VLAN interface configurations on a single
Ethernet interface or aggregate interface.
Use the no vlan command to delete the configuration for a VLAN interface.
web-mgmt:
Syntax
Enters Web Management Service mode.
web-mgmt
Starts the web management service on a listening address-port pair with an
optional session timer.
web-mgmt address port [ timer | off ]
Disables the web management service.
no web-mgmt
Parameters
address
Identifies the listening IP address on the appliance. The default value is
0.0.0.0.
v When the value is 0.0.0.0, the service listens on all active IPv4 addresses.
Guidelines
Examples
v Enters Web Management Service mode.
# web-mgmt
Modify Web Management Service configuration
v Modify the web management service for the specified IP address-port pair. The
idle-session timer uses the default value of 10 minutes.
# web-mgmt 10.10.13.31 9090
Web management successfully started
v Modify the web management service for the specified IP address-port pair. Set
the idle-session timer to 15 minutes.
# web-mgmt 10.10.13.31 9090 900
Web management successfully started
v Restore the idle-session timer to its default value.
# web-mgmt 10.10.13.31 9090 off
Web management successfully started
v Disable the idle-session timer.
# web-mgmt 10.10.13.31 9090 0
...
Web management successfully started
v Disable the web management service.
# no web-mgmt
Web management successfully disabled
v Enable the web management service with its previously defined settings.
# web-mgmt
Modify Web Management Service configuration
# admin-state enabled
# exit
write memory:
Syntax
write memory
Examples
v Save the running configuration as the startup configuration.
# write memory
Overwrite existing autoconfig.cfg? y
#
v Cancel the operation.
# write memory
Overwrite existing autoconfig.cfg? n
#
To enter the configuration mode, use the Global host-alias command. To delete a
host alias, use the Global no host-alias command.
While in this mode, use the commands in the following table to define a host alias.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
Table 42. Host Alias commands
Command Purpose
“admin-state” on page 586 Sets the administrative state for the configuration.
“ip-address” Creates an alias for an IP address on a Ethernet port.
ip-address:
Syntax
ip-address address
Parameters
address
Specifies the IP address to map.
Guidelines
The ip-address command creates an alias for a local IP address of the appliance.
Instead of providing the IP address, you can specify this alias.
Initialization commands
You can use the initialization commands to initalize or reset the IBM MQ
Appliance.
The initialization commands can be run from the command line interface in flash
mode. To enter flash configuration mode, from the appliance command line, type
flash.
boot config:
This command designates the startup configuration for the next restart.
Syntax
Parameters
file Specifies the name of the startup configuration file.
Guidelines
The boot config and boot image commands work together to define the restart
process.
v The boot config command designates the startup configuration.
v The boot image command designates the startup firmware image.
Example
boot delete:
Syntax
boot delete
Guidelines
A firmware upgrade with the boot image command retains current configuration
data to restore the appliance to a known, stable state if necessary. The previous
firmware image and associated configuration data is referred to as the secondary
installation.
Example
boot image:
This command designates the startup firmware image and restarts the appliance
with this image.
Syntax
Parameters
accept-license
Indicates acceptance of the terms of the license agreements.
file Specifies the name of the firmware image.
Guidelines
The boot config and boot image commands work together to define the restart
process.
v The boot config command designates the startup configuration.
v The boot image command designates the startup firmware image.
The firmware image can contain new version of component firmware. Examples of
component firmware includes, but is not limited to, the BIOS, BMC, and RAID
controller for the appliance. When the firmware image contains new versions of
component firmware. the upgrade can take approximately 20 minutes. During this
upgrade process, do not power off or restart the appliance.
You must use the accept-license keyword to confirm acceptance of the original
license agreement (that is, the license agreement that you accepted when you
installed and configured the IBM MQ Appliance).
You can use an empty license.accepted file when you automate the installation
process with a script. To indicate acceptance of the terms of the license agreements,
the script must create the empty license.accepted file in the temporary: directory
on the appliance. When the file exists on the appliance:
v The license is considered to be accepted.
v The appliance allows the firmware upgrade to proceed.
Examples
v Restarts the appliance with the file 5001 in the image: directory. Acknowledge
acceptance of the license agreements with the accept-license keyword.
boot switch:
Syntax
boot switch
Guidelines
A firmware upgrade with the boot image command retains current configuration
data, including activated features, which allows you to restore the appliance (rolled
back) to a known, stable state if necessary.
v The previous firmware image and associated configuration data is the secondary
installation.
v The newly installed firmware image and associated configuration data is the
primary installation.
The boot switch command is not available on an appliance that is part of a high
availability group.
When you switch between firmware images that contain different versions of
component firmware, the switch can take approximately 20 minutes. During this
switch operation, do not power off or restart the appliance. Examples of
component firmware includes, but is not limited to, the BIO, BMC or RAID
controller for the appliance.
You can use the boot switch command to transition between the newly installed
and previously active firmware versions.
Configuration edits that are made to a selected image are local and are not
included during the rollback operation. It is possible to issue the boot switch
command twice, which returns the appliance to the newly installed version.
While you can use the boot delete command to delete the secondary installation,
keep in mind that its deletion prevents firmware rollback as provided by the boot
switch command. Do not delete of the secondary installation unless you are
working with IBM Support.
Example
The rollback operation failed. The secondary installation was deleted with the boot
delete command.
boot update:
Syntax
Parameters
write Creates and opens a new configuration. If the file exists, the appliance
erases and opens the existing configuration.
append Opens an existing configuration to which to add commands.
file Specifies the name of the configuration file to create or open.
Guidelines
Follow the last command of the configuration with the following sequence to
signal the end of the configuration.
1. Press the Enter key.
2. Enter a ..
3. Press the Enter key.
After you complete your edits, use the boot config and shutdown commands to
activate this configuration.
Examples
v Create the jrb_03.cfg configuration. If it exists, the appliance erases and opens
the file.
# boot update write jrb_03.cfg
Enter startup commands, one per line. End with a period.
v Open the jrb_03.cfg configuration to add commands.
# boot update append jrb_01.cfg
Enter startup commands, one per line. End with a period.
This command deletes all configuration data from the file system of the appliance.
Syntax
reinitialize file
Parameters
file Specifies the name of the firmware image to reinitialize the appliance. The
file must be in the image: directory.
Guidelines
The reinitialize command deletes all configuration data in the file system of the
appliance. This data consists of style sheets, object configurations, keys, certificates,
log files, and so forth.
You must be logged in as the user admin to use the reinitialize command.
After files are deleted, they cannot be recovered. If you might need any of these
files after you reinitialize the appliance, ensure that you have copies of these files.
Example
Delete all user files and data on the appliance, and restart the appliance.
# reinitialize firmware.scrypt2
WARNING - all user data and files will be deleted
Do you want to continue ("yes" or "no")? y
#
shutdown:
Syntax
shutdown
Parameters
reboot Shuts down and restarts the appliance.
Guidelines
The shutdown command shuts down, or shuts down and restarts the appliance.
Without parameters, the command restarts the appliance after waiting ten seconds.
The appliance restarts with the startup configuration that is specified by the boot
config command and the startup firmware image that is specified by the boot
image command. Without a designated startup configuration or firmware image,
the appliance restarts with the configuration and firmware image that were active
when you issued the shutdown command.
Examples
v Wait 10 seconds to shut down and restart the appliance.
# shutdown reboot
Reboot in 10 second(s).
#
v Wait 1 minute to shut down and turn off the appliance.
# shutdown poweroff 60
Shutdown in 60 second(s).
#
verify-firmware:
This command runs the integrity verifier tool against the current firmware image.
Syntax
verify-firmware
Guidelines
The verify-firmware command runs the integrity verifier tool against the current
firmware image. This tool verifies the integrity of files that are part of the currently
installed firmware.
When you run the integrity verifier tool, it verifies the integrity of files that are
part of the currently installed firmware. When files are different than the currently
installed firmware image, messages are written to the console and also written as
warnings to the system log.
This command is similar the boot image command with the file-integrity checker.
Example
The IPMI user commands can be run from the command line interface in IPMI
user configuration mode. To enter IPMI user configuration mode, complete the
following steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter IPMI user configuration mode:
ipmi-user
3. Type exit to save your changes and leave IPMI user configuration mode, then
type exit again to leave global configuration mode.
password:
Syntax
password [password]
Parameters
password
Optional: Sets the password for the user.
Guidelines
The password command sets the password that the remote user must present for
authentication. The password length must be 8 - 16 characters. This command with
the user-id command defines an authentication record in the Baseboard
Management Controller BMC).
Note: Because the password is in only the BMC, it is not included as part of an
export or backup operation. Because the password is not part of an export, it is not
added during an import or restore operation.
user-id:
Syntax
user-id identifier
Guidelines
The user-id command sets the identifier for the IPMI user. This command with
the password command defines an authentication record in the Baseboard
Management Controller BMC).
Each user must have a unique identifier. The index for all user configurations in
the BMC is this identifier.
The IPMI LAN channel commands can be run from the command line interface in
IPMI LAN channel configuration mode. To enter IPMI LAN channel configuration
mode, complete the following steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter IPMI LAN channel configuration mode:
ipmi-lan-channel
3. Type exit to save your changes and leave IPMI LAN channel configuration
mode, then type exit again to leave global configuration mode.
allowed-user:
Syntax
Allows a user
allowed-user ID [privilege] [SOL] [sessions]
Disallows a user
no allowed-user ID
Parameters
ID Specifies the name of an existing Intelligent Platform Management
Interface (IPMI) user to enable on this LAN channel. To create an IPMI
user, use the Global ipmi-user command.
privilege
Optional: Sets the maximum privilege level to allow the user on this LAN
channel.
callback
Allows IPMI commands that establish a callback connection.
user Allows IPMI commands that read operational status. This setting is
the default value.
operator
Allows IPMI commands that change operational status.
Guidelines
The allowed-user command specifies a user allowed to use this LAN channel. For
each user, include the maximum privilege level, whether to allow serial over LAN,
and the maximum number of simultaneous sessions. Use this command for each
user to allow.
CAUTION:
If you enable serial over LAN support for the IPMI LAN channel, an IPMI user
who connects through an IPMI 2.0 client has access to the serial console port.
v An IPMI user can connect through an IPMI 2.0 client independent of the state
of the appliance. The only time that an IPMI user cannot connect to the
appliance is when the appliance is disconnected from AC power.
v An IPMI user has higher priority than a user who is directly connected to the
serial port.
v If a user is directly connected to the serial port, the IPMI user usurps the
current serial session and does not need to log in to the appliance. If no user
is directly connected to the serial port, the IPMI user must log in to the
appliance.
v There can be only one serial user. The IPMI user suspends the serial session
of the user who is directly connected to the serial port until the remote IPMI
user closes (deactivates) the serial session. When the IPMI user closes the
serial session, the session for the user who is directly connected to the serial
port resumes.
v If an IPMI user is connected to the appliance and you need to use the serial
port, you must unplug the Ethernet cable from the MGT0 port. After you
unplug the cable, wait for the serial port to become available, which can take
up to 20 minutes.
ip address:
This command sets IP addresses with subnet mask for the IPMI LAN channel.
Parameters
address
Specifies the IP version 4 (IPv4) address and netmask. The netmask can be
in CIDR (slash) format or dotted decimal format. With CIDR format, the
integer specifies the prefix length. The prefix length can be in the range 0 -
32.
Guidelines
The ip address command sets IPv4 addresses with subnet mask to the interface.
This IP address must be distinct from all IP addresses on the appliance and from
all IP address on the connected subnet (broadcast domain).
ip default-gateway:
This command sets the default gateway for the IPMI LAN channel.
Syntax
Sets the default gateway
ip default-gateway address
Deletes the default gateway
no ip default-gateway
Parameters
address
Specifies the IP address of the default gateway.
Guidelines
maximum-channel-privilege-level:
Syntax
maximum-channel-privilege-level privilege
Guidelines
sol-enabled:
Syntax
sol-enabled { on | off }
Parameters
on Users can use the serial over LAN protocol. This setting is the default
value.
off Users cannot use the serial over LAN protocol.
Guidelines
The sol-enabled command indicates whether to support the serial over LAN
protocol over Remote Control and Management Protocol Plus (RCMP+) on this
channel. When enabled, use the sol-required-user-privilege-level command to
set the privilege level for serial over LAN connections.
sol-required-user-privilege-level:
This command sets the privilege level for serial over LAN.
Syntax
sol-required-user-privilege-level privilege
Parameters
privilege
Sets the privilege level required for serial over LAN. The keyword list is in
from lowest to highest privilege level.
callback
Allows IPMI commands that establish a callback connection.
user Allows IPMI commands that read operational status. This setting is
the default value.
operator
Allows IPMI commands that change operational status.
Guidelines
This command is available when serial over LAN is enabled with the sol-enabled
command.
While in this mode, use the following commands in the following table to define
the LDAP search parameters.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
base-dn:
Syntax
base-dn DN
Parameters
DN Specifies the base DN for the search.
Guidelines
The base-dn command specifies the distinguished name (DN) relative to the LDAP
search. This value identifies the entry level of the tree that is used by the scope
command.
filter-prefix:
Syntax
filter-prefix prefix
Parameters
prefix Specifies the prefix of the filter expression.
Guidelines
The filter-prefix command specifies the string prefix to construct an LDAP filter
expression, as defined in RFC 4515. This string is added before the user name to
construct the LDAP filter to search for the DN of the user.
If the prefix is (&(mail= and the user name is bob@example.com and the suffix is
)(c=US)), the LDAP search filter is (&(mail=bob@example.com)(c=US)).
You can use the filter-suffix to append a string to the LDAP filter expression to
complete the search filter.
filter-suffix:
Syntax
filter-prefix suffix
Parameters
suffix Specifies the suffix of the filter expression.
Guidelines
The filter-suffix command specifies the string suffix to construct an LDAP filter
expression, as defined in RFC 4515. This string is added after the user name to
construct the LDAP filter to search for the DN of the user.
If the prefix is (&(mail= and the user name is bob@example.com and the suffix is
)(c=US)), the LDAP search filter is (&(mail=bob@example.com)(c=US)).
You must use the filter-prefix to add the prefix string to the LDAP filter
expression to complete the search filter.
Example
returned-attribute:
Syntax
returned-attribute attribute
Parameters
attribute
Specifies the name of the attribute to return. The default value is dn.
Guidelines
The returned-attribute command specifies the name of the attribute to return for
each entry that matches the search criteria.
Syntax
Parameters
base Searches the entry level of the tree only.
one-level
Searches the entry level of the tree and any object that is one-level below
the input.
subtree
Search the entry level of the tree and all of its descendants. This setting is
the default value.
Guidelines
The scope command indicates the depth of the LDAP search. The entry level of the
tree is defined by the base-dn command.
The link aggregation commands can be run from the command line interface in
link aggregation configuration mode. To enter link aggregation configuration
mode, complete the following steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter link aggregation configuration mode:
link-aggregation name
where name is the name of the link aggregation interface that you want to
configure. The name can have a maximum of 128 characters. The following
characters are valid:
v a through z
v A through Z
v 0 through 9
v Underscore (_)
v Dash (-)
v Period (.) (note that a name comprising a single period, or including two
periods together, is not permitted)
3. Type exit to leave the configuration mode and save your changes, then type
exit again to leave global configuration mode.
Link aggregation interfaces are not supported for links used in high availability
configurations or disaster recovery configurations.
This command assigns the primary network address for the aggregate interface.
Syntax
ip-address address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Guidelines
The ip-address command assigns the primary network address to the interface.
The network address is an IP address with its subnet mask.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
Examples
v Assign an IP address in version 4 format.
# ip-address 192.168.7.6/27
v Assign an IP address in version 6 format.
# ip-address 2001:0db8:3c4d:0015::abcd:ef12/34
ip-config-mode:
This command identifies the configuration mode for the aggregate interface.
Syntax
Parameters
static Indicates a static, manual configuration. This setting is the default value.
dhcp Indicates IPv4 autoconfiguration with DHCP.
slaac Indicates IPv6 autoconfiguration with SLAAC.
Guidelines
Examples
v Change the configuration mode to IPv4 autoconfiguration with DHCP.
# ip-config-mode dhcp
v Change the configuration mode to manual configuration.
# ip-config-mode static
ip-route:
This command manages static routes in the routing table for the aggregate
interface.
Syntax
Add a static route
ip-route address next-hop-address [metric]
Delete a static route
no ip-route address next-hop-address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
next-hop-address
Specifies the IP address of the next-hop router.
metric Optionally specifies the preference for the route. The lesser the value, the
more preferred the route. For each IP family, the supported range differs.
v For IPv4, enter a value in the range 0 - 255. The default value is 0.
v For IPv6, enter a value in the range 0 - 65536. The default value is 512.
Guidelines
The ip-route command manages static routes in the routing table. Issue this
command for each static route to add to the routing table.
To delete a static route, use the no ip-route command. Issue this command for
each static route to delete from the routing table.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
ip-secondary-address:
This command manages secondary network addresses for the aggregate interface.
Syntax
Add a secondary address
ip-secondary-address address
Remove a secondary address
no ip-secondary-address address
Remove all secondary addresses
no ip-secondary-address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Guidelines
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
Examples
v Add 192.168.7.6/27 as a secondary IP address to the interface.
# ip-secondary-address 192.168.7.6/27
v Remove 192.168.7.6/27 as a secondary IP address.
# no ip-secondary-address 192.168.7.6/27
v Remove all secondary IP addresses.
# no ip-secondary-address
This command designates the default IPv4 gateway for the aggregate interface.
Syntax
Designates the default IPv4 gateway
ipv4-default-gateway address
Deletes the default IPv4 gateway
no ipv4-default-gateway
Parameters
address
Specifies the IP address of the default IPv4 gateway.
Guidelines
The ipv4-default-gateway command designates the default IPv4 gateway that the
interface can reach. If the interface supports both IP families, use the
ipv6-default-gateway command to designate the default IPv6 gateway.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
ipv6-dadtransmits:
This command sets the number of IPv6 duplication address detection attempts for
the aggregate interface.
Syntax
ipv6-dadtransmits attempts
Parameters
attempts
Specifies the number of attempts. The default value is 1.
Guidelines
If you specify more than one attempt, use the ipv6-nd-retransmit-timer command
to set the interval between attempts.
ipv6-default-gateway:
This command designates the default IPv6 gateway for the aggregate interface.
Syntax
Designate the default IPv6 gateway
ipv6-default-gateway address
Parameters
address
Specifies the IP address of the default IPv6 gateway.
