Installing agents

How to install an IBM Workload Scheduler fault-tolerant agent or dynamic agent in your distributed or end-to-end network by using the twsinst script.

This picture describes the steps required for installing the master domain manager. You are now at step 7: installing the Dynamic Workload Console

When you install a fault-tolerant agent, also the remote command-line client is installed. You can use the client to run composer and conman commands.

Use only the twsinst script to install agents. If you are installing a dynamic agent, you can optionally add the Java™ run time which is needed to run job types with advanced options, and to configure a gateway to open communication with the dynamic workload broker.

When you install a dynamic or a fault-tolerant agent, also the following access methods, that extend the job scheduling capabilities of IBM Workload Scheduler to other software products, are installed:
PeopleSoft
To run and monitor PeopleSoft jobs from the IBM Workload Scheduler environment.
SAP
To create, schedule, and control SAP jobs by using the job scheduling features of IBM Workload Scheduler.
z/OS
To define and schedule jobs that run in a z/OS environment with JES2, JES3, or IBM Z Workload Scheduler
See Access methods for details about configuring and using the access methods.
Important: In order to be entitled to use the access methods and plug-ins, you must have purchased at least one of the following offerings: IBM Workload Scheduler, IBM Workload Scheduler for Applications, or IBM Z Workload Scheduler Agent. See the 10.2.3 Quick Start Guide available from IBM Fix Central. For information about the supported versions of the plug-ins and access methods, open the Data Integration report and select the Supported Software tab.
During each step of the installation process, the twsinst script creates files in the installation directory that you specified in the command. If you do not specify an installation directory in the -inst_dir option in the command, the script creates files in the following directories:
On Windows™ operating systems
%ProgramFiles%\IBM\TWA_TWS_USER
On UNIX™ operating systems
/opt/IBM/TWA_TWS_USER
Where TWS_USER is the user for which you are installing the IBM Workload Scheduler instance that you specify in the command.

The dynamic agent installation process automatically adds the workstation definition to the database and registers the workstation definition to the dynamic workload broker installed on the master domain manager or the dynamic domain manager that you specify during the installation process.

You can organize dynamic agents in pools to help organize your environment based on the availability of workstations and the requirements of the jobs to be run. Normally, when you create a pool, you add the dynamic agents to a workstation definition of type pool.

You can also register an agent with a pool by directly editing the pools.properties file located in <TWS_home>/ITA/cpa/config. See Automatically register agents to pools for more details.

To enable secure SSL communication for dynamic agents, you can choose one of the following methods:
  • Download and deploy to dynamic agents the certificates already available on the master domain manager using the wauser and wapassword parameters when you run the twsinst installation script. Ensure the certificates are available on the master domain manager in the TWA_DATA_DIR/ssl/depot path.
  • Use the sslkeysfolder and sslpassword parameters when you run the twsinst installation script. This applies to dynamic agents and fault-tolerant agents.

You only need to provide the path to the certificates and the password you want to define for the keystore and truststore. IBM® Workload Scheduler automatically generates the keystore and truststore with the specified password and configures WebSphere Application Server Liberty Base and your agents in SSL mode.

Enabling SSL during installation requires Java run time, which you can add at installation time using the addjruntime parameter, also available in the twsinst installation script. For more information, see Agent installation parameters - twsinst script.

At installation time, you can optionally create a subfolder on the master domain manager to contain one or more *.crt files to be added to the server truststore as trusted CA using the sslkeysfolder parameter. This can be used for example to add to the list of trusted CAs the certificate of the LDAP server or Db2 server. Additionally, you can store here any intermediate CA certificate to be added to the truststore. The subfolder must be named additionalCAs.

You can also use the netmansslport parameter when installing master domain manager, dynamic domain manager, and fault-tolerant agents to ensure netman communication between the server components and fault-tolerant agents takes place in SSL mode using the specified port number.