Product-specific Take Action commands

The product-specific Take Action command handler from OMEGAMON for Networks on z/OS enables the product to pass some IP commands to z/OS® Communication Server and the z/OS console.

The Take Action feature enables IP commands to be issued by the OMEGAMON for Networks on z/OS monitoring agent to the target z/OS system. The following predefined commands are supported :

Security for this monitoring agent Take Action commands is implemented through direct SAF (System Authorization Facility) calls and is based on resource profiles. OMEGAMON for Networks on z/OS agent Take Action commands cannot be successfully executed unless a security class is defined to the SAF security manager, and the security class name is configured in each runtime environment in which an OMEGAMON for Networks on z/OS monitoring agent is configured. The new 3270 and existing Tivoli® Enterprise Portal Take Action commands fail unless explicit security definitions are configured that enable these commands to be issued. Both user ID and command are validated. For information about the configuration that you must do before you can issue these commands, see Authorizing users to issue Take Action commands.

When invoked interactively by an operator using the enhanced 3270 interface, Take Action commands are issued in context from the 3270 workspaces either by entering “/” or an action letter as specified in Table 1, using the dialog shown in Figure 1:
Figure 1. Take Action dialog
Take Action dialog
You can start the Take Action Command Menu from any workspace that supports take action commands by entering an exclamation point (!) on the underscore in front of any row.
The command pop-up windows are pre-populated with attributes from the selected row from the enhanced 3270 interface from which the command was issued. Take Action commands can be issued from the workspaces shown in Table 1.
Table 1. Take Action commands and the associated workspaces in the enhanced 3270 user interface
Workspace Take Action commands available Action letter Attribute that the command is executed against
Active TN3270 Server Connections for Port Local_Port (KN3TNAS) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Application TCP Listeners and Connections (KN3TCLS) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
DVIPA Connections (KN3TCPV) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
EE Connection Summary for EE_PU_Name (KN3EEDS) NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise Active FTP Transfers Overview (KN3FTPO) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise Connections Find (KN3TCPF) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise Connections Health (KN3TCPO) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise EE Connections Overview (KN3EECO) NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise EE and HPR Connections Health (KN3EECO2) NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise FTP Sessions Overview (KN3FSEO) Drop Connection (Not available from the FTP Login Failures Summary or the FTP Session Failures Summary subpanels) D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise FTP Transfers Find (KN3FTPF) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Enterprise TN3270 Find (KN3TNAF) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
FTP Transfers for Session with Application_Name (KN3FTPS) Drop Connection (available only for Active FTP transfers) D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
TCP Listener Connections for Application_Name (KN3TCLS2) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
TN3270 Server Connections for Port Local_Port (KN3TNAS2) Drop Connection D Hex Connection Number
NSLookup IP Address N Remote IP Address
Ping IP Address P Remote IP Address
Tracerte IP Address T Remote IP Address
Once a Take Action command is issued, the user is redirected to the Command and Response Log workspace. The Command Log subpanel shows the latest command that was issued. The Command Response subpanel displays the command results. The Command Log workspace is shown in Figure 2.
Note: Some commands might not return results right away, so it is possible the Command Response subpanel might not have data initially.
Figure 2. Command and response log workspace
Command and response log workspace

By default, a user sees only the commands that are issued from that user ID. To learn how to enable a user to see all commands that have been issued, regardless of the user ID from which they were issued, refer to Authorizing users to issue Take Action commands.