Guidelines
The ipv6-default-gateway command designates the default IPv6 gateway that the
interface can reach. Define a default IPv6 gateway if you defined IPv6 IP
addresses.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
ipv6-nd-retransmit-timer:
This command sets the interval between IPv6 neighbor discovery attempts for the
aggregate interface.
Syntax
ipv6-nd-retransmit-timer milliseconds
Parameters
milliseconds
Specifies the interval between attempts in milliseconds. The default value
is 1000.
Guidelines
lacp-hash:
This command sets which hash function the LACP aggregation uses to determine
the interface for outbound packets.
Syntax
Parameters
ip-port
Indicates that the hash function uses both IP addresses and TCP/UDP
ports. IP addresses are layer 3. TCP/UDP ports are layer 4. This approach
is not strictly compliant to the LACP standard.
Guidelines
The lacp-hash command sets which hash function the Link Aggregation Control
Protocol (LACP) aggregation uses to determine the interface for outbound packets.
The command is meaningful only when you use the type command to define
LACP as the link aggregation type.
Example
Set the aggregate interface to use LACP and choose the aggregator with the
highest bandwidth. The aggregate interface uses only the MAC address hash
algorithm.
# type LACP
# lacp-select bandwith
# lacp-hash mac
lacp-select:
This command sets the algorithm for the LACP selection policy.
Syntax
Parameters
bandwith
Chooses the aggregator with the highest bandwidth.
count Selects the aggregator with the most NICs.
stable Does not change the aggregator when a better one is available. This setting
is the default value.
Guidelines
The lacp-select command sets the algorithm for the Link Aggregation Control
Protocol (LACP) selection policy. When there is more than one LACP aggregator
for the members of an LACP aggregation, the appliance uses the algorithm to
determine which aggregator to use. In other words, the algorithm determines
which group of aggregate interfaces is active.
The command is meaningful only when you use the type command to define
LACP as the link aggregation type.
Example
Set the aggregate interface to use LACP and choose the aggregator with the
highest bandwidth. The aggregate interface uses only the MAC address hash
algorithm.
link:
Syntax
Add an Ethernet interface
link name
Delete an Ethernet interface
no link name
Parameters
name Specifies the name of an Ethernet interface.
Guidelines
Examples
Add the eth10, eth11, and eth12 Ethernet interfaces to the aggregate interface.
# link eth10
# link eth11
# link eth12
MTU:
This command sets the maximum transmission unit of the aggregate interface.
Syntax
mtu bytes
Parameters
bytes Specifies the maximum size in bytes. Enter a value in the range 576 -
16128. The default value is 1500.
The mtu command sets the maximum transmission unit (MTU) for the aggregate
interface. The MTU of the aggregate interface overrides the MTU of the Ethernet
interface.
Example
packet-capture:
Syntax
Start a packet-capture session
packet-capture file seconds KB ["expression"]
Stop a packet-capture session
no packet-capture file
Parameters
file Specifies the file name for the packet capture. You can simultaneously
capture packets on multiple interfaces by specifying a different file name
for each interface.
seconds
Specifies the maximum duration of the packet-capture session in seconds.
Enter a value in the range 5 - 86400. The special value of -1 indicates that
the packet capture is continuous and completes when it reaches the
maximum file size or until you issue the no packet-capture command.
KB Specifies the maximum size of the file in KB. Enter a value in the range 10
- 500000.
expression
Optionally specifies the expression that filters the packet capture. Enclose
the expression in double quotation marks.
Guidelines
Examples
v Start a timed packet-capture session that writes data to the temporary:///
capture-1 file. The session completes either after 30 minutes or when the file
contains 2500 KB, whichever occurs first.
# packet-capture temporary:///capture-1 1800 2500
Trace begun.
#
type:
Syntax
Parameters
active-backup
Sets link aggregation to active-backup. One link is active, and the other
links are backup. If the active link is lost, switches to a backup link. This
setting is the default value.
LACP Sets link aggregation to the Link Aggregation Control Protocol (LACP).
The IEEE 802.1AX-2008 standard defines LACP. This mode requires
support on the network switch.
transmit
Sets link aggregation to transmit-based load balancing. This mode uses a
single link for incoming traffic but distributes outgoing traffic among all
links.
Guidelines
The type command defines the mode to use for link aggregation.
When the aggregate interface uses LACP, you can change the selection policy and
the distribution algorithm for outbound packets.
v Use the lacp-select command to change the LACP selection policy. The default
selection policy is to use active-backup.
v Use the lacp-hash command to change the LACP distribution algorithm for
outbound packets. The default algorithm is to use the hash function against both
MAC addresses and IP addresses.
Set the aggregate interface to use LACP and choose the aggregator with the
highest bandwidth. The aggregate interface uses only the MAC address hash
algorithm.
# type LACP
# lacp-select bandwith
# lacp-hash mac
yield-standby:
This command manages the inclusion of the aggregate interface in the standby
group.
Syntax
yield-standby
Guidelines
The yield-standby command removes this appliance in the standby group. This
command does not modify the interface configuration. After removal, the interface
is added back to the standby group in potentially a different state.
Use this command after you quiesce the appliance to remove the interface
gracefully from its standby group. You quiesce the appliance for maintenance.
Attention: Never use this command when preemptions is enabled in the standby
control configuration.
The state of the interface in the standby group controls what happens after you
run the command.
v When you issue the yield-standby command against the active appliance, the
following changes occur.
– The active appliance resigns from the standby group and a standby control
takeover occurs, which potentially breaks in flight connections and
transactions.
– The standby appliance becomes the active appliance.
– An election occurs among the group members to determine which one
becomes the standby appliance.
v When you issue the yield-standby command against the standby appliance, the
following changes occur.
– The standby appliance is temporarily removed from the standby group.
– An election occurs among the group members to determine which one
becomes the standby appliance.
v When you issue the yield-standby command against a listen appliance, that
appliance is removed and added back without an observable difference.
Example
Load Balancer Group mode provides the commands to create or modify a load
balancer group configuration.
To enter the mode, use the Global loadbalancer-group command. To delete a load
balancer group, use the Global no loadbalancer-group command.
While in this mode, use the following commands to define a load balancer group.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
algorithm:
Syntax
Parameters
first-alive
Uses the concept of a primary server and backup servers. When the health
state of the primary server is up, all connections are forwarded to this
server. When the health state of the primary server is softdown or down,
connections are forwarded to backup servers. The primary server is the
first server in the members list.
hash Uses the IP address of the client as the basis for server selection.
With the hash algorithm, the same client is served by the same server. Use
this algorithm only when clients access applications that require the
storage of server-side state information, such as cookies. Hashing
algorithms cannot ensure even distribution.
least-connections
Maintains a record of active server connections and forward a new
connection to the server with the least number of active connections.
round-robin
Maintains a list of servers and forwards a new connection to the next
server on the list. This setting is the default value.
weighted-round-robin
Maintains a weighted list of servers and forwards new connections in
proportion to the weight (or preference) of each server.
Guidelines
Examples
v Specify that server selection uses the first-alive algorithm.
# algorithm first-alive
v Specify that server selection uses the least-connections algorithm.
# algorithm least-connections
v Specify that server selection uses the weighted-round-robin algorithm.
# algorithm weighted-round-robin
damp:
This command specifies the dampening period for a server with health state of
softdown.
Syntax
damp seconds
Parameters
seconds
Specifies the number of seconds that a server remains in a softdown state.
Enter a value in the range 1 - 86400. The default value is 120.
Guidelines
The damp command specifies the dampening period for a member server. The
dampening period is the duration that a server is removed from the load balancer
group because it cannot connect during a normal HTTP or TCP transaction. Such a
server has a health state of softdown. When this interval expires, the server is
restored to the load balancer group and placed in the up state.
This command does not affect servers that are in the down state.
Example
giveup-when-all-members-down:
Syntax
giveup-when-all-members-down { on | off }
Parameters
on Does not forward the connection to any member. Makes the next attempt
when at least one member is in the up state.
Examples
v Disable connection attempts if all members are in the down state.
# giveup-when-all-members-down on
#
v Restore the default state.
# giveup-when-all-members-down off
#
health-check:
Syntax
Parameters
admin-state
Controls whether to run a periodic health check.
on Enables the health check.
off Disables the health check. This setting is the default state.
target-uri
For a standard health check, specifies the non-server (file path) portion of
the target URI. That is, specify the URI to receive the client request that the
rule generates. The default value is /.
This URI is used with the specified remote port.
target-port
Specify the port on the target server to receive the query. The default value
is 80.
You can override this value for one or more members of the Load Balancer
Group with the health-port argument of the server command.
The response from the server is evaluated to determine the health status of
each member server in the group. The request is sent to the target URI and
remote port.
This port is used for LDAP and standard health checks.
type Controls the type of check.
Standard
Checks the health with an HTTP request on the remote port. The
port is specified by the port argument unless it is overridden by
members of the load balancer group with the health-port
argument of the server command. The standard setting is the
default value.
TCPConnection
Checks the health with a TCP connection request on the remote
Chapter 11. Reference 723
port. The port is specified by the port argument unless it is
overridden by members of the load balancer group with the
health-port argument of the server command.
use-soap
For a standard health check, specifies the HTTP method to access the target
URI.
on Accesses the target URI with an HTTP POST operation by posting
a SOAP message. This setting is the default value.
off Accesses the target URI with an HTTP GET operation.
send-soap
When the use-SOAP argument is on, specify the SOAP message to send as
a client request. The default value is store:///healthcheck.xml. When the
use-SOAP argument is off, use two double quotation marks.
timeout
Specifies the number of seconds for the completion of the health check.
Enter a value in the range 2 - 86400. The default value is 10.
If successful, the server is deemed healthy and is marked as up; otherwise,
the server is marked as down.
frequency
Specifies the number of seconds between health checks. Enter a value in
the range 5 - 86400. The default value is 180.
xpath Use with the filter argument to specify the XPath expression that must be
found in a valid server response.
filter Specifies the style sheet to filter the server response. The default value is
store:///healthcheck.xsl.
This style sheet uses the specified xpath argument as input and scans the
server response for its presence. If found, the server is deemed healthy and
is marked as up; otherwise, the server is marked as down.
sslproxy
For a standard health check, specifies the name of the SSL Proxy Profile to
secure the connection.
enforce-timeout
For a standard health check, specifies whether to use the health check
timeout value to interrupt and end a health check transaction.
on Specifies that the health check timeout value is used.
off Specifies that the health check timeout value is not used. This
setting is the default value.
independent-checks
For a standard health check, specifies whether the health check
transactions in a Load Balancer Group run independently or sequentially.
on Specifies that the health check transactions run independently.
off Specifies that the health check transactions run sequentially. This
setting is the default value.
A health check is a scheduled rule that sends the same request to each member.
The successful completion of the health check requires that the server passes
normal TCP and HTTP connection criteria, depending on check type. Optionally, a
standard health check can use a filter to evaluate the response from the server. The
filter can use a defined expression or the evaluator can use a defined string to help
determine the server's health. If the evaluation passes, the server is healthy;
otherwise, the health state of the server is down. The response must be valid XML.
The response is analyzed with the XSL health check filter against the defined
XPath expression.
The timeout argument specifies how much time can expire before an attempt to
complete a health check fails. However, if the request hangs because the server
does not respond, the health check timeout compares only the actual time that the
request took. In this case, the health check timeout is not used to interrupt the
transaction. The enforce-timeout argument overrides this behavior and forces the
timeout to interrupt the transaction.
The frequency argument specifies the number of seconds between health checks.
This frequency value is used sequentially such that the health check consecutively
queries each load balancer member only after the prior health check completes. If a
server hangs for a long time, all other health checks for the other members are
delayed by that amount of time. The independent-checks argument overrides this
behavior and makes each health check independent.
Examples
v Specify a periodic health check for members.
# health-check on cgi-bin/x.cgi 80 Standard
on store:///identity.xsl 4 60 / store:///healthcheck.xsl sslProxy1
#
v Specify a periodic health check for members of the test1 load balancer group.
The submode commands specify that the target URI is cgi-bin/x.cgi and the
target port is 80. The health check timeout value is used, and health checks run
independently. All other properties use the default values. The health check is
saved on exit.
# loadbalancer-group test1
# health-check
# admin-state on
# target-uri cgi-bin/x.cgi
# target-port 80
# enforce-timeout on
# independent-checks on
# exit
masquerade:
This command specifies the host name to provide to the remote server.
Syntax
masquerade { on | off }
Parameters
on Passes the name of the load balanced group to the remote server.
Example
Pass the name of the load balancer group as the host name to the remote server.
# masquerade on
#
server:
Syntax
Parameters
address
Specifies the name or IP address of the server.
weight
For weighted algorithms: Specifies the relative weight (preference). Enter a
value in the range 1 - 65000. The default value is 1.
mapped-port
Specifies the port on the real server. If nonzero, the associated real server is
contacted on this port. Normally the real server is contacted on the same
port number as the one for the virtual server. In this case, retain the
default value of 0. If services run on different ports for different members
of the group, define this value.
This port is used for IMSConnect health check.
health-port
Specifies the port to test. Retain the default value of 0 to use the port that
is defined for this load balancer group.
Guidelines
The server command adds a server to the load balancer group. When you define a
member server, optionally specify the ports to use for sending client requests and
for the health check.
v For the first-alive algorithm, the sequence is significant. The first server is the
primary server, while subsequent entries serve as backup servers. For all other
algorithms, the sequence is not significant.
v For weighted algorithms, use the weight parameter to specify the relative
preference of a server. The greater the value, the more likely this server is to
receive a connection request. Assume that the load balancer group has the
following members.
– Member A with a weight of 100.
– Member B with a weight of 60.
– Member C with a weight of 40.
Because of the weights, member A receives 50% of requests, member B receives
30% of requests, and member C receives 20% of requests.
Example
try-every-server:
Syntax
try-every-server { on | off }
Parameters
on Sends the requests to each server until one responds or all fail. Each server
that fails is set to the softdown state.
off Does not attempt to contact other members. This setting is the default
value.
Guidelines
The try-every-server sends the request to each server until one responds or all
fail. This command applies only when none of the group members are in the up
state. Each server that fails is set to the softdown state.
Example
To enter the mode, use the Global logging target command. To delete a log target,
use the no logging target command.
While in this mode, use the commands in the following table to configure a log
target.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
Table 43. Log Target commands
Command Purpose
“active-timeout” on page 729 This command sets the timer to close an established and active connection
to the server.
active-timeout:
This command sets the timer to close an established and active connection to the
server.
Syntax
active-timeout seconds
Parameters
seconds
Sets the number of seconds to wait before the connection is closed. Enter a
value in the range 0 - 60. The default value is 0.
Guidelines
Attention: If multiple log targets have the following configuration, they might
share connections.
v The same local address and port
v The same remote address and port
Because of potential connection-sharing, set the same active timeout for these log
targets.
ansi-color:
Syntax
ansi-color { on | off }
Parameters
on Enables different priorities to display in different colors.
off Provides a monochrome display. This setting is the default value.
archive-mode:
Syntax
Parameters
rotate Specifies that when a log file reaches its maximum size, the log is rotated
as specified by the rotate command. This setting is the default value.
upload Specifies that when a log file reaches its maximum size, the file is
uploaded to a specified site for remote storage.
Guidelines
The archive-mode command is required when the log type is file. Otherwise, it is
ignored.
After you set the upload mode, you must use the remote-address,
remote-directory, remote-login, and upload-method commands to enable transfer
of the log file to the remote site.
Examples
v Set the archive type to upload.
# archive-mode upload
v Set the archive type to rotate, which restores the default state.
# archive-mode rotate
connect-timeout:
Syntax
connect-timeout seconds
Parameters
seconds
Sets the number of seconds that the appliance waits to establish a
connection. Enter a value in the range 1 - 90. The default value is 60.
Guidelines
The connect-timeout command indicates the time that the appliance waits to
establish a connection to the server before it generates an error message. After the
appliance generates the log message, it attempts to establish the connection again.
You can use the active-timeout and idle-timeout connection commands to
modify other timeout values.
backup:
Syntax
backup name
Parameters
name Specifies the name of a log, of any log type.
Guidelines
email-address:
This command specifies the email address of a remote recipient of SMTP log
messages.
Syntax
email-address address
Parameters
address
Specifies the remote email address.
Guidelines
The email-address command is only used when the log type is smtp.
Examples
event:
This command adds an event class and a priority to the log target.
Syntax
Parameters
class Specifies the name of an event-class, which is a set of related events.
priority
Identifies the event priority.
You can use the show logging priority command to display a list of event
priorities.
You can use the show logging event command to display a list of event classes.
Example
event-code:
Syntax
event-code code
Parameters
code Identifies the hex value of the event code.
Guidelines
This command allows only messages that contain specified event codes to be
written to the current log target. Thus, it is possible to create a log target that
collects only messages for a particular set of event codes. For example,
“Operational State down.”
Use the View List of Event Codes from the GUI to view a list of all event codes.
Example
Create a file-based log target that contains only XML parser events.
# type file
# event-code 0x00030001
# event-code 0x00030002
# event-code 0x00030003
# event-code 0x00030004
# event-code 0x00030005
# event-code 0x00030006
# event-code 0x00030007
# event-code 0x00030008
# event-code 0x00030009
# event-code 0x0003000a
#
Syntax
event-detection { on | off }
Parameters
on Suppresses the writing of identical events to the log for the specified
suppression period.
off Identical events are written to the log. This setting is the default value.
Guidelines
The event-detection command allows for the suppression of identical log events
that are generated by the same configuration object over a configurable time
period. When enabled, the log target retains a reference to each processed event for
the duration set with the suppression-period command. Until this period expires,
the log target does not process the same event from the same configuration.
event-filter:
This command specifies an event code to exclude from the log target.
Syntax
event-filter code
Parameters
code Specifies the hex value of the event code.
Guidelines
Event filters provide for the exclusion of log messages that contain specified event
codes from the log target.
Use the View List of Event Codes from the GUI to view a list of all event codes.
Example
Syntax
facility facility
Parameters
facility
Identifies the syslog facility.
Guidelines
The facility command specifies the syslog facility. This command is meaningful
only with syslog-based log targets.
Examples
feedback-detection:
Syntax
feedback-detection { on | off }
Parameters
on Suppresses all log events that are triggered by the logging subsystem.
off Suppresses log events that are triggered by the target itself, but writes
events that are generated by other log targets. This setting is the default
value.
Guidelines
The feedback-detection command allows for the suppression of log events that
are triggered by the logging subsystem itself. Log targets always suppress log
events that are triggered by the target itself but write events that are generated by
other log targets. Under certain circumstances, with two or more log targets, these
events can create a positive feedback loop that might cause resource contention.
