Interstage Application Server V6.0 Operator's Guide
|
|
- Franklin Bates
- 8 years ago
- Views:
Transcription
1 Interstage Application Server V6.0 Operator's Guide
2 Operator's Guide Trademarks Trademarks of other companies are used in this user guide only to identify particular products or systems: Product Microsoft, Visual Basic, Visual C++, Windows, Windows NT, Internet Information Server, and Internet Explorer Sun, Solaris, Java, and other trademarks containing Java UNIX Netscape, Netscape FastTrack Server, Netscape Enterprise Server, and Netscape Navigator CORBA, Object Management Group, OMG, OMG IDL, IIOP, Object Request Broker, and ORB Interstage and ObjectDirector Trademark/Registered Trademark Registered trademarks of Microsoft Corporation in the U.S.A. and other countries Trademarks of Sun Microsystems, Inc., in the U.S.A. and other countries Registered trademark in the U.S.A. and other countries, licensed exclusively through X/Open Company Ltd Registered trademarks of Netscape Communications Corporation in the U.S.A. and other countries Trademarks or registered trademarks of Object Management Group, Inc., in the U.S.A. and other countries Registered trademarks of Fujitsu Limited This document contains technology relating to strategic products controlled by export control laws of the producing and/ or exporting countries. This document or a portion thereof should not be exported (or re-exported) without authorization from the appropriate government authorities in accordance with such laws. Fujitsu Limited First Edition (November 2003) The contents of this manual may be revised without prior notice. All Rights Reserved, Copyright FUJITSU LIMITED 2003 ii
3 Preface Purpose of this Document This document is the Interstage Application Server Operator's Guide. Who Should Read this Document? This document is intended for people operating Interstage Application Server. It is assumed that readers have a basic understanding of the following. Basic knowledge of the Internet Object oriented technology Distributed object technology (CORBA) Basic knowledge of relational databases Windows NT or Windows 2000 or Windows Server 2003 UNIX Linux iii
4 Operator's Guide - Preface Organization of this Document This document is organized as follows. Chapter 1 - Interstage Operation Using the Interstage Management Console This chapter explains Interstage operation using the Interstage Management Console. Chapter 2 Operating Applications This chapter describes how to operate applications using WorkUnits. Chapter 3 - Performance Monitoring This chapter explains the performance monitoring tool. Chapter 4 - Maintenance (Resource Backup) This chapter describes system maintenance (resource backup). Appendix A - Configuration of Interstage Management Console This appendix explains the configuration and environment setup of the Interstage Management Console. Appendix B - isconfig.xml This appendix describes the isconfig.xml for Interstage definition. Appendix C - Interstage Operations by Interstage Integrated Commands This appendix describes Interstage operations by Interstage integrated commands Appendix D - Interstage System Definition This appendix describes the Interstage System Definition. Appendix E - Interstage Operating Environment Definition This appendix describes the Interstage Operating Environment Definition. Appendix F - Definition files used in operating the performance monitoring tool This appendix explains the files that specify the target of the performance monitoring tool. Appendix G - Systemwalker Linkage This appendix explains linkage with Systemwalker. iv
5 Table of Contents Chapter 1 Interstage Operation Using the Interstage Management Console Introduction Starting the Interstage Management Console Login Starting and Stopping Interstage Reconfiguring Interstage Setting the Interstage Management Console Operating Environment Customizing the Connection Port Number Customizing SSL Encrypted Communication for the Interstage Management Console Enabling SSL Encrypted Communication Disabling SSL Encrypted Communication Changing the Certificate Other Changes Chapter 2 Operating Applications Defining WorkUnits for Applications Environment for Executing Applications Application Process Multiplicity Automatic Restart of Applications Application Time-out Current Directory Environment Variables PATH CLASSPATH Warning Monitoring Starting and Stopping WorkUnits Start Time Monitoring Stop Time Monitoring v
6 Operator's Guide - Table of Contents Chapter 3 Performance Monitoring The Performance Monitoring Tool Functions of the Performance Monitoring Tool Function of Outputting Log Information to the Performance Log File Function of Monitoring the Real Time Performance Information by a Network Control Manager (Monitoring by MIB) Performance Monitoring Procedure Registering to the SNMP Service ) Registering in the SNMP Service ) Copying the Performance Monitoring Tool ) Reading the MIB Definition File ) Setting the Port Number System Configuration Setting Creating a Performance Monitoring Environment Starting Operation of Performance Monitoring Tool Monitoring Operations Starting Performance Monitoring Starting a Business Application Outputting the Performance Log File and Analyzing the Performance Information Stopping the Application Stopping the Performance Monitor Deleting the Performance Monitoring Environment Deletion from the SNMP Service Analyzing the Performance Information and Taking Action Function of Outputting Log Information to the Performance Log File Performance Information Collected by the Network Control Manager with the Real Time Monitoring Function Warnings Regarding the Evaluation of the Performance Information Managing the Performance Log Files Chapter 4 Maintenance (Resource Backup) Backing Up and Restoring Resources Outline and Applicable Resources Interstage Setup Resource File Interstage Operation Tool Resource File CORBA Service Resource File Event Service Resource File Portable-ORB Resource File Component Transaction Service Resource File Database Linkage Service Resource File vi
7 Operator's Guide - Table of Contents Interstage HTTP Server Resource File InfoProvider Pro Resource File J2EE Common Resource Files IJServer Resource Files Interstage JMS Resource File Servlet Service for Interstage Management Console Resource File SOAP Service Resource File InfoDirectory Directory Service Resource File Interstage Certificate Environment Resource File Old Version Servlet Service Resource File Backup Procedure Stopping the Service Creating a Backup Resource Directory Backing Up Interstage Setup Resource Backing Up Interstage Operation Tool Resources Backing Up CORBA Service Resource Backing Up Event Service Resource Backing Up Portable-ORB Resource Backing Up Component Transaction Service Resource Backing Up Database Linkage Service Resource Backing Up Interstage HTTP Server Resource Backing Up InfoProvider Pro Resource Backing Up J2EE Common Resource File Backing Up IJServer Resource File Backing Up Interstage JMS Resource Backing Up Servlet Service for Interstage Management Console Resources Backing Up SOAP Service Resources Backing Up InfoDirectory Resource Backing up Interstage Certificate Environment Resources Backing Up Old Version Servlet Service Resource Starting Up Services Restore Procedure Stopping Services Restoring Interstage Setup Resource Restoring Interstage Operation Tool Resource Restoring CORBA Service Resource Restoring Event Service Resource Restoring Portable-ORB Resource Restoring Component Transaction Service Resource Restoring Database Linkage Service Resource vii
