I am getting the below error after running the given command. Any help would
be appreciated.
C:\Program Files\AR System\serverarreload -a myadmin -p password -g 1 -l 1
Unrecognized command line option (ARERR 601)
-l
C:\Program Files\AR System\serverarreload -a myadmin -p password -g 1
Dear all,
Does ARS 7.1 or 7.5 require any additional non BMC software to be present
before performing the installation in a server group environment? I know that
apart from installing the SQL server client (in our case) on all the nodes in
the server group before installing ARS, no other
No it does not require additional software. The installation has been improved
in 7.5.
-Original Message-
From: Frex Popo frexp...@yahoo.fr
To: arslist@ARSLIST.ORG
Sent: Mon, Mar 29, 2010 8:19 am
Subject: ARS 7.1 in a server group - URGENT
**
Dear all,
Does ARS 7.1 or 7.5
Many thanks Roger..
--- En date de : Lun 29.3.10, Roger Justice rjust2...@aol.com a écrit :
De: Roger Justice rjust2...@aol.com
Objet: Re: ARS 7.1 in a server group - URGENT
À: arslist@ARSLIST.ORG
Date: Lundi 29 mars 2010, 14h51
** No it does not require additional software. The installation
What version of ITSM do you have (not ARS)? There was a bug in an
earlier release of 7.0.3 that was fixed in one of the patches (patch 4
I think). Other than that, this error usually means that you do not
have configurations that map the Request selections to proper Incident
defaults. Turn on
You could use Crystal and run the archive search and report as a
subreport.
Hope this helps.
Lee Marsh.
*
Lee Marsh
Remedy Administrator
BAE Systems Office Automation Systems Team
Antitrust Division, U.S. Department of Justice
Phone: 202-305-9725
Actually, the same person can be the change requester, change manager, change
assignee and change implementer (or task implementer), on top of
approving/rejecting the change request.
This very open OOTB design and lack of rules has created issues for us, and
we had to create customizations to
When a user (IT support staff) leaves we:
Transfer any records (INC, PBI, AM, etc) assigned to user.
Remove user from all of the support groups and roles.
Remove user's permissions.
Change the user's password.
Set users people record to off-line.
This should resolve any access issues you have.
Where do SOD (segregation of duties??) rules come from?? It looks like it is
from the financial world, not ITIL, since there is no mention of them
whatsoever in the book I am reading on Implementing ITIL Change and Release
Management by Larry Klosterboer. ITIL does not appear to prohibit
Thanks Lee Marsh,
We followed your instructions too. But still we are able to login. Any help?
Thanks Regards,
Rambabu Rudra
System Administrator
-Original Message-
From: Action Request System discussion list(ARSList)
[mailto:arsl...@arslist.org] On Behalf Of Marsh, Lee
Sent: Monday,
Hi All,
Please help us on incident reporting.
We required the total time spent on assigned group level and assignee level
with each status (from status new to status closed). It should also tell
us about the overall time spent on an incident.
All the timings we required on minutes only not
Hi List,
I have one very specific situation in which I need to close all open
browser windows from an active link. I know how to redirect back to the
login screen but that doesn't actually remove the login information from
Explorer. So if the user tries to login from there they are logged in as
Classification: UNCLASSIFIED
Caveats: FOUO
Is that a lowercase L or a lowercase I?
Michael W. Luttmann
Lead Remedy Developer
Fort Carson NEC
If you don't like change, you're going to dislike irrelevance even more.
Gen Shinseki
-Original Message-
From: Action Request System
I found this on page 126 and 127 of the 7.1 mid tier guide.
http://mid_tier_server/arsys/servlet/LogoutServlet?goto=URL
The user logs out and goes directly to the specified URL
You can call the LogoutServlet and then redirect them to the login
page or anywhere else you want.
James
On Mar 29,
Financial applications are defined in our environment as Application CIs. These
applications run on databases and servers which are also in the CMDB.
So here is a very simple scenario:
If you follow Sarbanes Oxley rules, you cannot approve and implement changes
for financial applications: these
Now, the ironic thing, is that for organizations to be SARBOX compliant, they
need to implement a change mgmt process (and tool therefore), which would be
ITIL compliant.
but OOTB, the ITIL tool is not SARBOX complaint!! so we're coming full circle.
