Sun Microsystems, Inc.
spacerspacer
spacer www.sun.com docs.sun.com |
spacer
black dot
 
 
     Contents   Next 
   
 

Preface

The Solstice Enterprise Agents User Guide is an introduction to the product and explains how to install, configure, and administer the Solstice Enterprise Agents runtime environment and associated subagents.

Who Should Use This Book

This document is targeted towards System Administrators.

Before You Read This Book

If you have just acquired the Solstice Enterprise Agents product, this should be the first book you read. It gives an overview of the product architecture functions, features, and components.

How This Book Is Organized

This document contains the following chapters:

Chapter 1, What Is a Solstice Enterprise Agent? is an overview of the product.

Chapter 2, Installing Enterprise Agents explains how to install Solstice Enterprise Agents on your Solstice machine.

Chapter 3, SNMP-Based Master/Subagent explains how the Master Agent works.

Chapter 4, Configuring Enterprise Agents provides configuration information.

Chapter 5, Using DMI provides an overview of the Desktop Management Interface.

Chapter 6, Using SNMP With DMI explains how SNMP accesses DMI components and gives details on how to use mapping to communicate between SNMP and DMI protocols.

Chapter 7, DMI Command Line Utilities explains the function of the command line interface and gives examples of its use.

Appendix A, Error Messages provides a list of error messages and their numbers.

The Glossary identifies acronyms and abbreviations and gives definitions of terms used in this book.

Related Books

The additional Sun publications listed below contain information related to this user guide.

  • System Administration Guide: Basic Administration

Accessing Sun Documentation Online

The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.

Typographic Conventions

The following table describes the typographic changes used in this book.

Table P-1 Typographic Conventions

Typeface or Symbol

Meaning

Example

AaBbCc123

The names of commands, files, and directories; on-screen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

What you type, contrasted with on-screen computer output 

machine_name% su

Password:

AaBbCc123

Command-line placeholder: replace with a real name or value 

To delete a file, type rm filename.

AaBbCc123

Book titles, new words, or terms, or words to be emphasized.

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

Shell Prompts in Command Examples

The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P-2 Shell Prompts

Shell

Prompt

C shell prompt machine_name%
C shell superuser prompt machine_name#
Bourne shell and Korn shell prompt $
Bourne shell and Korn shell superuser prompt #
 
 
 
     Contents   Next