0% found this document useful (0 votes)
119 views

Composer Commands

This document summarizes commands that can be used to manage objects in the database of IBM Tivoli Workload Scheduler Version 8.5. The composer command line interface program is used with connection parameters and commands. Commands include add, authenticate, create, extract, replace, delete, list, modify, and help for performing operations on scheduling objects like calendars, event rules, parameters, variable tables, prompts and resources in the database.

Uploaded by

bravichandra24
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views

Composer Commands

This document summarizes commands that can be used to manage objects in the database of IBM Tivoli Workload Scheduler Version 8.5. The composer command line interface program is used with connection parameters and commands. Commands include add, authenticate, create, extract, replace, delete, list, modify, and help for performing operations on scheduling objects like calendars, event rules, parameters, variable tables, prompts and resources in the database.

Uploaded by

bravichandra24
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

IBM Tivoli Systems Management Information Center http://pic.dhe.ibm.com/infocenter/tivihelp/v3r1/in...

Search: Go Scope: All topics

Workload Scheduler V8.5.1 Fix Pack 1 (Revised October 2010) > Previous versions > Version 8.5 > User's
Guide and Reference V8.5 > Appendix C. Quick reference for commands > Managing objects in the
database

Workload Scheduler, Version 8.5

Composer commands

This section describes the operations you can perform in the database using the composer command
line interface program with syntax:

composer [connection_parameters] [-defaultws twscpu]


["command[&[command]][...]"]

where connection_parameters are the following:

[-file filename]|
[-host hostname]
[-port port_name]
[-protocol protocol_name]
[-proxy proxy_name]
[-proxyport proxy_port_number]
[-password user_password]
[-timeout seconds]
[-username user_name]

These operations can only be run from any composer client command line installed.

In Table 115 displaying the list of commands that can be used against the scheduling object, filename
indicates an existing file when used in the syntax for the add and replace commands, it indicates a not
existing file when used in the syntax for the create/extract command.

Table 115. Commands used against scheduling objects in the database


User
Command Syntax Authorization
add add filename [;unlock] add or modify
authenticate authenticate [username=username
password=password]
create create | extract filename from display
extract {[calendars | calendar | cal=calname] |
[eventrule | erule | er=eventrulename] |
[parms | parm=parmname] |
[vartable | vt=tablename] |
[prompts | prom=promptname] |
[resources | resource |
res=[workstationame#]resourcename] |

1 of 1 04/23/2014 06:03 PM

You might also like