Ironic isn't it?
LOL!
-- Forwarded message --
From: ARSlist LISTSERV Server (14.4) lists...@listserv.rbugs.com
Date: Mon, Mar 29, 2010 at 7:41 AM
Subject: Rejected posting to arsl...@listserv.rbugs.com
To: robert.mole...@gmail.com
Your message is being returned to you unprocessed because
The administrator should be able to login with the changed password, no one
else should know this password.
Depending on your settings, the user may also be able to login as a requester
or guest. As a requester, you have limited read/write access to the calls you
create but you cannot change
It's a lowercase l.
Thanks Regards,
Rambabu Rudra
System Administrator
-Original Message-
From: Action Request System discussion list(ARSList)
[mailto:arsl...@arslist.org] On Behalf Of Luttmann, Michael W CTR USA
Sent: Monday, March 29, 2010 8:06 PM
To: arslist@ARSLIST.ORG
Subject: Re:
As you mentioned below,
First point - yes, you are right like only admin will able to login with the
changed password, because he only do changes the password.
Second - we have disabled guest. For sometime, if we forget about the
support staff, even a ordinary user can able to login.
Third - We
If the password for the person has been reset in the User form and you have
Guest access disabled, I don't see how the person can be logging in.
Activate your user log and send us what is showing up in the log when the
person logs in.
Dave
-Original Message-
From: Action Request
Hi All,
Yeah these are really dumb questions that I should know but I have a behavior
that makes me doubt myself.
1. When a record on Form A is created from an email template is that a submit
or a merge?
2. Record on Form A is created from an email template, then Form A pushes to
Form B. Do
1. submit
2. no
Regards,
Nicky Madjarov
phone: 973-202-4278
Find out how to bust your AR System performance @
http://www.SpeedUpARS.com
- Original Message -
From: Brittain, Mark
Newsgroups: public.remedy.arsystem.general
To: arslist@ARSLIST.ORG
Sent: Monday, March 29, 2010
Thanks, James!
That's what I'm doing now but no matter what I put after the goto= I just get
the Remedy login screen back. Here's what I have in my Run Process:
http://actualservername/arsys/servlet/LogoutServlet?goto=http://cvtynet.cvty.com/.
I also tried it as
Can't you still separate roles using Remedy change configuration rules,
approval mappings, and AP-administration?
The software is not the process nor does it control the process. The
organization still has its own processes and rules. ITSM is a way to
capture the data for service
From our experience in recently implementing CHM 7.0.3, relying on business
process as your ONLY means of enforcement of segregation of duties is
something that sounds good on paper but not on the pavement. As in previous
posts, we've had to use custom filters to enforce the business process of
I don't know, I have never encountered this problem.
Sorry I couldn't help further.
Lee.
*
Lee Marsh
Remedy Administrator
BAE Systems Office Automation Systems Team
Antitrust Division, U.S. Department of Justice
Phone: 202-305-9725
Cell: 202-528-1749
The way I disable users who have left the company is:
Set record in CTM:People to Delete and remove login LoginID/password. Under
Access Restrictions there should be no companies listed. You can use the
remove login ID option under other functions on the left nav pane.
Historical data regarding
My first point is that what really matters is what the external auditors tell
your CIO about the current state and the level of control on your change
management process and tool.
What we think or would like to think has minimal weight compared to the audit
report that gets forwarded to the
I cannot agree more. I think the next frontier is to be SARBOX compliant, in
addition to be ITIL compliant.
Now that would be a very competitive edge for BMC
Guillaume
From: Action Request System discussion list(ARSList) [arsl...@arslist.org] on
behalf
I don't know what's wrong. I just tried it on my mid tier and it
worked. I did it without an active link. I manually entered the URL
in the address bar.
http://actualservername/arsys/servlet/LogoutServlet?goto=http;//www.msn.com
How are you calling the active link?
