Skip navigation.

Administering a Tuxedo Application at Run Time

   Previous Next vertical dots separating previous/next from contents/index/pdf Contents View as PDF   Get Adobe Reader

Starting Up and Shutting Down an Application

The Tasks Involved in Starting Up and Shutting Down an Application

How to Set Your Environment

On Windows

On UNIX

How to Create the TUXCONFIG File

How to Start tlisten at All Sites

tlisten Command Options

How to Manually Propagate the Application-Specific Directories and Files

How to Create a TLOG Device

How to Boot the Application

Sequence of tmboot Tasks for a 2-Machine Configuration

Sequence of tmboot Tasks for Large Applications (Over 50 Machines)

How to Shut Down Your Application

Running tmshutdown

Using the IPC Tool When an Application Fails to Shut Down Properly

Monitoring Your BEA Tuxedo Application

Ways to Monitor Your Application

System and Application Data That You Can Monitor

Monitoring System Data

Monitoring Dynamic and Static Administrative Data

Common Startup and Shutdown Problems

Common Startup Problems

Common Shutdown Problems

Selecting Appropriate Monitoring Tools

Using the BEA Administration Console to Monitor Your Application

Using the Toolbar to Monitor Activities

Using Command-line Utilities to Monitor Your Application

Inspecting Your Configuration Using tmadmin

Generating Reports on Servers and Services Using txrpt

How a tmadmin Session Works

Monitoring Your System Using tmadmin Commands

Using EventBroker to Monitor Your Application

Using Log Files to Monitor Activity

What Is the Transaction Log (TLOG)?

What Is the User Log (ULOG)?

Detecting Errors Using Logs

Analyzing the Transaction Log (TLOG)

Analyzing the User Log (ULOG)

Analyzing tlisten Messages in the ULOG

Estimating Service Workload Using the Application Service Log

Using the MIB to Monitor Your Application

Limiting Your MIB Queries

Querying Global and Local Data

Using tmadmcall to Access Information

Querying and Updating the MIB with ud32

Using the Run-time and User-level Tracing Utility

Managing Errors Using the DBBL and BBLs

Using ATMI to Handle System and Application Errors

Using Configurable Timeout Mechanisms

Configuring Redundant Servers to Handle Failures

Monitoring Multithreaded and Multicontexted Applications

How to Retrieve Data About a Multithreaded/Multicontexted Application Using the MIB

Dynamically Modifying an Application

Dynamic Modification Methods

Tools for Modifying Your Application

Using tmconfig to Make Permanent Changes to Your Configuration

How tmconfig Works

How Results of a tmconfig Task Are Displayed

How to Run tmconfig

How to Set Environment Variables for tmconfig

How to Conduct a tmconfig Walkthrough Session

tmconfig Input Buffer Considerations

Making Temporary Modifications to Your Configuration with tmconfig

How to Add a New Machine

How to Add a Server

How to Activate a Newly Configured Machine

How to Add a New Group

How to Change Data-dependent Routing (DDR) for an Application

How to Change Factory-based Routing (FBR) for an Interface

How to Change Application-wide Parameters

How to Change an Application Password

Limitations on Dynamic Modification Using tmconfig

Tasks That Cannot Be Performed on a Running System

Making Temporary Modifications to Your Configuration with tmadmin

How to Set Environment Variables for tmadmin

How to Suspend Tuxedo ATMI Services or Servers

How to Resume Tuxedo ATMI Services or Servers

How to Advertise Services or Servers

How to Unadvertise Services or Servers

How to Change Service Parameters for Tuxedo ATMI Servers

How to Change Interface Parameters for Tuxedo CORBA Servers

How to Change the AUTOTRAN Timeout Value

How to Suspend Tuxedo CORBA Interfaces

How to Resume Tuxedo CORBA Interfaces

Managing the Network in a Distributed Application

Running a Network for a Distributed Application

Compressing Data Over a Network

How to Set the Compression Level

Selecting Data Compression Thresholds

Balancing Network Request Loads

How to Use Data-Dependent Routing

Example of Data-dependent Routing with a Horizontally-partitioned Database

Example of Data-dependent Routing with Rule-based Servers

How to Change Your Network Configuration

About the EventBroker

What Is an Event?