8 Operator's Guide - Table of Contents Restoring Interstage HTTP Server Resources Restoring InfoProvider Pro Resource (Windows and Solaris Only) Restoring J2EE Common Resource File Restoring IJServer Resource File Restoring Interstage JMS Resource Restoring Servlet Service for Interstage Management Console Resources Restoring SOAP Service Restoring InfoDirectory Resource Restoring Interstage Certificate Environment Resources Restoring Old Version Servlet Service Resource Starting Up the Services Moving Resources to Another Server Overview and Applicable Files Resource Exporting Procedure Resource Importing Procedure Stopping Services Importing Interstage Setup Resource Importing Interstage Operation Tool Resource Importing CORBA Service Resource Importing Event Service Resource Importing Portable-ORB Resource Importing Component Transaction Service Resource Importing Database Linkage Service Resource Importing Interstage HTTP Server Resource Importing InfoProvider Pro Resource (Windows and Solaris Only) Importing J2EE Common Resource File Importing IJServer Resource File Importing Interstage JMS Resource Importing Servlet Service for Interstage Management Console Resources Importing SOAP Service Resource Importing Interstage Certificate Environment Resources Importing Old Version Servlet Service Resource Starting Up Services Collective Maintenance Resource Backup/Export Stopping the Service Backup/Export Target Resource Definition Interstage Resource Backup/Export Resource Restore/Import Stopping the Service viii
9 Operator's Guide - Table of Contents Restore/Import Target Resource Definition Interstage Resource Restore/Import Appendix A Configuration of Interstage Management Console Configuration of Interstage Management Console... A-2 Web Browser... A-2 Services... A-2 Interstage Operation Tool Service... A-2 Interstage Operation Tool (FJapache) Service... A-2 Interstage JServlet (Operation Management) Service... A-2 Interstage JMX Service... A-2 Environment Files... A-3 Customizing Interstage Management Console Environments... A-3 Changing the Port Number... A-3 Changing the Automatic Update Interval... A-3 Interstage JMX Service... A-4 Troubleshooting the Interstage Management Console... A-5 Appendix B isconfig.xml Synopsis... B-2 Definition Parameter... B-2 Appendix C Interstage Operations by Interstage Integrated Commands Interstage Environment Setup... C-2 Generating the Interstage System Definition File... C-3 Registering the Interstage System Definition File... C-5 (1) Execute the isregistdef Command... C-5 (2) Define the Environment for each Service... C-6 Initializing Interstage... C-7 Determining the Services to be Initialized... C-7 Determining the Operating Mode... C-8 Customizing the Interstage Operating Environment Definition... C-8 Executing Initialization... C-13 Customization with the Interstage Operating Environment Definition... C-14 Designing the Naming Service and Interface Repository... C-17 Starting Interstage... C-19 Starting up a Database Management System... C-20 Starting Interstage According to Application Status... C-20 Starting the Resource Manager... C-21 Starting WorkUnits... C-22 Starting Interstage Automatically when Booting the Machine... C-22 ix
10 Operator's Guide - Table of Contents Method of Constructing the Environment...C-22 Operating Method...C-24 Operating Method when not Starting Automatically...C-24 Terminating Interstage...C-26 Terminating WorkUnits...C-27 Terminating Resource Manager...C-27 Terminating Interstage According to Application Status...C-28 Terminating the Database Management System...C-28 Customization by the ismodifyservice Command...C-29 Changing the System Operation Pattern...C-32 Changing the System Size...C-35 Changing the Naming Service/Interface Repository Settings...C-39 Changing Reference Location for the Naming Service and Interface Repository...C-40 Changing Reference Location for Only the Naming Service to the Home Server...C-41 Changing Reference Location for the Interface Repository...C-43 Change by the CORBA Service Operating Environment Definition...C-45 Appendix D Interstage System Definition Syntax...D-2 Statement...D-2 Comment Line...D-3 Blank Lines...D-3 Interstage System Definition File Syntax...D-4 System Scale...D-4 Appendix E Interstage Operating Environment Definition Syntax... E-2 Interstage Operating Environment Definition File Syntax... E-3 Appendix F Definition Files Used in Operating the Performance Monitoring Tool The Specification File for Performance Monitoring (ispstart Command)... F-2 Synopsis... F-2 Specification Item... F-2 Definition Example... F-2 Appendix G Systemwalker Linkage Operation Monitoring and Automatic Operation Using the Systemwalker Linkage Function...G-2 Overview of the Systemwalker Linkage Function...G-2 Activity Monitoring by Systemwalker CentricMGR Linkage...G-4 x
11 Operator's Guide - Table of Contents Operating Status Monitoring of WorkUnits and Objects...G-4 Operating Status Monitoring of the Servlet Container...G-8 Real-time Monitoring of Application Processing Status...G-9 Define Monitoring Values...G-9 Automatic Control by Systemwalker OperationMGR Linkage...G-10 Preparations...G-10 Operating Method... G-11 Index xi
12 Operator's Guide - Table of Contents xii
13 Chapter 1 Interstage Operation Using the Interstage Management Console This chapter explains Interstage operation using the Interstage Management Console. 1-1
14 Chapter 1: Interstage Operation Using the Interstage Management Console Introduction The Interstage Management Console integrates the operation views for the individual services of the Interstage Application Server to enable centralized operation. The Interstage Management Console can also be used to easily define Interstage configuration and tuning. If electronic signature or encryption processing such as SSL is to be defined from the Interstage Management Console for the following services, an Interstage certificate environment must be configured in advance using commands. Configure an Interstage certificate environment by referring to the Security System Guide. Interstage HTTP Server CORBA Service Servlet Service Interstage SOAP Service Interstage JMS 1-2
15 Starting the Interstage Management Console Starting the Interstage Management Console To use the Interstage Management Console, the following services must be started: Interstage Operation Tool Interstage Operation Tool(FJapache) Interstage JServlet(OperationManagement) After starting the above services, start the Web browser and specify the following URL: host-name Specify the host name or IP address of the server on which the Interstage Application Server is installed. port-number Specify the port number on the Interstage HTTP Server to which the Interstage Management Console is connected. Specify the port number on the Interstage HTTP Server during installation. The default port number is If SSL encrypted communication is to be used in operation of the Interstage Management Console, specify the following URL: If "Enable SSL encrypted communication" is selected for the operation mode of the Interstage Management Console during installation of Interstage, a certificate generated for the Interstage Management Console is used. If the above URL is specified under this condition, a message dialog box indicating that there is a problem in the certificate reliability appears. If the certificate obtained from a certification authority is to be used for SSL encrypted communication, refer to "Changing the certificate" in "Customizing Interstage Management Console." In an environment where the Interstage Application Server is installed, selecting Start Programs Interstage Application Server Interstage Management Console will also start the Interstage Management Console. Login When the Interstage Management Console starts, a login window appears. Specify an arbitrary user ID registered in the OS. Administrator group authority is required to log in to the Interstage Management Console. 1-3
16 Chapter 1: Interstage Operation Using the Interstage Management Console Starting and Stopping Interstage Select the System Status tab on the Interstage Management Console to display the operating status of Interstage. Select Detail View to confirm the service to be operated. Check the operating status of Interstage, then select Start or Stop and operate Interstage. If it has been defined to use the transaction service using the Interstage Management Console, performing an Interstage start or stop operation from the Interstage Management Console can also operate the transaction service (JTSRMP). However, the service cannot be operated when Interstage is started by machine booting or by Interstage integrated commands. If it has been defined to synchronize Web server operation with Interstage using the Interstage Management Console, performing an Interstage start or stop operation from the Interstage Management Console can also operate the Web server. However, the Web server cannot be operated when Interstage is operated by Interstage integrated commands. When performing an Interstage start or stop operation from the Interstage Management Console to operate the transaction service (JTSRMP) or Web server, the transaction service (JTSRMP) or Web server may fail to start. Even in this case, Interstage succeeds in starting. 1-4