When enabled, feedback detection suppresses all log events that are triggered by
the logging subsystem.
format:
This command specifies the format in which events are added to the log.
format format
Parameters
format
Indicates the format of log messages. The default value is xml.
cbe Specifies the log format follows the IBM Common Base Event
specification.
csv Specifies the log format as comma-separated.
raw Specifies the log format as unformatted text.
text Specifies the log format as formatted text.
xml Specifies the log format as XML.
Guidelines
Use the show logging format command to list the available formats.
idle-timeout:
This command sets the idle timer for the logging target.
Syntax
idle-timeout seconds
Parameters
seconds
Sets the number of seconds to wait before the appliance closes an inactive
connection. Enter a value in the range 1 - 600. The default value is 15.
Guidelines
The idle-timeout command sets the number of seconds to wait before the
appliance closes an established but inactive connection to the server.
Attention: If multiple log targets have the following configuration, they might
share connections.
v The same local address and port.
v The same remote address and port.
Because of potential connection-sharing, set the same values for these log targets.
Syntax
ip-filter address
Parameters
address
Identifies the network IP address.
Guidelines
The ip-filter command adds an IP address to include in the log target. Only log
messages that are from the specified IP address are written to the log target. With
this command, you can create a log target that collects log messages from only
specific clients.
local-address:
This command specifies the local address over which log events are transmitted to
a remote recipient.
Syntax
local-address address
Parameters
address
Specifies the IP address of the interface.
Guidelines
The local-address specifies the local address over which syslog log events are
transmitted to a remote recipient.
v For an SMTP log target, the local-address command is required. The log target
uses TCP port 25.
v For a syslog-based log target, the local-address command is optional.
– For syslog via UDP, the log target uses port 25.
– For syslog via TCP, the log target uses port 514.
For all other log types, the local-address command is not used.
Example
Specify the local interface used to transmit log messages to an SMTP server.
# type smtp
# local-address 10.10.13.4
local-file:
local-file URL
Parameters
URL Specifies the file to store log messages and takes the logstore:///file
form.
Guidelines
When the log type is file, the local-file command is required. For all other log
types, it is not used.
local-ident:
This command sets the string that the remote recipient uses to identify this log
target.
Syntax
local-ident identifier
Parameters
identifier
Specifies the identifier for the log target.
Guidelines
The local-ident sets the string that a remote recipient uses to identify the log
target. For an SMTP or syslog-based log target, this command is optional. For all
other types of log targets, the value set by this command is ignored.
nfs-file:
Syntax
nfs-file file
Parameters
file Specifies the path to the log file relative to the NFS mount point.
Guidelines
The file name can use only the characters a-z, A-Z, 0-9, or an underscore. The path
can have subdirectories that are delimited by a slash.
nfs-static-mount:
nfs-static-mount name
Parameters
name Specifies the name of an NFS static mount.
Guidelines
When the log type is nfs, specify the NFS static mount point to write the log over
NFS.
object:
Syntax
Parameters
type Specifies an object type. This filter restricts messages to only messages for
that object type.
name Optional: Specifies the name of an instance of the selected object type.
Guidelines
Object filters allow only those log messages that are generated by specific objects
to be written to the log target. Object filters are based on object type and based on
specific instances of that object type. Therefore, you can create a log target to
collect log messages for an instance of a particular object type. For example, you
can create a log target to write messages for the xyz service. Omit the instance
name to filter on all instances of the specified type.
Examples
v Add an object filter to log messages for the domain-3 domain.
# object domain domain-3
#
v Add an object filter to log messages for the Gateway-1 Multi-Protocol Gateway.
# object XSLProxy Proxy-1
#
priority:
This command sets the service-level priority for the log target.
Syntax
Guidelines
The priority command sets the priority for log target event-flushing. When
resources are in high demand, setting the priority to high can increase processing
capacity of the log target but might have a negative effect on the throughput of the
appliance.
rate-limit:
Syntax
rate-limit events/seconds
Parameters
events/seconds
Sets the maximum number of transactions per second. Enter a value in the
range 1 - 1000. The default value is 100.
Guidelines
The rate-limit command sets the number of log transactions per second.
v Remote log targets might receive more than this number of events within a
second, depending on network latency and buffering. Because only a single TCP
connection is made to the syslog server, a syslog over TCP log target is
exclusive.
v For syslog over TCP log targets, the rate limit is the maximum number of events
that are transmitted over the connection within 1 second. A value of 0 disables
rate-limiting by the log target.
This command is meaningful for an NFS, SMTP, SOAP, or syslog-based log target.
Otherwise, it is ignored.
Example
remote-address:
This command specifies the destination address of log messages or the log itself.
remote-address host
Parameters
host Identifies the host name or IP address of the remote server.
Guidelines
Use the remote-address command with the remote-port command to define the
destination of transmitted log messages.
With TCP-based, network log targets, instead of specifying the IP address or host
name of a remote server, you can specify the name of a load balancer group. In
this situation, the same load balancer group must be assigned to the default XML
manager in the domain with the XML Manager loadbalancer-group command. To
create a load balancer group, use the Global loadbalancer-group command.
Examples
v Specify the address of an SMTP server. Uses the default TCP port of 25.
# type smtp
# local address 10.10.13.4
# remote-address ragnarok.datapower.com
#
v Specify the address of a syslog daemon. Uses the default UDP port of 514.
# type syslog
# local address 10.10.13.4
# remote-address 172.16.100.1
#
v Specify the recipient address for an uploaded log file.
# type file
# archive-mode upload
# remote-address 172.16.100.1
#
remote-directory:
This command specifies the remote directory where uploaded logs are stored.
Syntax
remote-directory file-path
Guidelines
To denote an absolute directory from the root directory, specify a single forward
slash character or equivalent encoded character (%2F) before the fully qualified file
name.
v For SCP or SFTP, specify /file-path.
v For FTP, specify %2Ffile-path.
The path in the URL resolves to //file-path for SCP or SFTP and /%2Ffile-path
for FTP.
To denote a directory that is relative to the user's home directory, do not specify a
forward slash character or equivalent encoded character before the fully qualified
file name. For example, specify file-path. The path in the URL resolves to
/file-path.
Examples
v Specify the remote directory for an uploaded log file that is relative to the user's
home directory.
# type file
# archive-mode upload
# upload-method sftp
# remote-address 172.16.100.1
# remote-port 2121
# remote-directory logs/
#
v Specify the remote directory for an uploaded log file that is absolute to the root
directory.
# type file
# archive-mode upload
# upload-method ftp
# remote-address 172.16.300.254
# remote-port 2123
# remote-directory %2Flogs/
#
remote-login:
This command specifies the user name to use to upload a log file to a remote
server.
Syntax
Guidelines
The remote-login command is used only if the log type is file and the
archive-mode is upload.
Examples
Specify the recipient address, user name, password, and remote directory for an
uploaded log file.
# type file
# remote-address 172.16.100.1
# remote-login jrb brj
# remote-directory logs/
#
remote-port:
Syntax
remote-port port
Parameters
port Specifies the destination port that monitors traffic. The default value is 514.
Guidelines
The remote-port command specifies the listening port on the remote server. This
command is relevant only when for an SMTP or syslog-based log target, as
specified by the type command.
Use the remote-port command with the remote-address command to define the
destination of transmitted log messages.
You can use SSL to establish a secure connection to a remote server. For this
configuration, set the values of the remote-server and the remote-port commands
to the values of a local SSL Proxy on the appliance. The local SSL Proxy, as defined
by the Global sslforwarder command, can then forward log messages over a
secure connection to the remote server.
Example
Syntax
rotate count
Parameters
count Specifies how many times to rotate a log file. Enter a value in the range 1 -
100. The default value is 3.
Guidelines
The rotate command specifies the maximum number of rotations for the log file.
Depending on the appliance type, the location of the file can be the local file
system or the hard disk array.
Assuming a file name of CryptoLog and three rotations, the directory that contains
the log file can contain the following local files.
CryptoLog
The current log file.
CryptoLog1
The log file that was most recently archived.
CryptoLog2
The log file that was next most recently archived.
CryptoLog3
The oldest log file.
This command is meaningful only when one of the following conditions is met.
v The log type for the type command is file, and the archival mode for the
archive-mode command is rotate.
v The log type for the type command is nfs.
sender-address:
Syntax
sender-address address
Parameters
address
Specifies the local email address.
Guidelines
The sender-address command is only used when the log type is smtp.
Syntax
size KB
Parameters
KB Specifies the maximum size of the file in KB. Enter a value in the range
100 - 50000. The default value is 500.
Guidelines
The size command sets the maximum size of a local log file in KB.
Depending on the appliance type, the location of the file can be the local file
system or the hard disk array.
This command is only meaningful when the log type, as specified by the type
command, is file.
smtp-domain:
Syntax
smtp-domain domain
Parameters
domain
Specifies the fully qualified domain name of the SMTP client.
Guidelines
The smtp-domain command specifies the fully qualified domain name of the SMTP
client. This domain name is sent as part of the SMTP session invitation (HELO
command).
Example
soap-version:
Parameters
soap11 SOAP targets use SOAP 1.1. This setting is the default value.
soap12 SOAP targets use SOAP 1.2.
Guidelines
When the log type is soap, specifies the version of SOAP for use by SOAP log
targets.
ssl:
This command associates an SSL proxy profile for SOAP-based log over HTTPS.
Syntax
ssl name
no ssl
Parameters
name Specifies the name of an SSL proxy profile.
Guidelines
Use the ssl command associates an SSL proxy profile for SOAP-based log over
HTTPS. This command is meaningful only when the target type is SOAP and URL
uses HTTPS.
To remove the association of the SSL proxy profile, use the no ssl command.
ssl-client:
This command associates an SSL client profile for SOAP-based or syslog log
events.
Syntax
ssl-client name
no ssl-client
Parameters
name
Specifies the name of an SSL client profile.
The ssl-client command specifies the SSL client profile to secure connections
between the appliance and its targets.
To create an SSL client profile, use the Crypto ssl-client command. To remove
the profile, use the no ssl-client command.
This command is relevant only when the following conditions are met:
v The log type set by the type command is soap, syslog-tcp, or syslog-ng.
v The type set by the ssl-client-type command is client.
ssl-client-type:
This command sets the type of the SSL profile for SOAP-based or syslog log
events.
Syntax
Use an SSL client profile
ssl-client-type client
Use an SSL proxy profile (deprecated)
ssl-client-type proxy
Parameters
proxy (deprecated)
Uses the SSL proxy profile with the cryptographic profiles to secure
connections. This setting is the default value for backward compatibility.
client
Uses the SSL client profile to secure connections.
Guidelines
The ssl-client-type command sets the SSL profile type to secure connections
between the DataPower® Gateway and its targets. You can use an SSL proxy profile
or an SSL client profile.
v The SSL proxy profile is deprecated. Check whether your configuration uses an
SSL proxy profile. If yes, modify the configuration to use an SSL client profile to
secure connections. To specify an SSL proxy profile, use the ssl command.
v To specify an SSL client profile, use the ssl-client command.
This command is relevant only when the log type set by the type command is
soap, syslog-tcp, or syslog-ng.
suppression-period:
Syntax
suppression-period seconds
timestamp:
Syntax
Parameters
numeric
Specifies a numeric time stamp format. This setting is the default value.
syslog Specifies a syslog time stamp format.
trigger:
Syntax
Parameters
message-ID
Specifies the message identifier that will, when logged, trigger the
command.
expression
Optionally specifies a regular expression that must match the body of the
message to trigger the command.
only-once
Indicates the behavior when the trigger criteria are met more than one
time.
on This command is triggered only the first time that the trigger
criteria are met.
off This command is triggered each time that the trigger criteria are
met. This setting is the default value.
only-this–trigger
Indicates how other event triggers behave that have the same trigger
criteria.
on This command is triggered, but other commands that would be
triggered by the same message ID are not. This setting is the
default value.
off Subsequent event triggers, that share this message ID, are also
triggered.
Guidelines
Use the event trigger to run specific commands when specific messages appear in
the system logs.
Examples
v Start a packet capture when the specified message is logged. The only-once
parameter is set to on so that multiple packet captures are not initiated. The
only-this-trigger parameter is set to on so that the stop packet capture command
is not triggered immediately.
# trigger "0x99999" "" on on "interface eth0; packet-capture
temporary:///capture -1 250"
#
v Stop the packet capture.
# trigger "0x99999" "" on on "interface eth0; no packet-capture
temporary:///capture"
#
type:
Syntax
type model
Parameters
model Sets the logging model.
cache Writes log entries to memory.
console
Writes log entries to the console screen.
file Writes log entries to a file on the appliance.
nfs Writes log entries to a file on a remote NFS mount.
smtp Forwards log entries as email messages to a specified recipient.
soap Forwards log entries as SOAP messages to a specified recipient.
syslog Forwards log entries to a remote syslog daemon over UDP.
syslog-ng
Deprecated. Use syslog-tcp.
syslog-tcp
Forwards log entries to a remote syslog daemon over TCP.
Guidelines
For all log types, use the event command to specify log contents.
v For cache, requires no configuration beyond the identification of log type. You
can use the format, size, and timestamp commands to customize log behavior.
upload-method:
This command sets the protocol to upload a file-based log to a remote site.
Syntax
upload-method protocol
Guidelines
The SCP upload method is deprecated. If you use SCP to upload multiple log
targets at the same time, a system error might occur. The appliance supports only
one SCP connection at a time. To minimize the risk when you use SCP, configure
log targets with different settings, such as different event subscriptions and
different log sizes.
Examples
Provide the required information (transfer protocol, recipient address, user name,
password, and remote directory) to upload a file-based log to a remote storage site.
# type file
# upload-method sftp
# remote-address 172.16.100.1
# remote-login jrb brj
# remote-directory logs/
#
url:
Syntax
url URL
Parameters
URL Identifies the destination.
Guidelines
The url command sets the destination for SOAP-based log entries. This command
is used only if the log type is soap.
Examples
Use the status command to view general information about the appliance and
specific information about a queue manager.
Use the show command to view details of the status of the appliance.
status:
Reports disk usage, CPU usage, and memory usage across the appliance or for a
specific queue manager. Also reports additional information for a queue manager
running in a high availability configuration, or a disaster recovery configuration.
Purpose
You can use the status command to get information about the disk usage, CPU
usage, and memory usage for the appliance or for a specific queue manager.
This command must be run from the IBM MQ administration mode. If the system
is in the IBM MQ administration mode the prompt includes mqcli#. To enter the
IBM MQ administration mode, enter mqcli on the command line. To exit the IBM
MQ administration mode, enter exit on the command line.
Syntax
►► status ►◄
QMgrName
Parameters
QMgrName
Specifies the name of the queue manager for which the status summary is
returned.
If this parameter is omitted, a summary of all disk and memory usage on the
appliance is returned.
Usage Notes
v This command must be run from the IBM MQ administration mode. If the
system is in the IBM MQ administration mode the prompt includes mqa(mqcli)#.
To enter the IBM MQ administration mode, enter mqcli on the command line. To
exit the IBM MQ administration mode, enter exit on the command line.
v The information that is returned for the appliance includes the following
information:
Examples
v The following command returns a report for the appliance:
status
v The following command returns a report for a specific queue manager, QM1:
status QM1
Use the show command to view the status of the appliance or an aspect of the
appliance configuration.
Where status_provider identifies the status that the command displays. The
available status providers are described in the following sub topics.
or
show configuration_type
show audit-log:
Syntax
Parameters
-np Indicates no pagination.
user Sorts the events in the audit log alphabetically by user name.
address
Sorts the events in the audit log numerically by IP address.
date Sorts the events in the audit log numerically by date.
time Sorts the events in the audit log numerically by time.
rotation {1 | n}
Specify the audit log rotation to show. Without this parameter, shows the
audit-log file.
Guidelines
The show audit-log command displays the audit log with or without pagination.
Use the -np keyword to display the audit log without pagination. Use the user,
date, time, or address keyword to indicate the sorting sequence. Use the rotation
keyword to indicate the audit log to show (audit-log.1, audit-log.2, and so on).
Examples
v Display the events in the current audit log file (audit:///audit-log) in date
order.
# show audit-log date
#
v Display the events in the second rotation of the audit log file
(audit:///audit-log.2) by date without pagination.
show audit-log -np date rotation 2
This command searches the audit log and displays matching events.
Syntax
Parameters
-np Indicates no pagination.
user name
Displays events in the audit log for the specified user.
date start [end]
Displays events in the audit log from the specified start date to optional
end date. Without an end date, displays events to the most recent date.
time start [end]
Displays events in the audit log from the specified start time to the
optional end time. Without an end time, displays events until 23:59:59.
address address[/netmask]
Displays events in the audit log for the specified IP address or, if you use a
netmask, the IP address range.
Guidelines
The show audit-search command searches the audit log and displays events that
match the specified criteria. Use the -np parameter to indicate no pagination for
the output.
Examples
v Display events in the audit log for the joesmith account one screen at a time.
# show audit-search user joesmith
#
v Display events in the audit log from February 10, 2008 onward one screen at a
time.
# show audit-search date 20080210
#
v Display events in the audit log from IP address 10.10.10.15 upward as one
continuous list.
# show audit-search -np address 10.10.10.15
#
v Display events in the audit log from the IP address in the range of 10.10.10.0
through 10.10.10.255 one screen at a time.
# show audit-search address 10.10.10.0/24
#
Syntax
show clock
Guidelines
The show clock command produces the same results as the show time command.
Output
# show clock
show fibre-channel-hba:
Syntax
show fibre-channel-hba
Guidelines
The show fibre-channel-hba command shows the current state of the fibre channel
adapters on the appliance.
Example
# show fibre-channel-hba
fibre-channel-hba: fch1 [up]
-----------------------
admin-state enabled
show fibre-channel-hba-status:
This command displays the current status of the fibre channel adapters.
Syntax
show fibre-channel-hba-status
Guidelines
HBA Op-State WWPN Port state Port speed Port type Supported speeds
---- -------- ----------------------- ---------- ---------- --------- ------------------------
fch1 up 10:00:00:90:fa:8e:0a:c2 online 8 Gbit nport 4 Gbit, 8 Gbit, 16 Gbit
show fibre-channel-luns:
This command displays the available LUNs that the appliance knows about.
Syntax
show fibre-channel-luns
Guidelines
Example
# show fibre-channel-luns
show fibre-channel-volume:
Syntax
show fibre-channel-volume
Guidelines
The show fibre-channel-volume command shows the current state of the volumes
defined on the appliance.
Example
# show fibre-channel-volumefibre-channel-volume: jps2 [up] (new)
--------------------------
admin-state enabled
lun-uid 600507680181804D980000000000235C
use-multipath on
show fibre-channel-volume-status:
This command displays the current status of the fibre channel volumes.
