Agent Pre-installation Procedures for Linux

Before you install AgentsClosed A Control-M component installed on a host (computer) that runs and monitors the jobs on the host., you need to complete the following procedures:

The Agent communicates with the Server using an HTTPS protocol (port 443). If your organization blocks access to the Internet, you must contact your Network administrator to grant outgoing access to the following locations:

  • * (HTTPS protocol) (Outgoing only)

  • * (Outgoing only)

Configuring a User Account on UNIX/Linux

This procedure describes how to configure a user account on UNIX/Linux with specific parameters for Control-M.

Before You Begin


  1. Do one of the following:

    • Create a user account, as follows:

      /usr/sbin/useradd -u <numeric_user_id> -g <user_group> -d <user_home>

    • Create a group, as follows:

      /usr/sbin/groupadd <user_group>

    The <user_shell> account must be defined as one of the following names or programs:

    • /bin/csh

    • /bin/sh

    • /bin/ksh

    • /bin/bash

    • /bin/tcsh

  2. Configure the predefined limits that are designed to limit or prevent the excessive use of resources by a single process, as described in Control-M Limits on UNIX/Linux Accounts.

  3. Verify that the HOST environment variable is defined on all shells by running the env command.

    If the HOST environment variable not defined, contact your IT system administrator.

  4. Verify that the HOME directory is configured with 755 permissions by running Is Id on the Agent account.

    ls -ld /home/ctmag

    drwxr-xr-x 25 ctmag users 4096 Dec 2 13:47 /home/ctmag

    If the permissions are not set to 755, you can use the chmod command to set it.

    chmod 755 /home/ctmag

Control-M Limits on UNIX/Linux Accounts

The following table describes Control-M limits on UNIX/Linux accounts. If you install Control-M components in separate accounts, each account must have the minimum ulimit setttings. The computer kernel soft or hard setting must reflect the sum total that is required by each account.




Determines the maximum size of the data segment of a process.

BMC recommends setting this value to unlimited.


Determines the maximum size of the stack segment of a process.

BMC recommends 8 MB on all Linux computers.


Determines the maximum size that a core dump can reach.

BMC recommends setting this value to datasize to generate a complete core dump if a failure occurs.


Determines the maximum number of descriptors in use by a single process.

BMC recommends the value of 4,096.

Do not set the parameter value to unlimited.


Determines the maximum amount of memory to be used by a single process.

BMC recommends setting this value to unlimited.


Determines the maximum number of user processes.

Default: 4,096

Verifying Operating System Levels and Patches

This procedure describes how to verify the operating system level and patches with Control-M requirements.


  1. Download the Check_req utility.

  2. Log in as an Agent user.

  3. Extract the tar file and type the following command:

  4. Complete the instructions as necessary.

    If the operating system and patches meet Control-M requirements, you are advised that the product can be installed. Otherwise, a list of missing requirements appears.

    If the script alerts you to a missing patch or library (such as libnsl), check with your system administrator to see if the patch or library is included in one of the bundled packages that are installed on your computer.