17 Reconfiguring Interstage Reconfiguring Interstage Select System Set Environment tab on the Interstage Management Console to display the Interstage environment setting window. Change definition values as needed and select Apply. Depending on the environment setting item that has been changed, Interstage may have to be restarted or initialized afterwards. It is recommended to back up resources in advance. Refer to "Maintenance (Resource Backup)" for more information on backing up resources. If Interstage is initialized using the Interstage integrated command, restart the Interstage Operation Tool service and Interstage JServlet (Operation Management) service after initialization is complete. When the transaction service (OTS) is used, do not use the Interstage Management Console and Interstage integrated command together. If these two functions are to be used together, note the following: Initialization may be performed using the Interstage integrated command in an environment in which it is defined to operate the transaction service (OTS) using the Interstage Management Console. In this case, define in advance that the transaction service (OTS) is not used, using the Interstage Management Console. Tuning may be performed using the Interstage Management Console in an environment in which initialization has been performed in operation mode TYPE2 using the Interstage integrated command. In this case, set up in advance the environment in operation mode TYPE1 using the Interstage integrated command. 1-5
18 Chapter 1: Interstage Operation Using the Interstage Management Console Setting the Interstage Management Console Operating Environment This section explains how to customize the Interstage Management Console operating environment. The Interstage Management Console operating environment items that can be customized are as follow: Connection port number SSL encrypted communication for Interstage Management Console Customizing the Connection Port Number Use the following file to define the connection port number on the Interstage Management Console: Interstage-install-folder\gui\etc\httpd.conf To change the connection port number on the Interstage Management Console, change the value defined for the following item in the above file: Port Customizing SSL Encrypted Communication for the Interstage Management Console The option to use SSL encrypted communication in operation of the Interstage Management Console can be selected using "Select operation mode" during installation of Interstage. If the operation mode selected during installation is to be changed after installation, the environment must be customized according to the procedure shown below. If the following change is made, the "Interstage Management Console" shortcut registered in the Windows start menu is disabled. The URL registered in the Windows start menu must be changed. Example To change "Enable SSL encrypted communication" to "Disable SSL encrypted communication" Before change: After change: If SSL encrypted communication is not used, security vulnerability such as interception of communication data must be taken into account. If security problems are anticipated, take proper measures such as enabling SSL encrypted communication. 1-6
19 Setting the Interstage Management Console Operating Environment Enabling SSL Encrypted Communication If SSL encrypted communication was disabled during installation of Interstage, but you now want to use SSL encrypted communication, follow the procedure below: Enter the cmcrtsslenv Command Define a certificate/key management environment. "OS-install-folder\Program Files\Common Files\Fujitsu Shared\F3FSSMEE\cmcrtsslenv.exe" -ed interstage-install-folder\gui\etc\cert Edit the Interstage HTTP Server Definition File Edit the Interstage HTTP Server definition file for the Interstage Management Console. The definition file to be edited is as follows: Interstage-install-folder\gui\etc\httpd.conf Edit the file as follows: # ---- Configuration for SSL --- AddModule mod_ihs_ssl.c SSLEnvDir "[ Interstage-install-folder]/gui/etc/cert" SSLSlotDir "[ Interstage-install-folder]/gui/etc/cert/slot" SSLTokenLabel SSLTOKEN SSLUserPINFile "[ Interstage-install-folder]/gui/etc/cert/sslssl" SSLExec on SSLVersion 2-3 SSLVerifyClient none #SSLCipherSuite RC4-MD5:RC2-MD5:EXP-RC4-MD5:RSA-RC4-MD5:RSA-RC4-SHA:RSA-EXPORT-RC4-MD5 SSLCertName SSLCERT #SSLClCACertName cli01 Restart the Interstage HTTP Server for the Interstage Management Console Restart the following service: "Interstage Operation Tool(FJapache)" Disabling SSL Encrypted Communication If SSL encrypted communication was enabled during installation of Interstage, but you now want to disable SSL encrypted communication, follow the procedure below: Edit the Interstage HTTP Server Definition File Edit the Interstage HTTP Server definition file as follows: Before # ---- Configuration for SSL
20 Chapter 1: Interstage Operation Using the Interstage Management Console AddModule mod_ihs_ssl.c SSLEnvDir "[Interstage-install-folder]/gui/etc/cert" SSLSlotDir "[Interstage-install-folder]/gui/etc/cert/slot" SSLTokenLabel SSLTOKEN SSLUserPINFile "[interstage-install-folder]/gui/etc/cert/sslssl" SSLExec on SSLVersion 2-3 SSLVerifyClient none #SSLCipherSuite RC4-MD5:RC2-MD5:EXP-RC4-MD5:RSA-RC4-MD5:RSA-RC4-SHA:RSA-EXPORT-RC4-MD5 SSLCertName SSLCERT #SSLClCACertName cli01 After # ---- Configuration for SSL --- #AddModule mod_ihs_ssl.c #SSLEnvDir "[Interstage-install-folder]/gui/etc/cert" #SSLSlotDir "[Interstage-install-folder]/gui/etc/cert/slot" #SSLTokenLabel SSLTOKEN #SSLUserPINFile "[Interstage-install-folder]/gui/etc/cert/sslssl" #SSLExec on #SSLVersion 2-3 #SSLVerifyClient none #SSLCipherSuite #RC4-MD5:RC2-MD5:EXP-RC4-MD5:RSA-RC4-MD5:RSA-RC4-SHA:RSA-EXPORT-RC4-MD5 #SSLCertName SSLCERT #SSLClCACertName cli01 Restart the Interstage HTTP Server for the Interstage Management Console Restart the following service: "Interstage Operation Tool(FJapache)" Changing the Certificate The certificate used at Interstage installation or by the cmcrtsslenv command is generated by Interstage to use SSL encrypted communication on the Interstage Management Console. If a certificate issued by an official certification authority such as VeriSign is to be used, the procedure described below must be followed. The certificate generated by Interstage can be used for test operation before service operation or for operation on an intranet. A certificate issued by a certification authority can also be used for SSL encrypted communication using the Interstage Management Console. In an operating environment connected to an intranet or the Internet, it is recommended to use a certificate issued by a reliable certification authority. Define an Interstage Certificate Environment Enter the scsmakeenv command to define an Interstage certificate environment and create a certificate signing request (CSR). For more information, refer to the Security System Guide. # scsmakeenv -n IS-Console-SSL-Cert -f c:\temp\csr.txt -c 1-8