James
On Mar 29, 11:24
Thanks for the responses. We have downloaded a freeware MSI builder and
have created an MSI as well for our needs.. Hopefully it will work.. Testing
currently as well. Also, does anyone know of the System Requirements for the
User tool? Installing the WUT onto a fresh copy of XP (using the java
Filter log or active link log?
Thanks Regards,
Rambabu Rudra
System Administrator
-Original Message-
From: Action Request System discussion list(ARSList)
[mailto:arsl...@arslist.org] On Behalf Of Shellman, David
Sent: Monday, March 29, 2010 8:35 PM
To: arslist@ARSLIST.ORG
Subject: Re:
It fires on Window Loaded. I can see in the AL web log that is it firing. And
the warning message that is the action before the run process in that active
link is displayed correctly.
Sounds like I'll have to go to BMC with this one.
Thanks for trying, James!
Jenni Wacholz
480-445-2517
WFH
AR system 7.1 patch 7 for Email Engine
Anyone know why the following errors in the stderr.log for email.
Error Log:
SEVERE: Not connected
java.lang.IllegalStateException: Not connected
at
com.sun.mail.smtp.SMTPTransport.checkConnected(SMTPTransport.java:1511)
at
Hi All,
I have situation where the ticket on one Remedy server creates a ticket on
another Remedy server using an email template. This worked fine until it was
determined that an attachment needs to be included. Of course the file name is
different each time so I can't hard code the name.
Dwayne,
That's the nature of the results listif the entry you are editing is the
only one in the list and you modify it so it doesn't qualify for that list
anymore, then you get that message 'no data'the only way to avoid it is
to make it so that the results list is not dependent on a qual
Hi Dave,
We have enabled this user log by going to server information tab .Please
find the below user log information-
USER TID: 003144 RPC ID: 006209 Queue: Admin
Client-RPC: 390620USER: Remedy Application Service
/* Mon Mar 29 2010 22:14:32.5780 */User Trace Log -- ON
Thanks, LJ,
This is what I figured. I was hoping that somebody had some magical way around
the problem. I can hardly control what queries the users are allowed to run,
so I guess abandon the project. But it was fun while it lasted!
Dwayne
From: Action Request System discussion list(ARSList)
Sure you can control itwhy wouldn't you be able to :).if you don't
want them opening the form in search mode, have an AL that looks for that
operation, if it finds it close the form and open your control panel:)
_
From: Action Request System discussion list(ARSList)
It depends on what you mean by can. I CAN stop people from running queries,
but then they'd fire and the next guy would let them do all sorts of stuff they
shouldn't.
Is it Friday yet?
Dwayne
From: Action Request System discussion list(ARSList)
[mailto:arsl...@arslist.org] On Behalf Of LJ
Is one of these two, the user account in question? That is the account that
had the password changed to prevent login?
Dave
-Original Message-
From: Action Request System discussion list(ARSList)
[mailto:arsl...@arslist.org] On Behalf Of Ram Rudra
Sent: Monday, March 29, 2010 1:17 PM
I have a very simple escalation that changes a status. I then have a Filter
that when the status is changed (to Expired) a notification goes out (via an
email).
The AR System Email Messages form shows that it was Sent but no email is ever
sent. When I manually flip the status to Expired, the
Hi Jenni,
Try this in your Run Process
javascript:location='http://
actualservername/arsys/servlet/LogoutServlet?goto=http://cvtynet.cvty.com'
This will tell your browser's address bar to call the LogoutServlet which
will do the redirect to cvtynet.cvty.com.
If you want to close the browser
Christopher,
What you are seeing here -- the word INVALID being the password in the
user_cache record -- is a
characteristic of the system disabling the account. This word will never hash
from any password so the
account is inherently disabled but we can find all accounts that have been
Hi,
Thank you for this information.I have gone through these logs, it is really
of great help.
But i wanted to know one more thing, how these commands are getting
initiated from the User tool, which file from the ARUser installed directory
initiates this command sequence.
Please provide this
If you changed the password you can login since you know the password the user
cannot since I hope you do not give them the new password.
