You implement a configuration to make your deployed software fully functional. Implementation executes on the target system, applying the variables, resources, and operations that are defined in the configuration.
When you start the implementation, CA CSM evaluates the defined operations and determines which of them need to execute. The selected operations are presented as a list of steps that you must release so that they can be eligible to execute after their prerequisite steps have completed.
Note: Validation and implementation of a configuration may require exclusive access to data sets that the configuration specifies. Using data sets outside of CA CSM, such as ISPF edit and browse data sets, can introduce data set contention. Data set contention can result in validation and implementation errors. Therefore, while validation or implementation of a configuration is in progress, refrain from using the data sets specified by the configuration that are outside of CA CSM.
|
Copyright © 2014 CA.
All rights reserved.
|
|