21 Setting the Interstage Management Console Operating Environment New Password: <---Set a password for the Interstage certificate environment. This password becomes USER-PIN. Retype: Input X.500 distinguished names. What is your first and last name? [Unknown]:host.domain.com What is the name of your organizational unit? [Unknown]:xxxxx What is the name of your organization? [Unknown]:xxxx What is the name of your City or Locality? [Unknown]:xxxxxxx What is the name of your State or Province? [Unknown]:xxxxxxxxx What is the two-letter country code for this unit? [Un]:JP Is <CN=host.domain.com, OU=xxxxx, O=xxxx, L=xxxxxxx, ST=xxxxxxxxx, C=JP> correct? [no]:yes SCS: Information: scs0101: A certificate signing request (CSR) has been created. <.\csr.txt> Use the Created CSR to Request that a Certificate be Issued Use the created CSR to request that a certificate be issued. For details of processing, refer to "Requesting Certificate Issuance" in the "Security System Guide." Register the CA Certificate (ca-cert.cer) in the Interstage Certificate Environment The following explanation assumes that the issued SSL server certificate exists in site-cert.cer and that the CA certificate exists in ca.cert.cer. # scsenter -n CA-Cert -f c:\temp\ca-cert.cer Password: Certificate was added to keystore SCS: Information: scs0104: The certificate has been registered. Register the SSL server certificate (site-cert.cer) in the Interstage certificate environment The following explanation assumes that the issued SSL server certificate exists in site-cert.cer and that the CA certificate exists in ca.cert.cer. # scsenter -n IS-Console-SSL-Cert -f c:\temp\site-cert.cer -o Password: Certificate reply was installed in keystore SCS: Information: scs0104: The certificate has been registered. Create a User PIN file for the Interstage HTTP Server In the user PIN file, specify the password for the Interstage certificate environment. # ihsregistupin -f [Interstage-install-folder]\gui\etc\cert\upinfile -d [Interstage-install-folder]\etc\security\env\smee\slot 1-9
22 Chapter 1: Interstage Operation Using the Interstage Management Console UserPIN: environment. Re-type UserPIN: environment. <-- Specify the password for the Interstage certificate <-- Specify the password for the Interstage certificate Edit the Interstage HTTP Server Definition File Edit the Interstage HTTP Server definition file for the Interstage Management Console as follows: # ---- Configuration for SSL --- AddModule mod_ihs_ssl.c SSLEnvDir "C:/Interstage/etc/security/env/smee" <-- Fixed(Modify the Interstage installation folder as needed.) SSLSlotDir "C:/Interstage/etc/security/env/smee/slot" <-- Fixed(Modify the Interstage installation folder as needed.) SSLTokenLabel Token01 <-- Fixed SSLUserPINFile "c:/interstage/gui/etc/cert/upinfile" <-- User PIN file created by ihsregistupin SSLExec on SSLVersion 2-3 SSLVerifyClient none #SSLCipherSuite RC4-MD5:RC2-MD5:EXP-RC4-MD5:RSA-RC4-MD5:RSA-RC4-SHA:RSA-EXPORT-RC4-MD5 SSLCertName IS-Console-SSL-Cert <-- Nickname of SSL server certificate #SSLClCACertName cli01 Restart the Interstage HTTP Server Definition File for the Interstage Management Console Restart the following service: "Interstage Operation Tool(FJapache)" 1-10
23 Other Changes Other Changes To change the host name of a machine on which Interstage setup is complete, follow the procedure provided in "Moving Resources to Other Servers." 1-11
24 Chapter 1: Interstage Operation Using the Interstage Management Console 1-12
25 Chapter 2 Operating Applications This chapter describes how to operate applications using WorkUnits 2-1
26 Chapter 2 : Operating Applications Defining WorkUnits for Applications Environment for Executing Applications A WorkUnit serves as an operating unit for applications. One WorkUnit corresponds to one IJServer. For more information about IJServer, refer to the J2EE User's Guide. Application Process Multiplicity Defining the process multiplicity enables the application to process requests received concurrently from clients. Define the process multiplicity in the WorkUnit definition on the Interstage Management Console. Automatic Restart of Applications Define automatic restart of applications in the WorkUnit definition on the Interstage Management Console. For Web applications, define the number of abnormal terminations that occur within a given period. If the number of times an application terminated abnormally reaches the defined number, the WorkUnit terminates abnormally. All application processes in the WorkUnit are stopped and a request being processed in the relevant WorkUnit returns with an error to the client. If the number of abnormal terminations is not reached within the specified period, the number of abnormal terminations is reset. Application Time-out For behavior at time-out occurrence, one of the following modes can be selected: Forceful termination of an application, and an error message or an exception An error messages without terminating the application In either mode, a thread dump is automatically collected when a time-out occurs. A thread dump is collected into the container information log (info.log). It is output twice, i.e., immediately after, and 10 seconds after, the occurrence of a time-out. If the two thread dumps for a thread show no changes, it indicates that the application running on the thread has a problem. Current Directory The current directory of an application process is as follows: [interstage-install-folder]\j2ee\var\deployment\ijserver\[workunitname]\current\[workunit-name]\[process-id] Note: [Interstage-install-folder] indicates the directory in which Interstage is installed. [workunit-name] is the relevant WorkUnit name. [process-id] is the process ID of the relevant application process. 2-2
27 Defining WorkUnits for Applications Environment Variables The environment variables that need to be used for application processes can be defined in the WorkUnit definition on the Interstage Management Console. Both the environment variables included in the WorkUnit definition on the Interstage Management Console and system environment variables are valid for application processes running under control of the WorkUnit. If an environment variable included in the WorkUnit definition on the Interstage Management Console matches one in the system environment variables, the former environment variable takes precedence. Environment Variables other than PATH and CLASSPATH Both environment variables included in the WorkUnit definition on the Interstage Management Console and system environment variables are valid. If an environment variable in the WorkUnit definition matches one in the system environment variables, the former overwrites the value of the latter. PATH The value of a path in the WorkUnit definition on the Interstage Management Console is set before the value defined by system environment variable PATH. CLASSPATH The value of a classpath in the WorkUnit definition on the Interstage Management Console is set before the value defined by system environment variable CLASSPATH. Although both values are valid, the value in the WorkUnit definition on the Interstage Management Console is given priority. Warning Monitoring This product provides a function that monitors the heap memory utilization by JavaVM and the Perm area to detect a heap shortage and resultant frequent collection of garbage, which leads to the probability of job response deterioration. The function then notifies the heap area problem as a warning message (EXTP4368), which is output to the event log. Warning messages are output based on the following standards: Table 2-1 Output Message Standards Detail message Meaning of warning Occurrence conditions OutOfMemoryError warning has occurred because the Perm region is exhausted: TIME={0} SIZE={1} TIME: Time of occurrence SIZE: Size of the Perm area whose utilization has increased rapidly OutOfMemory may occur because the utilization of the Perm area has been increasing rapidly. An increase in the utilization of the Perm area since the previous measurement exceeds 10% of the entire Perm area, and the utilization of the Perm area will exceed 90% if the utilization is assumed to increase at the same rate. 2-3