-Original Message-
From: Ram Rudra rambabu.ru...@gssamerica.com
To: arslist@ARSLIST.ORG
Sent: Mon, Mar 29, 2010 10:20 am
Subject: Re: User is able
I heard a rumor that a version 7.7 was soon to be released.
Has anyone heard anything?
Gordon M. Frank
Lockheed Martin
___
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
attend wwrug10 www.wwrug.com ARSlist:
Are you packaging up an installed copy of the use tool? If so, it’s entirely
possible that the original installer does include them but places them in
system directories instead of in the application installation directory. In
that case, you would simply need to include the missing files in
You could get a fair bit of that information from the Incident audit log. Each
time an audited field changes values, it creates a new audit log entry when the
ticket is saved. You could tell what statuses it has been in and for how long
by parsing that information out of the audit log.
The
Hi,
You need to know a lot of things to understand this.
For example if a user hits a button, one or more Active-Link-Actions may
be triggered. These actions are defined through the AR Admin Tool /
Developer Studio (from version 7.5).
If the ACTL-action was a Set-Field, the system performs one
Hi Jason,
Closing the window is more important in this case than actually logging
out of Remedy as the main requirement is to force users to log back into
Remedy using their correct credentials. This AL only fires if the user
is logged in with one specific generic account ID.
The
Hi again,
One more thing.
If you are doing performance tuning, you do not need to understand
everything.
Check out the presentation I did during WWRUG09, where I point out the
most interesting API-calls:
http://rrr.se/doc/WWRUG09_RRR_LogFilePerformanceTuning.pdf
Best Regards - Misi,
well.. on a fresh updated copy of XP, the regular java installer from BMC
does not include those files. At least not in patch 004 of 7.5. So what
required applications do I need to install before installing the user tool?
On Mon, Mar 29, 2010 at 1:12 PM, Lyle Taylor tayl...@ldschurch.org wrote:
There is a tentative expectation that ITSM will release a new version in the
Summer 2010 time frame.
-David J. Easter
Sr. Product Manager, Enterprise Service Management
BMC Software, Inc.
The opinions, statements, and/or suggested courses of action expressed in this
E-mail do not necessarily
Hi,
Are businesses using the same Operational Categorizations for Change
Management and Incident Management? Or should these Operational values be
different across both applications? One person in the BMC Community forum
said
it is best practice to have the same Operational
Well first off the developer is wrong if he is talking about ITSM 7.01. The
Operational Categories are setup to be visible by application (or in the case
of Incident it can be configured down to the Service Type).
I would think the categorization for Incident and Change would differ since
I think it would be difficult to use identical sets, because of the reactive
vs. Proactive nature of the apps. However, the same principles could apply,
making the sets structurally similar with somewhat different verbiage.
Rick
-Original Message-
From: Kathy Morris
Our company uses a more problematic categories for the Incident side of
things. Categories like (Video - DVR - No Signal for customer's
experiencing a no signal on their dvr). For the Change side of the house,
we use a more change oriented categories like Application Modification or
System
Sorry I do not. I found the opener='x' trick while I was replying. We have
used the window.close for a while and was looking up the exact syntax when I
stumbled upon this additional step. I didn't test it thoroughly enough
though
To test I put it behind a button on a test form that is set as
I see. I appear to have misunderstood your last e-mail - I thought that your
generated MSI was failing (as opposed to BMC’s installer). In that case, I
would recommend working with BMC support to determine prerequisites, etc.. The
compatibility matrix and installation guide should indicate
Are any e-mails getting sent out successfully? My first thought is that it may
be having issues connecting to the mail server, or the connection is getting
reset before the e-mail engine expects, so when it tries to go and do some next
action, the connection is no longer valid.
Lyle
I agree with Christopher; SOD is not specified by ITIL and so doesn't
necessarily need to be enforced by default by the application supporting the
processes. SOD is a policy decision. That said, it would be nice if Change
Management had the ability to support policies like this. And that
Christopher,
If you turn on user-logging, you will get a row for each
bad-password-attempt.
It is then easy to search the log to find the time of your problem.
The string to search for is LOGIN FAILED with (password) at the end of
the line. Maybe you will see another suffix when the account is
64 matches
Mail list logo