Syntax
show fibre-channel-volume-status
Guidelines
Example
mqa# show fibre-channel-volume-status
show file:
If used in config mode this command displays a specified printable file. Otherwise
displays total and free space details for the appliance.
Syntax
In config mode:
show file URL
Parameters
URL Identifies the URL of the file to display. The URL takes the
directory:///file format.
Where:
directory
Specifies a directory on the appliance.
file Specifies the name of a file in the directory.
Guidelines
You cannot use the show file command to display files in the cert: directory.
show firmware:
This command displays the current firmware version, with image type and
installation date.
show firmware
Guidelines
The show firmware command provides a subset of the details of the show
firmware-version command. The show firmware command includes information
about whether the current firmware image is the primary or secondary installation
image and the date when the image was installed.
show firmware-version:
This command displays the current firmware version, without image type and
installation date.
Syntax
show firmware-version
Guidelines
The show firmware-version command does not include information about whether
the current firmware image is the primary or secondary installation image or the
date on which the image was installed. For these details, use the show firmware
command.
show ipaddress:
Syntax
show ipaddress
Guidelines
Output
show ipmi-lan-channel:
Syntax
show ipmi-lan-channel
show ipmi-user:
Syntax
show ipmi-user
show key:
Syntax
show key
Guidelines
Output
mqa# show key
Syntax
show link-aggregation-member-status
Guidelines
show link-aggregation-status:
Syntax
show link-aggregation-status
Guidelines
show link:
Syntax
show link
Guidelines
The show link command provides status about all interfaces on the appliance. The
output includes the following data about each interface.
v The name of the interface.
v The link state of the interface. Values are ok or no link. If no link, one of the
following conditions exists.
show load:
Syntax
show load
Guidelines
The show load command displays the system usage by task. Use this command
with the load-interval command to monitor system load.
The show load command displays memory usage for many tasks across the system,
not for just the main task. The total memory usage from the show load command
might be higher than the memory usage that displays with the show memory
command. This discrepancy is because the show load command displays memory
for these additional tasks.
show log:
Syntax
show log
Guidelines
Use show log to display the default log. Use show logging to display the default or
other log files.
show logging:
Syntax
Parameters
name [PCRE]
Specifies the name of a log, and optionally displays only the events from
the specified log that match the specified expression.
archive
Displays a list of available archival methods.
category [category]
Displays summary information about all active log categories, or displays
summary information about the specified log category.
event Displays a list of supported event classes.
Guidelines
show loglevel:
Syntax
show loglevel
Guidelines
The show loglevel command shows the minimum log level for logging targets.
Example
Show the log level of logging targets in the current application domain. The output
shows that the default-log logging target in the default domain is set to error.
# show loglevel
Minimum log level for ’default-log’ is 3 (error) in ’default’ domain
show multipath:
This command shows the routes available for volumes that are using multipath.
Syntax
show multipath
Guidelines
The show multipath command shows the routes available for each volume.
The show multipath command shows route information only for multipath
volumes that are in OP-State UP. Additionally, if a route is lost to the SAN Storage,
that route is no longer be listed in the table.
show ndcache:
This command shows the status of IPv6 neighbor discovery translations on all
interfaces.
Syntax
show ndcache
Guidelines
The show ndcache command shows neighbor discovery (ND) translations on all
local interfaces. The output shows only complete cache entries. The output shows
the following data about the network interface node:
v The primary address for the interface: IP version, address, and netmask.
v The physical (MAC) address of the interface.
v The name of the interface.
v The type of interface: Ethernet, VLAN, aggregate, or other. The other interface
type refers to network interfaces that you cannot configure. Examples of other
interface types include gre0, ip6tnl0, lo, sit0, and usb0. Not all appliances have
all of these other interface types.
v The lifecycle state for the entry.
incomplete
Resolving neighbor and inaccessible.
reachable
Neighbor is valid and accessible.
stale Neighbor is valid, but potentially reachable. State to be checked at first
transmission.
delay Awaiting verification from stale neighbor and inaccessible.
failed Failed to resolve and inaccessible.
noarp No attempt to resolve and inaccessible.
permanent
Neighbor is valid forever and always accessible.
probe Awaiting confirmation from neighbor and inaccessible.
show network-interface:
This command shows generic status of all network interfaces on the appliance.
show network-interface
Guidelines
The show network-interface command shows the following information about all
network interfaces on the appliance.
v The type of interface: Ethernet, VLAN, aggregate, or other. The other interface
type refers to network interfaces that you cannot configure. Examples of other
interface types include gre0, ip6tnl0, lo, sit0, and usb0. Not all appliances have
all of these other interface types.
v The name of the interface.
v The configured goal operational state of the interface.
v The operational state of the interface. States are Up, Down, Unknown, Dormant, Not
present, or Lower Layer Down.
v The primary address for the interface: IP version, address, and netmask.
v The physical (MAC) address of the interface.
v The maximum transmission unit (MTU), or largest packet, size that can be sent
or received on the interface.
v Statistics about received transactions:
– The amount of data, in bytes, that was received successfully on the interface,
which includes MAC-framing.
– The number of packets that were received successfully on the interface and
were passed to the network layer.
– The number of packets that were not received because of errors in the packet
or in the hardware.
– The number of received packets that were not in error but were not passed to
the network layer because of resource constraints.
v Statistics about transmitted transaction:
– The amount of data, in bytes, that was transmitted successfully on the
interface, which includes MAC-framing.
– The number of packets that were transmitted successfully on the interface.
– The number of packets that were not transmitted because errors on the
network or in the hardware.
– The number of packets that were not transmitted because the network layer
generated packets faster than the physical network can accept them.
show ntp-refresh:
This command lists the refresh status for the current NTP server.
Syntax
show ntp-refresh
Guidelines
The show ntp-refresh command lists the following information about the current
NTP server.
v The IP address of the last NTP server that was contacted.
show password-map:
This command lists the defined aliases that have password maps.
Syntax
show password-map
Guidelines
The show password-map command list the number of passwords maps and their
aliases.
Context
Output
(config-crypto)# show password-map
2 password-map aliases
george
fyvush
show profile:
Syntax
show profile
Guidelines
Context
show raid-array:
Syntax
show raid-array
Availability
The show raid-array command displays the status of the RAID array.
v The reference number of the RAID card. The value is always 1.
v The reference number of this array. Numbering starts with 1.
v The identifier of the logical driver of which this array is a part.
v The RAID level of this array configuration.
v The number of physical drives for this array.
v The normalized size of this array in megabytes. The value is rounded down to
an even multiple so that you can swap drives of the same nominal size but
might not be the same raw size.
show raid-battery-module:
This command displays the information about the battery backup unit of the RAID
controller.
Syntax
show raid-battery-module
Availability
Guidelines
show raid-logical-drive:
Syntax
show raid-logical-drive
Availability
Guidelines
The show raid-logical-drive command displays the status of the RAID logical
drive.
v The reference number of the RAID card. The value is always 1.
v The reference number of the logical drive.
v The name of the logical drive. The value is always raid0.
v The RAID level of the logical drive.
v The number of physical drives in the logical drive.
v The state of the logical drive in the volume.
v The state of the logical drive initialization.
v The read policy in effect.
v The write policy in effect.
v The cache policy in effect.
v The access policy in effect.
show raid-physical-drive:
Syntax
show raid-physical-drive
Availability
Guidelines
The show raid-physical-drive command displays the status of the RAID physical
drive.
v The reference number of the RAID card. The value is always 1.
v The reference number of the physical disk. Numbering starts with 1.
v The reference number to which this array joins.
v The identifier of the logical driver of which this array is a part.
v The name of the logical drive. The value is always raid0.
v The location of the disk in the appliance.
v The overall state of the disk.
v The progress of a rebuild, copyback, patrol, or clear operation against the disk
in percents.
v The exact size of this array in megabytes.
v The normalized size of this array in megabytes. The value is rounded down to
an even multiple so that you can swap drives of the same nominal size but
might not be the same raw size.
v The type of interface.
v The speed of the SAS interface. The speed is negotiated between the RAID
controller and the physical disk.
v The SAS address of the disk.
v The vendor identification string for the disk.
v The product identification string for the disk.
v The vendor-provided revision string for the disk.
v The vendor-specific identifier for the disk. Normally, the value is unique for each
physical drive.
show raid-ssd:
This command displays the remaining expected lifetime of the solid state disks in
the RAID array.
Syntax
show raid-ssd
Guidelines
The show raid-ssd command displays the expected remaining life of the SSDs. The
lifetime of SSDs depends upon their workload (writes per day). The following
information is dispayed:
v The disk number. The value is 1 or 2.
v The serial number of the SSD drive.
v The total GB written.
v The estimated life left of the SSD drive.
For example:
mqa# show raid-ssd
show route:
Syntax
show route
Guidelines
The show route command shows the routing table. This table describes the IP
routes on the appliance. The table includes static and default routes from interface
configurations and dynamic routes from discovery protocols.
show sensors-current:
This command displays the values for sensors that read electrical current.
Syntax
show sensors-current
Availability
The show sensors-current command provides values for sensors that read
electrical current. These sensors provide the current that certain components of the
appliance use. This command returns an empty output on blades. The output for
this command includes the following data.
v The name of the current sensor that is being monitored.
v The most recent reading of the current sensor in milliamperes. There are only
three significant digits.
v The maximum allowable reading of the current sensor in milliamperes.
v Whether the current reading is OK or the reading exceeds the upper critical
threshold. If the status is not OK, contact IBM support.
show sensors-fans:
This command displays the values for sensors that read the speed of the fans.
Syntax
show sensors-fans
Availability
Guidelines
The show sensors-fans command provides values for sensors that read fan speed.
This command returns an empty output on blades. The output for the show
sensors-fans command includes the following data.
v The identifier for the fan.
v The fan speed in revolutions per minute (RPM).
v The lowest allowable reading of the fan speed sensor.
v The highest allowable reading of the fan speed sensor. If the maximum speed for
a fan does not exist, no value is displayed.
v Whether the current fan speed is OK or the fan speed is below the lower critical
threshold. If the status is not OK, contact IBM support.
show sensors-other:
This command displays the status of sensors that have true or false values.
Syntax
show sensors-other
Availability
Guidelines
The show sensors-other command provides the state of sensors that have true or
false (nonnumeric) values.
The output for the show sensors-other command includes the following data.
v The name of the sensor that is being monitored. The name is in the form of a
descriptive predicate. If the value of the sensor is true, the descriptive predicate
is true; if the value of the sensor is false, the descriptive predicate is false. For
example, the sensor name Intrusion detected with a value of false means that
intrusion is not detected.
v The value of the sensor. The value is either true or false.
v The status of the sensor. The status can be one of the following values.
OK The reading of the sensor is normal.
Failure
The reading of the sensor indicates a problem or a failure in the
appliance.
No reading
No reading of the sensor is available now. An internal hardware or
software error might occur. Contact IBM Support.
Invalid
The DataPower software requested a sensor reading by using an invalid
sensor identifier. An internal DataPower software error might occur.
Contact IBM Support.
show sensors-temperature:
This command displays the values for sensors that read temperatures.
Syntax
show sensors-temperature
Availability
Guidelines
The show sensors-temperature command provides values for sensors that read
temperatures. These sensors provide the temperature of the air that flows through
the appliance and key components of the appliance.
v Temperature of each internal CPU components
The output for the show sensors-temperature command includes the following
data.
v The name of the temperature sensor.
v The most recent reading of the temperature sensor in degree Celsius. There are
only three significant digits.
v The temperature at which a warning of high temperature occurs. If the
temperature is above this value, investigate the cause and correct the problem.
v The temperature at which a critical error of high temperature occurs. If the
temperature is above this value, correct the problem immediately.
v The temperature at which a risk of permanent damage to the appliance exists. If
the temperature is above this threshold, correct the problem immediately.
Otherwise, turn off the power supply of the appliance.
v Whether the current temperature is OK or exceeds the warning, critical, or
danger threshold.
show sensors-voltage:
This command displays the values for sensors that read voltage.
Syntax
show sensors-voltage
Availability
Guidelines
The show sensors-voltage command provides values for sensors that read
voltages. These sensors provide the voltage of the power supplies and for other
components of the appliance.
The output for the show sensors-voltage command includes the following data.
v The name of the voltage sensor.
v The most recent reading of the voltage sensor in millivolts. There are only three
significant digits.
v The lowest allowable reading of the voltage sensor.
v The highest allowable reading of the voltage sensor.
v Whether the current voltage is OK or the voltage exceeds the upper or lower
critical threshold. If the status is not OK, contact IBM support.
show services:
This command lists all local services that are listening for incoming connections.
show services
Guidelines
Use the show services command to list all local services that are listening for
incoming connections. For each entry in the table, the service that created the
listener is shown.
Output
# show services
show services-memory:
Syntax
show services-memory
Guidelines
Use the show services-memory command to display a list of all active services and
their memory usage in MB.
The output shows the memory usage in MB for each service within the following
time frames.
v When the report is generated (current)
v During the last 60 seconds (1 minute)
v From the end of the first minute to the end of the fifth minute (1 - 5 minutes)
v From the end of the fifth minute to the end of the tenth minute (5 - 10 minutes)
v From the end of the tenth minute to the end of the first hour (10 minutes - 1
hour)
v From the end of the first hour to the end of the twelfth hour (1 - 12 hours)
v From the end of the twelfth hour to the end of the first day (12 hours - 1 day)
v From the end of the first day (lifetime)
show system:
Syntax
show system
Syntax
show tcp-connections
Guidelines
To list the current TCP connections, use the show tcp-table command.
show tcp-table:
Syntax
show tcp-table
Guidelines
The show tcp-table command lists the current TCP connections. To list the
number of TCP connections in specific states, use the show tcp-connections
command.
show tcp:
This command lists the current TCP connections followed by the number of
connections in each state.
Syntax
show tcp
Guidelines
The show tcp command lists the current TCP connections followed by the number
of connections in each state. This command provides the details that are provided
by the show tcp-connections and show tcp-table commands.
Syntax
show throughput
Guidelines
Each table lists the count for each interface for the last 10 seconds, 1 minute, 10
minutes, 1 hour, and 24 hours.
Context
To view statistics, data collection must be active. Use the global statistics
command to control data collection. If disabled, the command returns the
Statistics disabled message.
show time:
Syntax
show time
Guidelines
The show time command produces the same results as the show clock command.
Output
# show time
show users:
This command lists all users who are currently logged in to the appliance.
Syntax
show users
show version:
Syntax
show version
Guidelines
The show version command provides the combined details of the show
firmware-version and show library-version commands.
Network commands
You can use the network commands to modify network settings on the IBM MQ
Appliance.
The network commands can be run from the command line interface in network
configuration mode. To enter network configuration mode, complete the following
steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter network settings mode:
network
3. Type exit to leave the network settings mode and save your changes, then type
exit again to leave global configuration mode.
arp-interval:
Syntax
arp-interval milliseconds
Parameters
milliseconds
Sets the time interval in milliseconds between ARP attempts. Enter a value
in the range 500 - 5000. The default value is 500.
Guidelines
The arp-interval command sets the time interval between ARP attempts. The
appliance waits the defined time before it tries a failed ARP request again.
Example
This command sets the number of times the appliance attempts a failed ARP
request.
Syntax
arp-retries attempts
Parameters
attempts
Sets the number of attempts for a failed ARP request. Enter a value in the
range 1 - 64. The default value is 8.
Guidelines
The arp-retries command sets the number of times the appliance attempts a
failed ARP request.
Example
block-traffic:
Syntax
block-traffic { on | off
Parameters
on The appliance blocks nonmanagement traffic. The setting is the default
value.
off The appliance allows all network traffic.
Guidelines
For a production appliance, always enable this property. With this setting, the
appliance supports only management traffic over Telnet, SSH, web management
interfaces (WebGUI and Blueprint Console), and the XML management interface.
Until you correct the problem, the appliance cannot accept and process client
requests.
Example
This command controls how the appliance determines the route to return the
response.
Syntax
destination-routing { on | off }
Parameters
on Interface selection is based on the best path to the client, irrespective of the
service or receiving interface.
off Interface selection is based on the interface that is bound to the address of
the service that generated the response. This setting is the default value.
Guidelines
Example
disable-interface-isolation:
Syntax
disable-interface-isolation { on | off }
Parameters
on Enables interface-isolation.
off Disables interface-isolation. This setting is the default value.
Example
ecn-disable:
Syntax
ecn-disable { on | off }
Parameters
on Stops the generation of ECN-capable TCP sessions.
off Generates ECN-capable TCP sessions. This setting is the default value.
Example
ephemeral-port-range:
This command sets the starting port for the ephemeral port range.
Syntax
ephemeral-port-range port
Parameters
port Specifies the starting port of the ephemeral port range. By default, the
appliance can use ephemeral ports in the range 10000 - 61000. You can
override the default by defining a subset of ephemeral ports to not be
ephemeral ports. These ports are ephemeral ports in the range 10000 -
32768. Even if you override, the appliance always has control of the
ephemeral ports in the range 32769 - 61000.
Guidelines
The ephemeral-port-range command sets the starting port for the ephemeral port
range. DataPower appliances use ephemeral ports to send data over TCP and UDP.
To avoid conflicts between the ephemeral ports and the ports on which services
listen, specify the starting port of the ephemeral port range. The last port in the
ephemeral port range is 61000.
Syntax
Disable ICMP reply messages
icmp-disable { addressmask-reply | echo-reply | info-reply |
timestamp-reply }
Enables ICMP, if disabled
no icmp-disable { addressmask-reply | echo-reply | info-reply |
timestamp-reply }
Parameters
addressmask-reply
echo-reply
info-reply
timestamp-reply
Specifies the target ICMP reply type.
Guidelines
Examples
v Disable reply messages for ICMP echo (ping) requests.
# icmp-disable echo-reply
v Enable ping reply messages to restore the default state.
# no icmp-disable echo-reply
relax-interface-isolation:
This command controls whether to allow packets from a wrong interface when
both interfaces are on the same subnet.
Syntax
relax-interface-isolation { on | off }
Parameters
on Accepts a packet on an interface other than the one bound to the
destination address of the packet. This setting is the default value.
off Allows only the interface that is bound to the destination address to accept
the packet.
Example
Allows only the interface that is bound to the destination address to accept a
packet.
# relax-interface-isolation off
reverse-path-filtering:
This command determines whether incoming packets with a source address that
cannot be routed by that interface are accepted and processed.