Differences Between Application-defined and System-defined Events

What Is the EventBroker?

How the EventBroker Works

Event Notification Methods

Severity Levels of System Events

What Are the Benefits of Brokered Events?

Subscribing to Events

Process of Using the EventBroker

How to Configure EventBroker Servers

How to Set the Polling Interval

Subscribing, Posting, and Unsubscribing to Events with the ATMI and the EVENT_MIB

Identifying Event Categories Using eventexpr and filter

Accessing the EventBroker

How to Select a Notification Method

How to Cancel a Subscription to an Event

How to Use the EventBroker with Transactions

How Transactions Work with the EventBroker

Migrating Your Application

What Is Migration?

Performing a Master Migration

Migrating a Server Group

Migrating Machines

Performing a Scheduled Migration

Migration Options

How to Switch the Master and Backup Machines

Examples of Switching MASTER and BACKUP Machines

How to Migrate Server Groups

How to Migrate a Server Group When the Alternate Machine Is Accessible from the Primary Machine

How to Migrate a Server Group When the Alternate Machine Is Not Accessible from the Primary Machine

Examples of Migrating a Server Group

How to Migrate Server Groups from One Machine to Another

How to Migrate Machines When the Alternate Machine Is Accessible from the Primary Machine

How to Migrate Machines When the Alternate Machine Is Not Accessible from the Primary Machine

Examples of Migrating a Machine

How to Cancel a Migration

Example of a Migration Cancellation

How to Migrate Transaction Logs to a Backup Machine

Tuning a BEA Tuxedo ATMI Application

When to Use MSSQ Sets

How to Enable Load Balancing

How to Measure Service Performance Time

How to Assign Priorities to Interfaces or Services

Example of Using Priorities

Using the PRIO Parameter to Enhance Performance

Bundling Services into Servers

When to Bundle Services

Enhancing Overall System Performance

Service and Interface Caching

Removing Authorization and Auditing Security

Using the Multithreaded Bridge

Turning Off Multithreaded Processing

Turning Off XA Transactions

Determining Your System IPC Requirements

Tuning IPC Parameters

Setting the MAXACCESSERS, MAXSERVERS, MAXINTERFACES, and MAXSERVICES Parameters

Setting the MAXGTT, MAXBUFTYPE, and MAXBUFSTYPE Parameters

Tuning with the SANITYSCAN, BLOCKTIME, BBLQUERY, and DBBLWAIT Parameters

Recommended Values for Tuning-related Parameters

Measuring System Traffic

Example of Detecting a System Bottleneck

Detecting Bottlenecks on UNIX Platforms

Detecting Bottlenecks on Windows Platforms

Troubleshooting a BEA Tuxedo Application

Determining Types of Failures

How to Determine the Cause of an Application Failure

How to Determine the Cause of a BEA Tuxedo System Failure

How to Broadcast an Unsolicited Message

Maintaining Your System Files

How to Print the Universal Device List (UDL)

How to Print VTOC Information

How to Reinitialize a Device

How to Create a Device List

How to Destroy a Device List

Recovery Considerations

Repairing Partitioned Networks

Detecting a Partitioned Network

Restoring a Network Connection

Restoring Failed Machines

How to Restore a Failed MASTER Machine

How to Restore a Failed Nonmaster Machine

How to Replace System Components

How to Replace Application Components

Cleaning Up and Restarting Servers Manually

How to Clean Up Resources Associated with Dead Processes

How to Clean Up Other Resources

How to Check the Order in Which BEA Tuxedo CORBA Servers Are Booted

How to Check the Hostname Format and Capitalization of BEA Tuxedo CORBA Servers

Why Some BEA Tuxedo CORBA Clients Fail to Boot

Aborting or Committing Transactions

How to Abort a Transaction

How to Commit a Transaction

How to Recover from Failures When Transactions Are Used

How to Use the IPC Tool When an Application Fails to Shut Down Properly

Troubleshooting Multithreaded/
Multicontexted Applications

Debugging Multithreaded/Multicontexted Applications

Limitations of Protected Mode in a Multithreaded Application

 

Skip footer navigation  Back to Top Previous Next