28 Chapter 2 : Operating Applications Detail message Meaning of warning Occurrence conditions It takes a long time to do the garbage collection: TIME={0} AVERAGE={1} TIME: Time of occurrence SIZE: Mean time for the past three garbage collections Inefficient garbage collections are run with the short intervals: TIME={0} WEIGHT={1} TIME: Time of occurrence WEIGHT: Utilization of old generation immediately before garbage collection The garbage collections are run with the short intervals because of the lack of memory: TIME={0} SIZE={1} TIME: Time of occurrence SIZE: Heap size that was needed when a warning occurred There are possibilities of OutOfMemoryError because of the lack of memory: TIME={0} SIZE={1} TIME: Time of occurrence SIZE: Heap size that was needed when a warning occurred There are possibilities of OutOfMemoryError because of the lack of the Perm region: TIME={0} SIZE={1} TIME: Time of occurrence SIZE: Perm area size that was needed when a warning occurred It takes too much time for garbage collection. Inefficient garbage collections have occurred at short intervals. Garbage collections have occurred at short intervals because of a memory shortage. OutOfMemory may occur because of a memory shortage. OutOfMemory may occur because of a Perm area shortage. The mean time for the past three garbage collections exceeds 5,000 milliseconds. The past three garbage collections have been performed at intervals shorter than 20,000 milliseconds, and the utilization of the old generation heap immediately before a garbage collection is lower than 65%. The past three garbage collections have been performed at intervals shorter than 20,000 milliseconds, and the utilization of heap memory immediately after a garbage collection is higher than 65%. The utilization of heap memory immediately after a garbage collection exceeds 95%. Alternatively, the utilization of heap memory immediately after a garbage collection exceeds 90% and the usage size of the heap has increased from the time of the previous garbage collection. This state has continued for three or more times. The utilization of the Perm area exceeds 90%. 2-4
29 Defining WorkUnits for Applications Detail message Meaning of warning Occurrence conditions The garbage collections are run with short intervals: TIME={0} INTERVAL={1} TIME: Time of occurrence INTERVAL: Garbage collection interval time The time information is formatted as: Garbage collections have occurred at short intervals. year/month/day hour:minute:second.millisecond. The past three garbage collections have been performed at intervals shorter than 20,000 milliseconds. If the job is continued after a warning message is output, problems such as memory shortage and degraded response time may occur. To prevent these problems, tune the relevant areas based on the information about insufficient resources provided in warning messages. The causes of errors that become problems for JavaVM are heap area and Perm area shortages. To prevent these problems, raise the current upper limits by 20% and restart operation. If a warning is still output, raise the upper limits by another 20%. Repeat this tuning until no warning is output. Repeating tuning until no warning message is output can construct a system that runs stably. To tune the JavaVM heap and Perm areas, set the upper limits of the sizes of the heap and Perm areas in JavaVM options in the WorkUnit definition on the Interstage Management Console. To set the upper limit of the JavaVM heap area, use the -Xmx option. Example: To set the upper limit of the JavaVM heap area to 256 bytes -Xmx256m To set the upper limit of the JavaVM Perm area, use the -XX:MaxPermSize option. Example: To set the upper limit of the JavaVM Perm area to 128 bytes -XX:MaxPermSize=128m Perform tuning in the development phase (system test) to solve potential problems in advance. The methods for increasing the sizes of the heap area and Perm area are explained above. In addition, increasing the process multiplicity of IJServer can also solve problems. Monitor Screen on Interstage Management Console The monitor function of the Interstage Management Console can be used to reference JavaVM performance information. This information about the state of JavaVM can be used as reference information for solving the problem indicated in the warning message. Table 2-2 JavaVM Performance Information Item Process serial number Process ID Container type JavaVM operation time (msec) Explanation Indicates the serial number of a process started by a WorkUnit. Indicates the process ID of JavaVM. Indicates "1VM," "Web," or "EJB" for the JavaVM container type. Indicates the time during which JavaVM has been running. 2-5
30 Chapter 2 : Operating Applications Item JavaVM heap information (Kbytes) JavaVM Perm area information (Kbytes) Garbage collection information Notes Explanation Indicates JavaVM heap information. Current: Current value of heap information. Minimum: Minimum value of heap information after JavaVM started. Maximum: Maximum value of heap information after JavaVM started. Upper limit: Upper limit of JavaVM heap size. The upper limit is almost the same as the heap size specified by the - Xmx option. Indicates JavaVM Perm area information. The Perm area contains information in the Java class file. Current: Current value of Perm area information. Minimum: Minimum value of Perm area information after JavaVM started. Maximum: Maximum value of Perm area information after JavaVM started. Upper limit: Upper limit of JavaVM Perm area size. The upper limit is almost the same as the Perm area size specified by the -XX:MaxPermSize option. Indicates information on JavaVM garbage collection. Frequency: Number of times a garbage collection occurred after JavaVM started. Total processing time (msec): Total processing time for garbage collection after JavaVM started. Average garbage collection interval (msec): Average interval at which garbage collections have occurred after JavaVM started. If the utilization of the JavaVM heap or Perm area rapidly increases in a short period, a warning monitoring message may not be output. In this case, a message indicating a memory shortage is output to the event log. Take action according to the message. If a JavaVM other than the default JavaVM provided by Interstage Application Server V6.0L10 is used, warning monitoring cannot be used. JavaVM Perm area information and garbage collection information on the monitor screen of the Interstage Management Console cannot be used either. The minimum, maximum, and upper limit parameters for JavaVM heap information (Kbytes) are those at the time of recollection of status information. If a JavaVM other than the default JavaVM provided by Interstage Application Server V6.0L10 is used, the following types of information are always indicated as 0 on the monitor screen of the Interstage Management Console: Current, minimum, and maximum parameters for JavaVM Perm area information (Kbytes) 2-6
31 Starting and Stopping WorkUnits Frequency, total processing time (msec), and average garbage collection interval (msec) parameters for garbage collection information If Interstage Application Server Plus Developer V6.0 is used, warning monitoring cannot be used. JavaVM Perm area information and garbage collection information on the monitor screen of the Interstage Management Console cannot be used either. The minimum, maximum, and upper limit parameters for JavaVM heap information (Kbytes) are those at the time of recollection of status information. Starting and Stopping WorkUnits Specify [WorkUnit] in the left frame on the Interstage Management Console. Next, select the name of the WorkUnit to be started from the WorkUnit name list in the right frame, then click the start or stop button. For more information, refer to Help on the Interstage Management Console. Start Time Monitoring The time to wait until completion of WorkUnit startup can be specified. Start processing may hang or delay because of a problem in the start-time execution class or during init processing. If this occurs during the WorkUnit startup wait time, the process can forcibly be terminated to cancel start processing. The default WorkUnit startup wait time is 180 seconds. If needed, change it in the WorkUnit environment definition from the Interstage Management Console. If you don t want to cancel processing until start processing is complete, specify 0 for the WorkUnit startup wait time. If the WorkUnit fails to start up after the startup wait time elapses, a thread dump is automatically collected. A thread dump is collected into the container information log (info.log). It is output twice, i.e., immediately after, and 10 seconds after, the occurrence of a time-out. The cause of the error can be investigated based on changes between the two thread dumps. Stop Time Monitoring The time between completion of the WorkUnit forced process stop after initiation of WorkUnit forced process stop can be specified. If the forced process stop operation hangs during the WorkUnit forced process stop wait time, the process can forcibly be terminated to cancel stop processing. The default WorkUnit forced process stop wait time is 180 seconds. If needed, change it in the WorkUnit environment definition from the Interstage Management Console. If you don t want to cancel processing until stop processing is complete, specify 0 for the WorkUnit forced process stop wait time. If the WorkUnit fails to start up after the forced process stop wait time elapses, a thread dump is automatically collected. A thread dump is collected into the container information log (info.log). It is output twice, i.e., immediately after, and 10 seconds after, the occurrence of a time-out. The cause of the error can be investigated based on changes between the two thread dumps. 2-7