Syntax
reverse-path-filtering { on | off }
Parameters
on Ignores incoming packets with a source address that cannot be routed by
that interface.
off Accepts and processes incoming packets with a source address that cannot
be routed by that interface. This setting is the default value.
Guidelines
Note: If you allow reverse path filtering, the appliance cannot correctly route
requests from the Sysplex Distributor to use the Target Control Server.
tcp-retries:
This command sets the number of times to send a failed TCP SYN request.
Syntax
tcp-retries retries
Parameters
retries Specifies the number of times the local system sends a TCP SYN that
receives no response. Enter a value in the range 1 - 32. The default value is
5.
The tcp-retries command sets the number of times the local system sends a
failed TCP SYN request.
Example
Set to 10 attempts.
# tcp-retries 10
tcp-window-scale:
Syntax
tcp-window-scale { on | off }
Parameters
on Enables TCP window scaling. This setting is the default value.
off Disables TCP window scaling.
Guidelines
Use the RBM commands to configure role based management on the IBM MQ
Appliance.
au-cache-mode:
Syntax
Parameters
absolute
Caches the results of user authentications for a period of time specified by
the au-cache-ttl command (the explicit time-to-live).
Guidelines
Example
au-cache-ttl:
Syntax
au-cache-ttl seconds
Parameters
seconds
Specifies the time-to-live (TTL) in seconds. Enter a value in the range 1 -
86400. The default value is 600.
Guidelines
The au-cache-ttl command defines the explicit TTL in seconds for cached
authentication results. This value is compared against the TTL in the authentication
response in accordance with the cache mode, as defined with the au-cache-mode
command.
Example
au-info-url:
Syntax
au-info-url URL
Guidelines
The au-info-url command defines the fully qualified file name (URL) of the XML
file for authentication. This command is relevant when the authentication method,
as defined with the au-method command, is xmlfile.
Example
Identify the RBM-AU.xml file in the local: directory as the authentication XML file.
# au-method xmlfile
# au-info-url local:///RBM-AU.xml
au-ldap-bind-dn:
Syntax
au-ldap-bind-dn DN
Parameters
DN Specifies the login DN (distinguished name).
Guidelines
The au-ldap-bind-dn command specifies the login DN to access the target LDAP
server. This command is relevant when the authentication method, as defined with
the au-method command, is ldap and when the LDAP search for group name
property, as defined with the au-ldap-search command, is enabled.
Beyond specifying the login DN to search the LDAP for the group name, you must
use the au-ldap-bind-password command and optionally use the
au-ldap-parameters command.
v The au-ldap-bind-password command specifies the user's password.
v The au-ldap-parameters command associates LDAP search parameters.
Example
au-ldap-bind-password:
au-ldap-bind-password password
Parameters
password
Specifies the password for the login DN.
Guidelines
Beyond specifying the login password to search the LDAP for the group name, you
must use the au-ldap-bind-dn command and optionally use the
au-ldap-parameters command.
v The au-ldap-bind-dn command specifies the user.
v The au-ldap-parameters command associates LDAP search parameters.
Example
au-ldap-parameters:
Syntax
au-ldap-parameters name
Parameters
name Specifies the name of the LDAP search parameters.
Guidelines
This command is relevant only when LDAP search is enabled with the
au-ldap-search command and when the authentication method is ldap, as defined
with the au-method command.
Example
au-ldap-readtimeout:
This command sets the time that RBM authentication waits for a response from the
LDAP server.
Syntax
au-ldap-readtimeout seconds
Parameters
seconds
Indicates the number of seconds to wait for a response from the LDAP
server before the appliance closes the connection. Enter a value in the
range 0 - 86400. The default value is 60. A value of 0 indicates that the
connection never times out.
Guidelines
Specify a maximum time length of 60 seconds that the appliance waits for the
response from the LDAP server.
# au-ldap-readtimeout 60
au-ldap-search:
Syntax
au-ldap-search { on | off }
Parameters
on Enables an LDAP search for the user's distinguished name (DN). The login
name and LDAP search parameters are used as part of an LDAP search to
retrieve the user's DN.
off Disables an LDAP search for the user's DN. The login name with the
LDAP prefix and suffix are used to construct the user's DN. This setting is
the default value.
Guidelines
This command is relevant when the authentication method, as defined with the
au-method command, is ldap.
Example
au-method:
Syntax
au-method method
Parameters
method
Sets the RBM authentication method. The default value is local.
client-ssl
Uses a SSL certificate from a connection peer. Requires validation
credentials associated with the au-valcred command.
ldap Uses an LDAP server. Requires information about the LDAP server
with the au-server-host and au-server-port commands.
local Uses the user configuration that is maintained on the local system.
Does not access external resources.
XML file
Uses a locally stored RBM Info file. Requires the location of the file
with theau-info-url command.
Guidelines
The au-method command sets the authentication method for RBM. The selected
method must be fully configured before invoking this command.
au-server-host:
Syntax
au-server-host host
Parameters
host Specifies the IP address or domain name of the server.
Guidelines
When the authentication method is ldap, as defined with the au-method command,
define the LDAP server in one of the following ways:
v The au-server-host and au-server-port commands
v The loadbalancer-group command
Example
au-server-port:
Syntax
au-server-port port
Parameters
port Specifies the port number of the authentication server.
Guidelines
When the authentication method is ldap, as defined with the au-method command,
define the LDAP server in one of the following ways:
v The au-server-host and au-server-port commands
v The loadbalancer-group command
au-valcred:
Syntax
au-valcred name
Parameters
name Specifies the name of the validations credentials.
Guidelines
Example
cli-timeout:
This command specifies the time before the CLI session is closed because of
inactivity.
Syntax
cli-timeout seconds
Parameters
seconds
Specifies the timeout value of the idle session in seconds. Enter a value in
the range 0 - 65535. The default value is 0, which disables the timer.
Guidelines
The cli-timeout command specifies the amount of idle time in seconds before the
CLI session is closed because of inactivity. When the session times out, you must
reestablish a session and reauthenticate.
fallback-login:
This command specifies whether to use local users if the primary authentication
method fails.
Syntax
Parameters
disabled
Indicates that no locally defined user can log on. This setting is the default
value.
local Indicates that all locally defined users can log on.
restricted
Indicates that only specific locally defined users can log on.
Guidelines
To limit fallback users to a specific set, use the restricted keyword. In this case,
use the fallback-user command to define the specific, locally defined users to
allow as fallback users.
Note: On XI50z, this option is local. No administrator can modify this setting.
Examples
v Allow all locally defined users to log on.
# fallback-login local
v Designate bobsmith and joselopez as fallback users.
# fallback-login restricted
# fallback-user bobsmith
# fallback-user joselopez
v Disallow all locally defined users from logging on.
# fallback-login disabled
fallback-user:
fallback-user user
no fallback-user user
Parameters
user Specifies the name of a locally defined user.
Guidelines
Use the no fallback-user command to remove a user from the list of fallback
users.
Example
ldap-prefix:
This command specifies the LDAP prefix to add to the user name to form the DN.
Syntax
ldap-prefix prefix
Parameters
prefix Specifies an LDAP prefix.
Guidelines
The ldap-prefix command specifies the string to add as a prefix to the user name
to form the distinguished name (DN) for LDAP authentication. The LDAP prefix
and the user name are separated with a comma, and both are included within
quotation marks.
If the LDAP prefix is cn= and the user name is Bob Smith, the beginning portion of
the DN is cn=Bob Smith.
Example
This command associates the SSL proxy profile for LDAP authentication.
Syntax
ldap-sslproxy name
Parameters
name Specifies the name of an SSL proxy profile.
Guidelines
This command is relevant only when the authentication method, as specified with
the au-method command, is ldap.
ldap-suffix:
This command specifies the LDAP suffix to add to the user name to form the DN
for RBM authentication.
Syntax
ldap-suffix suffix
Parameters
suffix Specifies an LDAP suffix.
Guidelines
The ldap-suffix command specifies the string to add after the user name to form
the base distinguished name (DN) for LDAP authentication. The LDAP suffix and
the user name are separated with a comma, and both are included within
quotation marks.
For example, if LDAP suffix is O=example.com and the user name is Bob, the DN is
CN=Bob,O=example.com.
ldap-version:
This command specifies the LDAP version to access the LDAP server for RBM
authentication.
ldap-version { v2 | v3 }
Parameters
v2 Uses LDAP version 2 as the protocol. This setting is the default value.
v3 Uses LDAP version 3 as the protocol.
Guidelines
The ldap-version command specifies the LDAP version for RBM authentication.
This command is relevant only when the au-method command is set to ldap.
loadbalancer-group:
This command associates the load balancer group for RBM LDAP authentication.
Syntax
loadbalancer-group name
Parameters
name Specifies the name of a load balancer group.
Guidelines
Example
lockout-duration:
Syntax
lockout-duration minutes
Guidelines
The lockout-duration command specifies the duration to lock out accounts after
the maximum number of failed login attempts is exceeded. Define the maximum
number of failed login attempts with the max-login failure command. Instead of
locking out an account for a specific duration, the account can be locked out until
re-enabled by a privileged administrator. To lock out accounts until reset, set the
duration to 0.
Note: The lockout-duration command applies to all local accounts, which include
the admin account. When the duration is 0, the admin account is locked out for 120
minutes or until reenabled by another administrator.
Examples
Enable lockout behavior for accounts that on the fifth login failure, the account is
locked out until reset by a privileged administrator:
# lockout-duration 0
# max-login-failure 4
max-login-failure:
This command specifies whether to lock out a local user account after a specific
number of failed login attempts.
Syntax
max-login-failure count
Parameters
count Specifies the maximum number of failed login attempts to allow before
lockout. A value of 0 disables account lockout. Enter a value in the range 0
64. The default value is 3.
Guidelines
Note: The max-login failure command applies to all local accounts, which
include the admin account. When the duration is 0, the admin account is locked out
for 120 minutes or until reenabled by another administrator.
mc-custom-url:
This command specifies the URL of the RBM credential-mapping custom style
sheet.
Syntax
mc-custom-url URL
Parameters
URL Specifies the location of the style sheet.
Guidelines
The mc-custom-url command defines the fully qualified file name (URL) of the
custom style sheet to map credentials. This command is relevant when the
mapping credentials method, as defined with the mc-method command, is custom.
Example
mc-info-url:
This command specifies the URL of the mapping credentials XML file.
Syntax
mc-info-url URL
Parameters
URL Specifies the location of the XML file.
Guidelines
The mc-info-url command defines the fully-qualified file name (URL) of the XML
file for credentials mapping. This command is relevant when the mapping
credentials method, as defined with the mc-method command, is xmlfile.
Example
mc-ldap-bind-password:
This command specifies the password for the login DN to access an LDAP server.
Syntax
mc-ldap-bind-password password
Parameters
password
Specifies the password for the login DN.
Guidelines
Beyond the password for the login DN to search the LDAP for the group name,
use the following commands to complete the configuration.
v How to connect to the LDAP server. Use either of the following approaches.
– The mc-server-host and mc-server-port commands
– The mc-loadbalancer-group command
v Optionally associate an SSL proxy profile with the mc-ldap-sslproxy command
to secure communication with the LDAP server
v Specify the login DN to access the LDAP server with the mc-ldap-bind-dn
command
v Optionally associate LDAP search parameters with the mc-ldap-parameters
command
Example
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
# mc-server-port 389
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
# mc-ldap-parameters ldap1-MC
mc-ldap-parameters:
mc-ldap-parameters name
Parameters
name Specifies the name of the LDAP search parameters.
Guidelines
Beyond LDAP search parameters to search LDAP for the group name, use the
following commands to complete the configuration.
v How to connect to the LDAP server. Use either of the following approaches.
– The mc-server-host and mc-server-port commands
– The mc-loadbalancer-group command
v Optionally associate an SSL proxy profile with the mc-ldap-sslproxy command
to secure communication with the LDAP server
v Specify the login DN to access the LDAP server with the mc-ldap-bind-dn
command
v Specify the user's password with the mc-ldap-bind-password command
Example
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
# mc-server-port 389
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
# mc-ldap-parameters ldap1-MC
mc-ldap-readtimeout:
This command sets the time that RBM credential mapping waits for a response
from the LDAP server.
Syntax
mc-ldap-readtimeout seconds
Parameters
seconds
Indicates the number of seconds to wait for a response from the LDAP
Guidelines
Example
Specify a maximum time length of 60 seconds that the appliance waits for the
response from the LDAP server.
# mc-ldap-readtimeout 60
mc-ldap-search:
This command indicates whether to retrieve the group names with an LDAP
search.
Syntax
mc-ldap-search { on | off }
Parameters
on Enables an LDAP search for the user's group. The authenticated DN of the
user with the LDAP search parameters are used as part of an LDAP search
to retrieve the user’s group.
off Disables an LDAP search for the user's group. The authenticated identity
of the user (DN or user group of local user) is used directly as the input
credential. This setting is the default value.
Guidelines
This command is relevant when the credentials mapping method, as defined with
the mc-method command, is local or xmlfile.
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
# mc-server-port 389
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
# mc-ldap-parameters ldap1-MC
mc-ldap-sslproxy:
This command assigns an SSL proxy profile with the LDAP credentials server.
Syntax
mc-ldap-sslproxy name
Parameters
name Specifies the name of an SSL proxy profile.
Guidelines
Beyond an SSL proxy profile to secure communication to search the LDAP for the
group name, use the following commands to complete the configuration.
v How to connect to the LDAP server. Use either of the following approaches.
– The mc-server-host and mc-server-port commands
– The mc-loadbalancer-group command
v Specify the login DN to access the LDAP server with the mc-ldap-bind-dn
command
v Specify the user's password with the mc-ldap-bind-password command
v Optionally associate LDAP search parameters with the mc-ldap-parameters
command
Example
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
mc-loadbalancer-group:
This command assigns a load balancer group as the target for an LDAP search.
Syntax
mc-loadbalancer-group name
Parameters
name Specifics the name of a load balancer group.
Guidelines
Beyond the LDAP load balancer group to search for the group name, use the
following commands to complete the configuration.
v Optionally associate an SSL proxy profile with the mc-ldap-sslproxy command
to secure communication with the LDAP server
v Specify the login DN to access the LDAP server with the mc-ldap-bind-dn
command
v Specify the user's password with the mc-ldap-bind-password command
v Optionally associate LDAP search parameters with the mc-ldap-parameters
command
Example
Uses a local XML file to map credentials and search LDAP to retrieve the DN.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-loadbalancer-group LBGroup1
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
mc-ldap-bind-dn:
mc-ldap-bind-dn DN
Parameters
DN Specifies the login DN (distinguished name) to access the target LDAP
server.
Guidelines
The mc-ldap-bind-dn command specifies the login DN to access the target LDAP
server.
Beyond the login DN to search the LDAP for the group name, use the following
commands to complete the configuration.
v How to connect to the LDAP server. Use either of the following approaches.
– The mc-server-host and mc-server-port commands
– The mc-loadbalancer-group command
v Optionally associate an SSL proxy profile with the mc-ldap-sslproxy command
to secure communication with the LDAP server
v Specify the user's password with the mc-ldap-bind-password command
v Optionally associate LDAP search parameters with the mc-ldap-parameters
command
Example
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
# mc-server-port 389
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
# mc-ldap-parameters ldap1-MC
mc-method:
Syntax
Parameters
custom Uses a custom style sheet. Use the mc-custom-url command to specify the
location of the style sheet.
Guidelines
The mc-method command sets the credential mapping (authorization) method for
RBM.
The following table lists the supported credential mapping methods for each user
authentication method.
Table 45. Authentication methods and supported credential mapping methods
Map credential method
Authentication method local xmlfile custom
client-ssl No Yes Yes
custom No Yes Yes
ldap No Yes Yes
local Yes Yes Yes
radius No Yes Yes
spnego No Yes Yes
xmlfile Yes Yes Yes
When the credentials mapping method is local or xmlfile, you can use the
mc-ldap-search command to retrieve the distinguished name with an LDAP
search.
Notes:
v The selected credentials mapping method must be fully configured before
invoking this command.
v If the admin account is not configured with all permissions, the admin user is
locked out of the GUI. Access the command line to change this circumstance.
Examples
v Set the authorization method to xmlfile and identifies the location of the file.
# mc-method xmlfile
# mc-info-url "local:///RBMPolicy.xml"
v Set the authorization method to local.
# mc-method local
mc-server-host:
Syntax
mc-server-host host
Guidelines
Beyond the LDAP server to search for the group name, use the following
commands to complete the configuration.
v The mc-server-port command to specify the listening port on the LDAP server
v Optionally associate an SSL proxy profile with the mc-ldap-sslproxy command
to secure communication with the LDAP server
v Specify the login DN to access the LDAP server with the mc-ldap-bind-dn
command
v Specify the user's password with the mc-ldap-bind-password command
v Optionally associate LDAP search parameters with the mc-ldap-parameters
command
Example
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
# mc-server-port 389
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
# mc-ldap-parameters ldap1-MC
mc-server-port:
Syntax
mc-server-port port
Parameters
port Specifies the listening port on the server.
The mc-server-port command specifies the listening port on the LDAP server.
Beyond the listening port on the LDAP server to search the LDAP for the group
name, use the following commands to complete the configuration.
v The mc-server-host command to specify the LDAP server
v Optionally associate an SSL proxy profile with the mc-ldap-sslproxy command
to secure communication with the LDAP server
v Specify the login DN to access the LDAP server with the mc-ldap-bind-dn
command
v Specify the user's password with the mc-ldap-bind-password command
v Optionally associate LDAP search parameters with the mc-ldap-parameters
command
Example
Use a local XML file to map credentials and search the LDAP retrieve the
distinguished name.
# mc-method xmlfile
# mc-info-url local:///RBM-MC.xml
# mc-ldap-search on
# mc-server-host ldap.mydomain.com
# mc-server-port 389
# mc-ldap-bind-dn "cn=proxyuser"
# mc-ldap-bind-password p@Ssw0rd
# mc-ldap-parameters ldap1-MC
password-hash-algorithm:
This command sets the hash algorithm to apply to passwords before they are
stored.
Syntax
Parameters
md5crypt
Uses MD5 Crypt as the hash algorithm. This setting is the default value.
sha256crypt
Uses SHA-256 Crypt as the hash algorithm.
Guidelines
Example
Use the hash algorithm SHA-256 Crypt to apply to passwords before they are
stored.
# password-hash-algorithm sha256crypt
pwd-aging:
This command specifies whether users must periodically change their passwords.
Syntax
pwd-aging { on | off }
Parameters
on Requires the periodic change of passwords.
off Allows continued use of passwords. This setting is the default value.
Guidelines
Example
pwd-digit:
This command specifies whether passwords must contain at least one numeric
character.
Syntax
pwd-digit { on | off }
Parameters
on Indicates that passwords must contain at least one numeric character.
off Indicates that passwords do not require numeric characters. This setting is
the default value.
pwd-history:
Syntax
pwd-history { on | off }
Parameters
on Indicates that passwords can be reused.
off Indicates that passwords cannot be reused. This setting is the default value.
Guidelines
Example
pwd-max-age:
Syntax
pwd-max-age days
Parameters
days Specifies the maximum number of days that a password is valid. Enter a
value in the range 1 - 65535. The default value is 300.
Guidelines
Example
pwd-max-history:
pwd-max-history count
Parameters
count Specifies the number of passwords to retain. Enter a value in the range 1 -
65535. The default value is 5.
Guidelines
Example
pwd-minimum-length:
Syntax
pwd-minimum-length length
Parameters
length Specifies the minimum length. Enter a value in the range 1 - 128. The
default value is 6.
pwd-mixed-case:
This command specifies whether passwords must contain uppercase and lowercase
characters.
Syntax
pwd-mixed-case { on | off }
Parameters
on Indicates that passwords must contain uppercase and lowercase characters.
off Indicates that passwords do not require uppercase and lowercase
characters. This setting is the default value.
Guidelines
pwd-nonalphanumeric:
Syntax
pwd-nonalphanumeric { on | off }
Parameters
on Indicates that passwords must contain nonalphanumeric characters.
off Indicates that passwords do not require nonalphanumeric characters. This
setting is the default value.
Guidelines
Examples
v Require passwords to contain nonalphanumeric characters.
# pwd-nonalphanumeric on
v Restore the default state.
# pwd-nonalphanumeric off
pwd-username:
This command specifies whether passwords can contain the user string.
Syntax
pwd-username { on | off }
Parameters
on Indicates that passwords can contain the user name.
off Indicates that passwords cannot contain the user name. This setting is the
default value.
Guidelines
restrict-admin:
This command specifies whether to restrict access by the admin account to the CLI
through a serial connection.
Syntax
restrict-admin { on | off }
Parameters
on Restricts the admin account to CLI access through a serial connection.
off Allows the admin account to all access methods. This setting is the default
value.
Guidelines
Note: On XI50z, this option is disabled. No administrator can modify this setting.
Examples
v Restrict CLI access by the admin account to serial connections.
# restrict-admin on
v Allow access by the admin account to all access methods.
# restrict-admin off
ssl-client:
Syntax
ssl-client name
no ssl-client
Parameters
name
Specifies the name of an SSL client profile.
The ssl-client command specifies the SSL client profile to secure connections
with the LDAP server during LDAP authentication.
To create an SSL client profile, use the Crypto ssl-client command. To remove
the SSL client profile, use the no ssl-client command.
ssl-client-type:
This command sets the type of the SSL profile for LDAP authentication.
Syntax
Parameters
proxy
This value is deprecated. Do not use.
client
Uses the SSL client profile to secure connections.
Guidelines
The ssl-client-type command sets the SSL profile type to secure connections with
the LDAP server during LDAP authentication. To specify an SSL client profile, use
the ssl-client command.
Use the REST Management Interface commands to enable and modify the
configuration of the REST management interface.
local-address:
This command assigns a local IP address on which the REST management interface
listens.
local-address address
Parameters
address
Identifies the IP address on which the appliance listens for incoming REST
management requests.
Guidelines
You can specify the local address and port together with the local-address
command or specify the port independently with the port command.
Examples
Specify a listening address and port for the REST management interface:
# local-address 192.0.2.2 5552
port:
This command assigns the local port on which the REST management interface
listens.
Syntax
port port
Parameters
port
Identifies the port on the appliance. The default value is 5554.
Guidelines
The port command assigns the local port on which the REST management
interface listens.
To specify the local IP address for the REST management interface, use the
local-address command.
Examples
ssl-config-type:
This command sets the type of the SSL profile for the REST management interface.
ssl-config-type config_type
Parameters
config_type
Specify server if you want to specify SSL (TLS) security for the REST
management interface.
Guidelines
The ssl-config-type command sets the SSL profile type to secure connections
between clients and the appliance. You must use the server type.
ssl-server:
This command associates an SSL server profile with the REST management
interface.
Syntax
ssl-server name
Parameters
name
Specifies the name of an SSL server profile.
Guidelines
The ssl-server command specifies the SSL server profile to secure connections
between clients and the appliance. You use an SSL server profile when the
appliance is an SSL server.
This command is relevant when the type set by the ssl-config-type command is
server.
SNMP Settings mode provides the commands to modify the SNMP settings.
To enter the mode, use the Global snmp command. To disable SNMP, use the Global
no snmp command.
While in this mode, use the following commands to define the server connection.
The settings grant access to the SNMP agent for an SNMP manager, identify the
appliance UDP port that is monitored by the SNMP agent, and manages the trap
events from the SNMP agent.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
access-level:
This command specifies the level of access that an SNMPv3 manager has to the
appliance MIBs.
Syntax
access-level read-only
access-level read-write
Parameters
read-only
Indicates that managers are restricted to SNMP get operations, which
means that these managers can read, but cannot change management
information base (MIB) values.
read-write
Indicates that managers have access to both SNMP get and set operations,
which means that these managers can read and change MIB values.
Examples
v Specify read-only access.
# access-level read-only
community:
This command grants and defines access to the specified SNMPv1 or v2c
communities.
Syntax
Parameters
communityName
Specifies the name of the community. The community name is effectively a
password phrase that accompanies SNMP requests, and is used to
determine whether the request can be fulfilled or not.
read-only
Indicates that managers are restricted to SNMP get operations, which
means that these managers can read, but cannot change management
information base (MIB) values.
read-write
Indicates that managers have access to both SNMP get and set operations,
which means that these managers can read and change MIB values.
Examples
v Specify read-only access to the community named “private”.
# community private read-only
ip-address:
This command specifies the IP address that is listened on for SNMP requests.
Syntax
ip-address local_IP_address
Parameters
local_IP_address
Specify a local IP address that the SNMP service listens on for SNMP
requests to the appliance. Specify 0.0.0.0 to listen on all appliance
interfaces.
Examples
v Specify the appliance listens on IP address 198.51.100.0 for SNMP requests.
# ip-address 198.51.100.0
port:
This command identifies the appliance UDP port that is monitored by the SNMP
agent for SNMP requests.
Syntax
Parameters
address
Specifies an optional IP address that identifies a specific local interface as a
recipient of SNMP requests.
port Identifies the UDP port that is monitored by the SNMP agent or engine for
SNMP requests. The default value is 161.
Guidelines
In the absence of an IP address argument, the SNMP agent monitors the specified
port on all interfaces for SNMP requests. With an IP address argument provided,
the SNMP agent monitors only the specified interface-port pair for SNMP requests.
For example, the IP address might be the XML management port.
Examples
v Identify a nonstandard SNMP port, 65161, on all interfaces as the recipient of
SNMP requests.
security-level:
This command specifies the access that an SNMPv3 manager has to the appliance.
Syntax
security-level noAuthNoPriv
security-level authNoPriv
security-level authPriv
Parameters
noAuthNoPriv
The SNMP connection requires neither authentication of users nor
encryption of data.
authNoPriv
The SNMP connection requires authentication of users but not the
encryption of data.
authPriv
The SNMP connection requires authentication of users and encryption of
data.
Examples
v Specify that the appliance requires an SNMPv3 manager to supply valid user
and credentials, and that data transferred to the manager is encrypted.
# security-level authPriv
trap-code:
Syntax
trap-code code
no trap-code code
Parameters
code Specifies the hex identifier of an event code.
Guidelines
The trap-code command specifies individual event codes to add to the trap list.
Run this command for each event to add to the list.
Use the no trap-code command to delete a previously configured code from the
trap list.
Note: The “File is expired” event refers to the file associated with the certificate
aliases on the appliance.
Examples
Add the “Out of memory” parser event with hex code 0x00030002 to the list.
# trap-code 0x00030002
trap-default-subscriptions:
This command enables or disables the default list of event codes that generate
traps.
Syntax
trap-default-subscriptions { on | off }
Parameters
on The default event subscriptions are used. This setting is the default value.
off The default event subscriptions are not used. Your event subscriptions
persist after a system restart.
trap-priority:
Syntax
trap-priority priority
Parameters
priority
Identifies the event priority. The default value is error.
Guidelines
The trap-priority command specifies the minimum criticality for trap events. The
priorities are hierarchical. In descending order of criticality, the priorities are
emergency, alert, critic, error, warn, notice, info, and debug.
Example
trap-target:
This command specifies the recipient of SNMP traps issued by the local SNMP
agent.
Syntax
Guidelines
The local SNMP agent or engine issues the following generic traps:
v coldStart
v linkDown
v linkUp
v authenticationFailure
Examples
v Specify a recipient of SNMP v3 traps at 10.10.10.20:162. The trap recipient is
accessed with user ID “snmpNs”, and authentication and encryption are
required.
# trap-target 10.10.10.20 3 snmpNs authPriv
v Specify a recipient of SNMP v2c traps at 10.10.10.11:162. The trap recipient is
accessed with the public community.
# trap-target 10.10.10.11 2c
v Specify a recipient of SNMP traps at 10.10.100.19:162. The trap recipient is
accessed with the OpenView community.
# trap-target 10.10.100.19 2c OpenView
v Delete 10.10.10.11:162 from the list of trap recipients.
# no trap-target 10.10.10.11
user:
This command specifies the user ID used by a SNMPv3 manager to connect to the
appliance.
Syntax
user userName
version:
Syntax
version { 1 | 2c | 3 }
Parameters
1 Specifies support for SNMP Version 1 as defined in RFC 1155, RFC 1156,
and RFC 1157.
2c Specifies support for SNMP Version 2c as originally defined in RFC 1901
through RFC 1908. This setting is the default value.
3 Specifies support for SNMP Version 3 as defined in RFC 2261 through RFC
2265.
Examples
v Specifies support for SNMP Version 1.
# version 1
v Specifies support for SNMP Version 2c, which is, the default state.
# version 2c
SSH Server Profile mode provides the commands to manage the cipher suites for
SSH connections.
ciphers:
This command specifies the cipher suites that the appliance accepts for SSH
encryption.
Syntax
Add a cipher.
ciphers cipher-string
Delete a cipher.
no ciphers cipher-string
Parameters
cipher-string
Specifies the ciphers allowed by OpenSSH version 2 to use in SSH
communication. The order of cipher suites is important. The server
To enter the mode, use the Crypto ssl-client command. To delete an SSL client
profile, use the Crypto no ssl-client command.
While in this mode, use the following commands to define the SSL client profile.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
cache-size:
Syntax
cache-size entries
Parameters
entries
Specifies the maximum number of client sessions to cache. Enter a value in
the range 1 - 500000. The default value is 100.
This command is relevant only when the caching command is set to on.
cache-timeout:
This command sets the time that SSL sessions remain in the client session cache
before they are removed.
Syntax
cache-timeout seconds
Parameters
seconds
Sets the time that SSL sessions remain in the SSL session cache. Enter a
value in the range 1 - 86400. The default value is 300.
Guidelines
The cache-timeout command sets the time that SSL sessions remain in the session
cache before they are removed.
This command is relevant only when the caching command is set to on.
caching:
This command controls whether to cache SSL sessions when the appliance is an
SSL client.
Syntax
caching { on | off }
Parameters
on
Enables SSL session caching. This setting is the default value.
off
Disables SSL session caching.
Guidelines
The caching command controls whether to cache SSL sessions. When enabled, you
can change the following SSL session settings. The default behavior is 100 entries
and 5 minutes.
v Use the cache-size command to specify the maximum number of SSL sessions
to cache.
v Use the cache-timeout command to specify the time that SSL sessions remain in
the SSL session cache before they are removed.
This command specifies the cipher suites that the SSL client profile uses to
establish a secure connection.
Syntax
ciphers cipher_string
Parameters
cipher_string
Specifies the cipher suites. The following cipher suites are supported.
v RSA_WITH_NULL_MD5
v RSA_WITH_NULL_SHA
v RSA_EXPORT_WITH_RC4_40_MD5
v RSA_WITH_RC4_128_MD5
v RSA_WITH_RC4_128_SHA
v RSA_EXPORT_WITH_RC2_CBC_40_MD5
v RSA_EXPORT_WITH_DES40_CBC_SHA
v RSA_WITH_DES_CBC_SHA
v RSA_WITH_3DES_EDE_CBC_SHA (default)
v DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
v DHE_DSS_WITH_DES_CBC_SHA
v DHE_DSS_WITH_3DES_EDE_CBC_SHA (default)
v DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (default)
v DHE_RSA_WITH_DES_CBC_SHA
v DHE_RSA_WITH_3DES_EDE_CBC_SHA (default)
v RSA_WITH_AES_128_CBC_SHA (default)
v DHE_DSS_WITH_AES_128_CBC_SHA (default)
v DHE_RSA_WITH_AES_128_CBC_SHA (default)
v RSA_WITH_AES_256_CBC_SHA (default)
v DHE_DSS_WITH_AES_256_CBC_SHA (default)
v DHE_RSA_WITH_AES_256_CBC_SHA (default)
v RSA_WITH_NULL_SHA256
v RSA_WITH_AES_128_CBC_SHA256 (default)
v RSA_WITH_AES_256_CBC_SHA256 (default)
v DHE_DSS_WITH_AES_128_CBC_SHA256 (default)
v DHE_RSA_WITH_AES_128_CBC_SHA256 (default)
v DHE_DSS_WITH_AES_256_CBC_SHA256 (default)
v DHE_RSA_WITH_AES_256_CBC_SHA256 (default)
v RSA_WITH_AES_128_GCM_SHA256 (default)
v RSA_WITH_AES_256_GCM_SHA384 (default)
v DHE_RSA_WITH_AES_128_GCM_SHA256 (default)
v DHE_RSA_WITH_AES_256_GCM_SHA384 (default)
v DHE_DSS_WITH_AES_128_GCM_SHA256 (default)
Guidelines
The ciphers command specifies the cipher suites that the SSL client profile uses to
establish a secure connection.
The cipher suites correspond to the RFC names without the TLS_ or SSL_ prefix.
For example, RSA_WITH_3DES_EDE_CBC_SHA correspond to
TLS_RSA_WITH_3DES_EDE_CBC_SHA or SSL_RSA_WITH_3DES_EDE_CBC_SHA
in the relevant RFC.
The SSL client profile must include at least one cipher suite that matches the
associated key material.
v An RSA signing key requires ECDHE_RSA cipher suites.
v An ECDSA signing key requires ECDHE_ECDSA cipher suites.
To specify multiple cipher suites, run this command for each cipher suite.
curves:
This command specifies the list of elliptic curves that the SSL client profile
supports.
Syntax
curves name
Parameters
name
Specifies the name of the curve. The following curves are supported:
v sect163k1
Guidelines
The curves command specifies the elliptic curves that the SSL client profile
supports.
idcred:
Syntax
idcred name
Parameters
name
Specifies the name of the identification credentials.
The idcred command specifies the identification credentials that the appliance uses
to authenticate itself to an SSL server if client authentication is requested.
protocols:
This command specifies the SSL and TLS protocol versions to support when the
appliance is an SSL client.
Syntax
protocols option-string
Parameters
option-string
Specifies the SSL and TLS protocol versions to support. When you enable
support for multiple protocol versions, use a plus sign (+) character to
separate the versions. The following values are valid. The default value is
TLSv1d0+TLSv1d1+TLSv1d2.
SSLv3 Enables SSL version 3.
TLSv1d0
Enables TLS version 1.0.
TLSv1d1
Enables TLS version 1.1.
TLSv1d2
Enables TLS version 1.2.
Guidelines
The protocols command specifies the SSL and TLS protocol versions to support.
ssl-client-features:
This command specifies the features to add in the SSL client profile.
Syntax
ssl-client-features feature
Parameters
feature
Identifies the feature. Separate multiple features with the plus sign (+)
character. The default value is use-sni.
use-sni
Allows the client to send the Server Name Indication (SNI)
extension in the ClientHello message to the server that the client
attempts to connect to.
Guidelines
The ssl-client-features command specifies the features to add in the SSL client
profile that secures connections between the appliance and its targets.
valcred:
This command specifies the name of the validation credentials to validate the SSL
server certificate during the SSL handshake.
Syntax
valcred valcred
Parameters
valcred
Specifies the name of the validation credentials.
Guidelines
The valcred command specifies the name of the validation credentials to validate
the SSL server certificate during the SSL handshake. Validation credentials consist
of a set of certificates that validates the authenticity of received certificates and
digital signatures.
validate-server-cert:
This command controls whether to validate the server certificate during the SSL
handshake.
Syntax
validate-server-cert { on | off }
Parameters
on
Validates the server certificate. This setting is the default value.
off
Does not validate the server certificate.
Guidelines
To enter SSL Server Profile mode, use the crypto ssl-server command. To delete
an SSL server profile, use the crypto no ssl-server command.
While in this mode, use the commands in the following table to define the SSL
server profile.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
allow-legacy-renegotiation:
This command controls whether to allow SSL renegotiation with SSL clients that do
not support RFC 5746.
Syntax
allow-legacy-renegotiation { on | off }
Parameters
on
Allows SSL renegotiation with SSL clients that do not support RFC 5746.
off
Does not allow SSL renegotiation with SSL clients that do not support RFC
5746. This setting is the default value.
Guidelines
cache-size:
Syntax
cache-size entries
Parameters
entries
Guidelines
This command is relevant only when the caching command is set to on.
cache-timeout:
This command sets the time that SSL sessions remain in the server session cache
before they are removed.
Syntax
cache-timeout seconds
Parameters
seconds
Sets the time that SSL sessions remain in the SSL session cache. Enter a
value in the range 1 - 86400. The default value is 300.
Guidelines
The cache-timeout command sets the time that SSL sessions remain in the session
cache before they are removed.
caching:
This command controls whether to cache the SSL sessions when the appliance is an
SSL server.
Syntax
caching { on | off }
Parameters
on
Enables SSL session caching. This setting is the default value.
off
Disables SSL session caching.
Guidelines
The caching command controls whether to cache SSL sessions. When enabled, you
can change the following SSL session settings. The default behavior is 20480 entries
and 5 minutes.
v Use the cache-size command to specify the maximum number of SSL sessions
to cache.
v Use the cache-timeout command to specify the time that SSL sessions remain in
the SSL session cache before they are removed.
This command specifies the cipher suites that the SSL server profile uses to
establish a secure connection.