32 Chapter 2 : Operating Applications Notes This function is effective for forcibly terminating the WorkUnit. When an ordinary WorkUnit stop operation is performed from the Interstage Management Console, the stop sequence may not be finished in 60 seconds. In this case, an error return occurs on the Interstage Management Console while stop processing continues. After some time, re-collect status information to check whether stop processing is complete. If stop processing is still not complete, it can be stopped forcibly. 2-8
33 Chapter 3 Performance Monitoring The Performance Monitoring Tool includes the function that obtains the performance information for the EJB application (for an old version compatible environment) operating on the business server and Light EJB container (for an old version compatible environment), or IJServer EJB container. The Performance Monitoring Tool supports the following two functions. Function of outputting log information to the performance log file This function collects the performance information of specified objects in the performance log file. The accumulated performance information can be output in CSV format using the report output command. Function of monitoring the performance information in real time by a Network Control Manager (Monitoring by MIB) By using the MIB (*2) monitoring function of a Network Control Manager such as Systemwalker CentricMGR (*1), the performance information of the specified object can be displayed and monitored in real time. Displaying and monitoring performance information using a Network Control Manager is called realtime monitoring. Note Performance information on IJServer type IJserver (Web + EJB [1VM]) and IJserver (Web only) cannot be obtained. This section describes how to issue commands on the application server, and display performance information when using Systemwalker CentricMGR as a Network Control Manager. *1) Network Control Manager is a software program for displaying and monitoring performance information on the monitor server. *2) MIB is the abbreviation of the Management Information Base. MIB is a management information area that has been defined for managing the system and TCP/IP information. The Performance Monitoring Tool consists of the performance monitoring logger that collects performance information, and various commands. 3-1
34 Chapter 3: Performance Monitoring The Performance Monitoring Tool The Performance Monitoring Tool provides the commands shown in Figure 3-1 (Windows) and 3-2 (Solaris OE). Figure 3-1 Performance Monitoring Tool Commands 3-2
35 The Performance Monitoring Tool Figure 3-2 Performance Monitoring Tool Commands ispmakeenv command: Creates the performance monitoring environment and starts the performance monitoring logger ispdeleteenv command : Deletes the performance monitoring environment and stops the performance monitoring logger ispstart command : Starts monitoring performance ispstop command : Stops monitoring performance ispstatus command : Displays performance monitoring status information. ispreport command : Outputs the performance log file report ispsetagt command and ispunsetagt command: Registers and unregisters Performance Monitoring Tool in SNMP service Performance monitoring logger: Collects performance monitoring information, reports performance information to the Network Control Manager, and creates performance log files. 3-3
36 Chapter 3: Performance Monitoring Functions of the Performance Monitoring Tool This section describes the functions of the Performance Monitoring Tool Function of Outputting Log Information to the Performance Log File This function collects the performance information of specified objects in the transaction applications and the wrapper in the performance log file. The performance information is collected at the interval specified when creating a performance monitoring environment. Since the accumulated performance information can be output in CSV format by executing the report output command, it is useful in the analysis of the performance information and the accumulation of statistical information. These data items enable detailed performance analysis. The following information can be collected with this function. EJB application (for an old version compatible environment), Light EJB container (for an old version compatible environment), or IJServer EJB container Data collection start date Date the performance information measurement for the record was started Data collection start time Time the performance information measurement for the record was started Data collection end date Date the performance information measurement for the record was finished Data collection end time Time the performance information measurement for the record was finished EJB application name (For EJB application) EJB application name. (Max 256 bytes) Light EJB container name (For Light EJB container) Light EJB container name/ejb application name. (Max 288 bytes) IJServer name/ejb application name (for IJServer EJB container) IJServer name/ejb application name (Max 288 bytes) Method name + signature Name of method to be monitored and signature (type of method argument and return value) 3-4
37 The Performance Monitoring Tool Process ID The process ID of the server application Thread ID ID of a thread in which the method to be monitored operates Request Processing Time (maximum/average/minimum) Time (in milliseconds) required for performing the method indicated under "Method name" in the thread indicated by "Thread ID." This value is used for evaluating a pair of method and signature. Request Processing Wait Time (maximum/average/minimum) Time (in milliseconds) from receiving a request from a client to starting the method operation. This value is used for evaluating each EJB application, Light EJB container or EJB container of IJServer. This value is not collected if the EJB application, Light EJB container or EJB container of IJServer is a message-driven bean. Number of Times the Operation has been Executed Maximum number of requests that wait for being processed by an EJB application, Light EJB container or EJB container of IJServer. This value is used for evaluating each EJB application, Light EJB container or EJB container of IJServer. This value is not collected if the EJB application, Light EJB container or EJB container of IJServer is a message-driven bean. Number of processes Number of the method operations in the thread indicated by "Thread ID." This value is used for evaluating a pair of method and signature. Number of Requests Received Accumulated number of the EJB application, Light EJB container or EJB container of IJServer operations from the start of performance monitoring. This value is used for evaluating each EJB application, Light EJB container or EJB container of IJServer. Number of EJB object (Session) The number of the current EJB objects is output. The number of EJB objects is the difference between the number of executed create methods and executed remove methods. The output value is the maximum value within the interval time. This value is used for evaluating each EJB application, Light EJB container or EJB container of IJServer. This value is not collected if the EJB application, Light EJB container or EJB container of IJServer is a message-driven bean. Passivate number for Entity(maximum) Number of instance pooling in the EJB application, Light EJB container (process) or EJB container of IJServer. The output value is the maximum value within the interval time. This value is used for evaluating each EJB application, Light EJB container or EJB container of IJServer. 3-5