Syntax
ciphers cipher_string
Parameters
cipher_string
Specifies the cipher suites. The following cipher suites are supported.
v RSA_WITH_NULL_MD5
v RSA_WITH_NULL_SHA
v RSA_EXPORT_WITH_RC4_40_MD5
v RSA_WITH_RC4_128_MD5
v RSA_WITH_RC4_128_SHA
v RSA_EXPORT_WITH_RC2_CBC_40_MD5
v RSA_EXPORT_WITH_DES40_CBC_SHA
v RSA_WITH_DES_CBC_SHA
v RSA_WITH_3DES_EDE_CBC_SHA (default)
v DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
v DHE_DSS_WITH_DES_CBC_SHA
v DHE_DSS_WITH_3DES_EDE_CBC_SHA (default)
v DHE_RSA_EXPORT_WITH_DES40_CBC_SHA (default)
v DHE_RSA_WITH_DES_CBC_SHA
v DHE_RSA_WITH_3DES_EDE_CBC_SHA (default)
v RSA_WITH_AES_128_CBC_SHA (default)
v DHE_DSS_WITH_AES_128_CBC_SHA (default)
v DHE_RSA_WITH_AES_128_CBC_SHA (default)
v RSA_WITH_AES_256_CBC_SHA (default)
v DHE_DSS_WITH_AES_256_CBC_SHA (default)
v DHE_RSA_WITH_AES_256_CBC_SHA (default)
v RSA_WITH_NULL_SHA256
v RSA_WITH_AES_128_CBC_SHA256 (default)
v RSA_WITH_AES_256_CBC_SHA256 (default)
v DHE_DSS_WITH_AES_128_CBC_SHA256 (default)
v DHE_RSA_WITH_AES_128_CBC_SHA256 (default)
v DHE_DSS_WITH_AES_256_CBC_SHA256 (default)
v DHE_RSA_WITH_AES_256_CBC_SHA256 (default)
v RSA_WITH_AES_128_GCM_SHA256 (default)
v RSA_WITH_AES_256_GCM_SHA384 (default)
v DHE_RSA_WITH_AES_128_GCM_SHA256 (default)
v DHE_RSA_WITH_AES_256_GCM_SHA384 (default)
v DHE_DSS_WITH_AES_128_GCM_SHA256 (default)
Guidelines
The ciphers command specifies the cipher suites that the SSL server profile uses to
establish a secure connection.
The cipher suites correspond to the RFC names without the TLS_ or SSL_ prefix.
For example, RSA_WITH_3DES_EDE_CBC_SHA correspond to
TLS_RSA_WITH_3DES_EDE_CBC_SHA or SSL_RSA_WITH_3DES_EDE_CBC_SHA
in the relevant RFC.
The SSL server profile must include at least one cipher suite that matches the
associated key material.
v An RSA signing key requires ECDHE_RSA cipher suites.
v An ECDSA signing key requires ECDHE_ECDSA cipher suites.
The SSL server profile must include at least one cipher suite that matches the
identification credentials as specified by the idred command.
v When the identification credentials contains RSA keys, you must specify at least
one RSA cipher suite.
v When the identification credentials contains ECDSA keys, you must specify at
least one ECDSA cipher suite.
To specify multiple cipher suites, run this command for each cipher suite.
compression:
This command controls whether to enable SSL compression when the appliance is
an SSL server.
compression { on | off }
Parameters
on Enables SSL compression
off
Disables SSL compression. This setting is the default value.
Guidelines
curves:
This command specifies the list of elliptic curves that the SSL server profile
supports.
Syntax
curves name
Parameters
name
Specifies the name of the curve. The following curves are supported:
v sect163k1
v sect163r1
v sect163r2
v sect193r1
v sect193r2
v sect233k1
v sect233r1
v sect239k1
v sect283k1
v sect283r1
v sect409k1
v sect409r1
v sect571k1
v sect571r1
v secp160k1
v secp160r1
v secp160r2
v secp192k1
v secp192r1
v secp224k1
v secp224r1
Guidelines
The curves command specifies the elliptic curves that the SSL server profile
supports.
idcred:
Syntax
idcred name
Parameters
name
Specifies the name of the identification credentials.
Guidelines
The idcred command specifies the identification credentials that authenticate the
appliance during the SSL handshake.
max-duration:
This command specifies the maximum time to maintain an SSL session after the
initial negotiated handshake when the appliance is an SSL server.
Syntax
max-duration seconds
Parameters
seconds
Specifies the maximum time in seconds. Enter a value in the range 1 -
11520. The default value is 60.
Guidelines
max-renegotiation-allowed:
Syntax
max-renegotiation-allowed seconds
Parameters
seconds
Specifies the maximum number of renegotiation attempts that a client can
initiate per session. Enter a value in the range 0 - 512. The default value is
0, which disables the support for the client initiated renegotiation.
Guidelines
This command is relevant only when the value set by the ssl-options command
contains max-renegotiation.
prefer-server-ciphers:
This command controls whether to use the server's cipher suite order instead of
the client's during cipher suite negotiation.
Syntax
prefer-server-ciphers { on | off }
Parameters
on
Uses the server's cipher suite order. This setting is the default value.
off
Uses the client's cipher suite order.
Guidelines
When the server and the client negotiate which cipher suites to use, the server
compares the client's ciphers suites list with the server's cipher suites list and select
a shared one for connection. For example:
v The client's cipher suite list in order of the client's preference:
ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,
DHE_RSA_WITH_AES_256_CBC_SHA256, RSA_WITH_AES_256_CBC_SHA256
prohibit-resume-on-reneg:
This command controls whether a previous SSL session can be resumed during a
renegotiation handshake.
Syntax
prohibit-resume-on-reneg { on | off }
Parameters
on
Indicates that a previous session cannot be resumed during a renegotiation
handshake.
off
Indicates that a previous session can be resumed during a renegotiation
handshake. This setting is the default value.
Guidelines
This command is relevant only when the value set by the max-renegotiation-
allowed command is not 0.
protocols:
This command specifies the SSL and TLS protocol versions to support when the
appliance is an SSL server.
Syntax
protocols option-string
Parameters
option-string
Specifies the SSL and TLS protocol versions to support. When you enable
support for multiple protocol versions, use a plus sign (+) character to
separate the versions. The following values are valid. The default value is
TLSv1d0+TLSv1d1+TLSv1d2.
Guidelines
The protocols command specifies the SSL and TLS protocol versions to support.
request-client-auth:
This command controls whether to request client authentication during the SSL
handshake.
Syntax
request-client-auth { on | off }
Parameters
on
Requests client authentication.
off
Does not request client authentication. This setting is the default value.
Guidelines
When enabled, you must provide validation credentials with the valcred command
to validate the SSL client certificate.
require-client-auth:
This command controls whether to require client authentication during the SSL
handshake.
Syntax
require-client-auth { on | off }
Parameters
on
Requires client authentication. This setting is the default value.
off
Does not require client authentication.
send-client-auth-ca-list:
This command controls whether to require client authentication during the SSL
handshake.
Syntax
send-client-auth-ca-list { on | off }
Parameters
on
Transmits the client CA list during the SSL handshake. This setting is the
default value.
off
Does not transmit the client CA list during the SSL handshake.
Guidelines
ssl-options:
This command specifies the list of elliptic curves that the SSL server profile
supports.
Syntax
ssl-options options
Parameters
options
Specifies the options to apply to the SSL connection. The following values
are valid. To specify multiple options, separate each option with the plus
sign (+) character. For example, max-duration+max-renegotiation.
max-duration
Enables the option to specify the maximum duration of the SSL
session.
max-renegotiation
Enables the option to specify the maximum number of the client
initiated renegotiation that is allowed per session.
The ssl-options command specifies the options to apply to the SSL connection.
Enabling these options has negative impact on the performance of the SSL
communication. When enabled, you can change the following SSL settings. The
default behavior is 60 seconds and 0 renegotiation attempts.
v Use the max-duration command to change the maximum duration of the SSL
session.
v Use the max-renegotiation-allowed command to change the maximum number
of renegotiation attempts that the client can initiate per session.
valcred:
This command specifies the name of the validation credentials to validate the SSL
client certificate during the SSL handshake.
Syntax
valcred valcred
Parameters
valcred
Specifies the name of the validation credentials.
Guidelines
The valcred command specifies the name of the validation credentials to validate
the SSL client certificate during the SSL handshake.
validate-client-cert:
This command controls whether to validate the client certificate during the SSL
handshake if the client certificate is provided.
Syntax
validate-client-cert { on | off }
Parameters
on
Validates the client certificate. This setting is the default value.
off
Does not validate the client certificate.
Guidelines
While in this mode, use the commands in the following table to define system
settings.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
v To exit this configuration mode and save changes to the running configuration,
use the exit command.
Table 46. System settings commands
Command name Description
“admin-state” on page 586 This command sets the administrative state for the configuration.
“contact” This command identifies the person or function responsible for appliance
maintenance.
“custom-ui-file” on page 844 This command specifies the location of the custom user interface file.
“entitlement” on page 844 This command manages intrusion detection of the appliance in System
Settings mode.
“locale” on page 845 This command specifies the locale for the operating language of the
appliance.
“location” on page 845 This command specifies the location of the appliance.
“name” on page 846 This command sets an identifier for the appliance.
contact:
Syntax
contact contact
Parameters
contact
Identifies the person or function responsible for appliance maintenance.
Guidelines
The contact command identifies the person who is responsible for managing the
appliance. This information identifies the person who is responsible for managing
this appliance by name, telephone number, email address, or a combination of
these items.
custom-ui-file:
This command specifies the location of the custom user interface file.
Syntax
custom-ui-file URL
no custom-ui-file
Parameters
URL Specifies the location of the file on the appliance.
Guidelines
The custom-ui-file command specifies the location of the custom user interface
file. The file must be in the local: or store: directory on the appliance. The file
cannot be on a mounted file system.
This XML file contains custom user interface messages to display in the GUI and
from the CLI. This file also defines the custom prompt for the CLI. After you create
the custom user interface file, use the test schema command to validate that the
XML file is conformant with the dp-user-interface.xsd schema.
Use the no custom-ui-file command to remove the use of custom messages and
the CLI prompt that are defined in the custom user interface file.
Example
Specify the xyzbanner.xml file in the store: directory as the custom user interface
file.
# custom-ui-file store:///xyzbanner.xml
entitlement:
Syntax
entitlement original
Parameters
original
Specifies the original serial number.
Guidelines
The entitlement command specifies the serial number of the original appliance
after you receive a replacement appliance. Without the serial number of the
locale:
This command specifies the locale for the operating language of the appliance.
Syntax
locale locale
Parameters
locale Specifies the operating language.
de German.
en English.
es Spanish.
fr French.
it Italian.
ja Japanese.
ko Korean.
pt_BR Brazilian Portuguese.
ru Russian.
zh_CN Simplified Chinese.
zh_TW Chinese (Taiwan).
Guidelines
The locale command specifies the locale for the operating language of the
appliance. This setting manages locale-specific conventions, such as date and time
formats, and controls the language of log messages.
Before a locale is selected, the administrative state of the language must be enabled
with the language command.
location:
Syntax
location location
Parameters
location
Specifies the appliance location.
Guidelines
Syntax
name identifier
Parameters
identifier
Specifies the identifier. Use a string up to 127 characters in length.
Guidelines
The name command specifies the system identifier of the appliance. Define an
identifier that consists of only ASCII letters and numbers, for this value can be
used to identify the appliance to establish a remote connection. Some protocols do
not support spaces. If the name contains spaces, enclose in double quotation
marks.
When the custom user interface file defines the command-line extension, this
identifier is added before the prompt.
Examples
v Set Duluth as the name of the appliance.
# name Duluth
v Set Tango Lake as the name of the appliance.
# name "Tango Lake"
v Clear a previously set name:
# no name
To enter the mode, use the Crypto valcred command. To delete validation
credentials, use the no valcred command.
While in this mode, use the following commands to define the validation
credentials.
v To view the current configuration, use the show command.
v To restore default values, use the reset command.
v To exit this configuration mode without saving changes to the running
configuration, use the cancel command.
cert-validation-mode:
Syntax
Parameters
legacy The validation credentials contain the exact peer certificate to match or the
certificate of the immediate issuer, which might be an intermediate CA or a
root CA. This mode is maintained for backwards compatibility. You can
use exact-match or pkix in most cases instead of using legacy. This setting
is the default value.
pkix The complete certificate chain is checked from subject to root with this
validation credentials for certificate validation. Validation succeeds only if
the chain ends with a root certificate in the validation credentials. Nonroot
certificates in the validation credentials are used as untrusted intermediate
certificates. More untrusted intermediate certificates are dynamically
obtained from the context at hand (SSL handshake messages, PKCS#7
tokens, PKIPath tokens, and so forth).
exact-match
The validation credentials contain the exact peer certificate to match. This
mode is useful when you want to match the peer certificate exactly, but
that certificate is not necessarily a self-signed (root) certificate.
Guidelines
The pkix method, as described in RFC 3280, expects the remote peer to provide all
intermediate certificates to the DataPower appliance during SSL negotiation. The
associated validation credentials consist of self-signed certificates and certificates of
trust anchors. Certificates can be a root CA or an intermediate CA.
Examples
v Create the ValCred-1 validation credentials with PKIX validation.
# valcred ValCred-1
Crypto Validation Credentials configuration
# cert-validation-mode pkix
v Restores the default setting for the ValCred-1 validation credentials.
# valcred ValCred-1
Crypto Validation Credentials configuration
# cert-validation-mode legacy
certificate:
certificate alias
no certificate alias
Parameters
alias Specifies the name of the certificate alias.
Guidelines
Before you can add a certificate-alias to validation credentials, you must complete
the following procedure.
1. Use the copy command to transfer the certificate to the appliance.
2. Use the Crypto certificate command to create an alias for the certificate.
Use the no certificate command to remove a certificate alias from the validation
credentials.
Examples
check-dates:
This command controls whether to check the current date against the NotBefore
value and the NotAfter value in the X.509 certificates and CRLs during certificate
validation.
Syntax
check-dates { on | off }
Parameters
on Checks the current date against the NotBefore value and the NotAfter
value in the X.509 certificates and CRLs during certificate validation. If the
certificate is expired, validation fails. This setting is the default value.
Guidelines
The check-dates command controls whether to check the current date and time
against the activation date (the NotBefore value in the certificate) and the
expiration date (the NotAfter value in the certificate) in the X.509 certificates and
CRLs during certificate validation.
v When enabled, expired certificates causes the validation to fail during certificate
validation.
v When disabled, expired certificates can be accepted and validated during
certificate validation without causing the validation to fail.
Example
crldp:
This command controls support for the X.509 Certificate Distribution Point
certificate extension.
Syntax
Parameters
ignore Ignores the certificate extension. This setting is the default value.
require
Indicates that a candidate certificate is deemed valid if the presented
certificate chain ends with a trust anchor. This method is used only when
the validation credentials are for SSL peer validation.
Guidelines
The crldp command controls support for the X.509 Certificate Distribution Point
certificate extension. This noncritical certificate extension specifies how to obtain
CRL information.
See RFC 2527 and RFC 3280 for information about certificate policies.
Examples
v Create the ValCred-1 validation credentials that enable support the Certificate
Distribution Point extension.
# valcred ValCred-1
Crypto Validation Credentials configuration
# crldp require
#
v Restore the default state for the ValCred-1 validation credentials.
explicit-policy:
This command controls support for the initial explicit policy variable.
Syntax
explicit-policy
no explicit-policy
Guidelines
The explicit-policy command, controls support for the initial explicit policy
variable. This command is meaningful only if the cert-validation mode command
is set to pkix.
If enabled, the chain validation algorithm must end with a non-empty policy tree.
If disabled, the algorithm can end with an empty policy tree unless policy
constraints extensions in the chain require an explicit policy.
For information about certificate policies, see RFC 2527 and RFC 3280.
Examples
v Create the ValCred-1 validation credentials where the chain validation algorithm
must end with an empty tree.
# valcred ValCred-1
Crypto Validation Credentials configuration
# cert-validation mode pkix
# explicit-policy
v Restore the default state for the ValCred-1 validation credentials.
# valcred ValCred-1
Crypto Validation Credentials configuration
# no explicit-policy
initial-policy-set:
Syntax
initial-policy-set identifier
no initial-policy-set identifier
Parameters
identifier
Specifies the unique identifier for the certificate policy.
Note: The use of qualifiers is not supported. If present, they are ignored.
In a host certificate, policy information terms indicate the policy under which the
certificate was issued and the purposes that the certificate can be used for.
In a CA certificate, policy information terms limit the set of policies for certification
paths that include this certificate. When a CA does not want to limit the set of
policies for certification paths that include this certificate, the CA can assert the
special anyPolicy policy. The anyPolicy policy has an OID of 2.5.29.32.0.
All members of the set are used during certificate chain processing as described in
Section 6.1.1 of RFC 3280.
Examples
v Modify the ValCred-1 validation credentials to add the 1.3.6.1.4.1.14248.1.1
policy identifier.
# valcred ValCred-1
Crypto Validation Credentials configuration mode
# initial-policy-set 1.3.6.1.4.1.14248.1.1
v Modify the ValCred-1 validation credentials to remove the
1.3.6.1.4.1.14248.1.1 policy identifier.
# valcred ValCred-1
Crypto Validation Credentials configuration
# no initial-policy-set 1.3.6.1.4.1.14248.1.1
require-crl:
require-crl
no require-crl
Guidelines
The require-crl command mandates CRL (certificate revocation list) use during
certificate chain processing. By default, CRL use is not required during certificate
chains processing.
Use the no require-crl command to restore the default condition, which allows,
but does not require, CRL use during certificate chains processing.
Examples
v Create the ValCred-1 validation credentials that require CRL use during
certificate chain processing.
# valcred ValCred-1
Crypto Validation Credentials configuration
# require-crl
v Restores the default setting for the ValCred-1 validation credentials.
# valcred ValCred-1
Crypto Validation Credentials configuration
# no-require-crl
use-crl:
This command enables but does not require the use of certificate revocation lists
during certificate chain processing.
Syntax
use-crl
no use-crl
Guidelines
The use-crl command enables but does not require the use of certificate
revocation lists during certificate chain processing. By default, CRL use is enabled
during processing certificate chains.
Use the no use-crl command to disable the use of certificate revocation lists
during certificate chain processing.
Examples
v Create the ValCred-1 validation credentials that disable CRL use during
certificate chain processing.
# valcred ValCred-1
Crypto Validation Credentials configuration
# no use-crl
v Restore the default setting for the ValCred-1 validation credentials.