Interstage Application Server V7.0 Single Sign-on Operator's Guide
Interstage Application Server V7.0 Single Sign-on Operator's Guide Single Sign-on Operator's Guide - Preface Trademarks Trademarks of other companies are used in this user guide only to identify particular
More informationManaging Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationhttp://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationSharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
More informationApplication Servers - BEA WebLogic. Installing the Application Server
Proven Practice Application Servers - BEA WebLogic. Installing the Application Server Product(s): IBM Cognos 8.4, BEA WebLogic Server Area of Interest: Infrastructure DOC ID: AS01 Version 8.4.0.0 Application
More informationProblem Detection and Automatic Recovery of Business Applications
Problem Detection and Automatic Recovery of Business Applications V Toshihiro Mimura (Manuscript received January 9, 2007) High reliability is important for mission-critical systems, and to achieve it,
More informationOperation, Monitoring, and Linkage Guide
ucosminexus Application Server Operation, Monitoring, and Linkage Guide 3020-3-Y10-10(E) Relevant program products See the manual ucosminexus Application Server Overview. Export restrictions If you export
More informationTIBCO Hawk SNMP Adapter Installation
TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR
More informationTransNav Management System Documentation. Management Server Guide
Force10 Networks Inc. TransNav Management System Documentation Management Server Guide Release TN4.2.2 Publication Date: April 2009 Document Number: 800-0006-TN422 Rev. A Copyright 2009 Force10 Networks,
More informationDeploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationwebmethods Certificate Toolkit
Title Page webmethods Certificate Toolkit User s Guide Version 7.1.1 January 2008 webmethods Copyright & Document ID This document applies to webmethods Certificate Toolkit Version 7.1.1 and to all subsequent
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationDeploying Microsoft Operations Manager with the BIG-IP system and icontrol
Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -
More informationFileMaker Server 13. FileMaker Server Help
FileMaker Server 13 FileMaker Server Help 2010-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationCentreWare Internet Services Setup and User Guide. Version 2.0
CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More informationJob Management Partner 1/Performance Management - Remote Monitor for Virtual Machine Description, User's Guide and Reference
Job Management Partner 1 Version 10 Job Management Partner 1/Performance Management - Remote Monitor for Virtual Machine Description, User's Guide and Reference 3021-3-353(E) Relevant program products
More informationCrystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
More informationCloud Portal for imagerunner ADVANCE
Cloud Portal for imagerunner ADVANCE User's Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG How This
More informationTIBCO Administrator User s Guide. Software Release 5.7.1 March 2012
TIBCO Administrator User s Guide Software Release 5.7.1 March 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY
More informationSample copy. Introduction To WebLogic Server Property of Web 10.3 Age Solutions Inc.
Introduction To WebLogic Server Property of Web 10.3 Age Solutions Inc. Objectives At the end of this chapter, participants should be able to: Understand basic WebLogic Server architecture Understand the
More informationEnterprise Reporting Server v3.5
Enterprise Reporting Server v3.5 Administrator s Guide January 2001 Edition 2001 WebTrends Corporation Disclaimer WebTrends Corporation makes no representations or warranties with respect to the contents
More informationBasic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )
About Oracle WebLogic Server Oracle WebLogic Server is the industry's best application server for building and deploying enterprise Java EE applications with support for new features for lowering cost
More informationNEC Express5800 Series NEC ESMPRO AlertManager User's Guide
NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs
More informationNEC Storage Performance Monitor/Optimizer User s Manual
NEC Storage Performance Monitor/Optimizer User s Manual NEC Corporation 2001-2003 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation.
More informationTIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationDomains and Network Configuration
5 Domains and Network Configuration In WebLogic Server, a domain is a group of servers, with a common set of configuration information. Every server must be in a domain, whether it is a standalone server
More informationCA Nimsoft Monitor. Probe Guide for IIS Server Monitoring. iis v1.5 series
CA Nimsoft Monitor Probe Guide for IIS Server Monitoring iis v1.5 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and
More informationFurther evolved with trusted and proven technologies
Further evolved with trusted and proven technologies All Rights Reserved. Copyright 2013, Hitachi, Ltd. In this era of cloud computing, system development requires flexibility. The Cosminexus application
More informationSSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
More informationCA Spectrum and CA Service Desk
CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationTivoli Identity Manager
Tivoli Identity Manager Version 4.6 Active Directory Adapter Installation and Configuration Guide SC32-1376-09 Tivoli Identity Manager Version 4.6 Active Directory Adapter Installation and Configuration
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationThis guide consists of the following two chapters and an appendix. Chapter 1 Installing ETERNUSmgr This chapter describes how to install ETERNUSmgr.
Preface This installation guide explains how to install the "ETERNUSmgr for Windows" storage system management software on an ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000,
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationEMC Documentum Content Management Interoperability Services
EMC Documentum Content Management Interoperability Services Version 6.7 Deployment Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com EMC believes the information
More informationAvalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationCHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationHitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide
Hitachi NAS Blade for TagmaStore Universal Storage Platform and Network Storage Controller NAS Blade Error Codes User s Guide MK-95RD280-03 2006 Hitachi, Ltd., Hitachi Data Systems Corporation, ALL RIGHTS
More informationVMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
More information24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
More informationUser Guidance. CimTrak Integrity & Compliance Suite 2.0.6.19
CimTrak Integrity & Compliance Suite 2.0.6.19 Master Repository Management Console File System Agent Network Device Agent Command Line Utility Ping Utility Proxy Utility FTP Repository Interface User Guidance
More informationSimple Scan to Email Setup Guide
Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
More informationHow To Use An Org.Org Adapter On An Org Powerbook (Orb) With An Org Idm.Org (Orber) Powerbook With An Adapter (Orbor) With A Powerbook 2 (Orbi) With The Power
Tivoli Identity Manager Version 4.6 Oracle ERP Adapter Installation and Configuration Guide SC32-1189-02 Tivoli Identity Manager Version 4.6 Oracle ERP Adapter Installation and Configuration Guide SC32-1189-02
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationAscent Capture 5 Web Validation Server Getting Started with Ascent Capture Web Validation Server
Ascent Capture 5 Web Validation Server Getting Started with Ascent Capture Web Validation Server 10300253-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA.