# valcred ValCred-1
Crypto Validation Credentials configuration
# use-crl
The VLAN commands can be run from the command line interface in VLAN
configuration mode. To enter VLAN configuration mode, complete the following
steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter Ethernet configuration mode:
vlan name
where name is the name of VLAN interface that you want to configure.
3. When you have finished, save your configuration:
write memory
4. Type exit to leave the configuration mode, then type exit again to leave global
configuration mode.
VLAN interfaces are not supported for links used in high availability
configurations or disaster recovery configurations.
ethernet-interface:
Syntax
Guidelines
This command is meaningful only when you use the over command to indicate
that connectivity is over an Ethernet interface.
identifier:
Syntax
identifier number
Guidelines
The identifier command specifies the VLAN identifier to send traffic as well as
to receive traffic. The identifier must be unique among all VLAN interfaces on the
same Ethernet interface.
ip-address:
This command assigns the primary network address for the VLAN interface.
Syntax
ip-address address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Guidelines
The ip-address command assigns the primary network address to the interface.
The network address is an IP address with its subnet mask.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
Examples
v Assign an IP address in version 4 format.
# ip-address 192.168.7.6/27
v Assign an IP address in version 6 format.
# ip-address 2001:0db8:3c4d:0015::abcd:ef12/34
ip-config-mode:
This command identifies the configuration mode for the VLAN interface.
Syntax
Guidelines
Examples
v Change the configuration mode to IPv4 autoconfiguration with DHCP.
# ip-config-mode dhcp
v Change the configuration mode to manual configuration.
# ip-config-mode static
ip-route:
This command manages static routes in the routing table for the VLAN interface.
Syntax
Add a static route
ip-route address next-hop-address [metric]
Delete a static route
no ip-route address next-hop-address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
next-hop-address
Specifies the IP address of the next-hop router.
metric Optionally specifies the preference for the route. The lesser the value, the
more preferred the route. For each IP family, the supported range differs.
v For IPv4, enter a value in the range 0 - 255. The default value is 0.
Guidelines
The ip-route command manages static routes in the routing table. Issue this
command for each static route to add to the routing table.
To delete a static route, use the no ip-route command. Issue this command for
each static route to delete from the routing table.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
Examples
v Add a static route to the routing table (subnet 10.10.10.224 via next-hop router
192.168.1.100). The metric for the route is 0, the default value for IPv4, which is
the most preferred route.
# ip-route 10.10.10.0/27 192.168.1.100
v Delete a static route from the routing table (subnet 10.10.10.224 via next-hop
router 192.168.1.100).
# no ip-route 10.10.10.0/27 192.168.1.100
ip-secondary-address:
This command manages secondary network addresses for the VLAN interface.
Syntax
Add a secondary address
ip-secondary-address address
Remove a secondary address
no ip-secondary-address address
Remove all secondary addresses
no ip-secondary-address
Parameters
address
Specifies the IP address and netmask. The netmask is in CIDR format and
is the integer that assigns the prefix length.
v For version 4, the prefix length can be in the range of 0 through 32.
v For version 6, the prefix length can be in the range of 0 through 128.
Guidelines
Examples
v Add 192.168.7.6/27 as a secondary IP address to the interface.
# ip-secondary-address 192.168.7.6/27
v Remove 192.168.7.6/27 as a secondary IP address.
# no ip-secondary-address 192.168.7.6/27
v Remove all secondary IP addresses.
# no ip-secondary-address
ipv4-default-gateway:
This command designates the default IPv4 gateway for the VLAN interface.
Syntax
Designates the default IPv4 gateway
ipv4-default-gateway address
Deletes the default IPv4 gateway
no ipv4-default-gateway
Parameters
address
Specifies the IP address of the default IPv4 gateway.
Guidelines
The ipv4-default-gateway command designates the default IPv4 gateway that the
interface can reach. If the interface supports both IP families, use the
ipv6-default-gateway command to designate the default IPv6 gateway.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
ipv6-dadtransmits:
This command sets the number of IPv6 duplication address detection attempts for
the VLAN interface.
Syntax
ipv6-dadtransmits attempts
Parameters
attempts
Specifies the number of attempts. The default value is 1.
If you specify more than one attempt, use the ipv6-nd-retransmit-timer command
to set the interval between attempts.
ipv6-default-gateway:
This command designates the default IPv6 gateway for the VLAN interface.
Syntax
Designate the default IPv6 gateway
ipv6-default-gateway address
Delete the default IPv6 gateway
no ipv6-default-gateway
Parameters
address
Specifies the IP address of the default IPv6 gateway.
Guidelines
The ipv6-default-gateway command designates the default IPv6 gateway that the
interface can reach. Define a default IPv6 gateway if you defined IPv6 IP
addresses.
This command is meaningful except when you use the ip-config-mode command
for autoconfiguration with DHCP or SLAAC.
ipv6-nd-retransmit-timer:
This command sets the interval between IPv6 neighbor discovery attempts for the
VLAN interface.
Syntax
ipv6-nd-retransmit-timer milliseconds
Parameters
milliseconds
Specifies the interval between attempts in milliseconds. The default value
is 1000.
link-aggregation-interface:
Syntax
link-aggregation-interface name
Parameters
name Specifies the name of an aggregate interface
Guidelines
This command is meaningful only when you use the over command to indicate
that connectivity is over an aggregate interface.
mtu:
This command sets the maximum transmission unit of the VLAN interface.
Syntax
mtu bytes
Parameters
bytes Specifies the maximum size in bytes. Enter a value in the range 576 -
16128. The default value is 1500.
Guidelines
The mtu command sets the maximum transmission unit (MTU) for the VLAN
interface.
The MTU for the VLAN interface cannot be greater than the MTU of the parent
interface. The parent interface is either an Ethernet interface or an aggregate
interface. Use the over command to set the parent interface type.
v When the parent is an Ethernet interface, the ethernet-interface command sets
the Ethernet interface. The MTU of the VLAN interface cannot be greater than
the MTU of the Ethernet interface.
v When parent is an aggregate interface, the link-aggregation-interface
command sets the aggregate interface. The MTU of the VLAN interface cannot
be greater than the MTU of the aggregate interface.
Example
outbound-priority:
Syntax
outbound-priority priority
Parameters
priority
Specifies the priority value. Enter a value in the range 0 - 7. The default
value is 0.
Guidelines
over:
Syntax
Parameters
ethernet
Indicate that the parent is an Ethernet interface. This setting is the default
value.
link-aggregation
Indicates that the parent is an aggregate interface.
Guidelines
The over command sets the parent interface type for the VLAN interface.
v When an Ethernet interface, use the ethernet-interface command to set the
parent Ethernet interface.
v When an aggregate interface, use the link-aggregation-interface command to
set the parent aggregate interface.
packet-capture:
Syntax
Start a packet-capture session
packet-capture file seconds KB ["expression"]
Stop a packet-capture session
no packet-capture file
Parameters
file Specifies the file name for the packet capture. You can simultaneously
capture packets on multiple interfaces by specifying a different file name
for each interface.
seconds
Specifies the maximum duration of the packet-capture session in seconds.
Enter a value in the range 5 - 86400. The special value of -1 indicates that
the packet capture is continuous and completes when it reaches the
maximum file size or until you issue the no packet-capture command.
KB Specifies the maximum size of the file in KB. Enter a value in the range 10
- 500000.
expression
Optionally specifies the expression that filters the packet capture. Enclose
the expression in double quotation marks.
Guidelines
Examples
v Start a timed packet-capture session that writes data to the temporary:///
capture-1 file. The session completes either after 30 minutes or when the file
contains 2500 KB, whichever occurs first.
# packet-capture temporary:///capture-1 1800 2500
Trace begun.
#
The web management service commands can be run from the command line
interface in web management service configuration mode. To enter web
management service configuration mode, complete the following steps:
1. From the appliance command line, enter global configuration mode:
config
2. From global configuration mode, enter throttle configuration mode:
web-mgmt
3. Type exit to leave the configuration mode and save your changes, then type
exit again to leave global configuration mode.
While in this mode, use the commands in the following table to modify the web
management service.
idle-timeout:
This command specifies the idle-session timer for the web management service.
Syntax
idle-timeout seconds
Parameters
seconds
Specifies the timeout value of the idle session in seconds. Use any value of
0 - 65535. The default value is 600. A value of 0 disables the timer.
Guidelines
The idle-timeout command settings only apply to the IBM MQ Appliance web UI
part of the user interface. The IBM MQ Console does not time out because it
performs monitoring tasks.
862 IBM MQ Appliance
local-address:
This command changes the local address and port that the web management
service monitors for requests.
Syntax
Parameters
address
Specifies the IP address or host alias of a local interface that the service
listens on. The default value is 0.0.0.0.
port Specifies the listening port for the service. The default value is 9090.
Guidelines
The local-address command specifies the local address and port that the service
listens on.
v When the value is 0.0.0.0, the service listens on all active IPv4 addresses.
v When the value is ::, the service listens on all active IPv4 and IPv6 addresses.
If the local address supports IPv6 addresses, modify the web-mgmt ACL to include
an allow clauses for specific or all IPv6 addresses.
Use a host alias to help ease migration tasks among appliances. To create a local
host alias, use the Global host-alias command.
Example
Specify that port 8090 on all interfaces is monitored for requests to the Web
Management Service.
# web-mgmt
Web Management Service configuration mode
# local-address 0.0.0.0 8090
port:
This command changes the listening port for the web management service.
Syntax
port port
Parameters
port Indicates the listening port. The default value is 9090.
Change the port to 8090 on the local interfaces that monitor for requests to the web
management service.
# web-mgmt
Web Management Service configuration mode
# port 8090
#
ssl (deprecated):
This command changes the association of the SSL proxy profile for the web
management interface.
Syntax
ssl name
Parameters
name Specifies the name of an SSL proxy profile.
Guidelines
The ssl command changes the association of the SSL proxy profile for the web
management interface. You must associate an SSL proxy profile with the web
management interface. By default, the web management interface uses the shipped
configuration. Unless you create and assign a different SSL proxy profile, all
appliances use the same SSL configuration.
ssl-config-type:
This command sets the type of the SSL profile for the web management interface.
Syntax
Parameters
proxy (deprecated)
Uses an SSL proxy profile with the cryptographic profiles to secure
connections. This setting is the default value for backward compatibility.
server
Uses an SSL server profile to secure connections.
sni
Uses an SSL SNI server profile to secure connections.
Guidelines
The ssl-config-type command sets the SSL profile type to secure connections
between clients and the appliance. You can use an SSL proxy profile, an SSL server
profile, or an SSL SNI server profile.
ssl-server:
This command associates an SSL server profile with the web management
interface.
Syntax
ssl-servername name
Parameters
name
Specifies the name of an SSL server profile.
Guidelines
The ssl-server command specifies the SSL server profile to secure connections
between clients and the appliance. You use an SSL server profile when the
appliance is an SSL server.
This command is relevant when the type set by the ssl-config-type command is
server.
The REST management interface provides access to the actions and to the
configuration and status resources on the appliance.
For REST commands for administering IBM MQ, see “Administering IBM MQ by
using the REST API” on page 244, also see Using the administrative REST API in
the IBM MQ documentation.
You can use the management REST interface to view status or configuration data,
or to configure and reconfigure the appliance. You can send HTTP requests to the
REST interface port and receive JSON-formatted responses with a payload and
indication of success or failure. To send requests and receive responses, you can
use the curl program, a similar shell tool, or a browser tool such as one for Firefox
or Chrome. The response contains information about the resource at the URI target.
You can also use the REST management interface by incorporating requests into
programs that you write.
REST management uses the HTTP GET, POST, PUT, and DELETE methods on its
URIs. Not every resource is available for all HTTP methods. For example, status
resources support only the GET method, where configuration resources allow more
supported methods. You can retrieve the list of supported HTTP methods on any
URI by sending the OPTIONS request to that URI.
You can use different methods when you send requests to the REST management
interface.
The general structure of all REST management interface requests is the same. You
give the method (GET, PUT, POST, DELETE, OPTIONS) followed by the URI
(starting with https://address:5554/mgmt/...). The remaining structure of the
request depends on the resource and URI of the request. For example:
GET ’https://example.com:5554/mgmt/config/default/User/Bob’
See “REST management resources” on page 868 for valid URIs and applicable
methods. You can also see which methods are supported for which URIs, by
sending a request to that URI using the OPTIONS method. For example:
OPTIONS ’https://example.com:5554/mgmt/config/default/User/Bob’
When you make requests on config objects, you can optionally specify view, depth,
and state query parameters. For example:
GET ’https://example.com:5554/mgmt/config/default/User/Bob?view=recursive&depth=2’
See “REST management resources” on page 868 and “Query parameters” on page
871 for details on the parameters and where you can use them.
Authentication header
An HTTP basic authentication header must be present in every request that is sent
to the REST management interface.
Request payloads
When you use a PUT or POST method with a URI, you include a payload that
contains what is to be put or posted.
For example, if you were wanted to modify the default gateway IP address in the
eth0 Ethernet interface configuration, you would first retrieve the current value, for
example:
GET https://myhost.com:5554/mgmt/config/default/EthernetInterface/eth0/DefaultGateway
{
"_links" : {
"self" : {
"href" : "/mgmt/config/default/EthernetInterface/eth0/DefaultGateway"
},
"doc" : {
"href" : "/mgmt/docs/config/EthernetInterface/DefaultGateway"
}
},
"DefaultGateway" : "192.0.2.0"
}
When you send a REST request, the appliance responds with a structured response
in JSON format. The exact structure of the response depends on the resource and
URI of the request, but all responses are similar.
The response includes all available resources from any point within the API. It
includes the resources by embedding a _links element within the JSON response,
which contains pointers to accessible resources, including possible documentation.
You can then target the resources within the _links element in your subsequent
REST management interface requests.
For example, when you specify a GET request for the REST API root
(https://example.com:5554/mgmt/), the response consists of the resources available
that is structured as a list of fields and values:
The following example shows the response to a request for status information
about the current firmware version of the appliance, GET ’/mgmt/status/default/
FirmwareVersion’:
{
"_links": {
"self": {
"href": "/mgmt/status/default/FirmwareVersion"
},
"doc": {
"href": "/mgmt/docs/status/FirmwareVersion"
}
},
"FirmwareVersion": {
"Serial": xxxxxxx,
"Version": "MQ00.9.0.1.0",
"Build": "xxxxxxx",
"BuildDate": "2016/09/20 10:29:27",
"WatchdogBuild": "MQ00.9.0.1.0",
"InstalledDPOS": "MQ00.9.0.1.0",
"RunningDPOS": "MQ00.9.0.1.0",
"XMLAccelerator": "embedded",
"MachineType": 5725,
"ModelType": "S14"
}
}
The root URI begins with the /mgmt/ resource. All available resources are
positioned below this resource.
Configuration resources
Query parameters are available for use with these resources, see “Query
parameters” on page 871.
Table 47. Configuration resources
Supported HTTP Supported query
URI methods parameters Description
/mgmt/config/ GET none List of appliance
configurations
/mgmt/config/ GET, POST state List of all
default/class configurations of a
specific object class
/mgmt/config/ GET, PUT, DELETE depth, state, view configuration of the
default/class/ specified instance in
object the object class
/mgmt/config/ GET, PUT state The value of the
default/class/ specified scalar
object/ property belonging to
scalar_property the specified object in
the class.
/mgmt/config/ GET, PUT, POST state The value of the
domain/class/ specified vector
object/ property belonging to
vector_property the specified object in
the class.
Status resources
Use the status resources to access appliance status information.
Table 48. Status resources
URI Supported HTTP methods Description
/mgmt/status/ GET List of all available status
providers on the appliance
/mgmt/status/default/class GET The status provider of the
specified object class
Filestore resources
Use the filestore resources to work with files and directories on the appliance.
Table 50. Filestore resources
URI Supported HTTP methods Description
/mgmt/filestore/ GET List of available URIs
/mgmt/filestore/default/ GET List of available directories
/mgmt/filestore/default/ GET Contents of the specified
directory directory
/mgmt/filestore/default/ GET, PUT, POST, DELETE Contents of the specified file
directory/file
Metadata resources
Query parameters
You can use query parameters with requests to the configuration resource URIs.
You can access various kinds of data by using query parameters. All the
parameters are optional. The parameters are used only on certain API requests, as
specified. The default behavior is for the parameters not to be specified.
view
The view query parameter specifies the amount of detail that is returned in
a request. Set view=recursive to receive the requested data and the
contents of any referenced objects. Use with the depth parameter to control
the depth of recursion (the default is seven levels of recursion). The
recursive process can impact performance substantially.
v Each retrieved level of referenced configuration contents is a new depth.
The depth parameter specifies how many levels to retrieve. The retrieved
contents appear in the data under the _embedded : descendents field of
the object.
"_embedded": {
"descendants": [ ]
}
v The referenced data from all the depths is retrieved as a flat list of
objects and types. No information about the hierarchical relationship
between the returned data is conveyed by this list.
Example:
/mgmt/config/default/class/object?view=recursive&depth=2
depth
The depth query parameter limits the returned payload to a specified
number of expansions, controlling the number of referenced objects that
are retrieved. The value of the parameter is an integer in the range 1 - 7.
The recursive process can impact performance substantially.
v This parameter is ignored unless it is used with the view=recursive
parameter.
v When the view=recursive parameter is used without a depth parameter,
the value of depth defaults to 7.
Example:
/mgmt/config/default/class/object?view=recursive&depth=4
The state of an object is retrieved with a GET request. The response contains
both the runtime state and the configuration.
"state": {
"opstate": "down",
"adminstate": "disabled",
"eventcode": "0x0034000d",
"errorcode": "Object is disabled",
"configstate": "saved"
}
Messages
Visit the messages section in the IBM MQ documentation for help with IBM MQ
diagnostic messages.
http://www.ibm.com/support/knowledgecenter/SSFKSJ_9.0.0/
com.ibm.mq.ref.doc/q050250_.htm
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
Software Interoperability Coordinator, Department 49XA
3605 Highway 52 N
Rochester, MN 55901
U.S.A.
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This book contains information on intended programming interfaces that allow the
customer to write programs to obtain the services of WebSphere® MQ.
However, this information may also contain diagnosis, modification, and tuning
information. Diagnosis, modification and tuning information is provided to help
you debug your application software.
Trademarks
IBM, the IBM logo, ibm.com®, are trademarks of IBM Corporation, registered in
many jurisdictions worldwide. A current list of IBM trademarks is available on the
Web at “Copyright and trademark information”www.ibm.com/legal/
copytrade.shtml. Other product and service names might be trademarks of IBM or
other companies.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
Notices 875
876 IBM MQ Appliance
IBM®