More informationAvaya Network Configuration Manager User Guide
Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information
More informationUse Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
More informationVirtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationStruxureWare Data Center Operation Troubleshooting Guide
StruxureWare Data Center Operation Troubleshooting Guide Versions 7.4 and 7.4.5 1. Power Tool Tip Troubleshooting............................................................................ 2 2. Troubleshooting
More informationAhsay Replication Server v5.5. Administrator s Guide. Ahsay TM Online Backup - Development Department
Ahsay Replication Server v5.5 Administrator s Guide Ahsay TM Online Backup - Development Department October 9, 2009 Copyright Notice Ahsay Systems Corporation Limited 2008. All rights reserved. Author:
More informationIntelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)
Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2) Hyper-V Manager Hyper-V Server R1, R2 Intelligent Power Protector Main
More informationTable of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
More informationNo.1 IT Online training institute from Hyderabad Email: info@sriramtechnologies.com URL: sriramtechnologies.com
I. Basics 1. What is Application Server 2. The need for an Application Server 3. Java Application Solution Architecture 4. 3-tier architecture 5. Various commercial products in 3-tiers 6. The logic behind
More informationPre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix
Standard Setup Guide 1 2 3 4 5 Pre-Installation Checks Installation Creating Users and Quick Setup Usage Examples and Settings Appendix Read this manual carefully before you use this product and keep it
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationTivoli Access Manager Agent for Windows Installation Guide
IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide
More informationv6.1 Websense Enterprise Reporting Administrator s Guide
v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,
More informationExploiting the Web with Tivoli Storage Manager
Exploiting the Web with Tivoli Storage Manager Oxford University ADSM Symposium 29th Sept. - 1st Oct. 1999 Roland Leins, IBM ITSO Center - San Jose leins@us.ibm.com Agenda The Web Client Concept Tivoli
More informationPerformance Monitoring User s Manual
NEC Storage Software Performance Monitoring User s Manual IS025-15E NEC Corporation 2003-2010 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC
More informationOfficeServ Link. User Guide. Version 2.1 June 2005
OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This
More informationSophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More information(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING
(n)code Solutions CA A DIVISION OF GUJARAT NARMADA VALLEY FERTILIZERS COMPANY LIMITED P ROCEDURE F OR D OWNLOADING a Class IIIc SSL Certificate using BEA Weblogic V ERSION 1.0 Page 1 of 8 Procedure for
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
More informationE-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
More informationEnglish ETERNUS CS800 S3. Backup Exec OST Guide
English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps
More informationPRIMEQUEST Integration
C122-E062-01EN PRIMEQUEST Integration for Microsoft Operations Manager FUJITSU LIMITED Preface Purpose This manual explains the MOM management pack (PRIMEQUEST Server Agent MOM Connector), a function
More informationEMC Documentum Content Services for SAP Repository Manager
EMC Documentum Content Services for SAP Repository Manager Version 6.0 Installation Guide P/N 300 005 500 Rev A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com
More informationCA Nimsoft Monitor. Probe Guide for Apache HTTP Server Monitoring. apache v1.5 series
CA Nimsoft Monitor Probe Guide for Apache HTTP Server Monitoring apache v1.5 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change
More informationSystem Settings Guide
System Settings Guide Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG imagerunner 2545i/2545 2535i/2535 2530i/2530
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationWORKING WITH LOAD BALANCING AND QUEUEING FOR ADOBE INDESIGN CS5 SERVER
WORKING WITH LOAD BALANCING AND QUEUEING FOR ADOBE INDESIGN CS5 SERVER 2010 Adobe Systems Incorporated. All rights reserved. Working With Load Balancing and Queueing for Adobe InDesign CS5 Server Adobe,
More informationUser s Manual PowerPanel Shutdown Service Graceful Shutdown and Notification service to ensure power protection of your computer
User s Manual PowerPanel Shutdown Service Graceful Shutdown and Notification service to ensure power protection of your computer Revision 1.1 TABLE OF CONTENTS INTRODUCTION... 1 INSTALLATION GUIDE... 2
More informationSafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
More informationEVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.
WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4
More informationRelease 6.2.1 System Administrator s Guide
IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This
More informationNovell Sentinel Log Manager 1.2 Release Notes. 1 What s New. 1.1 Enhancements to Licenses. Novell. February 2011
Novell Sentinel Log Manager 1.2 Release Notes February 2011 Novell Novell Sentinel Log Manager collects data from a wide variety of devices and applications, including intrusion detection systems, firewalls,
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationConfiguring IBM WebSphere Application Server 6.1 to Support SAS 9.2 Web Applications
Configuration Guide Configuring IBM WebSphere Application Server 6.1 to Support SAS 9.2 Web Applications This document is for SAS installers who want to configure IBM WebSphere Application Server for use
More information13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
More informationStudio 5.0 User s Guide
Studio 5.0 User s Guide wls-ug-administrator-20060728-05 Revised 8/8/06 ii Copyright 2006 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationInstallation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More informationWhite Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
More informationOverview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements.
ServerView User s Guide (For Windows Agent) Areas Covered - Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView
More informationChapter 3 Startup and Shutdown This chapter discusses how to startup and shutdown ETERNUSmgr.
Preface This guide discusses procedures and safeguards relating to the use of ETERNUSmgr to configure ETERNUS DX400 series, ETERNUS DX8000 series, ETERNUS2000, ETERNUS4000, ETERNUS8000, ETERNUS3000, ETERNUS6000,
More informationJUL / 07 VERSION 3.2
JUL / 07 VERSION 3.2 ASETVI EWME smar www.smar.com Specifications and information are subject to change without notice. Up-to-date address information is available on our website. web: www.smar.com/contactus.asp
More informationInstalling SQL Express. For CribMaster 9.2 and Later
Installing SQL Express For CribMaster 9.2 and Later CRIBMASTER USER GUIDE Installing SQL Express Document ID: CM9-031-03012012 Copyright CribMaster. 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004,
More informationInstallation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
More information